اعلانات

السبت، 4 يونيو 2016

Three cases in which your phone may breach and operates the camera without your knowledge! .. Vahdhirha!

From the headquarters of the company leading the field of Internet security around the world, "Check Point," said security expert for the Internet, "Michael Shiloh," the types of breakthroughs for mobile phones:

- The first is a common attack, a user get a text message from any internal number within the region in which they live and presses on the link

- The second was discovered by the company "Check Point" and informed the American company "Apple" it is targeted for general business networks in addition to the "Apple" operating system, and the letter that looks like an official or coming from the employer.

- The third of the intrusion and called "Stage Fright," which affects nearly ninety percent of the devices operating system "Android".

During the coming period Beware of emails and links bombs through the Internet, you hit your phone or computer.

Virus similar to "Petya" a category of "ransomware" encrypts the hard drive and prevents you finally have access to the files only after the money is paid to the owner.

He was able programmed for this virus to reach dozens of devices through booby-trapped e-mails to anyone wishing to employment in one of the companies, and there is no files attached within the letter but there is a link booby-trapped biography on the website of "DropBox" would befall the device certainly if you press on him.

But the virus begins to form work immediately after pressing him who shall amend the first boot your computer "MBR" status also prevents you from that up to a hard drive and you will see a new message also bomb that tells you that an ongoing reform of the system, but he and unfortunately, during the examination process works virus on encryption All of your data.

After the completion of the encryption process, you receive a red screen and the message to tell you that your computer Encode once and will not be able to access your files only after they enter the world of the Internet dark and then making a payment to the developer of the virus to be able to get the key to save your files.

Apple overhauled "Error 56" .. what about the 53 ?!

American company "Apple" released a new version of its "iOS 9.3.2" devoted to computers 9.7-inch "iPad Pro" tablet, and works that update to solve the problem, which was the reason for the problems of many tablet computers that have already emerged after the installation of the updated version of "iOS devices 9.3.2. "


Users can also "iPad Pro" with a 9.7-inch install the new version of the system "iOS 9.3.2" over the number of construction "13F72" through the air updates, and can be installed on devices "iPad Pro" is working on a version of the operating system older than the current.

The new update is available for the operating system, "iOS 9.3.2" new load devices "iPad Pro" copy "Wi-Fi", and devices "iPad Pro" normal version.

The "Apple" may have to issue new update "iOS 9.3.2" phones "iPhone" and "iPad" in the middle of the month of May, to the many users of computers "iPad Pro" shortly after reporting on the appearance of a problem "error 56" Error 56, and then by trying to download the update.

As the user must, after showing his fault that connects its second iPad device in order to perform a System Restore process through the "iTunes" program, however this did not succeed users to find a solution to the problem.

What are the virtues of the month of Ramadan

In the name of God, thank God, peace and blessings be upon the Messenger of Allah, and his family and companions and guided Companions. As yet, that the holy month of Ramadan preferred a great big place in Islam, fast for this month it is the duty of every Muslim, which is to fast the fourth pillar of the five pillars of Islam. According to a lot of religious texts that shows the virtue of the month of Ramadan has its advantages and which is characterized by the rest of the months, and those texts saying peace be upon him: «If you entered the month of Ramadan opened the gates of heaven, and closed the gates of hell, and the devils are chained. », And in another interview:« When Ramadan comes, opened the doors of paradise. »[Both reports were narrated by Bukhari]. One of the values ​​of this month that when he came to open the gates of heaven and paradise, and close the gates of hell, the sequence and the devils are chained. Ramadan has excelled all other months that the night is considered the greatest night in the year, which is Laylat al-Qadr, also excelled on the other also that fasting is the cause of the forgiveness of sins, as the Messenger of Allah, peace be upon him said: «of Qadr out of faith and anticipation, forgive his sins. It fasts Ramadan out of faith and hope of reward will be forgiven his previous sins. »[Bukhari]. In the month of Ramadan, Laylat al-Qadr, described by Allah in the Holy Qur'an that it is better than a thousand months, it is night in which Allah revealed the Koran one sentence to the house of glory in heaven, and then differentiated according to the realities of the twenty-three years old inn, as narrated this Ibn Abbas, may Allah be pleased with him. On the other virtues of this month, that is equivalent to Hajj pilgrimage, as stated this in a proper conversations fixed for the Messenger of Allah, that which was characterized by the month of Ramadan for the rest of the months. Among other things, which was characterized by the month of Ramadan from other months that the tarawih prayer, this prayer is not only in Ramadan, also called a prayer to do, and came as narrated from the Messenger of Allah, peace be upon him that the Ramadan belief and anticipation forgiven his sins. Fasting and are considered to expiate for her sins, it should be for a Muslim to take this opportunity to atone for his sins. This is what God opened by us, and we collected from the virtues of the month of Ramadan, and is no doubt that this article did not understand all the virtues of the month of Ramadan, the month of Ramadan Vvdhail more than the limit in these words. In conclusion, we ask God to make this work purely for Allah's sake, and we ask that is acceptable to us, thank God....

How cleaner device from viruses

P technological development has become many people use this development to the detriment of others, they start doing the virus and they are published in order to count as a victim and the machine get infected, and the virus is a small object made of the programs is similar to doubt the spider and the aim is to harm or may have a commercial , and aims to control the device from the add and remove or modify or do stole some of the data, and of doing these viruses are programmed professionals, and may be a computer virus directly when you open the program, or it may be a hidden snaps in the memory of the computer and the injury all program opens in computer memory, they are disguised behind files, and usually come viruses from websites, and to detect the presence of viruses in the device should be noted some cases that infect the machine and is that the device will become slow to a large extent, the messages will appear line for several programs, the disappearance of some of the files, or not to open some applications, and is doing coders order can no selling then anti-virus software and thus earn many money, and for the prevention of infection by viruses we must examine floppy disks before you use them, and we that we are not to download any file from the internet before making sure his safety, and attention to the game programs which are usually contain many harmful devices viruses, try to use original software or licensed, and the use of a password for the device to prevent tampering with your device, and constant updating of the programs virus protection after we downloaded Al device, and use a firewall and these programs are programs to prevent the hidden communication, attention of the messages that may be sent to you by email do not open any of them is that to be sure it is intact and it is reliable, not to open the sites of others immoral because so many uses for their experiences viral, and remove you've begun to suspect device Ped doing those steps virus to remove viruses from your computer, click on Start, and then typing cmd, and then you will see a screen and called dOS, type the ntsd and then press Inter, the wizard will then begin to get rid of viruses and even if you have antivirus software, such as Ante virus will speed up the work, and then you press the Inter, and you'll notice that your computer has become faster and he was getting rid of viruses, knowing that this method is used with Ante virus to get rid of dangerous viruses, which can not be disposed of by weak programs.

What information technology

Technology is the twentieth century and beyond are very critical of the toolset systems, which are man-made. In the present era of many titles and important inventions in our daily life appeared, the mismatch harmful and positive ones, but all the cases they constitute something essential and necessary in our daily lives, and from this standpoint we will be talking today about a novelty term, namely information technology. IT technology (known to American information group), as "the study, design, development, activation, support or management of information that depend on computer systems," and they are used and applied to computers and software applications, these applications are transforming, storing, handling and sending and securely retrieve information of all kinds. IT competence of a broad interested in technology and aspects related to the treatment and management of information, especially in large organizations. It expresses the shortcut information IT technology. The deal IT technology with electronic computers and computer software to work on the storage and transfer of data and protection, transfer and restore them at any time. At the present time it does not dispense with any organization for information technology, and differed specialists call it is said they are networking and software technology, and is said to be information technology, also called in some companies: Information Services Section (IS), or management information systems (MSP), or a service provider Organization (MSP). IT technology that applicable standards on computers for information rights fails processing and its traditional regular way, especially in large and massive information and data quantum communities, and point to how great the information loses control and processed accurately and quickly, not only using modern information technology, which operates in many areas including: scientific research, finance and business, and the economy. And technology advantages of information technology: low economic cost and the ability to do many different areas of work in less time and less effort through the rules and regulations of the various information and using various programs. We call on all related communications and computer software help to deal independently or in a network with several devices under other equipment. And in informatics ultimately it means that there are three basic elements: First, physical entity Kalhacob and related equipment. Second, software running on the computer, and the software running on the computer to run and do different tasks, and thirdly and finally cognitive resources. Will not linger to talk a lot, but here we have Oodzna some information about information technology, which are spread in our time dramatically technology, we will be able detail where because every part of this great sea will take our research so that we can understand them and work on them, the intensity of splendor and accuracy of the finite and the large number of advantages