Affichage des articles dont le libellé est technology. Afficher tous les articles
Affichage des articles dont le libellé est technology. Afficher tous les articles

vendredi 1 mai 2015

Top 4 Websites To Sell Your Old iPhone For the Most Money


Whether you want to sell your old iPhone, or buy a used iPhone to save money instead of buying one that is brand new, you will need to shop around until you find the sites that offer the best deals. After all, if you are selling, you want to get the most money possible, and if you are buying, you want to get the best savings. Here are the top five websites where you can sell and buy older iPhones and make or save money.

1. Craigslist

You can buy and sell old iPhones for anywhere from $70 to $800, depending on the age and condition of the phone. The only problem with Craigslist is that you need to be careful about who you are dealing with, because no one is screened. Completing the deal in a public place is always recommended for your safety. Craigslist is free and easy to use. All you have to do is post your ad with all of the pertinent information (including contact information) and photos of the item. You can get great deals if you are looking to buy an older phone, and you can often get top dollar when you are selling an iPhone.

2. Sell My iPhone

Sell your old iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5 or iPhone 5C quickly and easily at this website. You will receive accurate quotes, and after the phone is delivered to Gadget Salvation, you will receive payment within a day or two. Simply send in the phone (for free), and an inspection will be performed. Within 48 hours, you will receive confirmation about the sale, and the payment will be issued.

3. Amazon

One of the best options is the Trade-In program from Amazon. No matter what the age of your iPhone is, you are going to make some money. All you have to do is a short Q&A on the type of phone you have, your carrier (if you have one), the condition, and if there are any accessories included. Then, you will get a flat rate from Amazon in the form of an Amazon gift card. It doesn’t get much simpler than that, and you can redeem the gift card for other items, including putting it toward a new iPhone. Another option is to act as an individual seller, but there is a bit more work involved because you will need to set up an account. But, you can choose your own selling price. When the item sells, you will have the money in your account within two to three weeks.

4. Best Buy

Earn anywhere from $5 to $310 for your old iPhone (depending on the model, condition, and accessories included) when you sell it to Best Buy. You can go online and get an estimate for what the company will pay for your iPhone. Then, simply print out the estimate and take it to a participating store in your area. You will receive a Best Buy gift certificate, which you can use towards the purchase of a new iPhone. Keep in mind that they do not take original iPhones

Sony Plays to Strengths in Games, Sensors as It Vows Revival

ONCE at the leading edge of consumer electronics, Sony Corp. is now more lumbering giant than trend-setter after falling behind competitors such as Samsung Electronics Co. and Apple Inc.
Sony watchers are urging the down-on-its-luck company to rediscover its pioneering ethos. Founded in 1946, Sony symbolized Japan's rebirth after its World War II defeat, rising from humble beginnings. It had little else besides the smarts of founders Masaru Ibuka and Akio Morita, to come up with hit after hit: the transistor radio, home tape recorders, the Walkman portable recorder-and-player.
In a sign of its travails, the Tokyo-based electronics and entertainment conglomerate Thursday reported a net loss of 126 billion yen ($1.1 billion) for the fiscal year through March, almost as bad as the 128.4 billion yen loss it racked up the previous fiscal year. Annual sales rose nearly 6 percent to 8.2 trillion yen.
Sony is forecasting a return to profit at 140 billion yen ($1.2 billion) for the fiscal year through March 2016. It is seeking to rebuild its operations around its strengths. Here's what's ailing and promising in Sony's business areas:
Televisions
Back in the 1960s, Sony dominated in TVs with its own technology called Trinitron, which boasted such a reputation for image quality it won an Emmy Award in 1973. But Sony underestimated the industry's switch to flat-panel TVs from CRT, or cathode-ray tubes. Sony has lost money in its TV business for the past decade. Samsung of South Korea leads with about a third of the global TV market share, followed by LG Electronics. Sony trails with under a tenth of the market. Last year, Sony split off the TV division as a wholly owned entity. And it's banking on 4K, with image quality superior to high-definition, or "ultra-HD," each set costing as much as $25,000. The problem: Rivals are all working on the same.
"Sony management keeps saying the electronics market is shrinking. But that's a given. Sony in the past came up with products that created new product sectors," said Yasunori Tateishi, who has written a book on Sony's woes.
Image Sensors
Image sensors are used in devices such as smartphones, digital cameras, medical devices and self-parking cars, and translate the information of a pictorial image into digital signals. Sony's sensor technology, known as CMOS, was years in the making and its development was expensive, causing the division to post years of losses. Sony might be finally ready to cash in on the investment. It is moving aggressively into high-end video cameras and SLR, or single-lens reflex, cameras, underpricing powerful Japanese rivals Nikon and Canon.
Sony's latest cameras can take smooth video of fast-moving objects and shoot video where there is almost no light. Although smartphones have eroded Sony's Cyber-shot digital camera business, Sony is now wooing professional and upscale amateur photographers. Sony also acquired a 20 percent stake in medical equipment maker Olympus Corp. in 2012, to develop endoscopes and other surgical tools packed with Sony technology, such as three-dimensional imaging and 4K.
Kazunori Ito, analyst at Barclays in Tokyo, believes that image sensors, along with games, can be counted on to be the new profit drivers for Sony, at a time when restructuring charges are winding down. The cameras are drawing new fans, including Havard Ferstad, a 34-year-old IT consultant and Tokyo resident, who has bought a 200,000 yen ($2,000) Sony camera. "The thing is that Sony has high quality sensors in their still cameras, and they are giving it to consumers at a relatively low price," he said.
Game Machines
The first PlayStation video game home console, which went on sale in Japan in 1994 and in the U.S. in 1995, has been a hit. With three successors already out, there is almost certain to be a fifth, or PS5. Sony has also delivered popular hand-held machines, starting with the PlayStation Portable, discontinued last year, and the PS Vita.
Sony has only two major rivals in the game-machine business: Nintendo Co. and Microsoft  Corp. The PlayStation 4 is at the top, and the PlayStation Network, which has more than 100 million registered accounts worldwide, relays content and services, including games, streaming video, TV shows and chats. The game-networking platform will extend to more devices, such as TVs and tablets. In the U.S., Sony recently entered the pay-television business with an online package of more than 50 channels starting at $50 a month, called PlayStation Vue, for PlayStation owners in three cities.
"That's the power  of the PlayStation brand, a brand that has been cultivated over the course of 20 years as the core gamers' system," said Jeffrey Wilson, senior analyst with PCMag.com, who points to "Final Fantasy VII" and "Metal Gear Solid 4" as strong exclusives. "Right now, Sony needs to give gamers what they signed up for when they purchased a PS4 -- a string of good games."
Entertainment
In 1995, Sony acquired Hollywood studio Columbia Pictures for $3.4 billion, which was widely criticized as over-priced. Norio Ohga, president at that time, was a former opera singer and musical connoisseur, with a vision to make Sony an entertainment company. Whenever Sony had a hit movie, such as the "Spider-Man series," or a popular musical release from artists like Beyonce and Daft Punk, that helped offset its losses in the electronics business.
But striking the right balance between electronics and entertainment has been difficult. In 2009, Howard Stringer, then Sony chief, scoffed at a reporter's question about whether Sony planned to produce material by Michael Jackson, a Sony artist who died that year, using 3-D technology. Sony later reversed course and produced 3-D versions of Jackson's music videos, including the post-mortem "This Is It."
Recently, Sony Pictures suffered from a hacking attack  over its movie called "The Interview," which spoofs an assassination of North Korean leader Kim Jong Un. The film was released in independent theaters and through Internet outlets in December.
"Those interested in cinema and who watch Sony's films are primarily judging the company by the quality of the films they produce and release, so whether they sell electronics is not really on their minds," said Maggie Lee, a film critic for Variety. Lee said the hacking woes actually drew more interest in "The Interview," and she also had praise for "Coming Home," directed by Zhang Yimou and Sono Sion's "Shinjuku Swan" as strong recent offerings.
Robots
The Aibo entertainment robot, on which Sony pulled the plug in 2006 under a plan to cut costs, was a perfect example of the "synergy" that has been an elusive goal for decades, creatively bringing together two areas of Sony's expertise: entertainment and gadgetry. The mechanical pets, costing about $2,000 each, were programmed with a disarming "personality," drawing fiercely loyal fans. Never mind only 150,000 of the toy-poodle-sized toys were ever sold. They boosted Sony's image as an innovator that was more than about just money-making. Stringer's decision to kill Aibo set off an uproar from owners.
"Sony became too Americanized. It used to be a different kind of company," said Nobuyuki Norimatsu, nicknamed "Aibo doctor," of A-Fun, a company of engineers who do repairs for discontinued electronics goods. Last year, Sony ended maintenance services for Aibo. Norimatsu has a Buddhist priest chant prayers for the robotic spirits before taking an Aibo apart. It's that kind of caring and love Sony needs to reclaim, he said.

jeudi 30 avril 2015


How To Create A Website - Create A Website

Over the past few years, I have received countless emails from people who are looking for guidance on how to create a website. The truth is that we have been taught to believe that it is a complicated process. And you know what? It really USED to be. But it most certainly isn't anymore. We can now launch websites in a matter of 15 minutes. So if you are looking to create a website, this tutorial on how to create a website will be so helpful to you.



Wireless Phone Service from Google Challenges Major Carriers

Google is trying to shake up the wireless phone industry with a low-priced service designed to pressure major carriers into making it more affordable for people to get online and use Google's services.
The service, called "Project Fi," debuted Wednesday, about two months after Google revealed its plans to expand its ever-growing empire into providing wireless connections for smartphones.
Google Inc. is selling the basic phone service for $20 a month and will only charge customers for the amount of cellular data that they use each month, instead of a flat rate. Each gigabyte of data will cost $10 a month. That means a customer could sign up for a plan offering three gigabytes of data and get $20 back if only one gigabyte was used in a month.
Most wireless phone carriers allow their customers to roll over unused data into another month of service without refunding any money.
Project Wi-Fi initially will only be sold to a narrow audience that owns the Nexus 6, a smartphone that Motorola Mobility made with Google's help.
Google's pricing setup makes Project Fi less expensive than most of the comparable plans offering by the four biggest wireless phone carriers -- Verizon, AT&T, T-Mobile and Sprint. The monthly prices for a single line of smartphone service with up to one gigabyte of cellular data at those carriers range from $45 to $50 compared to $30 from Google, before subtracting any potential credits for unused data.
The major carriers, though, offer a variety of family plans that could still be better deals than Project Fi. Those bundled plans allow several phone lines to share a pool of cellular data.
Besides trying to bring down the prices of wireless phone plans, Google is promising subscribers that their Nexus 6 model will automatically connect with the fastest network  available.
Rather than building its own network, Google is leasing space on cellular towers built by Sprint and T-Mobile, which are hoping the deals will boost their profits without costing them too many customers tempted to defect to Project Fi. Google is promising Project Fi will automatically switch over to an available Wi-Fi network if that is running at a higher speed than the cellular alternatives.
"As mobile devices continually improve how you connect to people and information, it's important that wireless connectivity and communication keep pace and be fast everywhere, easy to use, and accessible to everyone," Nick Fox, the Google executive overseeing Project Fi, wrote in Wednesday blog post.
T-Mobile CEO John Legere, whose company already has been cutting its prices and rolling out new options, said it was a "no-brainer" to work with Google on Project Fi.
"Anything that shakes up the industry status quo is a good thing -- for both US wireless customers and T-Mobile," Legere wrote in a blog post.
Google has an incentive to promote cheaper and faster wireless service because it operates some of the world's most popular online services, including its search engine, maps, Gmail and YouTube video site. The Mountain View, California, company believes most people will visit those services more frequently if they are enticed to stay online for longer periods, giving Google more opportunities to show the digital ads that generate most of its revenue.
Similar motives prompted Google to begin building high-speed, hard-wired networks capable of navigating the Internet at speeds up to 100 times faster than existing broadband services. Although Google is only selling its broadband service in a handful of U.S. cities so far, AT&T and Comcast are now offering options with comparable speeds in a few communities.

New Browser Hack Can Spy On Eight Out Of Ten PCs






A group of Columbia University security researchers have uncovered a new and insidious way for a hacker to spy on a computer, Web app or virtual machine running in the cloud without being detected. Any computer running a late-model Intel microprocessor and a Web browser using HTML5 (i.e., 80% of all PCs in the world) is vulnerable to this attack.
The exploit, which the researchers are calling “the spy in the sandbox,” requires little in the way of cost or time on the part of the attacker; there’s nothing to install and no need to break into hardened systems. All a hacker has to do is lure a victim to an untrusted web page with content controlled by the attacker. Once there, the software inside the bogus content launches a program that  manipulates how data moves in and out of a victim PC’s cache, which is the part of the CPU that serves as the intermediary between the high-speed central processor and the lower-speed random access memory or RAM.

The exploit then records the time it takes for the victim’s PC to run various operations in the cache memory, using the browser’s own high-resolution timers (we’re talking nanoseconds here). By studying the time it takes for memory access to take place, the hacker can get an accurate picture about a user’s browser history, keystrokes and mouse movements. The attack is more for spying than theft: it doesn’t steal any data or passwords or corrupt the victim’s machine.

The “spy in the sandbox” is what’s known as a side-channel attack, which is one of the older tricks in the hacker’s black bag. Such an attack usually involves interpreting what’s going inside a computer guts by measuring physical outputs such as sound, electromagnetic radiation or power consumption. In the 1980s, Soviet spies reportedly were suspected of having planted tiny microphones inside IBM Selectric typewriters to record the striking of the type ball as it hit paper to determine which key was pressed. Other old-school side-channel hacks include filming and analyzing the blinking lights on old modems or external hard drives. Bad guys have since used side-channel attacks to steal pay TV streams and cars and break into phones.
Modern-day side-channel attacks now take the form of reading the activity of processors, memory or networking ports. The recent and massive shift of computing to cloud services such as Amazon EC2 or Microsoft Azure initially raised fears that hackers would be able to spy among virtual machines shared on the same servers (which is how clouds get their cost efficiencies), but apart from research done in 2009 showing that it is hypothetically possible for one virtual machine to spy on another by studying how it uses computing cycles, so far there haven’t been any publicly confirmed side-channel attacks by bad guys in the cloud. Amazon tried to downplay the 2009 report by researchers at MIT and UC-San Diego.

While it’s difficult to launch a side-channel attacks in a secured cloud, it would be far easier on the open web. A handful of security researchers have already proven various techniques, a recent one of which used a radio receiver to steal cryptographic keys from a computer sitting a few feet away. Yuval Yarom, a researcher from the University of Adelaide, Australia, last year presented a way to use a cache memory side-channel attack to steal a victim’s Bitcoin secret key after observing about 25 Bitcoin transactions.
The Columbia researchers, Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan and Angelos Keromytis, used the same technical method as Yarom but focused on how such an attack could be built into a simple Web page to hit the most amount of users as possible—without being detected.

Cybersecurity At RSA


You could tell by the din that the RSA Conference in San Francisco this week is the largest enterprise IT security confab in the world. The fact that several prominent breaches over the last year have shaken the C-suite out of its ostrichlike complacency clearly turned the volume up on this show all the way to eleven. So now money seems to be flowing into IT security like never before, adding to the commotion.
The big question: with all this security gear from the many hundreds of vendors exhibiting at the conference, each trying to get their message heard above the clamor, why do the hackers appear to be winning? Clearly, tools aren’t enough – even when they’re arguably better than ever.
Regardless, the RSA Conference is largely about the tools and technologies – where each tool addresses some corner of the security sphere. Here are my picks for some of the most interesting (in alphabetical order, so as not to play favorites). Are they sufficient? You be the judge.


CA Technologies / As the largest vendor on this list, CA Technologies was predictably showing off a number of security products. The one tool that caught my eye is their secure API management tool, which joined the CA family through the 2013 Layer 7 Technologies acquisition. Today, this product has moved well beyond its XML appliance roots to a user-friendly tool for handing all the security around APIs, so that developers don’t have to worry about the nuts and bolts when publishing their software interfaces.
Certes Networks / Once hackers penetrate a corporate network, they typically sneak around from place to place, seeking further vulnerabilities until they happen upon their goal, which is typically data they’d like to steal. Certes Networks aims to slow down this behavior by leveraging sophisticated encryption to compartmentalize the network. Different segments of the LAN or WAN have separate keys, preventing hackers from moving around easily.
Contrast Security – Contrast Security takes a page out of the agent-oriented playbook of Application Intelligence vendors like AppDynamics and New Relic, leveraging agents scattered about the network to identify vulnerability patterns in code. Customers primarily use contrast security for development and test environments that leverage Java, .Net, and Adobe Systems Cold Fusion languages, but the technology also works in the production environment. The Contrast Security plugin for Eclipse will alert developers when they introduce vulnerabilities that might allow common attacks like SQL injection, thus preventing those vulnerabilities from reaching the production environment in the first place.
CrowdStrike – CrowdStrike is one of a handful of vendors who seek to detect adversaries once they’re already on your network by uncovering indicators of attack (IOA) and indicators of compromise (IOC). These indicators are essentially breadcrumbs that hackers leave behind as they probe for vulnerabilities. The trick to detecting them is that individually they may not raise red flags, so tools like CrowdStrike must look for suspicious patterns – at least until the hackers figure out how to avoid leaving breadcrumbs.

Microsoft Wireless Display Adapter

While Miracast was once an unreliable solution for replicating a PC or device screen to an external display, Microsoft’s newer Miracast dongles—in particular the inexpensive Microsoft Wireless Display Adapter—change all that. And I now bring such a device with me on family trips so that we can all enjoy TV shows or movies together on the big screen.

We’re in Puerto Rico this week for the kids’ vacation—how we managed to get out of Boston and its historic snowfalls and low temperatures is still unclear—and I brought along the Microsoft Wireless Display Adapter for this very reason. It’s a simple and, at $60 at the Microsoft Store, inexpensive solution: Just plug in the HDMI end of the dongle to an available HDMI port on the TV and plug the USB end into a USB port for power. (If there’s no USB port on the TV, you can use a standard cell phone-like power adapter instead.)

In addition to its rock-solid reliability, there are a number of nice things about the Microsoft Wireless Display Adapter.
First, because it’s Miracast, it doesn’t require a Wi-Fi network to work: you just make a direct connection between a compatible PC or device (see below) and the dongle. If we had brought along a similarly sized Roku Streaming Stick or Amazon Fire TV Stick, we’d have been left stranded since those devices need to connect to Wi-Fi and they can’t navigate a hotel’s web-based sign-in pages.
Second, it works with all my devices, which on this trip include a Surface Pro 3 and a Nokia Lumia 930 smart phone. Basically, you need Windows 8.1 or Windows Phone 8.1, or Android to use any Miracast device. (And if you’re using Windows 8.1 (as with the Surface), you can even download a special Microsoft Wireless Display Adapter app for configuring the device, though that is not necessary on a trip like this.)
I tested the Wireless Display Adapter with both of these devices and it worked great: With the phone, you get a nice screen replication, which is of course odd in portrait mode.
On Surface Pro 3, the display projection functionality in Windows 8.1 goes to screen duplication by default, which squishes the built-in device display. But you can switch to external only and just used the Surface’s trackpad to control onscreen items. It works fine.
Because the Wireless Display Adapter works with my devices, that further means it works with anything I can do on those devices. Native apps like Netflix and Xbox Video. Web-based apps like YouTube or Google Play Video. Everything works.
Finally, the Wireless Display Adapter is small and self-contained, so you won’t notice its size or heft at all in a carry-on bag, let alone the device bag I throw in my larger luggage. Bringing this device along on a trip is a no-brainer, and if I don’t use it, no harm no foul.
Looking ahead to this summer, we’ll be traveling to France, and accessing US-based services like Netflix has other challenges. I’ll examine those issues in August, but it’s fair to say that screen projection via the Wireless Display Adapter will work just as well in Europe as it does here in the USA. And this dongle will be a permanent part of my travel toolkit going forward.

10 Ways To Prevent Your Mac From Being Hacked




Information protection is now scrutinized in all commercial and government industries. Theft of information has crippled many organizations and businesses. One of the main reasons information is lost, corrupt, or stolen is because many industries have not fully adopted it as a risk, and have yet to implement strong quality assurance policies and programs.
Some of the most common risks are because of unattended computers, weak passwords, and poor information management practices. Hackers look for the weakest target and tunnel into a business from easy sources, like tablets or cell phones. Using smart encryption software can remediate this threat and vulnerability, making it difficult for competitors or rookie hackers to penetrate your device. However, software alone is not enough to prevent Macs from being hacked. It is the Mac user who has the authority and resources to save it from potential penetration. The top 10 ways to prevent your Mac from being hacked is discussed below. Following all these tips will surely make your Mac hack-resistant. As a word of caution, before starting on the below processes, be sure to back-up your system first.

1. Don’t Surf or Read Mail Using the Administrator Account

Create a non-administrator user in the Accounts pane of System Preferences and use this account for everyday tasksOnly log in with an administrator account when you need to perform system administration tasks.

2. Use Software Update

Regularly applying system updates is extremely important.
For Internet-connected systems: Open the Software Update pane in System Preferences. Ensure that “Check for Updates” is enabled, and set it to “Daily” (or the most frequent setting). There is a command line version available as well, called Software Update. Read its main-page for more details.
Apple-Download-Page
For systems not connected to the Internet: Retrieve updates regularly fromwww.apple.com/support/downloads. Be sure to verify that the SHA-1 digest of any download matches the digest published there, using the following command: /usr/bin/openssl sha1 download.dmg

3. Account Settings

You want to disable Automatic Login. To do this, open the Accounts pane in System Preferences. Click on “Login Options.” Set “Automatic login” to “Off.” Set “Display login window as” to “Name and password.”
To disable Guest Account and Sharing, select the Guest Account and then disable it by unchecking “Allow Guest to log in to this computer.” Also, uncheck “Allow guests to connect to shared folders.”

4. Secure Users’ Home Folder Permissions

To prevent users and guests from perusing other users’ home folders, run the following command for each home folder: sudo chmod go-rx /Users/username

5. Firmware Password

Set a firmware password that will prevent unauthorized users from changing the boot device or making other changes. Apple provides detailed instructions for Leopard (which apply to Snow Leopard) here:
http://support.apple.com/kb/ht1352

6. Disable IPv6 and AirPort when Not Needed

Open the Network pane in System Preferences. For every network interface listed:
  • If it is an AirPort interface but AirPort is not required, click “Turn AirPort off.”
  • Click “Advanced.” Click on the TCP/IP tab and set “Configure IPv6:” to “Off” if not needed. If it is an AirPort interface, click on the AirPort tab and enable “Disconnect when logging out.”

7. Disable Unnecessary Services

The following services can be found in /System/Library/LaunchDaemons. Unless needed for the purpose shown in the second column, disable each service using the command below, which needs the full path specified: sudo launchctl unload -w System/Library/LaunchDaemons/com.apple.blued.plist
  • com.apple.blued.plist – Bluetooth
  • com.apple.IIDCAssistant.plist – iSight
  • com.apple.nis.ypbind.plist – NIS
  • com.apple.racoon.plist – VPN
  • com.apple.RemoteDesktop.PrivilegeProxy.plist – ARD
  • com.apple.RFBEventHelper.plist – ARD
  • com.apple.UserNotificationCenter.plist – User notifications -
  • com.apple.webdavfs_load_kext.plist – WebDAV -
  • org.postfix.master – email server
Other Services Can be found here: /System/Library/LaunchAgents and can be disabled the same exact way as the items listed above.

8. Disable Setuid and Setgid Binaries

Setuid programs run with the privileges of the file’s owner (which is often root), no matter which user executes them. Bugs in these programs can allow privilege escalation attacks.
To find setuid and setgid programs, use the commands:
  • find / -perm -04000 -ls
  • find / -perm -02000 -ls
After identifying setuid and setgid binaries, disable setuid and setgid bits (using chmod ug-s programname) on those that are not needed for system or mission operations. The following files should have their setuid or setgid bits disabled unless required. The programs can always have their setuid or setgid bits re-enabled later, if necessary.
  • /System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent– Apple Remote Desktop
  • /System/Library/Printers/IOMs/LPRIOM.plugin/Contents/MacOS/LPRIOMHelper – Printing
  • /sbin/mount_nfs – NFS
  • /usr/bin/at – Job Scheduler
  • /usr/bin/atq- Job Scheduler
  • /usr/bin/atrm – Job Scheduler
  • /usr/bin/chpass – Change user info
  • /usr/bin/crontab – Job Scheduler
  • /usr/bin/ipcs – IPC statistics
  • /usr/bin/newgrp – Change Group
  • /usr/bin/postdrop – Postfix Mail
  • /usr/bin/postqueue – Postfix Mail
  • /usr/bin/procmail – Mail Processor
  • /usr/bin/wall – User Messaging
  • /usr/bin/write – User Messaging
  • /bin/rcp – Remote Access (Insecure)
  • /usr/bin/rlogin – /usr/bin/rsh
  • /usr/lib/sa/sadc – System Activity Reporting
  • /usr/sbin/scselect – User-selectable Network Location
  • /usr/sbin/traceroute – Trace Network
  • /usr/sbin/traceroute6 – Trace Network

9. Configure and Use Both Firewalls

The Mac system includes two firewalls: the IPFW Packet-Filtering Firewall, and the new Application Firewall. The Application Firewall limits which programs are allowed to receive incoming connections. It is quite easy to configure the Application Firewall. Below, I mention how to configure Mac’s Application firewall. Configuring the IPFW Firewall requires more technical expertise and cannot be fully described here. It involves creating a file with manually written rules (traditionally, /etc/ipfw.conf), and also adding a plist file to /Library/LaunchDaemons to make the system read those rules at boot. These rules depend heavily on the network environment and the system’s role in it.

How to Configure Application Firewall in Mac

In only Four steps you can easily configure the Application Firewall in Mac.
1. Select System Preferences from the Apple Menu
how to prevent mac from being hacked
2. From the System Preferences Pane select Security. Then click on theFirewall Tab. Ignore the other Tabs (General and Firevault ). 
3. On the Firewall tab, you may need to unlock the pane, if it is locked. To unlock, click on the small pad lock on lower left corner and enter your Administrator Username and Password.
how to prevent mac from being hacked
4. Click Start to enable Mac’s Application Firewall. The green light beside Firewall Status and the ON notification will ensure that the Firewall is running smoothly.
You can further customize the Firewall configuration by clicking on the Advance button on the right side.

There are three Advance option in the Firewall Tab

1. Block All Incoming Connections: Blocking all incoming connections will disable most of the sharing services like File Sharing, Screen Sharing and others. It will only allow basic internet service. Keeping it checked or unchecked depends with on the user.
how to prevent mac from being hacked
2. Automatically allow signed software to receive incoming connections: I prefer to keep this option unchecked. This will automatically add software signed by “any” valid authority to the allowed list of Software rather than prompting the users to authorize them.
3. Enable stealth mode: I always keep this option checked. This prevent your Mac from responding to ping requests and port scans

10. Safari Preferences

Safari will automatically open some files by default. This behavior could be leveraged to perform attacks. To disable, uncheck “Open safe files after downloading” in the General tab. Unless specifically required, Safari’s Java should be disabled to reduce the browser’s attack surface. On the Security tab, uncheck “Enable Java.” Also, private browsing in Safari is a great way to stop hackers from picking up bread crumbs and using them against you later.

Bonus Tip: Disable Bluetooth and Airport

The best way to disable Bluetooth hardware is to have an Apple-certified technician remove it. If this is not possible, disable it at the software level by removing the following files from /System/Library/Extensions:
IOBluetoothFamily.kext
IOBluetoothHIDDriver.kext
The best way to disable AirPort is to have the AirPort card physically removed from the system. If this is not possible, disable it at the software level by removing the following file from /System/Library/Extensions:
IO80211Family.kext
If followed carefully, the above mentioned tips can outdo a hacker’s technology to compromise your Mac. However, as technology advances, hacker use ever-more innovative ways to penetrate your Mac. If you know other ways to hack into a Mac, please share with us in the comments below!

mercredi 29 avril 2015

Amazon Fire TV Stick Improves Miracast Support … Sort Of

Thanks to a recent software update, Amazon’s inexpensive Fire TV Stick—an HDMI dongle that works as a sort of mini digital media set-top box—has improved its support for Miracast wireless display. This means that in addition to its normal functionality, you should be able to use Fire TV Stick to mirror the display on your Windows Phone, Windows PC or tablet, or Android device. But there’s just one problem.
And that problem is: it doesn’t work reliably.
On the Windows Phone handset I tried—my Lumia 930—I was able to mirror the display, but audio didn’t work. This means that you can’t play music or audiobooks, of course. But you also can’t hear the audio in videos, like the TV shows or movies in Xbox Video.
phone-connected
I also tried to test this with two Windows PCs, my Surface Pro 3 and another Windows 8.1-based laptop. In both cases, it successfully connected Fire TV Stick as a wireless display. But the video never worked, nor did the audio. According to one emailer, he was able to get video to work with Windows 8.1 but not audio.
As it turns out, there is another problem too.
And this one has been around since Amazon announced (but didn’t really deliver) Miracast support in Fire TV Stick when the device launched last fall. That is, Fire TV Stick doesn’t elegantly handle display casting. With other devices—Chromecast, Roku, Microsoft Wireless Display Adapter (which I use and recommend), and so on—the device just sits there waiting for a remote display request. But with Fire TV Stick, you have to first configure it for this use by navigating to Settings, Display & Sounds and then turning on remote display. That’s a silly and time-consuming extra step.
I asked Rafael Rivera about this—he’s done more testing of Miracast devices than anyone—and he told me that even if these issues get fixed, the Miracast performance of Fire TV Stick is so bad, you’ll be stuck with a very low resolution display (1024 x 768) or very bad latency, which renders the experience unusable. He’s published the results of his Miracast work in his post Raw: Wi-Fi Display dongles and associated latencies if you want to learn more. (The Fire TV Stick is by far the worst of the devices he’s tested from a performance standpoint.)
Which is all too bad. Because in my experience Fire TV Stick offers the best performance of the stick-type living room gadgets … as a standalone device. And it really is a great little standalone device, with access to Amazon’s services, of course, but also Roku, Hulu Plus an all the other major services.
But my position on Fire TV Stick for Miracast sadly, hasn’t changed: You’ll want a Microsoft Wireless Display Adapter—just $64 at Amazon.com—or another similar device instead.