Powered by Blogger.

Follow

About me

Instagram

Instagram

Events

Recent Comments

Random Posts

Social Share

Flickr

Popular Posts

Recent comments

Sponsor

Wednesday 30 September 2015

Tagged under:

Ned Stark and Arthur Dayne fighting at the Tower of Joy

Watch the video of Ned Stark and Arthur Dayne fighting at the Tower of Joy

It’s time to go crazy because we have some amazing news for Game of Thrones fans. The production team has started filming scenes for the Tower of Joy scene and today a videos of the fight were posted online!
The shooting is going on at Castillo de Zafra, which is being used as the Tower of Joy. The video shows Ned Stark and Ser Arthur Dayne fighting outside the Tower of Joy. People weren’t allowed near the venue but that didn’t stop some fans sneaking around and capturing the video of the fighting scene. Take a look at the video that has been shared by Javi Marcos


However, that’s not the only video that was posted. Here’s another video that was shared by Richard Atkinson in which we are able to get a better view of the fight.




In the video we can hear Richard talking about Sean Bean fighting with an unknown person. We are sure that it’s the fight between Ned Stark and Ser Arthur Dayne and in the end we can see another person who comes from the back and stabs Dayne. The person must be Howland Reed as Ned Stak has said that Howland Reed had saved his life from Ser Arthur Dayne.

Game Of Thrones airs on April 2016
~Winter Is Here~
Source:GameOfLaughs

Saturday 26 September 2015

Tagged under:

Google Security Engineer Explains Issues With Root and Android Pay

A forum member that has been confirmed as working as a Security Engineer for Google out of Mountain View, has joined XDA in order to discuss the issues with Android Pay on rooted devices, why it will not work and has confirmed that Google are listening to your feedback. Regarding root access and Android Pay he has said this:
” Android users who root their devices are among our most ardent fans and when this group speaks, we listen. A few of us around Google have been listening to threads like this one and we know that you’re disappointed in us. I’m a security engineer who works on Android Pay and so this thread struck me particularly hard. I wanted to reach out to you all and tell you that we hear you.
Google is absolutely committed to keeping Android open and that means encouraging developer builds. While the platform can and should continue to thrive as a developer-friendly environment, there are a handful of applications (that are not part of the platform) where we have to ensure that the security model of Android is intact.
That “ensuring” is done by Android Pay and even third-party applications through the SafetyNet API. As you all might imagine, when payment credentials and–by proxy–real money are involved, security people like me get extra nervous. I and my counterparts in the payments industry took a long, hard look at how to make sure that Android Pay is running on a device that has a well documented set of API’s and a well understood security model.
We concluded that the only way to do this for Android Pay was to ensure that the Android device passes the compatibility test suite–which includes checks for the security model. The earlier Google Wallet tap-and-pay service was structured differently and gave Wallet the ability to independently evaluate the risk of every transaction before payment authorization. In contrast, in Android Pay, we work with payment networks and banks to tokenize your actual card information and only pass this token info to the merchant. The merchant then clears these transactions like traditional card purchases. I know that many of you are experts and power users but it is important to note that we don’t really have a good way to articulate the security nuances of a particular developer device to the entire payments ecosystem or to determine whether you personally might have taken particular countermeasures against attacks–indeed many would not have. “ –  jasondclinton_google
android-pay
Replying to the possibility that this meant that support for rooted device may one day come, Jason stated “I don’t know of any way to currently or in the near future make an assertion that a particular app’s data store is secure on a non-CTS compatible device. As such, for now, the answer is “no”” and replying to one user’s statement that if he had to choose between root and Android Pay, they would choose root, Jason gave his sympathies and claimed that he wished it were possible to achieve root functionality without actually rooting. He has also taken feedback regarding placing a warning in the play store stating that the app will not work on rooted devices.
Unfortunately, it has been confirmed that any non-official build will fail to pass SafetyNet due to the system image not being expected. He continued by stating that. “One way of thinking about this is that the signature can be used as a proxy for previous CTS passing status. (If we were to scan every file and phone device enumerated by the kernel to infer what environment we are running on, we’d bog down your device for tens of minutes.) So, we start with the CTS status inferred by a production image signature and then go about looking for things that don’t look right. This community has identified quite a few of the things that we are looking at, already: presence, of ‘su’, for example.” –  jasondclinton_google
He will continue to monitor related threads regarding Android Pay on XDA, however, cannot promise to reply to all comments, but will certainly be listening. To keep up to date with his comments in the thread, check here. However it’s a step in the right direction, now that we know they are listening and taking constructive feedback in, we will hopefully see more discussion between Google’s staff and forum members.

So there you have it, alas Android Pay is not coming to rooted devices anytime soon, however Google is listening to your feedback and is responding.

Source:XDA

Thursday 17 September 2015

Tagged under:

Game Of Thrones Season 6 News!

Spoiler Warning!

Game Of Thrones Season 6 Episode List:

To all GOT fans.Below is the image of Season 6 episode names.
Here are some of my theories.Please do comment in the below section.



Episode 1 (Kingsmooth) : Deals with the Iron borns (Theon Greyjoy/Reek).It will introduce a new character Euron Greyjoy.

Episode 2 (White Harbour) : It should deal with the faceless men and Arya.Also to say rumour are that Jaqen H'ghar will die in this very season.

Episode 3 (The Mummers Dragon) : As the name suggest it will deal with Daenerys Targaryen and her dragons.There is also a rumor floats that she will reach Westeros in this season.It is very important of her to claim her rights.

Episode 4 (My Lord) : I am not very sure of this but I think that it will be involved to Stannis Baratheon or Jon Snow and The Red Priestess.Note that sources tells that Stannis is still alive.Again in Game Of Thrones you can't tell one is dead unless you see they loose their head!

Episode 5 (The Last Heir) : Again I am not very sure but I think it will involve Tommen Baratheon (Joffrey Baratheon's) younger brother.I think he will die/killed.

Episode 6 (Winds of Winter) : I think you all have guessed it. This episode will be like Winter Is Here!

Episode 7 (Crow's Eye) : This one is very interesting.This episode will involve Bran's (Jon Snow's brother) vision (Greensight) and will show him some battles of the past (Young Ned Stark,Robert Baratheon,Arthur Dayne,Howland Reed,Lyana Stark etc). I think it will also show about Jon Snow's parentage and also about R+L=J.Reportedly watchersonthewall.com and winteriscoming.net also told about this.You can check Here and Here

Episode 8 (Warrior of Light) : As you all might have guessed It should deal with revival/resurrection of Jon Snow and Azor Ahai or The Prince That Was Promised theory.

Episode 9 (The Long Night) : This will be the biggest episode of Season 6 and will deal with the rally on Winterfell.Jon Snow will rally the Wildlings,Umbers and all Stark supporters against Boltons to take back his home.

Episode 10 (Valonqar) : This one is interesting.I think Cersei will be killed by her little brother.It may be Tyrion but I think it will be Jaime.

Again these are my theories and are not to be confused.The Showrunners may change the storyline according to their wishes!

Game Of Thrones Season 6 airs on April 2016.

~Winter Is Here~

Wednesday 16 September 2015

Tagged under:

HP restoration incomplete error "fix"









Problem:


ctoerror.flg file
[21:12:12.07] ChkErrBB.CMD :  Detect some error during PININST_BBV.
[21:12:12.07] ChkErrBB.CMD :  Check c:\system.sav\logs\BurnBootWarn.log
[21:12:12.07] ChkErrBB.CMD :  or, check c:\system.sav\logs\BurnBootMerge.log
[21:12:12.08] ----------------------------------------
[21:12:12.08] Critical error condition was detected at BBV1...
[21:12:12.08]
[21:12:12.08] Refer the following file if exists.
[21:12:12.08]   - c:\system.sav\Logs\BurnBootWarn.log
[21:12:12.08]   - c:\system.sav\Logs\BurnBoot.log
[21:12:12.08]
[21:12:12.08] Switch to 2ndCap's WinPE and show [Recovery Manager]'s Incomplete dialog.
[21:12:12.08] because RM's dialog can't appear on [Start] screen on Win8 environment.
[21:12:12.08] customer may not notice RM already shows Error dialog.
[21:12:12.08]
[21:12:12.08] ----------------------------------------
there might be unexpected reboot during BBV Clean or Last...
The process will cause CTO panic because the image might not be normal...
























Solution:

First use Esc to get into the bios - diable the active keys so you get your fkeys back and - set the boot method to be your recovery media - cdrom or USB etc

Next, reboot and from the HP recovery screen, select your weapon - factory reset, new image etc ... then start the process

Don't go away - after the 2nd of the 3 items (copy files to hd), quicly remove the recovery media. Now, it will use the files it has copied to the HD and wont get confused with the recovery drive - esp during restarts - this time, it should work and you will eventually get back to entering your preferred language and creating your brand new win 8 account again.

Leaving the recovery drive in after the files are copied to the HD and the machine gets itself wrapped up in knots and ends up in the recovery incomplete stage where the 'retry' method asks you to insert media which is already inserted.

Hope This Helps.
Leave your thoughts in the comment section below!

Friday 11 September 2015

Tagged under:

Game Of Thrones Season 6 Major Spoiler!

Kit Harington spotted in Belfast with a cast member. Massive season 6 spoilers ahead!

We know that earlier last month Kit Harington was in Belfast and he also met a cast member but all that wasn’t in anyway linked to the shooting for Game of Thrones season 6 but now we have some massive news!! Warning: Massive spoilers ahead. Don’t say we didn’t warn you.

Game of Thrones fan site, Watchers on the Wall has reported that Game of Thrones is filming scenes for a massive battle in Northern Ireland, which will be part of the 9th episode. So the tradition continues and we can expect another awesome 9th episode in season 6.


The battle with involve armies of Umbers, Boltons, wildlings but the major spoiler is that Kit Harington has been spotted at the sets while participating in the shoot along with Iwan Rheon AKA Ramsay Bolton!

this is a photo of kit harrington and iwon rheon in belfast tonight. you're welcome. jon snow is indeed ALIVE


So it seems that the theories about Jon Snow being resurrected are true and Jon will be freed from the Night’s Watch oath once he is resurrected and he can take revenge against the Boltons.

Another interesting thing is that we had last seen Rickon and Osha split with Bran and others to meet the Umbers and take refuge with them and considering that the Umbers are a part of this battle, it must be to remove the Boltons from Winterfell and replace them with a Stark.

Source:GameOfLaughs

Thursday 10 September 2015

Tagged under:

Top 10 VPN Service providers

Top 10 VPN Service providers which ensure that your browsing stays private and anonymous

Virtual Private Network -VPN is a network technology which links the private network over internet using encryption methods. VPN is generally preferred by corporates, educational institutions, Government agencies and private citizens to facilitate easy access of remote users to secured private networks. VPN is economical as it is much cheaper when compared to private networks, it provides flexibility, not only that VPN users can maintain their anonymity as well as protect themselves from being snooped. VPN works on 4 protocols:
  • IP security (IPSec): IPSec utilizes two methods to encrypt its user’s data :a) transport mode or b) tunneling mode. Transport mode means encryption of  message within the data packet also termed as Payload. Tunneling mode means encryption of the entire data packet.
  • Point-To-Point Tunneling Protocol (PPTP): This is the most widely used protocol; PPTP uses the tunneling method wherein PPTP stores data within the PPP packets which are further stored inside the IP packets which are transported to their destination.
  • Layer 2 Tunneling Protocol (L2TP): It works on two  major features: L2TP Access Concentrator (LAC) and  L2TP Network Server (LNS). LAC: this is a device which terminates the call and LNS: this authenticates the PPP packets as seen earlier in the PPTP.
  • Transport Layer Security (TLS) and Secure Sockets Layer (SSL) i.e. TSL/SSL: This method uses a combination of the authentication and encryption methods which leads to transportation of the data between the servers and client.
There are several VPN service providers which vary in the way the data is secured during its transit over the public network infrastructure. Out of the various VPN providers, Techworm brings you the Top 10 VPN service provide you with privacy and data security :

TorGuard:

No logs are monitored. In addition to a strict “no logging policy” TorGuard also provides second layer of data security with a shared IP configuration due to which it becomes next to impossible to trace the user’s IP address. TorGuard VPN has multiple Socks proxy servers and VPN’s around the world. The entire data is wrapped into single packet by encryption via  tunnel method through secure servers and then this data is again connected to the BitTorrent cloud which gives it the second layer of insulation from being attacked. TorGuard currently maintains 1000+ servers in over 44 countries across the world and are in continuous expansion. TorGuard retains its control on all hardware though it seeks partnerships with data centers who can adhere to strict security criteria. All servers are arranged and managed exclusively by TorGuard’s in house networking team through a single, secure key. TorGuard advises its clients to use OpenVPN connections only and for encryption use AES256 with 2048bit RSA for better security. URL : bit.ly/torguardvpn

Mullvad

Logs are not monitored. Here again a second layer of data security is ensured by making users to share their IP addresses both for IPv4 and IPv6.  Users are normally not monitored however only in case of extreme network abuse the basic tools are used to tackle such network exploitation. This service does not maintain any personal information of the user. It supports BitTorrent. Open VPN using Mullvad client program is the most secured VPN connection. Mullvad assigns a unique number to each downloaded program. This account number identifies user’s account which can be used to make payments and to enable the program to connect. Due to the unique number assigned it helps in the security of the data. URL : mullvad.net/en

IPVanish

This creates a secure environment for day to day web usage. Before user logs onto the net, it is essential to establish IPVanish VPN connection, which will convert entire online data into encrypted tunnel including emails, data transfers, online banking, instant messaging and all online browsing. The encrypted data cannot be intercepted by any third party including  ISP (Internet Service Provider). It supports P2P traffic. It uses OpenVPN, L2TP, and PPTP Protocols for its operations. URL : bit.ly/ipvanis

LiquidVPN

Logs are not retained. LiquidVPN  uses the ‘Modulating IP’ technology, wherein the user’s IP address is changed continuously making it very difficult to track the actions of user on internet. Added to this  is the use of shared IPs, great encryption standards, and a very low starting price. For mitigation of network abuse the SNMP and Mikrotik Layer 7 firewall rules works at hardware level and Zabbix and OSSEC at host level. Their data centers are on short term lease across the world. URL : liquidvpn.com

BTGuard

This service is based on proxy service where the user is able to hide their true IP address from the rest of the world. This is a service specially built for the BitTorrrent users to protect their anonymity. BTGuard was just a basic proxy service that user would need to configure to avail the BitTorrent service however now BTGuard is becoming a handy tool with its easy to install software to protect their anonymity. BTGuard also has an encryption tunnel software for users who require special security for their data. BTGuard stores username, password and e-mail addresses however the IP addresses are never stored. URL : btguard.com

BolehVPN

It hides true location of the user by encrypting and encapsulating the entire data which passes through the VPN hence making it difficult for the snoopers or the third party to intercept or decode the internet traffic. Various features of  BolehVPN can be listed as : it protects the user by masking the IP address, the data is encrypted throughout i.e. to and fro when it passes the VPN server, it accelerates the P2P, It also hides the true location of user due to which user appears to hail from a different location and last it also helps users to bypass certain corporate firewalls. It is based on Open VPN and SSL VPN. URL : bolehvpn.net

HideIPVPN

It is based on combination of  PPTP, SSTP, L2TP, IPSec, OpenVPN and SmartDNS. It is compatible with a huge list of operating systems Windows, Mac, Linux, Routers etc. HideIPVPN offers a very high quality of anonymity to its users on the internet wherein user can access even the blocked websites, surf the web anonymously, hide the IP address and encrypt user’s data. HideIPVPN does not restrict access to any online sites or services. All data going out and coming in via VPN is encrypted, secured and it also hides IP address which  means one can safely access secure websites without anyone intercepting the connections. The encrypted data is hidden from user’s ISP and network administrator too which means only user and the destination will be able to see what is being sent. SmartDNS service helps the user to access more than 35 online media services from around the world hence it is ideal for anyone who has limited cable access to TV channels, by using HideIPVPN user can change their DNS name and hence get easy access to the blocked TV / media servers. URL : hideipvpn.com

SlickVPN

An IP address acts as a digital signature which helps to detect the location of the user to any website or to the Internet Service Provider i.e. ISP. SlickVPN hides the true IP address of user by assigning them an anonymous one hence enabling user to hide their location from snoopers. If any user connects to SlickVPN, a connection will be created between user’s computer and our servers. SlickVPN encrypts any data transmissions or online activity so that user’s presence is anonymous; in addition the connection is also secured by SlickVPN so that the Internet activity, usernames, passwords, emails, instant messages, downloads, uploads, etc. are shielded from third party. URL : slickvpn.com

Unspyable

This uses an Off-Shore VPN service wherein VPN encrypts the entire internet connection and creates an encrypted tunnel between the user’s computer and the server chosen by user from the preferred list of servers. Now whenever user browses the internet, all the web sites which user visited would see the address of the remote server and not the real IP address of the user. Due to the encrypted tunnel between user and server, user’s IP address is now anonymous. Hence none of user’s information is available on the local network nor to the local ISP or to government censors and monitoring. For users who want a higher security Unspyable also offers the Multiple Hop VPN wherein just as in Off Shore VPN the data is made to pass through a multiple off shore hops / servers which is very difficult to crack. Major benefits of this VPN :Provide secure and private offshore email logs which is not saved or monitored, correspondence is secured using hot spots, Anonymity of IP address. URL : unspyable.com

NordVPN

This provides a great 256bit AES OpenVPN protection and there are PPTP and L2TP/IPSec connections available. As soon as user connects to the NordVPN a tunnel is created between user and the server and all the data in this route is encrypted. NordVPN is also one of the only VPNs to allow Tor over VPN and has a double-hop encryption system which cannot be cracked. Tor over VPN is an advanced privacy solution provided by NordVPN.
The basic principle here : User first connects to NordVPN server which then routes all traffic through a widely known Tor network. Here the data is encrypted within NordVPN layer at the initial stage and later sent to the Tor network. The Tor is more safer for privacy as the encrypted data is made to route through a few Tor hops and finally reach its destination helping in maintaining the anonymity of user’s vital information and also DNS traffic is also routed through the Tor network user’s will be able to access ” .onion websites” or the hidden websites just using NordVPN. URL : nordvpn.com

The above are the top VPN services that we like, however there may be others which are better those given above. If you have found a better VPN service, drop the name of the provider in the comments section so it can help other users to stay secure and private.
Tagged under:

Nextbit Robin



It's a long (and steep) road ahead, but there's promise in this smartphone startup.
Nextbit is a fresh mobile startup that's already off to a hot start with its first phone, Robin, which raised more than $900,000 on Kickstarter in just its first week of crowdfunding. The phone isn't coming to retail until early in 2016, but we've had an opportunity to get our hands on some pre-production units and see what Robin — and Nextbit as a whole — is all about.
Here's an early look at the hardware it's bringing to market, and a little more on its company strategy as well.
Robin is one of the most interesting looking (and feeling) devices I've had my eyes and hands on in some time. Part of that is the unique "mint" and white color scheme, but this is a very cool device in the darker blue (almost black) color as well — and the color I expect a majority of sales to come in.
Robin looks nothing like the rest of the smartphone industry today, and it's refreshing.
It looks nothing like the rest of the smartphone industry today, but Robin certainly has ties to the look of the solid polycarbonate Nokia phones of yesteryear as well as the color and sharp lines of HTC's Desire phones (Scott Croyle, Nextbit's designer, is formerly of HTC). The phone is flat on all sides without feeling sharp, and it has just a few subtle design flourishes that make it stand out. Dual speakers flank the display, there's a notification LED on the top edge of the phone (so it can be seen even when the phone is face down), and an array of four LEDs on the back plate indicate cloud activity happening in the operating system. Some more subtle additions are a fingerprint sensor in the side power button, and a USB-C port on the bottom for charging.
Robin definitely stands out without trying too hard to be flashy and intense. There aren't any chamfered metal edges, swoopy curves, bits of chrome or superfluous design elements — and I find that incredibly refreshing. It's just a phone, with some very clever design decisions, and one that I'm initially a fan of aesthetically. Reactions from around the Internet have been slightly more mixed to be fair, but I think the overall feeling is positive, as is mine.
On the inside you're getting plenty as well — particularly considering the $399 price. Robin has a Snapdragon 808 processor, ample memory and a decent 32GB of storage, a 5.2-inch 1080p display, 2680 mAh battery, 13MP camera, and a few other little perks like quick charging, NFC and a two-tone camera flash. The internals aren't really the big focus of Robin, and I'm OK with that so long as there's enough inside to power the experience it wants — and it seems like there is.
But Robin isn't just about nice-looking hardware — there's a big software component here as well. Nexbit has some lofty ambitions when it comes to value-adds baked into its build of Lollipop on the phone (and they're already working on Android 6.0 Marshmallow), with the tentpole feature being integration with cloud storage right into the operating system. Though the phone has 32GB of internal storage, you also get access to 100GB of Nextbit cloud storage — included for the life of your device — that will automatically back up your photos, videos and apps.
Seamless cloud backup is something nobody else really does, and it has tons of potential.
But this isn't a "push" kind of system, Robin is always backing up for optimization purposes — meaning if you haven't touched an app in a few months, the app's assets (but you your personal app data) will be seamlessly moved to the cloud to clear up your local storage, and you can quickly recall it and pick up right where you left off (with all of your data and preferences) before. The operating system will also back up full-resolution photos to the cloud and keep device-appropriate sized ones, again to save storage.
And that's just what Nextbit has announced so far. The company has bold ambitions to do even more with the cloud and add entirely new features to Robin before and after launch. Of course what's there now is certainly new and not found anywhere else, but Nextbit feels there's more to be done with this cloud-integrated thinking. There are concerns about battery and network issues when you start doing a lot on the cloud, but it also opens up massive possibilities when you don't tie everything down to just the phone's internal hardware itself.
Beyond the cloud features, this is a relatively familiar Lollipop experience, with some simple changes to the interface — primarily in the launcher and color scheme. Nothing feels foreign to anyone who's used Android before, and you still have full access to the suite of Google apps and anything you want to install from Google Play. Considering the pre-production nature of the devices I had access to I can't make any calls on performance (nor would I want to at this point), but I do appreciate Nextbit's software approach — it seems clean, simple and useful, just like the hardware that carries it.
So much can change from now until Robin starts shipping out to Kickstarter backers early next year, but first impressions have me ready and willing to get a full production device in my hands for real long-term use. There are plenty of other questions about the launch — mostly in the realm of retail sales, the future of the Nextbit itself and customer support in the real world — that need answering. But when evaluating it based on what we know now, purely as a phone, Robin is extremely exciting.

Source;AndroidCentral