This is default featured slide 1 title
This is default featured slide 2 title
This is default featured slide 3 title
This is default featured slide 4 title
This is default featured slide 5 title

Monthly Archives: May 2017

Recognize Online Fraud

Scamming Techniques
The broader term for all kinds of scams and hacking technique is social engineering. This is what developers with malicious intent do to trick people and influence their decisions. The most heard of term is called cold reading where most of the time another is tricking the victims into revealing facts about them and their private information. Additionally knowing your target is yet another trick that is employed by such developers, who are more into collecting maximum information on likes and dislikes of users online. Ads and choices of ads whenever clicked or accessed by users go directly to the database of such companies.

It all begins by harnessing information from various social media websites. These are not merely information gathering techniques but also about strategizing attacks based on information received. Facebook seems to be the ultimate social media circuit where numerous users are often taking various surveys, quizzes or clicking ads choices.

The best tactic employed by scammers is to not let a user think critically. The best example is that of an ad, which is designed as Amazon shipping e-mail. It seems more like a personal message that has arrived from Amazon about an order delay due to declined credit card. Often a user falls to this trap and clicks the link within the e-mail without once checking the authenticity of the source. Then the link is directed towards a website where a user is supposed to share financial information. Often many fall into this trap and divulge their private information.

The trick involves carrying out a survey online and then picking popular choice like shopping website or game downloads anything that users are interested at large. Online shopping is a widespread phenomenon that requires transfers from PayPal, Amazon orders and UPS shipping.

Telerobotics versus Telepresence

Telerobotics is often confused with the idea of Telepresence (TP). Both have a role to play in shaping the way that future security systems will act. So, what is the difference between telepresence and telerobotics?

Telepresence allows you to feel like you are in a remote location without actually being in a remote location. Currently, it’s about pumping the highest resolution video and audio to the remote viewer in order to simulate the environment in which the sensing/recording equipment have been placed. This type of solution is going to be focused on improving what the camera and microphone can detect as well as bandwidth utilization. Some common examples of consumer tools include Skype, FaceTime and Google Hangouts.

These are all essentially telepresence applications that can be used from your computer or cell phone. Other than the focus on real-time interaction, this is effectively the current state of the surveillance industry. The video and audio feeds are as real time as possible and an individual can theoretically monitor those feeds from anywhere. This likely means that future applications in security for telepresence may be more about access control or real-time interactions in areas too dangerous/sensitive to host humans.

Telerobotics takes the idea from telepresence one step further. If TP is a remote set of eye and ears, TR is eyes, ears, hands and feet. It allows you to not only see/hear the location and interact via 2-way audio but also to interact physically with objects in the remote location and to navigate the TR hardware around the remote space. This capability could radically alter the way surveillance and security are done.

A telerobotics system could be set up to open doors, physically interact with people or even pull a fire alarm if the situation calls for it. It could also be used to greet guests to the facility or any of a very wide set of tasks that would normally require a human being to be in a specific location. No more having views locked to the focal points of a set of cameras and wondering what is happening just out of shot. With TR, the operator can navigate the hardware anywhere in the facility providing exactly the view needed on any desired location without the need for a bank of cameras. For now, the physical limitations of these systems would be the same as most ‘remote’ technologies. Bandwidth between controller and TR setup, the need to maintain the remote hardware/software and considerations tied to getting a TR setup back in operation should it encounter a significant problem while remote are all considerations that will impact anyone using TR for security.

Use Daydream Mode

Daydream mode is initially made available for Nexus 4 and Android 4.2 users. If you own a Nexus 4 then here is what you need to do:

• Place your Nexus 4 on charging an it will automatically transform into a clock that uses the night mode. This comes handy when you wake up in the middle of night trying to figure out what time it is. The dim light background makes it perfectly visible without being loud.

Displaying Photos

For all those who are always busy clicking pictures and keeping memories alive Google gives them the best option. Photo Table and Photo Frame are such features that are present in the Daydream apps that come handy for an amazing slideshow. You can create slideshows by gathering pictures or albums from the Gallery. When you enable the mode your device will begin to display pictures from albums. This is what you call transforming your device into a digital picture frame. The screen will display one picture at a time when you use the Photo Frame app but if you want to display multiple pictures then use the Photo Table app.

Displaying Quotes

For a more inspirational morning and positive start of your day you can even render Daydream Quotes to display random quotes. Whenever your device is on this mode it will automatically begin to display quotes. The neat display of white on black will instantly grab your attention without being loud.


This is yet another interesting aspect that is compatible with Daydream Mode. Flipboard serves you with instant updates by going through latest updated content available on the app. This way you will be constantly tuned into new and interesting content without any hassle of unlocking your device for checking it.

Other Options

You can check out other options too that include:

• Zoum Twitter that is compatible with Daydream for displaying latest tweets

• Weather Daydream, this is a screen saver that gives you latest weather report; this will cost you $3. Beautiful Widgets is yet another such app that will give you a beautiful display of weather along with time

• Another hidden app in Daydream provides a floating jelly beans display on your device. Go to the Daydream apps and locate BeanFlinger

Some Technology Tricks College Freshman

Electronic appliances and accessories to bring to the dorm
Besides the obvious items: laptop, smart phone, alarm clock and chargers, have you thought of these electronic appliances and accessories to bring to college?
• Noise-cancelling headphones
• Extension cords and cable ties
• Airprint inkjet or laser printer
• Replacement printer ink or laser toner cartridges
Shelf life of unopened ink or laser toner cartridges can be expected to be about 1 year. Compatible or remanufactured printer ink or laser toner cartridges provide cost savings of up to 80% as compared to O.E.M. The best thing is that you can order online and have them delivered to your college mailing address.
• Back up hard-drive
• E-reader or tablet
More and more textbooks are made available in electronic versions. You may want to invest in an e-reader or tablet that enables you to carry your textbooks around campus easily and study on the go.

A wireless set up in the dorm room
College freshmen usually stay in double or triple rooms where space and internet ports are limited. This requires smart organization. Given the number of devices that may need wifi connection, a wireless router is essential. Search the student forum to find out how the current students are setting up the wireless connection.

You will need a working, always-on, broadband internet access with a DSL or cable modem. You will also need a wireless, broadband router with built-in firewall. Then, set up your personal wifi network. Usually it will be a simple “One Step Setup” process explained in the manual.

Cloud storage.
Cloud storage means cyber storage of your media and document files and it is an effective data back-up methodology. An internet hosting service is needed and it allows users to upload files that could then be accessed over the internet from a different computer, tablet, smart phone or networked device, by the same user or possibly by other users, after a password or other authentication is provided. Cloud storage can be expensive. However, there are some free and limited cloud storage services to tap into. To name a few, CNET, Dropbox, Google Drive, SkyDrive and Evernote all provide free and limited space cloud storage services.