Common search

Friday, April 12, 2013

Pictures the strangest way Barber in China

Pictures the strangest way Barber in China

حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-1.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-2.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-3.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-4.jpg 


حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-5.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-6.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-7.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-8.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-9.jpg 



حلاقة - قص الشعر في الصين - اغرب حلاق في العالم Haircut-in-China-10.jpg 

Highest restaurant in the world - Dubai

Highest restaurant in the world - Dubai

اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-1.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-2.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-3.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-4.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-5.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-6.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-7.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-8.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-9.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-10.jpg 


اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-11.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-12.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-13.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-14.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-15.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-16.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-17.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-18.jpg 



اعلى مطعم في العالم - دبي Highest-restaurant-in-the-world-Dubai-19.jpg

Strange animal called Phronima

Strange animal called Phronima
This strange animal is one of the alien species that was found recently in the deep sea mountain chain in the North Atlantic. And the strategy of this animal to survive all of his shows, from home and abroad, in an attempt to hide itself


حيوانات شفافة dz111ez5pp7ktihej4.jpg









Pictures of industrial man Phil installation

Pictures of industrial man Phil installation

اغرب عمليه -  قدم صناعية لفيل uk01agayt615f4nffy.jpgاغرب عمليه -  قدم صناعية لفيل k12ggzyxe64u98dkswp.jpgاغرب عمليه -  قدم صناعية لفيل 8zfthuses26cvr12p2qf.jpgاغرب عمليه -  قدم صناعية لفيل x7ffv0m7cfndzvo09dk1.jpg

Thursday, April 11, 2013

Detection of the first tablet to Egyptian industry

Detection of the first tablet to Egyptian industry

Egypt witnessed on Thursday detected computer Tablet Einar ", is the first tablet to Egyptian industry produce factories banha company for technology industries.

Eng. Yasser revealed judges, Chief Executive of the information technology industry development agency itida, that the idea of the Tablet PC industry locally are available for school and university students with potential and suitable price.

Authority to manufacture 3 million tablet in 2013 and 2014. The goal will be to distribute 20 million flag on University students and schools by 2017.

The judge said he had already finished producing about 10,000 device during the pilot phase will be distributed to students at the universities.

The judge said the cost of producing the 10,000 computer about 10 million pounds, the production cost of the computer is 1,000 Egyptian pounds (about 145 dollars).


Machine specifications
A screen measuring 9.7 inches and resolution 720 x 1024 pixels
Processor with a frequency of 1.6 GHz (model is not specified and the number of cores)
Rear camera 2 megapixel front camera for unspecified precision
1 GB RAM
8 GB internal storage expandable up to 32 GB via microSD
Support for Wi-Fi and 3 g networks
Weight 750 Gr.
Android 4.0 (ice cream sandwich)
The Samsung also is preparing for the opening of a factory in Egypt to produce tablets and other electronic devices.
2013-635012918244525527-452_main
untitl4755ed-1_copy.jpg.crop_display

New Chrome Beta for Android update brings full-screen feature

New Chrome Beta for Android update brings full-screen feature

Google released a new update to version mtsafha beta Chrome Beta for Android, update version no. 27.0.1453.49; is the first version which comes in no. 27 of the Android version.

The new update brings several useful features, including the ability to browse websites on the entire screen (full-screen), and when you scroll down the Web page fades in the top of the browser that the user needs to appear once again, allowing the ability to focus on a larger portion of the content you watch.

New version improvements brought to the title bar at the top, which facilitated the search method, where the search terms will be preserved in the tape rather than replace links pages are used, so the user will be required to rewrite the lyrics full search.

The update also added the ability to view previous tabs on tablets, by holding the back button, as well as allow access to sites that require certificates, with the possibility to specify certificates already installed.

The update also brought improvements and fixes for some problems, including delays in entering text in some text fields, as well as the existence of duplicate items sometimes in the chrome://history page, in addition to solving the problem of slow to open new tabs in some cases, as well as Flash pages sometimes, especially during navigation.

You can download the latest version of the browser Google Chrome Beta shop play for free.

Google launched a service that allows users to move their data in the event of death

Google launched a service that allows users to move their data in the event of death

Google revealed a new service called "inactive" account manager, which enables users to determine what happens to them after a period of non-use.

Google shows over new service page, that service allows the user to specify a timeout after which account is considered inactive for delete or convert data for a specific person, is a service that can help transform the data sensitive electronic after the death of one of his heirs.

Any owner of an account in Google services using a new service which allows certain properties to set timeout "inactivity" that starts from the last login was for the account.

The service offers other properties such as "alert" and that sends an alert via email or SMS to user's phone to alert him that his boat on the account is not active, there is also a "share data" feature which allows adding contacts to convert the account data after expiration of "inactivity".

Recall that any user of Google services can access the service "inactive" account manager via the account settings page, under "account management", or go to the following link,/settings/u/0/account/inactive, google.com after logging in to the account to activate the service

An espionage campaign aimed at gaming companies

An espionage campaign aimed at gaming companies

The expert group published bkasberski lab report contains detailed examination, which analyzes campaign continued the electronic spy organization known as Winnti specializes in cyber crime.

According to a report from Kaspersky Lab, Winnti attacks on group companies operating in the field of online gaming since 2009 and is still active to date. The Group aims to steal electronic certificates signed by the licensed software providers in addition to intellectual property theft, including source code for projects for online games.

It was the first incident, which drew attention to the activities of a criminal Winnti, signed in the fall of 2011, when it detected a malicious Trojan horse program on a large number of computers around the world. And the common denominator between all infected computers is that they used to play a game known auction in the Internet. Shortly after the incident, there were indications that the malicious program the computers players was part of the regular update of the official company server for electronic games. The victims were from infected computers and users are members of the pool players doubted that electronic game publisher was installed malicious software to spy on its customers. But it turned out after that malicious software had been installed on computers by accident and that players cybercriminals targeted already electronic game company.

In response, the company provided the Publisher for the game and the server's owner who posted the Trojans among its clients, a request to Kaspersky Lab for analysis of malicious software. The Trojan is a dynamic link library asset for 64-bit Windows environment and used as operator program. It was a remote administration tool, gives attackers the ability to control the victim's computer without the user's knowledge. This is an important discovery because this Trojan horse program is a malicious program for 64-bit Edition Microsoft Windows has a valid digital signature.

And Kaspersky Lab experts began analyzing campaign Winnti and found more than 30 companies operating in this area was hit by the Winnti, knowing that the majority of the companies involved in the production of electronic video games located in South East Asia. However, companies involved in gaming on the Internet and in Germany, the United States, Japan, China, Russia, Brazil, Peru and Belarus entered among the victims of a Winnti.

In addition to industrial espionage, Kaspersky Lab experts detected the 3 plans for money that may be used by Winnti to get illegal gains:

Do Forex fraud in electronic games like rune or gold used by players to transfer sums of money will default to true.
Use source code stolen from gaming servers to look for gaps within the games to promote and speed up the process of forging coin game and assembled without provoking suspicion.
Use source code stolen from well-known gaming servers in order to publish on pirated validated their servers.
Currently still active, Winnti and planning continue to Kaspersky Lab. And perseveres Kaspersky Lab experts in working with complex it security, electronic games and production sector authorities which issue certificates to detect additional infected servers while helping pull in digital certificates.

It should be noted that Kaspersky Lab products to detect and neutralize malware and copy used in the campaign Winnti, b Backdoor.Win32.Winnti, Backdoor.Win64.Winnti, Rootkit.Win32.Winnti and Rootkit.Win64.Winnti.

.

Powered By Blogger

Search This Blog