- your solution - the support for you

Hint for you ! You should have JavaScript enabled for this site ! - see in
menu-option "preferences" of your browser -
this homepage is best seen with browser Firefox and
as e-mail program Thunderbird -

JavaScript cannot contain malicious code and
Firefox as browser is very safe

you can get Firefox at and
Thunderbird at
only in case
you do not want to change the settings of your Microsoft Internet Explorer.
In case you do not want to add Firefox you can add Google Chrome
instead or else browser. In case you have no second browser,
you would depend only on one browser which would have absolutely to work
only under Windows. But search results in non-Windows Browsers are different
(in sense of diversity of opinions) than in case you have only one
single browser under Windows. Search-results with a browser are depending on the installed system. So your view of life has the colour of the surrounding system.

news of today (news of last week are filtered here. The news are checked before if
they are consistent or are obsolete.) :

in future Quant–Computers against upcoming crypto–wave ... ?! ( Januar 6th 2014 – source : WashingtonPost and golem ) :

After revealations in year 2013 about NSA partially a wave began, where end–users encrypt their datas.
New models of quant–computers, which are content of a research, will be faster - up to 1 million times - than a notebook of today.
Processes of encryption and signatures, which existed up to 2013, should be decrypted easier then. According to Snowden NSA is secretly
doing research about development of a quant–computer. This can be read in documents of whistleblower Edward Snowden.
Quant–computers could decrypt a big part of now–a–days used cryptography, so this is not surprising about NSA′s efforts.
Actually it looks as if US Secret Service could not make progress about it and did not achieve more than the public scientists.
There have been only few experiments with smaller Bytes and quant–computers are at moment a theoretical model. They work after
laws of quant–mechanics to fulfill specially mathematical calculations more quickly. For this quant–computers calculate with
so–called combined particles. This idea is going back to Physicist and Winner of Nobel–Prize Richard Feynman, who already
1982 has published this possibility. The quant–computers are calculating with algorithm of Peter Shor (1994) for to
decrypt datas. This would concern any public–key–algorithm for encryption and digital signatures. As well this
concerns public and private keys. The RSA–procedure can be then decrypted as well the method of ElGamal and DSA
encluded too. Diffie–Helmann–swapping–keys and all methods basing on elliptical curves are in danger too.
But the quant–computer has to be 1 million times more quickly, for that en encryption of 256 Bit has then only the strength
of 128 Bit encryption. So one can assume that method with 128 Bit is in danger too, it would have only the safety of 64 Bit
encryption. 64 Bit is then in area of being cracked today easily by actual classical computers – if one has sufficient
money and ressources for this. But for this one needs massive parallel–processing working hardware in big numbers.
And even if quant–computers will exist one day, an attack by them would be extremely utopic. One would need many of
them and much more electricity. Encryption–methods with 256 Bit and hash–methods with 512 Bit are probably
secure for a certain while.

car–factorys are changing board–systems of cars to Android ( Januar 6th 2014 – source: google ) :

After foundation of Open Automotive Alliance (OAA) Google, Audi, Honda, Hyundai and General Motors (GM)
are now co–operating. NVIDIA too is participating in. Their aims are, to embed Android on automobiles and to adjust the usage to the needs
of cardrivers. The OAA plans this for Connected Cars. Open standards should support the docking to mobile world of users. First cars with
integrated Android will be finished by end of this year. More details are kept secretly. Ricky Hudi, leader of department for Electrics/Electronics
Development at Audi, said: ″The co–operation for a common ecosystem will bring improvements and advantages for security of drivers.″
– ″Millions of people are already familiar with Android and use it every day″, said Sundar Pichai, Senior Vice President for Android,
Chrome and Apps at Google. With additional features of Android–platforms in automotive industry, Google partners will have an easier task ″to
embed mobile technics into cars and bring a more comfortable surround for drivers, to focus easier on the traffic.″ Honda wants to
improve security and to ensure comfortable usage of onboard–systems. Yoshiharu Yamamoto said, CEO and director of Hondas
department for technical development. ″The car is the ultimately mobile computer. With onboard–supercomputing–chips
the visions of futuristic cars will be soon real″, said NVIDIA-chief Jen–Hsun Huang. The OAA will boost the
automotive industry into situation ″to bring in cars on to the market more quickly.″ Further manufacturers are
welcome for to participate in OAA – alongside the founding members.

simply forgotten ? ... to lock pins ... ? ( Januar 8th 2014 – source: golem ) :

WLAN–routers have an open backdoor. This concerns brands like Linksys, Netgear, Diamond und Cisco. Their routers offer user′s
datas simply free for download. French engineer Eloi Vanderbeken found this out and posted it at github. His Linksys–Router
WAG200G reacted to signals coming from port 32764. He analyzed the firmware and was then able to execute commands with help
of a script running on this router to retrieve config–files encluded with password–files.
By the documentation of Github and estimated by Hacker News, the backdoor is containing in numerous models of
different providers. Reason for this could be, that concerning models as DSL–Modems are equipped with chipsets
of Taiwan firm Sercomm. By this can be guessed why all pings Vanderbekens resulted back as answer beginning with line
″ScMM\xFF\...″ Heise Security reports that this port is not open alone within the local network.
A special query with search–engine Shodan resulted in displaying 3.000 IP–addresses, who answered
to port 32764, with 60 adresses from Germany. Two weeks ago it was public, that NSA is able to manipulate routers
of Huawei and of Juniper via internet. But US–Whistleblower Snowden has not announced this in his documents,
not too how NSA has done this.

LED–technics improved ( January 11th 2014 – source: golem ) :

Switch Infinia is only available in USA and fits only into E26–sockets. An E27–variant will not be available for
a while. This light–bulb has several LEDs, which are cooled by a liquid (silikon–oil). The problem
of LEDs is, they are saving much energy, but have a pretty high heat–development directly at chip. Because of
cooling cases they are heavier. This LED–Retrofit–bulb only need 6 to 10 Watt, but have a light–power
of 450 to 800 Lumen. The light–colour is at 2.700 Kelvin – this is ″warmwhite″. These bulbs
are dimmable. Time of warranty exceeds to 3 years, – this are for sure 25.000 hours of light switched on permanently.
Price is planned with 12 US–Dollar. LED–lightbulbs contain less poison than energy–saving–lamps.
They offer full lightpower. There is no heating–phase before start of light. This light is different than
Edison′s bulb and in darker times of year less stress for the eyes.

interesting notebook of Huang ( January 11th 2014 – source: golem ) :

Huang blogs, when one cannot hack a notebook, then this notebook does not belong to the owner.
At Huang is blogging frequently about hardware–solutions
for his needs as hardwarehacker and security scientist. He is co–founder of Chumby Open–Source–Hardware.
Two years ago he started to develope his prototype of Novena and has now presented this to the public at annual meeting
of CCC in Hamburg after Christmas. Huang wants to start soon with Crowdfunding to invest into production of Novena.
His self–created mainboard has: a Cortex–A9–Quad–Core–Prozessor iMX6 of Freescale with
1,2 GHz, which is documented about full 6.000 pages completely. Only for GPU, a Vivante GC2000, a binary blob for
hardware–acceleration in 3D is necessary. But Huang is doing without driver for this, because decoding of Videos
can be achieved on his laptop with help of softwaredecoders. Huang and his hacker xobs presented this at 30C3
in Hamburg with their work about non–secure SD–cards. All components are available through distributors
for at least next 5 years. His novena has: an energy–saving LCD Pixel Qi to ensure longer life of accu.
Huang plans a journey with Transsibirian Train and so his Laptop can work 7 days without electricity. For his
hacking Huang has integrated a FPGA (Field Programmable Gate Array) with Spartan–6 CSG324 of
Xilinx into this mainboard. This can be used too for bitcoin–mining, wrote Huang. Along with Gigabit–network–adapter
there is a second 100–MBit–Adapter, which can be used for package–filtering.
In an integrated EEPROM crashlogs can be saved and via Over–the–Gate–USB–port external devices
can be fuzzed or spoofed. In order to compile sourcecode for drivers and firmware there are not only proper
components necessary, but also a SATA–port is given for SSD. The crowdfunding–campaign will start by
February to March 2014 CET – so Huang – but did not tell the price.

All that glitters ...( January 8th 2014 – source: business news in Google ) :

... is not gold. The crashing price for gold is pressing down National Bank of Switzerland (SNB) into red balance.
After estimating calculations the National Bank will face for 2013 a loss of nine Billion Swiss Franken (7,3 Milliards Euro),
as SNB reports. The value of gold stocks has sunken with 15 billion Swiss Franken. There is only a plus of 3 billion Swiss
Franken with foreign currencies as well with an amount of over 3 billion Swiss Franken from liquid turnover paid by bank UBS.
In 2013 the gold price sank with 28 percent. Because of this minus the SNB cannot pay out dividends to shareholders.
This concerns the profit too, so that federal states and their Kantons cannot be paid off. At present gold price is
resurrecting, and is at 1.240,71 Dollar for each ounce. This was possible by increasing purchasing actions of China.
China has overtaken India as worlds biggest gold consumer. Analysts are optimistic about ongoing days in January.
Fifteen augurs asked by Bloomberg are calculating with climbing exchange rates, four remain neutral and only two
are sceptic about this.

uniform charging–device soon on the market ( December 20th 2013 – source: golem ) :

According to European member of parliament Barbara Weiler, soon an uniform charging–device for smartphones and tablets
will be available on the market. This should avoid trouble in usage of mobile devices in future, which has been reached
by European Parliament dealt together with European Counsil, said Weiler. Both legislators have agreed about a new reform
of a guide–line for radio and telephone systems. The universal micro–USB–charging–device for mobiles
as example for, which can be plugged into computers, was announced by German inter–trade organisation Bitkom in
June 2009. Less charging–devices are meaning less electric junk and less pollution for environment.

now it is official – BadBios exists as NSA says ( December 19th 2013 – source: NSA and ) :

( nosy-x has waited several months before this and thought over, if this really can be, because in the beginning there
were only wild rumours. ) Now Debora Plunkett said in an official statement, that a super–virus exists.
General Alexander, chief of NSA, explained, that malware in the web with purpose to destroy the financial system of
United States completely, is existing and cannot be stopped, when NSA is not keeping an observant eye on the internet.
There are some else nations, who would use malware, to bring US–Financial–System to their knees.
If Cyber Command would not undertake actions against this constantly, then USA would not be able, to stop such
attacks, Alexander added. Debora Plunkett, chief of Information Assurance Directorate (IAD), a department
of NSA, responsible for security of Telecommunications– and IT–Systems of United States, explained,
that this malware is working by attacking BIOS, which then makes a complete network defective, as soon as
the first infected computer is rebooting. IT–Security–Companies like Symantec already decades
ago warned about this potentially threat, but it has not been any case known up to today. Of course malware
exists, which infects BIOS and keeps itself saving inside BIOS like Trojan Mebromi.
Reports about a Super–Trojan, which actually came up about ″Badbios″ have always been estimated
as panicmongering. But Plunkett said that such malware has been seen ″in the wild″. ″It can crash
US–business literally″. It is no exaggeration, that security in world–wide states is threatened
by different malware– and hacker–attacks – to understand this, one only need to recall the
incidents in Estland 2007. Estland was target of a military–planned hacker–attack, which lead to
breakdown of several services with their websites. But a malware, which would be able to break down business
completely, would be far–fetched. Security–expert Nicholas Weaver, who did some research several
years ago for Defense Advanced Research Projects Agency (DARPA) about the effects of a
″worst–case worm″, concluded that the chance, to harm the own country would be too big,
so that potential attackers are shying away from an attempt to attack. And if it would come to an attack
with such malware, the effects for business and population would be not less severe, like after
an enormous storm at the US-east-coast.

South–Korea is planning to substitute Windows XP with Ubuntu ( Dezember 18th 2013 – source: ) :

Further official support for Windows XP is ending by April 8th 2014. Many towns, who relied so far on XP, now
have a serious problem. The biggest part of security applications have been provided by Microsoft products and now
there is soon the possibility to upgrade or to pay much money for new licenses, or simply to change to a Linux system.
This way IT–companies and the infrastructure with its administrations are thinking about, whether to substitute
Windows XP with Ubuntu, if and to the extent to this day. To substitute Windows XP with Ubuntu, is not as simple as
thought, cause both systems are two different hats. The users would have to learn new and the administrations would
rather have to pay for courses than to buy new Windows licenses. In many administrations now Linux is a very popular
option, as best example to see in Munich. The Germans have achieved their aims, to shake off the dependency on
Microsoft and to use a Linux–distribution with LibreOffice instead, but it took some years for this.
When South–Korea wants to save much money, then rather Linux is the better possibility to work in place
than Windows.

Google buys former hardware–research center from US–Military ( Dezember 18th 2013 – source: Google ) :

Up to last months Boston Dynamics had manufactured militarian roboters. Now Google has bought Boston Dynamics. About
the price both have agreed to secrecy. A speaker of Google said to New York Times, that some ″given orders of
military will be fulfilled″, but it is not planned, to become an armament factory. Within recent 6 months
this is acquisition number eight for Google as special company for robotics in same row of: Autofuss,
Bot & Dolly, Schaft, Industrial Perception, Meka, Redwood Robotics and Holomni. For this Andy Rubin is
responsible, who himself was taken over by Google with purchase of his Start–Up Android Inc. Rubin began his
career in the Nineties in Germany as engineer for robotics. A roboter is the logo of Android. Boston Dynamics has
developed in recent years several roboters, which prototypes are directed to examples of animals, like: BigDog, Cheetah
and WildCat. First is a roboter with four legs, who can move track–and–field. In his Youtube–Channel
the company is showing examples for human–like roboters too. There were customers like US–Army, the Marine
Corps and the US–Navy. DARPA as well, who is responsible for research–projects at US–ministery
for defense. Sonys roboter–pet Aibo comes from DARPA. The development of roboters should now be a new
business–branch for Google. Andy Rubin thinks, that the advantage of this for Google lies in, to develop
as well hardware as software for to test codes in interaction with hardware and AI.

way of NSA is illegal, says supreme court of USA ( December 17th 2013 – zdnet : ) :

It is to assume that the collection of telecommunication–datas of several million people by US–service NSA is
illegal. This is the opinion of the judge at the supreme court. A law–suit would have good prospects to be won.
This is the first time, that the NSA is facing trouble by supreme court: The US federal judge, Richard Leon, has described
the massive collection of telephone–datas by NSA as to be supposed illegal last week. This massive surveillance
of datas – Leon is speaking of methods like in George Orwells ″1984″ – is not conform with fourth
addition of US constitution, which guarantees the protection of privacy and is protecting the citizens against incomparatively
searchings by state. But according to Leons estimation this is only a temporary decision: The government has the possibility
to object to this, for reason of ″national security″. Should Leon succeed with his decision, then the NSA
would not be allowed any more to perform massive surveillance of millions of telephone–datas as before. Verizon got
known as first company, who passed on telecommunication–datas to secret services. The revealations of former NSA–agent
Edward Snowden had shown, that the NSA is collecting and watching worldwide datas million times. Five billion data–sequences
of telephone–connections each day are collected by NSA–database with name Fascia. The US–government
always pointed out to, that the collection of datas is allowed and is leading to successful actions against terrorists.
Federal judge Leon is disbelieving this, cause the government has not made any case public, in which NSA–datas have
prevented any terror–attack. Senator Mark Udall, a leading reviewer of ongoing surveillances, is welcoming this
judgement. This judgement is underlining his arguments made years ago already, that massive collections of datas are
colliding with the law of constitution about privacy and this is not ensuring security of USA. For Snowden there are further
no prospects for exemption from punishment. After a high–ranking representative of NSA has brought in the idea about
a settlement for amnesty, the government with president Barack Obama is still demanding extradition of Snowden.
″Our position has not changed,″ said Obamas speaker Jay Carney. The leader of the NSA–observer–group,
Rick Ledgett, has said in television channel CBS that NSA is open towards exemption from punishment, but only if Snowden
stops his revealations with further secret documents. Ledgett said, that he personally thinks it would be worth
to talk about.

new Cyanogenmod available for download ( December 13th 2013 – source: Cyanogenmod ) :

First nightlies of CM 11.0 basing on Android 4.4 are no for over 30 devices free available. CM 11 is supporting models
like: Asus, Google, HTC, LG, Samsung und Sony. Additionally there are the M–Variants basing on Android 4.4 for
Nexus 4,5,7 and 10 available. Recently there were several little security–holes in Android 4.2, 4.3 and 4.4 – but
they are fixed in CM 11.0 already. With Cyanogenmod there are additionally features and one can adjust CM the way, that
certain apps cannot access on personal datas. For installation of Cyanogenmod the bootloader of concerning device has to be
unlocked. Many companies like Sony or HTC offer descriptions in their manuals. Under Windows there are many tools, which
are making installation of Cyanogenmod or a different custom Rom comfortable. Without these tools there is only the
way as manual installation via command line and its Android Debug Bridge (ADB).
With now over 10 Million Users Cyanogenmod is now the most popular community–based Android–Distribution.
At present there are daily 15.000 new installations. By end of June the amount of users was still at 5,6 millions.
Main reason for this popularity could be, that manufacturers like Samsung or HTC would take months, for to adjust a
new Android–version fixing to its device. A further advantage is, that – after Cyanogenmod is installed – it
is not possible to install non–wanted apps, like those, which some manufacturers would like to be installed.
Because some apps, which are installed by manufacturers, cannot be deleted – and this is annoying the users often.
Cyanogenmod offers full access on its device. This is a right as Tim Berners–Lee is demanding too. Full permissions as
administrator on a smartphone could be a central problem, said Berners–Lee at Linux–User–conference in
Canberra, Australia. A device, which does not allow full permissions to the user, is serving a different master. With
Cyanogenmod the user has this full permission.

DHL has tested drones for emergency cases ( December 7th 2013 – source: AP ) :

A little unmanned drone flew across a river with a parcel, which weighed around 6,6 pounds and contained medicaments – as
test at subsidiary company of Deutsche Post namely DHL. This was thought as test, for the case, that there are situations,
in which parcels for emergency cases should be delivered in unapproachable areas. About two weeks ago Amazon has announced
its idea with Prime Air. Their aims were to shorten the delivery times on to 30 minutes at maximum. UPS too is doing
research and testing drones. FedEx founder Fred Smith already had severaly years ago showed interests into this technology.
In the USA these commercial drones are still not allowed, as long as the mandates of FAA are valid until end of 2015.

balance of Mozilla and Firefox ( December 7th 2013 – source: Mozilla ) :

In the meantime there are one half billion desktop users, who use Mozillas Firefox and further 50 million, who use it on their
Android. Mozilla is famous too for its application of StopWatching – and celebrates now the 15th anniversary.
A speaker of Mozilla says that 2014 even will be a better year.

new worldwide alliance against surveillance of the states ( December 7th 2013 – source: zdnet ) :

The eight companies Google, Apple, Facebook, Twitter, AOL, Microsoft, Yahoo and LinkedIn have founded an alliance and name this
as the Reform Government Surveillance Group. Although they are normally aggressively competitors, they came together and
agreed about forming a group against the spying programs of US–government, which have been revealed by Edward Snowden.
They announced wide–scale changes against massive surveillances of the governments. Snowden′s revelations have
included alleged wiretapping, the storage of phone call records illegally, fibre–optic cable infiltration used to monitor
communication on an international scale, and the use of malware to monitor computer networks by the U.S. agency. According
to the latest document leak, the NSA is gathering close to 5 billion records a day on cellular devices worldwide.
The Washington Post says large amounts of domestic data is ″incidentally″ recorded, which allows the agency
to track millions of people worldwide based on how and where mobile devices are used. Facebook CEO Mark Zuckerberg said
that the revelations show a ″real need for greater disclosure and new limits on how governments collect information.″
Brad Smith, Executive Vice President of Legal & Corporate Affairs at Microsoft said that ″surveillance should address
specific, suspicious targets under defined legal process rather than bulk collection of Internet communications.″
Marissa Meyer, CEO of Yahoo, said ″recent revelations about government surveillance activities have shaken the
trust of our users, and it is time for the United States government to act to restore the confidence of citizens
around the world.″ Google CEO and chairman Larry Page commented that user data security was ″critical″
for firms, but this has been ″undermined by the apparent wholesale collection of data, in secret and without
independent oversight, by many governments around the world.″
″The balance in many countries has tipped too far in favor of the state and away from the rights of the
individual rights that are enshrined in our Constitution,″ the letter states. ″This undermines the freedoms
we all cherish. It′s time for a change.″ The U.S. President agrees to an extent. During
a recent appearance on MSNBC′s Hardball, Obama said that he plans to ″propose some
self–restraint on the NSA,″ and push for ″some reforms that that can give people more confidence.″
At the interview, Obama said: ″All of us spend more and more of our lives in cyberspace. We′ve got to be in
there in some way to protect the American people, even as we′re making sure the government doesn′t abuse it.
The Snowden exposures have identified some areas of legitimate concern, but some of it has also been highly
sensationalized. The people at the NSA generally are looking out for the safety of the American people. They are
not interested in reading your emails or text messages, and that′s not something that′s done.″
The company alliance states that they are all taking steps to keep user data secure, including the deployment of
encryption technology to scupper ″unauthorized surveillance on our networks,″ and plan to push back
government requests to ensure they are both legal and reasonable.

Will Steam–Box will be the winner of 2014 ? ( December 5th 2013 – source: Valve )

The Steam Box of Valve will be distributed at same price like XBox One of Microsoft. But the difference is, that the
Steam Box has far more performance than the XBox One. Inside of Steam Box is AMD′s newest R9 270 built in with
over–clocked velocity and 2 GB GDDR5 VRAM. The XBox One has a GPU 7790. Further the Steam Box contains: a 500 GB
harddisk, Wi–Fi support, Bluetooth and the Steam Controller of Valve. Probably there is less support given directly
from Valve for Steam Box, but therefore there are enough solutions in internet–forums for Steam Box. An advantage
too is, that Windows–games can be streamt too with Steam Box.
It is not necessary to pay an annual subsription like at XBox Live Gold paywall, only for to access streaming apps.
The thing is, that at XBox One has to be invested much more to get the same fun, while at Steam Box is offered much more, without
additionally costs. There are no barriers, to plug–in Steam Box to PC of user.
In case Steam Box will run without any problem like the steam–latest–program for PC, then Microsoft
and Sony have a serious opponent, in marketing-segment for consoles. The hardware of Steam Box in overview at
price of about 499,– USD :
– GPU: some units with NVidia Titan, some GTX780, some GTX760, and some GTX660
– CPU: some boxes with Intel : i7-4770, some i5-4570, and some i3
– RAM: 16GB DDR3-1600 (CPU), 3GB DDR5 (GPU)
– Storage: 1TB/8GB Hybrid SSHD
– Power Supply: Internal 450w 80Plus Gold
– Dimensions: approx. 12 x 12.4 x 2.9 in high

new plans of Amazon ( December 2nd 2013 – source: amazon ) :

In the USA Amazon wants to distribute orders with automatic mini–drones. For this the company is developing own
remotely piloted aerial vehicles, founder Jeff Bezos said to US–channel CBS in an interview. The idea is, that
these ″octocopters″ deliver the orders within 30 minutes to customers. Bezos added, that further tests and
admissions are necessary at aeronautical authority. He thinks that Amazon will be ready for this in 4 to 5 years. The
name for this service is : ″Prime Air″. This service is only thought for short distances. The drones
with 8 motors could deliver freight with a weight of up to 5 pounds and each freight could be delivered up to 10 miles,
said Bezos. The team of CBS–program ″60 Minutes″ was able to shoot movies of drones at Amazon. The
company demonstrated in a video, that one drone delivers directly from assembly–line in center for Logistics
to customer in front of his home. The FAA is still working it out, to make rules for possible mission of automatic
drones in US-airspace.

Objections to ideas of Bezos ( December 3th 2013 – source: FAZ and Deutsche Post ) :

A reality–check is unmasking the announcement of Bezos as marketing–stroke of genius: Technically as well as
legally this drone–conept is 5 years away from being realized at least. True, there is progress in technics
concerning drones, but there are still legally barriers and concerns about security. In Germany comitments with drones
would be strictly not possible, because drones fly without pilots. And these aerial vehicles have no sufficiently operating
distance. For this Amazon would have to build a more dense network of Logistic–Centers, to fulfill the operating
distances of 10 miles for each drone. The Deutsche Post (German Mail Company) is thinking about drones too
and is doing research for distribution of parcels in future time. A press speaker said, that this is no new idea.
The company is maintaining a center for research in Troisdorf, which started already 6 years ago. But the Deutsche Post
holds back informations about planned tests, at least there is nothing planned at now. There are still many legally
barriers to take. Like in USA there are no general admissions for civil drones in aerospace of Germany.
The US–adminstration for admissions FAA wants to create rules until 2015. Amazon–founder Bezos admits,
that missions with drones would need an agreement by this US–administration. At present in Germany such drones
are forbidden. In Germany a distribution–service via drones would be not possible, because unstaffed aerial vehicles
in outer view space of the steersman or with a weight of over 50 pounds are strictly forbidden according to brochure of German
federal administration for traffic.

Hacker Samy Kamkar shows, how to capture a drone ( December 4th 2013 – source: github ) :

The concept ″SkyJack″ consists of a Raspberry Pi, a little USB-battery, a W–Lan stick and a drone of
French manufactorer Parrot. This quadrocopter is programmed this way, that further parrot–drones in the near can be
traced. The hackerdrone breaks off the signal and reports itself as owner of the target–drone. After the remote–control
is captured, the hacker can steer the camera and the flight–control. This attack is basing of tracing the MAC–addresses
of the drones, which like network–computers are easy to identify. As soon as the hacker–drone is detecting a
MAC–address like those parrot–vehicles, it is breaking the connection of the target–drone to the
remote–controlling device with an open–source–program. In the end the target–drone is rooted.
Those who don′t want complicated attacks in the air, can capture drones too in peace from the field. There is nothing
more necessary than a Laptop or a little computer, explains Kamkar. In his blog at github, he is cheering about future
captures of drones: ″This is fun, to take over drones, which are on the way with parcels of amazon or which like
every else drone can be changed to little zombie–drones !″

BKA (German police) is repeating warnings about cheating online–shops ( December 2nd 2013 – source: ZDF ) :

The German police is repeating their warnings about cheating online–shops with weird offering deals. One can recognize
them by, that they offer products too cheap, or in bigger amount at discount pricings, or as customer one has to pay in
advance for non–delivered products. It is not sure, if the products will arrive at customer. This can be hot ware,
which has not been shopped by traders somewhere else. Often these online–shops have shopping baskets, where customers
have to pay in advance with online–banking. Normally and seriously business can be recognized, that it is no problem
to pay against bill within 10 or 14 days. Such bills have definitely datas about bank–connection with given tax–number
and clear address of the vendor. (addition of nosy– : nosy–x is because of this – since October 2012 – not
offering shopping–baskets with creditcards–payment and refuses basically the option to pay in advance – for reasons
of security for customers.)

Microsoft changes its strategy ( November 25th 2013 – source: zdnet ) :

According to an interview with Julie Larson–Green, Executive Vice President of Devices and Studios last week,
Microsoft wants to reduce the number of operating systems for mobile devices running currently with 3 versions of Windows.
There′s Windows RT for ARM–based PCs and tablets. And there′s the Windows Phone OS for Windows Phones.
Until spring of 2015 all versions should be reduced to only two. Windows RT seems not to be ″flexible″ enough,
therefore it is ″more seamless and simplified″. Obviously there is a hybrid system in development, which
matches both together Windows RT and Windows Phone OS. In over one year, there will then only be one full Windows and one
hybrid ARM–targeted variant of Windows. Apparently the future users will own different kinds of mobile devices
suiting to certain aims of users. Imaginable is one device for working–space and one for leisure times, aside of
notebook with datas for private use.

Worldwide internet already potentially rooted longer ago ? ( November 25th 2013 – source: SPIEGEL, Handelsblad and Washington Post ) :

This is not concerning 50.000 computers, which are in private use. This concerns 50.000 calculators in fields of networks.
By new documents of Edward Snowden, the NSA has placed invisibly programs worldwide in 50.000 computers in areas of
networks. These programs are doing their jobs like Trojans or spyware. About 1000 Specialists at NSA called in a group
as ″Tailored Access Operations″ (=TAO) are hackers themselves. The Washington Post has reported
recent August 2013 about this TAO–department. In this article it was said about 20.000 concerned computer–systems
until 2008. According to documents of Snowden network computers in Venezuela and Brasilia are infected. These special
hidden programs simply can be switched on or off by data–centre in Fort Meade. Apparently these hidden activities are
fixed in projects of NSA since 1998 like projects at British Service GCHQ, who had injected spyware too at Belgacom this year.
The NSA refuses any commentation of this incident pointing to reasons for national security of USA as usual.

Raspie number 2.000.000 from the assembly–line ( November 18th 2013 – source: zdnet ) :

By end of October already now are sold worldwide 2.000.000 pieces of Raspbery Pi. This bank–card–size piece was
normally thought only as niche–product to be added to hardware portfolio of the manufacturer. But this way it became a
bestseller and the streak of success is not ending. It was calculated, that in January 2014 should run the piece as
number 2.000.000 from the assembly–line – but this beats the expectations.

Android now at percentage of 81,0 % ( November 14th 2013 – source: cnet and IDC ) :

Only in third quarter of 2013 Android already has shipped 211,6 million smartphones – this means a percentage
of 81,0 %. Apple′s iOS is at 13 % while Windows Phone has a percentage of 3,6 %.

Chrome Book taking off – Windows declining ( November 14th 2013 – source: zdnet ) :

In field of low–cost (inexpensive) laptop market, Chrome Book is continuing to take off, while Windows 8
and Windows 8.1 have difficulties to grow with their percentage. The consumers only need a tool of value, which has no
trouble with Office, internet and mail programs, – which is running stable and is to have at a fair price. This way
Chrome Books are sensible solutions for schools. During months from January 2013 to November 2013 – four of Amazon′s
top five selling laptops were Chrome–Books. Users of Windows 7 have only little interest in Windows 8. In case that
Microsoft in last minute will succeed to regain the desktop market, Chrome–Books will own their percentage in low–priced
computer user world.

At present hot topic – decision is already now running until summer 2014 ( November 3th 2013 ) :

By now Linux has on the market of operating–systems ″only″ a percentage of between 1,5 and 2,0 % – but
this refers to sold distributions and not to the number of free downloads on the whole. The number of free Linux–downloads
by now would end up at least at 10 % as percentage (this refers to installed systems after downloads).
When the further support of Windows XP ends by April 2014, then it would mean an additionally percentage of nearly 40 %.
Many customers are not quite convinced by or not quite content with Windows 7 and Windows 8 as well with 8.1 – so this
would mean a potentially additional percentage of between 10 and 20 % for Linux / Unix (as second system).
Too many companies are now thinking about switching to Linux as desktop–system for working–places. A Linux–User,
who has understood how most programs are working, knows that all programs can cope with demands in business like for example
office programs. So time until summer 2014 will decide about, who is in favour for fields in business. If this development
would be the same like it happened at mobiles with Android, then the advantage lies clear at Linux/Unix systems.
The difference is only, Linux/Unix is not as same a target for malware as Android. Advantage would be, that with
Linux/Unix-systems, there is less surveillance possible than in times before. Windows XP and Windows 7 together have
a percentage of up to 80 %. On the whole this would affect a percentage on the market of operating–systems by
between 20 and 40 % – seen real – to favours of Linux – according to estimation of nosy–

Steam Valve is good for popularity of Linux ( November 3th 2013 – source: google ) :

Linus Torvalds said: ″Valve′s Steam for Linux is the best opportunity to help the Linux desktop.″ – from this view Steam
of Valve could be a boost for Linux. Good about Valve is, that in their portfolio are many games to have for low
pocket–money. So Valve is friendly towards children and their incomes. One does not have to have a console for this
and can install the Valve–Steam–package under Linux. By this point Valve is more consumer–friendly than
the established vendors of console–games.

Microsoft took back update of Windows 8.0 and 8.1 ( October 20th 2013 – source: ) :

Microsoft has removed the update to Windows RT 8.1 from its store. Reason is that users reported about difficulties with
update. After update, there was trouble to boot the system. For this reason the software has been removed from App–Store.
An User found a workaround for this as solution, and published it in a blog. But for this solution a bootable usb–stick
is necessary. Recent Thursday, October 18th the update for Windows 8.1 and Windows RT 8.1 was published. We reported about that.
Windows RT 8.1 is thought for mobile devices contrary to Windows 8.1 – this is why RT 8.1 does not have Windows Media
Player and Media Center as content. In June newspapers Digitimes reported, related to manufacturers in Taiwan, that most
Computer manufacturers have stopped to develope new products for Windows RT. This could make Microsoft a single vendor
with Surface RT of second generation.

BKA reports more cheating online–portals ( October 20th 2013 – source: Welt am Sonntag ) :

The associaton for German policemen is warning consumers of cheating online–shops. They would deliver the paid ware never. Germany is place number one
for those ″fake–shops″. Before Christmas time number of fake–shops is raising because many users
are shopping blindly in the web. The association warns especially of so–called ″snips″ which are like
national–sport as thefts of bicycles. The Federal Criminal Agency (BKA) advices consumers to keep themselves
from too cheap snips.

world–ranking of cyber–attacks ( October 20th 2013 – different sources ) :

Over the years, the geography and volume of attacks have evolved as the Internet itself has evolved. Attack traffic now comes from every corner of the world,
though some countries are responsible for more volume than others. According to Akamai′s second-quarter 2013 ″State of
the Internet″ report, Indonesia is now the top origination source for attack traffic, based on IP address. Indonesia is
responsible for 38 % of attack traffic, followed in second place by China, which accounts for 33 % of attack traffic.
AlienVault′s Open Threat Exchange data for October provides a different viewpoint. AlienVault reports that China has
more malicious IP addresses than any other country in the world, followed in second place by the United States. An increasingly
common form of attack is the distributed denial–of–service (DDoS) attack, according to data from Arbor
Networks, with the volume of high–bandwidth attacks steadily increasing. eWEEK reports this by reports of Akamai,
AlienVault and Arbor Networks.

Stallmans opinion towards surveillance – ″social pollution″ ( October 20th 2013 – source: ) :

Richard Stallman eloquently advocates for reducing the level of general surveillance in our society, arguing that information, once collected, will be misused.
Not surprisingly, the president of the Free Software Foundation argues that using free software is the first step we can take to control our digital lives,
and that non–free software cannot be trusted. Among the changes Stallman advocates for are explicit legal protection
for whistleblowers and stopping the collection of dossiers on everyone. He says: ″If we don′t want a total surveillance society,
we must consider surveillance a kind of social pollution, and limit the surveillance impact of each new digital system just as
we limit the environmental impact of physical construction.″ Whether you feel surveillance should be reduced or not,
this essay at is worth a read.

new virtualbox 4.3 out for download ( October 20th 2013 – source: ) :

In announcement to public press Oracle has set free virtualbox 4.3 for download now – article for press can be found here:
Virtualbox 4.3 now works with Windows 8.1 and Mac OS X 10.9 (Maverick) – and has no trouble with Linux
Distributions. The version 4.3 supports multi–monitor setups and touch interfaces too. According to an announcement
from Oracle: ″Another significant, but largely invisible change in 4.3 concerns the hypervisor itself. We have
significantly revamped the internals of VirtualBox as a platform for future performance enhancements. Today, this has mainly
improved boot times of guests, but we′ll be building upon this in forthcoming updates.″ – and –
″An extremely cool (but only experimental at this stage) feature is the VirtualBox virtual webcam device.
This allows the guest to use the webcam of the host so that you can use Skype or Google Hangouts from within your guest.″
VirtualBox is not too difficult to work into it and a good start for everybody who wants to test operating–systems and
running them as multiple operating systems on same machine. You can download VirtualBox Version 4.3 at VirtualBox takes only about 100 MB to run. You can find out much
more in the User Guide of VirtualBox.

Google′s Nexus 5 now out of the box ( October 17th 2013 – source: google ) :

At beginning of October 2013 a manual of Nexus 5 got public in advance. This way the technical details are known earlier than
planned. Now Nexus 5 is finally public. It is developed like Nexus 4 together with LG. Nexus 5 is to have for 350 USD and it
is listed in Play Store. This price concerns the edition with 16 GB Flash. It is expected that soon a 32 GB will be out too.
But then price would be at 400 USD. In Europe the prices would be then 350 Euro and 400 Euro. A year ago price of Nexus 4 was
about 300 Euro and this concerned the model with 8 GB. The model with 16 GB was at 350 Euro. Nexus 5 has an 5–inch–IPS–Touchscreen
with resolution of 1.920 x 1.080 pixels. This results in 440 ppi. For comparison: Nexus 4 has an 4,7–inch–display,
with resolution of 1.280 x 768 pixels. Therefore Nexus 4 has 320 ppi. – Inside of Nexus 5 is calculating a
Snapdragon–800–Quad–Core–Processor with id MSM8974. Snapdragon 800 has a frequency of up to 2,3 GHz
and is part too of Sonys Xperia Z1. RAM–size of Nexus 5 is at 2 GB, Flash–size of at 16 or 32 as of customers choice.
There is no little port for micro–SD–Cards at Nexus–models which is now standard.

Raspie No. 1.000.000 from the assembly–line ( October 12th 2013 – source: ) :

New milestone for Raspberry Pi – named as ″Raspie″ – from UK. In the meantime the 1 millionth piece
has been built. Since September 2012 Raspie is produced in a factory of Sony in Welsh Pencoed. Primarily this device was
thought for pupils as inexpensive solution against much too expensive competitors products with a fixed price of only at
49 USD as complete computer–board. Before time of factory in Wales Raspie had been manufactored in China. Normally up
to today it is 1,75 million produced devices on the whole. Of course this means that production in Wales has topped former
production in China already now. Manager Steve Dalton of Sony comments: ″We are enthusiastic and surprised about the
continuous market for Pi worldwide, and there is no sign for, that it could slow down.″
Not only pupils bought this little board, but also many experienced Users, which use Pi as GSM–basestation, as cloud
server and as ERP–appliance. Since June the Raspberry Pi Foundation offers an installation package with name
NOOBS (New Out Of Box Software), which ensures an easy introduction. The palette of hard– and software for
Raspie is increasingly growing. Recent month a Google–clerk published an open–source tool, which changes Raspie into
a simple webserver with webbased application development system. And in May the Raspie Foundation announced the first official
HD–camera–board as complement. Its price lies at 20 Dollar.

Debian Stable 7.2 available now ( Oktober 12th 2013 – source: ) :

Debian 7.0 (Wheezy) stable has been updated to Version 7.2 stable. A long list of bugs and security–holes, which
since start of May existed, has been adjusted by developers and volunteers. The bugfixes are concerning Debian–Packagemanager
dpkg, the Installationautomatisation fai, the Logical Volume Manager lvm2, the portscanner nmap, the SSL-VPN OpenVPN and the
fileserver Samba. Some application–tools like management for pictures with Shotwell, console–FTP–client lftp and
programming languages like Perl, Python and PHP5 had to be patched. The update is playing Linux–Kernel 3.2.51 on to the
machine. Some actualisations in reference to security are done with bugfixes for Debians Firefox–variant Iceweasel, Browser
Chromium, program Wordpress, package–analyzer Wireshark and else, one can read at about this. Non completed
packages have been removed. As common at Debian, Users get via distribution–tools to actualizations, which can be
settled too with CDs/DVDs after new installation.

investigations initiated against Skype and Microsoft ( Oktober 12th 2013 – source: ) :

Data protection commissioners of Luxemburg have initiated investigations against Skype suspected because of their consultations with NSA.
This could end up with sanctions against Skype, so that in future time Skype must not send datas of Users into USA any
more. The headquarter of Skype is located in Luxemburg – so it would violate the European laws of data protection, when
Skype is sending datas non–filtered to NSA. The investigations started already in June 2013. Gerard Lommel pointed to,
that investigations are ongoing. Microsoft declined a statement to the investigations. Surveillance of communications in
Luxembourg can only occur with judicial approval or by authorisation of a tribunal selected by the prime minister.
However, it is unclear whether Skype′s transfer of communications to the NSA have been sanctioned by Luxembourg
through a secret legal assistance or data transfer agreement that would not be known to the data protection commissioner
at the start of their inquiry. But clear is that after acquisition of Skype by Microsoft, the passed data–volume
to NSA has tripled. The Guardian owns documents about this. Microsoft had purchased Skype in 2011 for 8,5 Billion USD.
In fields of IT the US–software giant is at first place, to be associated with project Prism of NSA. From this
view Skype is now facing a backlash in the wake of the Prism revelations along with Prism and xkeyscore.
″The only people who lose are users″, says Eric King, head of research at human rights group Privacy
International. ″Skype promoted itself as a fantastic tool for secure communications around the world, but quickly
caved to government pressure and can no longer be trusted to protect user privacy.″
More infos about skype can be read here:
A former Skype technician, who wants to remain unknown, reports, that in Skype are built–in ″listening elemets″,
like at Echelon, who scan for certain phrases and can recognize when to raise alarm. In time of development Skype has
been integrated into project Prism of NSA, – which is proved by documents of Snowden. In February 2011 the
software development then was concluded and Skype had been tested. Since Microsoft acquired Skype in May 2011, it
seemed as if the relationship to NSA has been intensified. Caspar Bowden, who was occupied at Microsoft as chief
advisor for data–protection from 2002 until 2011, said, that he was not surprised by fact of NSA′s
surveillance of chat–tool. Further Bowden said, that he had pointed Microsoft to the danger of US laws of
foreign affairs (FISA) for data–protection of customers. But all he got as answer was a wall
of silence. Gregoire Pouget, an information security expert at Reporters Without Borders, believes that
journalists should not underestimate the risks posed by NSA Skype surveillance. ″It is what many of us
feared, and now we know for sure,″ Pouget says. ″If you are a journalist working on issues that
could interest the US government or some of their allies, you should not use Skype.″ Now the publicity
is more interested into encryption and PGP than before. The company ′Silent Circle′ (Washington D. C.)
reports, that FBI already had invited to meetings and had complained to ′Silent Circle′, that they
are a ″ghost provider″, and this could harm USA, with that no datas of User′s encrypted
communications are stored. But Janke, a 45–year–old former Navy Seal sniper, says his company will
not cede to government pressure to secretly comply with surveillance. ″I feel that we can use Skype as a template,″
Janke says, ″for what we don′t want to do.″

US–Whistleblower–Award for Snowden ( October 11th 2013 – source : ) :

Edward Snowden, ex–agent of NSA, received for his reports about spyware of NSA the US–Whistleblower–Award. Four further
ex–colleagues, who worked in the US–administration too, brought the award recent Wednesday personally to Snowden
in Moscow. This reports ex–CIA–agent Ray McGovern. The Sam–Adams–Award for ″Integrity in Intelligence″
was spoken for Snowden already in July. Snowdens Father Lon travelled to Moscow too, along with four ex–colleagues of
CIA, FBI, NSA and US–department for Justice, to see his Son. They all agree with that Russia is the safest place for Snowden
at moment. Ex–NSA–agent Thomas Drake is criticizing the USA, because they have given up the principle of constitutional
legality. Snowden had no choice than to leave the USA and to escape for to stay free. Former FBI–agent Coleen Rowley, who
got the Adams–Award in 2002, travelled along with the group to Moscow too. This award is named after CIA–agent Sam
Adams, who has published during Vietnam–War the fact, that number of Vietkong–warriors was underestimated. Snowden was
nominated for Sacharov–Award for Freedom of Spirit by European Parliament, which is awarded to Malala Yousafzai from
Pakistan. Snowden escaped May 20th 2013 to Hongkong from USA, then continued his trip to Moscow June 23th 2013, where he applied
for asylum in 21 states. Then he applied for asylum in Russia, where he got August 1st 2013 the papers to stay for one year.

Facebook has no protected privacy any more ( October 11th 2013 – source : ) :

Profiles in facebook are now open to public queries with search–engines, for those who search their names on the social media networks.
The privacy setting ″who can look up your Timeline by name″ has now been removed. Company′s chief privacy officer
Michael Richter said, that this is only affecting ″a small percentage″ of 1.15 billion monthly active users. Some
users were confused by that they could not find each other through search. Those who are searching for a job may want to
better manage what they share on the site, especially since 56 percent of employers checked the profiles of candidates on
social networking sites such as Facebook, LinkedIn, and Twitter.

new Haswell Chromebook of Acer ( October 10th 2013 – source : acer, intel and google ) :

The new processor generation of Intel Haswell is built in new Chromebook C720 of Acer. It is the second after HPs
Chromebook 14, which also has the new architecture. This CPU of Haswell does not have all functions like those of
actual Core–i–models. This Haswell one has the name ″Celeron″. The price for an Acer C720
is about 250 US–Dollar in USA. This Acer C720 contains a Celeron 2955U with two cores and 1,4 GHz Frequency.
Further it has 4 GB of DDR3L–RAM. The intern memory is at 16 GB. Additionally there is free 100 GB Online–memory
at Google Drive for two years. The resolution of this 11–inch–display is at 1366 x 768 pixels. It has WLAN
with IEEE 802.11 a/b/g/n, Bluetooth 4.0, a built–in HD–Webcam and stereo speakers. For addtionally devices
there are USB–2.0, USB–3.0 and HDMI–ports. Because of Haswell–CPU the accu has a longer time
span and is said to run longer than 8 hours with one load. The Samsung Chromebook 11 has a time span of at maximum
6 hours, but an ARM–processor. The installed Chrome OS of Google is basing on Linux and the applications are
running with Browser Chrome. The Chromebooks are updated frequently. It is not necessary to look for updates and
for virus protection. Usage is simplified by web–apps and by documents saved in the cloud. The Acer
C720 weighs 2 and one half pounds, costs in USA 249,99 US–Dollar and will be available in Europe in November
with price there of 319 Euro.

soon credit card is ″out″ and transfer with mobile is ″in″ ( October 10th 2013 – source : zdnet ) :

The financial institutions altogether spend millions for new technical solutions to secure EFTPOS and credit cards. Craig Wright, vice president Australia - Asia Pacific
the Global Institute for Cyber Security & Research: ″My opinion on card device security is that we will move away
from cards, we have devices – smart watches, Nike wristbands – all sorts of fun and funky things which can
act as near field devices.″ By way of example, he said a recent experiment involving the rewiring of a smartglove
had enabled himself and a team of researchers to pay for groceries at a local Woolworths with a Jedi–like swipe
of the hand: ″At the end of the day we all have mobile phones... and they are getting cheaper every single
year. And we will find people not leaving home without them, but they will leave home without their
wallet.″ According to Andrew Weaver the future of cards is no cards. ″What is the future of cards?
Not cards. Anything else that we can think of that is strange, weird and wonderful and that will give us access,
and pay and be trusted.″ Andrew Weaver, associate at Payments Consulting Network, argued that plastic cards
would remain for some time yet, and continue to need new and updated security. 15 years ago
the topic was cashless society by now. Andrew Rothwell, chief technology officer at Tyro Payments said:
″We have consumer experiences in hospitality, medical, automotive and everyone is trying to focus on
a customer engagement experience to provide the best app. And then they back–end that with a payment as well.
Pulling out a mobile phone with 55 different apps from Dunkin′ Donuts, from Coke, from Macca′s, from
wherever – forget it.″

Eric Schmidt literally : ″Android more secure than Apple′s iPhone″ ( October 10th 2013 – source: zdnet ) :

The Google chairman Eric Schmidt explained, that Android has more than a billion users, and is a platform that will
be around for a while, and therefore goes through rigorous real–world security testing. According to him it
is often said that the platform is fragmented and then he shot that down: ″With Android we have an agreement for
vendors that you keep the Android stores compatible and that is a great breakthrough for Android.″
Schmidt compared it to his Unix days in the 1980s, saying, ″The key thing was that we did not have an app store
to keep the Unix people together.″ Android is the most widely used operating system, based on worldwide
market and usage share statistics. Schmidt smashed off the general opinion ″Not secure?″,
– replying
″It′s more secure than the iPhone.″ The audience again gave a hearty chuckle. Schmidt paused
and said, ″You will be happier with Gmail, Chrome and Android more than you can possibly imagine.″

self–defending network is present – customers are not there yet ( October 10th 2013 – source: zdnet and IBM ) :

During IBM′s media round table sessions at its InterConnect 2013 event in Singapore this week, representatives from
the organisation′s big data and security divisions shared with ZDNet that the market simply wasn′t ready for a
self–defending network. Timothy Young said that the market already had all the technology necessary to realise this
vision. ″There probably is no reason why you can′t do that today. It′s probably a technology cost challenge.
But I think we are heading in that direction,″ Young said. Probable solution would base on a datacentre. ″It′s
really nothing more complicated than providing a thoughtful set of automation across the datacenter,″ Balog continued.
″The systems are already generating tonnes of data. It′s taking the system level to the machine analytics as
it′s often called and connecting it with the automation layer.″ When it came to security, Brendan Hannigan GM
IBM Security Systems, said that at the moment, the customers are focussed on the basics of advanced persistent threats,
intelligent analytics, and are not yet ready. ″In many instances the customers aren′t quite there yet,″ he
said. ″The vision is appropriate, it makes sense, and we will get there.″

Ubuntu 13.10 published in calendar week 42 ( October 10th 2013 – source: ) :

On October 17th Ubuntu 13.10 is expected to be released and available for download. Some say that it′s desktop is better
than in 13.04 and some things have been further improved. There are 50 new scopes especially in area of Unity dashboard. The
performance improvements are including a faster installer and an updated lightweight container technology, which allows
cloning of new environments in lesser time. Installation time of ″Saucy Salamander″ into a cloud–based machine
will be less than 3 minutes. Further there is cloud archive staging implemented in it with ″Havana″. And Ubuntu 13.10
also includes improved support for Linux Containers (LXC), a container technology that provides a way to run
multiple operating environments on a single machine. One could run more containers on a machine than virtual machines (VMs).
A single container can be copied more rapidly than a full VM. Ubuntu Linux is released by Canonical Ltd. twice a year in
months April and October – therefore title 13.04 or 13.10 this year 2013. It is also said that Ubuntu Touch for
smartphones will be released on October 17th.

Fujitsu won′t let IBM have the Unix market ( October 9th 2013 – source: computerworld, Fujitsu and Oracle ) :

The value of competition in the Unix server market for all participants to share is estimated at 9 billion USD. Designing a
competitive microprocessor is very costly, so the easy path for smaller vendors is to simply drop out. Fujitsu is committed
to developing its Sparc64 chip for Unix servers in an effort to, among other things, keep IBM from monopolizing the business,
says Noriyuki Toyoki, corporate senior vice president and the head of Fujitsu′s server division. IBM already has one
giant cash cow thanks to its dominance of the mainframe market, and if it came to dominate Unix in the same way – and it already
owns more than half the market, according to IDC – the industry and corporate users would lose, according to
Toyoki. ″Customers need alternatives to get the best value,″
he said in an interview. Fujitsu and
partner Oracle each develop a version of the Sparc chip. They jointly design Sparc systems and resell each other′s
products. Though Oracle has been expanding the role of its own Sparc designs, Toyoki said the future of Fujitsu′s own
Sparc64 chip is secure. The Unix market may be shrinking, he said, but it is still large enough to support multiple RISC
architectures. ″Frankly, we would not use Oracle′s Sparc chips in our servers,″ Toyoki said. He acknowledged
that the Oracle chips ″are very efficient, especially for throughput operations,″ but added that Fujitsu′s customers
need what he called RAS: the reliability, availability and serviceability capabilities that bleed into Sparc64 from its
mainframe systems. Also, he said, Fujitsu is ″the last Japanese company doing processor development. We′d like to
keep doing it.″ Fujitsu is usually listed in the top five Unix vendors, but trails far behind IBM, Oracle and

Windows 7 is updating system now like Linux is doing this already for a longer time ( Oktober 9th 2013 – source: and google ) :

Microsoft has published a new Update, which provides that Windows 7 is installed as system together with already
patched by Service Pack 1. New is at this update that Windows 7 now is removing older patches and packages of
update–downloads before to make space on the machine and to ensure that Windows 7 can work more clean. Up
to this time Windows 7 had saved back–ups of all patches for to ensure that in case a newer patch is not quite
applicable the newer patch could be de–installed then and older patch could work again until newer patch is fixed.
By the new update of recent Wednesday some older patches can be removed without danger to the system. For defragmenting
of harddisks there is a new entry. The new entry will appear as soon the button ″debug system–files″ has
been clicked and only then, when old patch–files have been found. Then there is in the list a new entry ″Windows Update
Debugging″ and as soon activated, by agreeing with ″OK″–button, all old patches will be deleted.
When all old patches have been removed, then it is not possible to de–install the actual patches, warns Microsoft.
But an older patch can be installed again without problems. Because it was long ago since last Service Pack, there are
now at most Windows 7 Users many old patches collected. The deletion of old patches could set free several 100 Megabytes or
even some Gigabytes memory on partition of system. This update feature of Windows 7 is an important new step of Windows 7
and is implementing that, what already a longer while existed at Linux–systems. At Linux with almost every update,
the older packages have been substituted by newer packages.

Tor is ″dirty″ ( but NSA not ) ( Oktober 7th 2013 – source: and US–press ) :

In the constantly long NSA–scandal the US–government is defending their hacking attacks against Tor.
US–Secret–Service Coordinator James Clapper said his opinion at tumblr towards the recent reports of
the press. He confirms, that US–Secret–Service is examining such anonymous services like Tor, only for
to know how it works and which informations are hidden. There are ″apodictic facts″, that ″our enemies″
prepare attacks with tools against USA and their Allied Forces. The press did not mention it, that secret–services
are only interested in such communications, which are falling in the responsibilities of foreign secret–service and
of counterintelligence. Because of this it would be forbidden, to access ″informations connected with online–activities
of innocent US–citizens″. This can be only to relief of US–Americans. This protection is not for
foreigners or for persecuted activists. The protection of USA and its citizens is emphasized. By this
every tool of secret–service is legitimate. Combatants would hide there news and discussions among ″innocent people
all over the world″. The attacks against Tor is defended by NSA, because the combatants are using the same social
networks, encryption tools and security functions, with which we protect our daily online–activities. Recent week the
Guardian has reported about activities, with which Users of anonymous services of Tor are identified and eavesdropped.
Internal the NSA admitts, that they have not been successful with this. The security–functions of Tor–network are
on–going intact and Users could further not be de–anonymized.

3D–printers are useful for aerospace ( October 7th 2013 – source : NASA and ) :

If one needs a new replacement part, then one has to make it. But how to do this in aerospace without toolmaker ?
The crew–members of ISS cannot work perfectly without failures and now and then it happens, that a technical part is
vanishing in eternal space. This should be no problem any more at ISS in future time: For this the NASA wants
to shoot a 3D–printer to the station. With this the aviators will then reproduce a lost tool or a damaged
part themselves. For this the printer is reading a 3D–file of desired item and after a short while it is there already.
In future time it will not work without 3D–printing to make tools. Advantage is, to save space and to reduce weight
and capacity of cargo, explains NASA–director Charles Bolden. One could build whole houses and even whole
spaceships. One even could print food. In June 2014 the space shuttle ″Dragon″ will shoot a 3D–printer
for ISS. The Californian company ″Made in Space″ has developed this device. The zero gravity is still bothering.

new roboter for to build bridges and furniture ( October 7th 2013 – source: ) :

Inventors, technicians, tinkers and pioneers often get said: ″This can′t be done. How should this work ? How you
want to achieve this ?″ so John Romanishin and Daniela Rus too, both working in area of MIT′s Computer Science
and Artificial Intelligence Laboratory (CSAIL).
John Romanishin designed the new idea of so–called
swarm–roboters as magnetic cubes – named ″M–Blocks″. These roboters don′t have arms
and legs. Instead they can climb on each other, walk around each other, leap through the air and are able to roll around.
Inside of each cube is sitting a flywheel which has can reach speeds of 20,000 revolutions per minute. When this flywheel
is breaking down with a sudden, then it results into an impulse inside of the cube, which is passe on by direction of
cube. This way it is jumping, rolling or turning around. Additionally to this there are persisting magnetos, fixed on
each edge and on each face. This way it is possible that every two cubes can tighten together or even more.
″It is one of these things that the modular–robotics community has been trying to do for a long time,″
says Rus, a professor of electrical engineering and computer science and director of CSAIL.
″We just needed a creative insight and somebody who was passionate enough to keep coming at it
despite being discouraged.″ – more can be read here:

will Chrome OS substitute Windows XP ? ( October 7th 2013 – source: ) :

Normally by end of April 8th 2014 Windows XP would be substituted by Windows 7 and Windows 8.1 in business and at schools.
But obviously schools are more interested in Chrome OS of Google, which is offered by Acer, Asus, HP, Lenovo, Samsung and
Toshiba. Roughly 22 percent of schools in USA are using Chromebooks of Google now, which is more inexpensive and working good.
At present it looks after a race between Google Chrome OS and Widnows 8.1 – Microsoft already has offered to every
Windows XP User included the schools to change to Windows 8.1 in year 2014 or already this year. But schools are
preferring the Google Chromebook.

more close collaboration between Valve and NVIDIA ( October 7th 2013 – source: ) :

Recent week Valve announced, that the SteamOS–machine, which is basing on Linux, will use Intel CPUs and NVIDIA GPUs in
prototypes for living–room, which will be available this year. Now more is known about the relations between
Valve and NVIDIA. Brian Burke of NVIDIA′s PR–Team has blogged an interview with Mike Sartain, CEO of
Linux–Group at Valve Software and somebody, he knows of early days at their project. The blog is not telling
anything news, but that NVIDIA GPU′s are named and that Valve as well NVIDIA already work together for a decade
and that NVIDIA is participating with big interests into SteamOS and Steam consoles. NVIDIA′s support with
drivers was quick at hand as well the porting of NVIDIA–libraries. More to read in the blog of NVIDIA.

″have morally the right to exploit security–holes″ ( October 5th 2013 – source: ) :

When security–holes in encyption–software can only be exploited with gigantic supercomputers, so according to
ex–NSA–chief Michael Hayden, the US–secret–service have the right not to patch this. This way
Michael Hayden justifies, that secret–services may exploit security–holes in encryption–software secretly.
It is about security for USA. Michael Hayden has been leading head of NSA and of CIA from 1999 to 2009. At Cybersecurity
Summit Hayden made a morbid joke about Snowden, namely he would nominate him too – but for a black list. Mike J.
Rogers, chairman of standing committee for secret–services of USA said, he would help Hayden with that. This journalist
Brendan Sasso reports in newspapers ′The Hill′. Background : Edward Snowden has been nominated for this
year′s Sacharow–Award for Spiritual Freedom of European Parliament. The committee of European Union for foreign
affairs and the Committee for development have voted for Snowden as one of three finalists. The awardee will be
published on October 10th 2013.

Microsoft is handling like Cyanogenmod ? ( Oktober 4th 2013 – source: Bloomberg and TechCrunch ) :

Microsoft is crawling for HTC and offers to install Windows Phone as second operating system alongside of Android on their
smartphones. Bloomberg values this as attempt of Microsoft to reach any User with option at least to give a look at Windows
Phone on the device. Obviously it is planned, that even fees for Licenses are omitted. The chairman for operating systems
at Microsoft, Terry Myerson is on the way to Taiwan to arrange this with HTC, so Bloomberg. Soon then should be offered
a dual–boot–device where Android and Windows–Phone are running together.

Mac OS X 10.9 alias Mavericks at finish–line ( Oktober 4th 2013 – source: Apple ) :

Apple has concluded the development of operating system Mac OS X 10.9 alias Mavericks. Already now the developers
can download Gold–Master of this software. When Mavericks is distributed officially – is not finally known.
At website of Apple it is further written as closing time ″autumn 2013″. Mavericks is said to be published
in October 2013, at same time of Windows 8.1.

Canonical is disregarding nothing ( Oktober 4th 2013 – source: ) :

Canonical, the company behind Ubuntu, is not disregarding the Ubuntu Desktop Version, because Ubuntu Touch Version is
as important. This way is guaranteed that convergence of both systems is warranted completely. After XMir as new feature
has been dropped, a part of the Ubuntu–Community was concerned about, whether this was the right decision. A
Canonical representative has assured everyone that the goal of the development team is complete convergence and that they
are actually playing catch–up with the mobile and tablet versions of Ubuntu. There is one Ubuntu platform that
will support everything from mobile phones, to tablets, to netbooks, to laptops, to work stations, to servers,
to clouds, to instances running workloads in those clouds. – Currently, we are playing catch up on phones
and tablets, but the goal remains full convergence, full support for all of these from a single code base. In no way is
there less of a commitment to desktop users and the integration that you mentioned, we just haven′t reached the
point where we can really start that integration, stated Rick Spencer, a Canonical vice president for Ubuntu Engineering.
Recent week Canonical announced, that XMir will not be implemented in Ubuntu 13.10 ( Saucy Salamander ),
therefore it will be continued at Ubuntu Touch.

Boomerang back to Adobe ? ( October 4th 2013 – source: ) :

Hackers have robbed customer–datas at Adobe of around 2,9 million customers. These datas contains encrypted
passwords and datas of credit–cards. Source–Codes of Adobe–Products have been copied too. Adobe comes from
this incident, that attackers had no access to non–encrypted datas for credit cards. Adobe is advicing the customers
to change their passwords. By status quo of investigations the attackers had access to source–codes of Adobe–software.
This is concerning the products Adobe Acrobat, Cold Fusion, Cold Fusion Builder and else, not specified Adobe–products.
Obviously there is no further risk for customers. Adobe is fetching advices from security experts Brian Krebs and Alex Holden.
Further infos are to be read at blog of Adobe and in their support–documents. Out of feather of Adobe is software xkeyscore.

Google announces browser Chrome 30 ( October 2nd 2013 – source: linuxtoday.xom ) :

Browser Chrome 30 for Linux, Windows and Mac OS X makes it more simple to surf in the internet than the versions before.
Too it is more stable and has more apps and extensions in its portfolio. About over 50 smaller security–bugs has
been fixed, so that it is more reliable and more stable.

homepages of US–government are black ( October 2nd 2013 – source: US–news ) :

Some websites of US–government have been switched off. So the website of White House. The Live–stream of Channel
for speeches of Obamahas been switched off. The last news of White House are dating back to September 30th. The website
of has been taken back. The alert–system for asteroids has been put to worldwide distributed sites.
It is forbidden for all public officers to work on from home. The Republicans refused to approve the planned budget.
With this they want to press US–president Obama to give up his plans for nationwide healthcare. The public cameras
in animal–parks, which had filmed the favourite animals of nation in a live–stream, are switched off.
Informations about, how the national shutdown is affecting the public life, can be seen at

French Gendarmerie converts its administration to Linux ( September 30th 2013 – source: ) :

By now the Gendarmerie of France has changed 37.000 desktop PCs to an installed verson of Ubuntu Linux. Until summer of
next year further 72.000 desktop PCs are to be changed over. These news could be a hint for, that there is a general
rethinking and that in future Windows is the less option as solution for desktops. In biggest data–centers
worldwide Linux is self–evident already for a longer time, like at Google, Amazon and Facebook. The Gendarmerie
justifies this with, that costs are reduced by 40 %, than if they would update the administration with systems of
Microsoft, referring to a published article by the European Union as solution for the public administration. In order
to perform the change not too abrupt, the French officers at first installed applications like OpenOffice, Firefox
and Thunderbird in Windows. This way the Users got used to new applications. Then it was possible to convert
the operating systems to Linux with same applications and backed–up contents. The migration was started in 2004.
At first application OpenOffice was installed. Then in 2006 firefox and thunderbird followed. And finally in 2008 about
5.000 officers got Ubuntu Linux as installed operating–system. By now this is one of the biggest known
reorganizations in public administration of Linux as desktop–system. Some governments like Brazil are using
open source software. And some states like China and India, are using own Linux–distributions, which have been
sponsored by government. The government of UK is converting since 2011 the administration slowly to open source
solutions. Partially there is still invested money into proprietary software of firms like Microsoft or Oracle, because
there is the problem, that some agencies are still dependent on proprietary applications. The course of action by
Gendarmerie in France could be the roadmap not only for public administrations, but also for bigger
organisation, how to apply Linux.

Investors urging Bill Gates to take it more easy ( September 30th 2013 – source: Reuters ) :

After news about Steve Ballmer quitting his job before end of year 2013 at Microsoft, it seems as if with a sudden the
three biggest share–holders of Microsoft are targeting Bill Gates personally. These three investors are persisting,
not to be named in public, because this would be of private matter. Together they have more shares than Bill Gates alone.
They are concerned about the role of Bill Gates, because he would block new decisions concerning strategy and would
restrict the power of Steve Ballmers follower too much. They point to the fact, which role Bill Gates has, to find a
new follower. Until 1986 Bill Gates had shares up to 49 % of Microsoft, before this went public. Since then he
is selling each year 80 Million USD as shares until 2018. After 2018 he would own no further shares any more at
Microsoft. In year 2000 he delegated his role as CEO to Steve Ballmer in order to focus to the Bill & Melinda Gates
foundation together with his wife. ″This is long overdue,″ said Todd Lowenstein, a portfolio manager
at HighMark Capital Management, which owns Microsoft shares. ″Replacing the old guard with some fresh eyes
can provide the oxygen needed to properly evaluate their corporate strategy.″ Kim Caughey Forrest, senior
analyst at Fort Pitt Capital Group, suggested now was not the time for Microsoft to ditch Gates, and that he
could even play a larger role. ″I′ve thought that the company has been missing a technology visionary,″
she said. ″Bill (Gates) would fit the bill.″ Microsoft is still one of the world′s most
valuable technology companies, making a net profit of 22 billion USD last fiscal year. But its core Windows
computing operating system, and to a lesser extent the Office software suite, are under pressure from the
decline in personal computers as smartphones and tablets grow more popular. Shares of Microsoft have been
essentially static for a decade, and the company has lost ground to Apple Inc and Google Inc in the move
toward mobile computing. celebrates 30th anniversary ( September 30th 2013 – sourcle: ) :

30 years ago newsgroup net.unix–wizards came up with net.usoft and announcement of Richard Stallman to found GNU with postings and
the mailing–list of net.unix–wizards at that time (a good while before unix–wizards–google–group of today).
This was start for new movement of Free Software. The Free Software Foundation has developed and the GNU public
license (GPL) was created, which is now used by Linux. Richard Stallman words continue to inspire software
developers to this day: ″I consider that the golden rule requires that if I like a program I must share it with
other people who like it. I cannot in good conscience sign a nondisclosure agreement or a software license agreement.″
Stallman wrote this in his original email from Sept. 27th, 1983 (see the full text at

new GNU Hurd–Kernel 0.5 for download ( September 30th 2013 – source: ) :

GNU–Hurd–Kernel as Option alongside of Linux–Kernel was already announced a longer while ago – now
Hurd is available as download. Since 2011 Hurd can be chosen as alternative to Linux–Kernel in Debian. Now at 30th
anniversary of Version 0.5 is available after Version 0.2. The development of Hurd has begun before Linux arise
in 1990 and between both versions are now 16 years. Since 2002 was attempted, to port Hurd on to Microkernel L4, which
was abandoned in 2005. Architectures of Microkernels have the advantage, that drivers don′t run with priority and
in same address–space as like the kernel, instead they run like normal user processes. With this the system is
more stable, because a device–driver can not overwrite different areas of memory (this have lead in the past always to total
system–crashes). So in micro–kernel the sound–driver is ended or started new separately later.
GNU Hurd 0.5 is basing on microkernel GNU Mach 1.4, which is published too at anniversary of GNU Mach is
running on 32–Bit–systems with x86–processors. A solution for 64–Bit–systems is still
developed. GNU Mach 1.4 has many bugfixes, which have been counted for eleven years since Mach version 1.3.
Many changes have been made. C–threads are modified into POSIX threads and the support for thread–local storage
as well the big file–systems at base of ext2fs. GNU Hurd is available for download at

secretly and silently asset in service ( September 27th 2013 – source: und ) :

Enough space for 5 Million gigabytes or 5 Zeta–Bytes (upgradable) and it has swallowed up building–outlays
of 2 Billion US–Dollars. The new biggest data–center of NSA in Bluffdale, Utah – has been secretly and
silently taken in service. There has been no big and public opening ceremony. The press were not allowed. There are worldwide
collected datas to be saved. Over 200 technicians are working in Utah Data Center. The building is not open to the
public and is guarded around the clock. There is no evidence if the center is entirely functioning. Further plans are,
that in twelve years the headquarter of NSA in Fort Meade will be enlargened by double of the size. As well else
places of locations in Hawaii and in Wiesbaden (Germany), where a new building has been finished already
and further sites in Fort Gordon, San Antonio and Aurora too. NSA is working together with supercomputer–specialist
Cray for a solution of Multi–Petaflops–computers, which should crack the newest Encryption–standard
of AES–256 faster. In summer 2011 Cray had announced the supercomputer–architecture with name XK6, which
achieves theoretically up to 50 petaflops – with new processors of AMD and Intel.

Panic about Android malware necessary or unnecessary ? ( September 25th 2013 ) :

At present there are worldwide 17.702.868 malware programs. Of these are by Kaspersky about 11.060.000 defined as malware
in the files for Virus–Definitions. But at same time Windows has a percentage of 90,81 % as operating–systems
on computers. Android has a percentage of 80 % of all mobile–operating–systems – but at moment 405.140
malware–programs at maximum. This way it is a significant difference to Windows. As operating–system Android would
only have to adopt the Linux–Kernel in 1 : 1 together with administration–system of Users in two levels at least
and with a file–system, where the rights for file–access are predefined. Then Android would be as safe as Linux
and non–interesting for all sorts of attempts to attack with malware.

new Linux–Distro of Valve ( September 23th 2013 – source: ) :

At announces,
with SteamOS in next days a new Linux–Operating–System. SteamOS is optimized for games on bigger screens and
thought for living–rooms. It is a new entertainment–platform for exchange with further gaming–partners
as multi–user–system. Users have the choice, which hardware can be adjusted at best, with possibilities
for support and feedback are given in direct contact with producers. For area of living–room are different
functions given. Home–Streaming: All Windows– and Mac–Games can be played. This works in network–modus
and too with transmission to television. There is an interface given for entertainment with music, television and movies.
The Family–Sharing has been improved ( after difficulties in past–time ). One can share with
different gaming–partners games and save game–settings with scores in the Steam–Cloud. SteamOS contains
for families the option, which games can be shared and which ones are only for adults (protection for children).

Apple iphone 5s hacked by CCC ( 23. September 2013 – Quelle: ) :

The fingerprint–scanner of new Apple iphone 5s has been hacked by biometry–team of CCC. They took a fingerprint,
which they photographed from a glass plate, to create an ″artificial″ finger. For this they then only
took a higher resolution of fingerprint and with this they cheated the fingerprint–scanner. So the iphone 5s
is simply unlocked. Hacker ″starbug″ actually says: ″We have repeatedly over years always warned to use
fingerprint–scanners for security. Fingerprints are everywhere, and it is cakewalk, to create artificial fingers.″
Already 2007 CCC has said, that a fingerprint–pay–cash–method at counter as such biometry used in
passports and identy–cards are non–safe and no topic for security to them.

Cyanogenmod with new aims ( September 18th 2013 – source: ) :

The download–portal wants to change itself to a company and is targeting new aims. Soon a
comfortable installer should ( as app ? ) install Cyanogenmod on to Android devices. The makers plan to get
number three of all mobile operating systems. It is also planned to get more percentage of all devices than Microsoft
with its Windows–Phone–platform. According to the makers 8 Million smartphone users are using Cyanogenmod
and are exchanging datas with this project. It is possible that even more devices are running with this system.
Cyanogenmod is the most popular option aside of Android and has definitely more Linux–Code than Android.
Cyanogenmod Inc. is located in Palo Alto and Seattle and has by now 17 Co–workers. CEO Kirt McMaster approached
founder Steve Kondik by end of 2012. Kondik is Chief Technology Officer and Koushik "Koush" Dutta is now active as
Vice President of Engineering. The company starts with risk capital of 7 Million USD.

Intel–Linux–Chief Dirk Hohndel′s opinion towards Linux ( September 20th 2013 – source: ) :

The growing markets of Android, smartphones and tablets, additionally the increasing amount of Chromebooks are – by
Intel′s view – ending with fact, that Linux is now the leading end–user operating system. Goldman
Sachs and Kleiner Perkins Caufield & Byers have reported to, that Windows has declining sales – contrary to
improving Linux. As Goldman Sachs says, this is not because of Linux itself – it is caused by breakthrough of
smartphones and tablets which unseated the Desktops. Microsoft has failed the development of this new key–techonolgy.
Hohndel said: ″Outside of the community, most people don′t see Linux′s impact. Linux is usually invisible.
When you go to any large Web site – Google, Facebook, Twitter – you′re using Linux.″ Even the
decreasing amount of Windows–Users are using invisibly Linux daily. Hohndel added, that it has never been so
popular to be a Linux–End–User. Google and Intel are working together, to improve Chromebooks. The
percentage of Chromebooks is now at a quarter of all sold Computers and at a fifth of the equipment at schools.
Hohndel is praising the new high–end Chromebook ″Pixel″.

Laughing Linux–world ( September 19th 2013 – source: und ) :

The question to Linus Torvalds at LinuxCon in New Orelans was, if he would be interested into position as CEO at
Microsoft. The answer was with a big grin: ″Still, I think Microsoft could do worse. (Cough) Elop (Cough).″
And he was questioned, if he ever has been pledged by US–Government (NSA and others), to build a backdoor
into Linux. His answer: ″ No ...″ (at same time nodding with his head as joke ′yes′ to the
crowd′s amusement).

Fastest tablet of the world made by nvidia ? ( September 19th 2013 – source: and ) :

Nvidia Tegra is a 7–inch–tablet with outstanding hardware : it′s name is Tegra 4 system–on–chip
and contains 4 Cortex–A15 cores, a battery for supply of core and 72 GeForce GPU cores. Nvidia tells nothing about
frequency of processor – normally it lies at 1.9 GHz – but the company says, it would be the world′s fastest
7–inch–tablet and will be distributed before end of this year. The price is fixed with 199 USD. Graphics
resolution lies at modest 1280 x 800 pixels. No details about RAM – only that it has Flash–memory of 16 GB
and a slot for micro SD cards up to 32 GB. Further there is built a VGA webcam and a 5 Megapixel camera with Nvidias Chimera
Computer Photography Technics for Photos and Videos in HDR–Quality and too for panorama–movies as well for
slow–motion–movies. The accumulator can run up to 10 hours and HDMI is there. Installed is Android 4.3

Mac–malware from Syria ( September 20th 2013 – source: ) :

Intego has detected a new Apple–trojan. ″Leverage″ leads to the hacker group Syrian Electronic Army.
But it is apparently no serious risk. This malware checks if internet–connection is online, then it downloads
a pic–file (as van ?) – after this a second pic–file is downloaded. Apple–Users should
keep their system up–to–date. ″Leverage″ is already recognized by VDF–files of Intego Virus

new anti–malware heals the installations ( September 19th 2013 – source: it– ) :

Hewlett–Packard (HP) has the answer for increasing more nifty malware in recent time. By this software
the computer is able, to repair itself after malware–attack. ″HP BIOSphere″ is basing on HP–own
″Sure Start Technology″. Like Linux–live–systems the software is starting before the operating–system
of Computer is loading. Reason for this is, that hackers mostly start in root–directory of machine at the booting
or attack directly the BIOS, to lock in malicious code. This way with ″HP BIOSphere″ there is a new protected
BIOS. This BIOS has a backup of BIOS of concerning machine. In case malware is somehow changing the BIOS, then
″BIOSphere″ can recognize this and is meshing. BIOS is getting repaired then by being overwritten.
... according to Michael Park, Vice–President for strategy and product–development at HP. BIOS is then
safe and the user is not noticing anything of this. There is no delay of loading or any report on the screen. At
present HP has weak turn–over and so ″BIOSphere″ arrives in time.

Android changes to Linux–code more and more ( September 18th 2013 – source: ) :

Google programmers have modified the Linux kernel to create the new mobile operating system in 2009, but the changes they
made were not accepted entirely by the folks who support the Linux kernel project. But early last year, Google and
the Linux community patched many lines of kernel–code and after review of the Linux Kernel, it shows following :
Last year, the percentage was 4.4 % of the Linux kernel–code by contributors of mobile–phone companies.
According to the Linux Foundations annual survey of Linux contributions – the percentage of Linux kernel–code
is now at 11 %.

IBM′s big injection for IBM–Linux ( September 18th 2013 – source: ) :

Today in New Orleans at the LinuxCon conference, IBM announced that it is investing another billion dollars in Linux.
But at this time the targets are more clear to see than in 1999. Instead of investing in Linux as a whole it will
be invested in IBM′s PowerLinux and IBM′s Power Server Architecture. The situation for IBM′s Power
Server were not easily made by down of 31 %. At this time, IBM CFO Mark Loughridge said that Linux would be the
straight forward solution for Power Servers. This is the strategy that IBM has been rolling out ever since..

new wave of malware in action ? ( September 18th 2013 ) :

Recently Anti–malware–programs are deactivated more than before, while they are scanning files infected
by malware. Is there a new form of developed retro–viruses or retro–worms on the way ? The week before news
were to read about scientists, who tested a new malware–possibility, which is able to overwhelm any
anti–malware–product independent from operating–system.

FBI explains mission at court ( September 17th 2013 – source: ) :

The FBI has admitted, to be responsible for malware–attacks against Tor–Browser and its connected bot–nets.
Their exploit ″magneto″ has been used for to identify users of Tor, said FBI–agent Brooke Donahue at
court against Eric Eoin Marques in Dublin. This mission with ″magneto″ was aimed against pornography
with children.

Kaspersky Antivirus 2014 ( September 17th 2013 ) :

The new program of Kasperky ″Antivirus 2014″ has now a Zeta–shield.
This shield protects the user against attacks of retro–viruses and retro–worms, which are able to switch off
the anti–virus–programs directly. This way Kaspersky is more secure, while updating the VDF–file.
nosy– recommends to switch off internet–connection, when anti–virus–program is finish with update.
Then it is really secure to do a profound check.

big cyber–manoeuver planned on November 13th and 14th ( September 11th 2013 – source: NAC und deutsche–wirtschafts– ) :

In the USA a big emergency–case–simulation for security of energy–supply is planned. On November 13th and
14th in North America the total blackout as result of cyber attacks and terrorism will be tested. According to New York
Times more than 150 different companies and organisations are participating. A physic assault against electric supply
network and a strike by hackers against electronic facilities will be simulated. The last manoeuver was 2 years ago.
Different is that this manoeuver GridEx II will simulate are more severe total short–circuit against supply network.
The aim will be to test the capacities to act of governments during the blackout and to test its resulting crisis of
provisioning. The expectations are, that something else will come out of this than like after a hurricane, which hits
the country only in the South–East. Most participants will take action from place at work. NERC takes over the
coordination and announce cascading short–circuits of supply network. Possible scenario would be:
A burglar could break into a relay station. This would look like theft of copper. But the burglar is loading up with
usb–stick a virus–program into network of power–supply, which would cause a breakdown of infrastructure.
Consequences could be more outstanding than 11/9. The biggest part of supply network is distributed by private firms,
who are saving at support costs. According to the White House 99 % of military facilities are dependent on
commercial power supply. The private facilities–based carriers are controlling 5.800 big power plants and
about 452.500 miles of high voltage power lines in the USA. Those are controlled and guarded by devices, which had
been installed decades ago. Some carriers are using their own traffic–protocolls and this way they are no big
target for hacker–attacks. Some are talking about principle of ″security by obscurity″.
Other carriers again are relying on Windows–based controlling systems. Often not all connections into public
internet are known and recorded, what can be more fragile for malware. Malware in form of trojans, worms or viruses
could invalidate the controlling systems, block the communication or destroy parts of hardware, which are difficult
to be substituted. This scenario as attack by terrorists was event–study of the National Academy of Sciences
(NAC). They conclude, that by the attack of terrorists against points of intersections of
supply network could result in a blackout of several weeks. The fear of Americans of a bigger electric
blackout is justified. By beginning of this year the superbowl, which is the most-seen
sports–event of world, has been delayed for half an hour after a blackout. Then approximately
50 Million US–Citizen had been without electricity.

Increasing malware–threat for Android ( August 2013 – source: google ) :

In most recent quarter the percentage of malware for all Android–systems raised with 40 %. Android has a
market percentage of over activated devices. This trend was the same at Microsoft Windows, at times
where Windows had the biggest market percentage worldwide, the percentage of malware raised too for Windows in the
80ies and 90ies. Comparatively Android is quite new and it appears, that malware is performing a broad assault, because
it is attractive (many do online–banking with smartphones) – too because of many possibilities with

opinion of Acer founder about Wintel ( Sept. 16th 2013 – source: google and acer ) :

The opinion of Acer founder Stan Shih is that the alliance of Microsoft Windows and intel ″is destined to fail″.
Indirectly both companies would push many users in direction to Google. Shih says, that Linux is also open, but this
″has not helped to receive similiar attention″. According to Shih software and service industries have
been not in the center of Taiwanese companies – also not the importance of design. So these companies will think
about investing more into design innovation like in fields of arts, software and technologies.

market developments ( Sept. 10th 2013 – source: google ) :

Manufacturer Dell is registering increasing sales of systems with installed Chrome OS. ACER too and Lenovo are following
and offer systems with Chrome OS to customers. Microsoft–Nokia reports, that increasing number of customers are
wishing Chrome OS rather than Windows–Systems.

Samsung announces a new Operating–system ( Sept. 10th 2013 – source: google ) :

Samsung soon offers new operating–systems with names ″Bada″ and ″Tizen″ for smartphones.
They ought run as open systems. In an interview Samsung explains, that devices in household and television equipment
will be encluded in usage with ″Bada″ and ″Tizen″, so that each household would obtain more
operating comfort. This idea is not new, it only was not done in action yet. Too, soon there should be a new
high–resolution Video–format for television in 3D. Glasses for watching 3D are not necessary then.

Dan Brown already was right ( Sept. 6th 2013 ) :

In techno–thriller of Dan Brown ″Digital Fortress″ ( German title: ″Diabolus″ ) is already
told, that every encryption is traced down systematically by supercomputer in Fort Meade. This is settled, as described
in ″Digital Fortress″, by implemented programs. This is generally thought for defense against terrorism.
It concerns encrypted e–mail–traffic as well encrypted partitions of hard–disks. This fact is confirmed
by news in SPIEGEL-Online (″new Snowden–discovery″) of today. In case something is encrypted
and not to crack, or cracking the new encryption would take too long, then further actions are taken. For example then
a signal with strength of more than 500 MB per second brings down concerning encrypted system.