Wednesday, 2 January 2013

iOS 6‘s ‘Do Not Disturb‘ Not Shutting Off Automatically on New Year‘s Day


      


         iOS 6 users who use Apple's scheduled 'Do Not Disturb' feature may find that their iPhone, iPad or iPod touch hasn't automatically disabled the feature on New Year's morning. The issue was reported on Whirlpool forums as well as our own MacRumors forums. The 'Do Not Disturb' feature silences calls, alerts and notifications when it is enabled.

 Users may optionally schedule 'Do Not Disturb' to activate between specific hours. This allows you to automatically disable calls and notifications while you sleep.

 It's this scheduling feature that appears to be misbehaving on New Year's Day. MacRumors reader Spacesamurai posted about his experience:I am in Japan so it is 2013, and I am finding that my iOS devices (iPhone 4 and iPad 2) are showing 'Do Not Disturb' even though it is outside of the time I set for them. Not sure if this is related to the new year.

Reloading the devices does not help and the software is up-to-date.Spacesamurai's experience has been echoed by others. Apple has had other bugs in the past related to New Year's day. In years past, Apple has had issues with alarms not going off into the new year. Fortunately, the 'Do Not Disturb' feature does not disable alarms set with Apple's built-in Clock app.http://rss.feedsportal.com/c/35070/f/648326/s/27176b93/mf.gif
http://feeds.feedburner.com/~r/MacRumors-All/~4/zBY5vBj_W54

Netbooks to go extinct in 2013



I always thought it was a combination of people wanting or needing new computer and an economy that meant they couldn’t afford normal notebooks that led those who would normally purchase notebooks to the netbook world for a few years. There were a few people out there who purchased the little machines simply because they were tiny and they wanted portability. The netbook also made a nice first computer for younger users.
You could still find few netbooks in 2012, especially earlier in the year but they were nowhere near as popular as they had been in years past. If you’re a fan of the netbook, the little machines are going extinct in 2013. The Guardian reports that Asus announced yesterday that it would not make any more of its Eee netbooks in 2013. During 2012, only Asus and Acer were making netbooks.
Acer also won’t make any more netbooks for 2013. Undoubtedly, there will be a few netbook sales this year as retailers both online and in the real world cut prices to clear remaining inventories. Once the machines Asus and Acer have are constructed are sold, there will be no more. The demise of netbooks is blamed on several factors.
Those factors included an uptick in the economy leading people back to more expensive and more powerful machines such as ultrabooks and traditional laptops. The incredible popularity of tablets such as the iPad and Android offerings are probably the biggest nail in the coffin of the netbook. In 2010 and 2011 netbook sales steadily declined from a high of over 2 million units in Q1 of 2010 to only about 750,000 units sold in Q4 2011.
Story Timeline
·         ASUS Eee PC Flare previews 2012 netbook offerings
·         HP Mini 1104 insists the netbook isn't dead
·         Acer Aspire One 725 netbook packs AMD Fusion
·         Toshiba discontinuing netbooks in the US
[via Guardian]

Thursday, 27 December 2012

HCL Learning enters Africa



HCL Learning, the education division of HCL Infosystems, has signed a memorandum of understanding (MoU) with a South African educational firm Spatial Data Holdings, to launch their products in five African countries including South Africa. Through this agreement the company has already started selling its educational content , tablets anddongles in Africa. The countries are South Africa, Zimbabwe, Zambia, Botswana and Namibia.

"We are mapping content to African educational boards and also modifying them to adapt to dialects and accents prevailing in these countries. The focus of content is primarily on English, Maths and Science," said Rothin Bhattacharyya, EVP Marketing , Strategy and Corporate Development at HCL Infosystems.

While the first wave of institutions driving this initiative in Africa are primarily non-governmental organisations (NGOs), governments are soon expected to step in. "Right now, NGOs and relatively expensive schools are taking up such solutions in Africa. We expect government buying to become big next year," said Bhattacharyya.

At the same time, government laptop buying remains a big source of growth in India. "We will be finishing this week our shipping requirements for the Tamil Nadu project worth about Rs 270 crore. In UP, we have been shortlisted for laptop project and have also applied for their tablet initiative. Governments in Punjab, Goa and Assam, among others, also have similar initiatives declared in their manifestoes," said Bhattacharyya.

HCL Learning, started three years ago, had so far been selling its products mainly in a business-to-business (B2B) fashion but now the company is going business-to-consumer (B2C). It plans to sell its tablets and dongles through more than 600 outlets nationwide in the coming few weeks.

"Introducing dongles allows us to reach on all the 50-60 million computing devices present in Indian market. We will be selling our content and services through retail channel as well as through our longstanding relationships with schools," said Bhatacharyya.

Soon, unlock your car with your NFC-enabled smartphone



Keep misplacing your car keys? Just wave your smartphone to unlock the door!
Engineers at South Korean automobile majorHyundai have invented a new system that will allow your smartphone to double as your car keys, and the technology will be made available to buyers within two years.

Rather than using Bluetooth, the system by Hyundai uses wireless Near Field Communication ( NFC), allowing you to lock and unlock the car by waving your phone over a small tag on the car window.

Inside the car, you place the phone on a pad in the centre console that wirelessly charges it while the content is synced and streamed to the car's infotainment system and touchscreen.

The system can also store in-car preferences, including radio stations, seating positions and even mirror adjustment - with multiple profiles able to be saved for different drivers.

The system was demonstrated on a concept version of Hyundai's popular i30 in Germany.

Hyundai said developing the system was part of the carmaker's aim of producing technology for the mainstream consumer, website carsguide.com.au reported.

"The Connectivity Concept showcases Hyundai's philosophy of making tomorrow's technology accessible to a wide range of customers," Hyundai Motor Europe chief operating officer Allan Rushforth said.

"With this technology, Hyundai is able to harness the all-in-one functionality of existing smartphone technology and integrating it into everyday driving in a seamless fashion," Rushforth said.

Wednesday, 26 December 2012

Industrial sites in Iran under cyber attack



           An internet virus attacked computers at industrial sites in southern Iran, in an apparent extension of a covert cyber war that initially targeted the country's nuclear facilities, an Iranian official said.
Iran, the world's No. 5 oil exporter, has tightened online security since its uranium enrichment centrifuges were hit in 2010 by the Stuxnet computer worm, which Tehran believes was planted by arch-adversaries Israel or the United States.

The unit tasked with fighting cyber attacks, the Passive Defence Organisation, said a virus had infected several sites in Hormozgan province in recent months but was neutralised.

"Enemies are constantly attacking Iran's industrial units through Internet networks in order to create disruptions," Ali Akbar Akhavan, head of the Hormozgan branch of the organisation, was quoted as saying by the Iranian Students' News Agency on Tuesday.

"This virus has even penetrated some manufacturing industries in Hormozgan province, but with timely measures and the cooperation of skilled hackers in the province, the progress of this virus was halted," Akhavan said.

"As an example, the Bandar Abbas Tavanir Co., a producer of electricity in the province and even adjacent provinces, has been the target of Internet attacks in recent months," he said.
Bandar Abbas is the capital of Hormozgan province on Iran's southern coast and home to an oil refinery and container port.

Israeli officials have threatened military action against Iranian nuclear facilities if Western sanctions on Tehran's banking and oil sectors do not persuade the Islamic Republic to shelve its disputed atomic programme.

Western powers suspect Iran is trying to develop the means to produce nuclear weapons. Tehran says it is enriching uranium only for civilian energy.

Iranian authorities said in April that a computer virus was detected inside the control systems of Kharg Island - which handles the vast majority of Iran's crude oil exports - but the terminal had remained operational.
Cyber attackers also slowed Iran's Internet and attacked its offshore oil and gas platforms this year, Iranian officials have said.

Monday, 24 December 2012

Some Anti-Malware basics



This is not a blog post for the IT professional, unless you have little idea how anti-malware, reputation, etc. work.  It is a small primer for those who don’t quite get all this anti-malware stuff.At its core anti-malware seems pretty straightforward.  You take something that can be run (usually an “image” or “executable”, but for sake of the audience we’ll just say App) and run a mathematical algorithm over it that produces an (almost) unique identifier for that App.  Generally that unique identifier is called a Hash (because of the technique used).  Anytime you run the same algorithm over the same App you get the same Hash.  Two different Apps with same name will have different Hashes. 

 Two Apps that are identical but have different names will get the same Hash.  If someone modifies an app, even slightly, it will have a different Hash.  So the Hash tells you exactly what you have.Anti-Malware software simply computes the Hash for an App and compares it to a “Black List” of Hashes that have been deemed Malware.  Those updates your anti-Malware software does all the time are to update the Black List of Hashes (or Signatures) of known Malware.   While this technique was sufficient in the early (particularly pre-Internet) days, today the Malware can spread rapidly enough to be endemic before your Anti-Malware vendor adds its Hash to their Black List.  More recently Malware authors have taken to constant updating of the App with slight changes so that each copy has a different Hash, defeating the simple Black List mechanism.

With Black Lists of  shrinking effectiveness Anti-Malware has grown to incorporate more sophisticated techniques for detecting Malware.  The problem with these techniques is that they significantly slow down App execution, so another mechanism was needed to minimize their use.  That is the addition of a White List of App Hashes that are known to be safe to run.  Let’s say you go to run Microsoft Excel.  The White List will contain the Hash of Excel’s main executable, excel.exe, as known to have been distributed by Microsoft.  Anti-Malware just checks the Hash and lets Excel run with no further interference.  If the Hash doesn’t match then either excel.exe has been modified or some other App has an executable called excel.exe.  Either way, it won’t be mistaken for the real Microsoft Excel.

Most Apps you run will either be on the White List or Black List and thus Anti-Malware software either lets them run without further interference or blocks them.  But what happens when an App is not on either list?  That’s when the App will be deeply evaluated either before, or while, it is running.The specific techniques for evaluating unknown Apps are beyond this blog posting but basically cover two broad areas.  The first, known as Generic Signatures, is for the Anti-Malware software to scan the image for known indicators that this is a particular kind of Malware.  

This helps defend against the case where Malware authors simply keep issuing very slight modifications of their Apps as a way to avoid the Black List.  When a new example of the Malware App is found its Hash is sent to the Anti-Malware vendor so it can be added to the Black List (and thus blocked with less performance impact).The second set of techniques are more dynamic, monitoring an App for suspicious behavior.  If suspicion that the App is Malware is high then execution is blocked, but if it is only slightly suspicious then it is allowed to proceed.  Information about the App may then be sent to the Anti-Malware vendor for analysis and a final determination on if it should be added to the Black List or White List.
Since traditionally unidentified Apps that have either no or only mildly suspicious behaviors are allowed to run it is possible for Malware to slip through these evaluation techniques.  To combat this more complete “Reputation” systems are being incorporated into Anti-Malware software as well as Operating Systems.  With Reputation, an App is onlyallowed to run if it is on the White List.  Unknown applications are completely blocked.  The problem with this approach in the past has been that many legitimate applications would be blocked, making systems almost unusable.  Recent advances have made Reputation far more practical, although in rare cases blocking of legitimate Apps will still occur.

Modern Reputation-based systems are more pro-active in adding Apps to the White List.  In particular they can look at the (verifiable) identity of the author of the App and, if they have a reputation for producing safe apps, automatically add any new (or legitimately changed) App to the White List.  Apps that engage in suspicious or clearly harmful behavior can be removed from the White List, blocking their execution.  This will also “damage” the reputation of the App’s author, making it more difficult for their Apps to be added to the White List.  Apps obtained from a tightly controlled “Store” like the Windows Store or Apple’s App Store receive the most direct reputation verification and are always on the White List (unless pulled from the Store). 

 By changing the focus of Anti-Malware from the Black List to the White List Reputation-based systems protect against Malware even before it is identified as such.Other techniques contribute to fighting Malware as well.  URL Filtering uses a Black List/White List technique to keep users from navigating to web sites that are known to distribute Malware or have done so in the past.  Email Filtering removes Malware-infested images from mail, and keeps SPAM (many of whose links take you to Malware distributing websites) out of your Inbox.  Firewalls help block Malware from communicating to the outside world.That’s the simple tutorial.  Hopefully one of the things it does is explain why Reputation is so important.  It’s really the only technique that gets ahead of the Malware authors.

Delete duplicate rows with no primary key on a SQL Server table


Problem
Every once in awhile a table gets created without a primary key and duplicate records get entered.  The problem gets even worse when you have two identical rows in the table and there is no way to distinguish between the two rows.  So how do you delete the duplicate record?
Solution
One option that SQL Server gives you is the ability to set ROWCOUNT which limits the numbers of records affected by a command.  The default value is 0 which means all records, but this value can be set prior to running a command.  So let's create a table and add 4 records with one duplicate record.
Create a table called duplicateTest and add 4 records.
CREATE TABLE dbo.duplicateTest 

[ID] [int] 
[FirstName] [varchar](25), 
[LastName] [varchar](25)  
ON [PRIMARY] 

INSERT INTO dbo.duplicateTest VALUES(1'Bob','Smith'
INSERT INTO dbo.duplicateTest VALUES(2'Dave','Jones'
INSERT INTO dbo.duplicateTest VALUES(3'Karen','White'
INSERT INTO dbo.duplicateTest VALUES(1'Bob','Smith')
If we select all data we get the following:
SELECT FROM dbo.duplicateTest
ID
FirstName
LastName
1
Bob
Smith
2
Dave
Jones
3
Karen
White
1
Bob
Smith
If we try to select the record for Bob Smith will all of the available values such as the following query:
SELECT FROM dbo.duplicateTest WHERE ID AND FirstName 'Bob' AND LastName 'Smith'
We still get 2 rows of data:
ID
FirstName
LastName
1
Bob
Smith
1
Bob
Smith
So to delete the duplicate record with SQL Server 2000 and 2005 we can use the SET ROWCOUNT command to limit the number of rows affected by a query.  By setting it to 1 we can just delete one of these rows in the table.  Note: the select commands are just used to show the data prior and after the delete occurs.
SELECT FROM dbo.duplicateTest 

SET ROWCOUNT 
DELETE FROM dbo.duplicateTest WHERE ID 
SET ROWCOUNT 

SELECT FROM dbo.duplicateTest

With SQL Server 2005 we can also use the TOP command when we issue the delete, such as the following. Note: the select commands are just used to show the data prior and after the delete occurs.
SELECT FROM dbo.duplicateTest 
DELETE TOP(1FROM dbo.duplicateTest WHERE ID 
SELECT FROM dbo.duplicateTest

So as you can see with SQL Server 2005 there are two options to allow you to delete duplicate identical rows of data in your tables.
Here is one note from Microsoft about using SET ROWCOUNT:

Using SET ROWCOUNT will not affect DELETE, INSERT, and UPDATE statements in the next release of SQL Server. Avoid using SET ROWCOUNT together with DELETE, INSERT, and UPDATE statements in new development work, and plan to modify applications that currently use it. Also, for DELETE, INSERT, and UPDATE statements that currently use SET ROWCOUNT, we recommend that you rewrite them to use the TOP syntax.


Sample Text

Sample text