A Blog about Programming, Security, Business, Web, Earn money

Showing posts with label development. Show all posts
Showing posts with label development. Show all posts

Fifteen Android apps infected with a dangerous virus


The British security company Sophos has just released a new report in which it lists fifteen or so potentially dangerous Android apps for smartphones. Despite Google's selection and security procedures for its Play Store, the apps pointed to by the Sophos report were on Google's app store.

These applications are actually infected by a malware virus that broadcasts ads on the smartphones on which they are installed. Unfortunately, it is quite complicated to uninstall them. Indeed, the icon of some apps disappears once the download is complete, which makes it difficult to uninstall them.

In other cases, the infected applications copy the icon of other legitimate applications which makes the distinction difficult. For example, a fraudulent application copied the icon and name of the Google Play Store or pretended to be an "update" app, displaying the Android symbol.

According to the security company, nearly 1.3 million smartphones have downloaded at least one of these applications and would be infected by the virus. After making this discovery, Sophos warned Google about the problem last July. The Mountain View firm assured that it has since resolved the problem.

Pinned applications are:
  • Flash On Calls & Messages
  • Rent QR Code
  • Image Magic
  • Generate Elves-
  • SavExpense
  • QR Artifact
  • Find Your Phone
  • Scavenger – speed
  • Auto Cut Out Pro
  • Background Cut Out
  • Photo Background
  • ImageProcessing
  • Background Cut Out
  • Auto Cut Out
  • Auto Cut Out 2019
What to do if one is infected?

If you downloaded any of these apps, it may still be on your phone. You've certainly faced a lot of advertising on your smartphone since this summer. Remember to take a look at the applications installed on your phone in the dedicated settings section - not just on the desktop.

Check that each one is legitimate. If this is not the case, you can always try to delete them from this list. If you do not succeed, unfortunately you will not have to go through the factory settings reset.

As the security company Sophos so aptly points out in its report, it is often a good idea to look at the comments of applications before downloading. A must, especially when you do not know the application or its developer. This could prevent you from finding yourself in a delicate situation.
Share:

Google says it has reached "quantum supremacy" with a calculation made in three minutes instead of 10,000 years


After the space conquest in the 1950s, a new technological and scientific race is underway: the one towards the quantum supremacy. After leaks in September, Google engineers and researchers at the University of Santa Barbara said they reached this milestone by performing a calculation with a quantum processor in just over three minutes (200 seconds) that would have taken 10,000 years to the most powerful of the current supercomputers. But his big American competitor, IBM, relativizes the announcement, saying that the calculation can be done in three days with a traditional computer. The White House, it has already blew champagne, very happy ahead of China, which invests massive resources in quantum computing.

What is quantum supremacy?

A reminder for all of us mortals, quantum computing is based on the principle of superposition. Instead of using bits that can only take two values (0 and 1), quantum processors use qubits that, at the microscopic scale and under extreme cold conditions, have an infinity of possible states (such as the Schrödinger cat both dead and alive). "It is a parallelism that allows for multiple calculations at once," summarizes Jean-Paul Delahaye, researcher in computer science. "Quantum supremacy" is a concept that dates back to the 1980s. This is the point at which quantum computers will be able to solve problems that would take too much time for traditional computers, thanks to a sufficient number of qubits.

Has Google reached this milestone?

Google responds in the affirmative, because according to its measurements, its processor Sycomore, which counts 54 qubits, realized 300 seconds a calculation which would have taken 10,000 years at most powerful supercomputers current. But IBM does not agree, saying that by coupling large amounts of storage and RAM, the calculation would take only 2.5 days, not 10,000 years. Until experts decide, it should be noted that the calculation chosen by Google, which is linked to a generation of random numbers, can not be generalized to other tasks such as the factorization of large numbers. We are far from a universal quantum computer capable of performing various calculations. In an editorial, Nature specifies that it will probably be one or more decades before quantum computers have an impact on our daily lives.

What will it serve?

Google, for its part, compares its breakthrough to the Wright brothers' first powered flight in 1903, which lasted only 12 seconds. It is, in short, a proof of concept. What will be its practical applications? According to Google, quantum computing could advance artificial intelligence at high speed. Advances in molecular modeling are already paving the way for new materials to design more efficient batteries, or catalysts that reduce carbon emissions during fertilizer manufacturing. Quantum computers could also disrupt cryptography and render obsolete our credit cards, which rely on the RSA algorithm to secure transactions. To counter this threat, research in resistant cryptography has already taken the lead. "It is even more advanced than the quantum computer," says physicist Daniel Hennequin.


Share:

The news that IOS 13, the next mobile of apple

The next version of Apple's mobile operating system promises great news, according to the first indiscretions.

Major Operating System (OS) versions are still arousing curiosity and even impatience.  This is the case for OS for computers, such as Windows or macOS, but also, and even more currently for their "mobile" counterparts like Android or iOS, all of which are the subject of multiple rumors, speculation and leaks during  the months before their release.  Today, it is the 9to5Mac site that unveils some iconic features of the next version of iOS, numbered 13, which will be officially presented at the Worldwide Developers Conference (WWDC) 2019 in early June.  And to believe these first revelations, the novelties will be numerous.

First, and as expected, iOS will have a dark mode (Dark mode) generalized, which can apply to all apps.  Remember to those who do not know yet that the dark theme, very fashionable at the moment combines two advantages: it reduces eye strain, and it reduces energy consumption - thus preserving the battery - on devices to  Oled screen, which are inherently devoid of backlight system.

Another novelty eagerly awaited, and even claimed by the iPad users: the multi-window.  In apps that display multiple windows, it will be possible to move, overlay and even dock these blocks - "cards" as Apple calls them - in different areas of the screen, just like what the project offers.  open source PanelKit.  A practical feature in apps that use tool palettes, such as for drawing.  Beware, it is not multiwind between apps for as much: because if iOS is of course multitasking, we will always see at most two apps simultaneously on the screen.

Less dramatic, but very useful in everyday life, iOS 13 will offer a function of cancellation of action much more convenient than the current method of shaking the device.  Now, just drag three fingers forward or back of the virtual keyboard to cancel the last action performed.  In a similar register, we can now easily select several elements - in a list, for example - using again several fingers.  Not as comfortable with a keyboard and a mouse, as on the computer, but very appreciable anyway!  Still in the ergonomic chapter, Apple will make the display of the sound volume adjustment much more discreet than currently, so as not to hinder the viewing of a particular video.

In the apps department, Apple will improve Mail.  From now on, messages will be easily categorized into different categories (business newsletters, shopping, travel, etc.), as other independent email providers such as Gmail already do.  It was time !  There would even be a section to read later.  In addition, in its iOS version 13, the Safari web browser will better manage the display of sites according to the definition of the screen of the device, automatically switching to a "desktop" mode when no tablet version is proposed  for example.  Also in the display chapter, iOS 13 will easily add new fonts through the Settings page.

Of course, it is likely that iOS still has many new features.  But it will be necessary to wait for the official presentation - or other leaks - to find out more ...

Share:

Programming Languages Loved, Hated and Best Paid for Developers

Here are the most popular programming languages and what developers can expect to gain by mastering them.

The Stack Overflow Knowledge Sharing Site has released its annual 2019 Developer Survey, which reveals the most popular and highest-paying programming languages in the world and the United States.

If you're a programmer loving Rust, Python, and TypeScript, you're not alone, according to Stack Overflow's 2019 survey, which surveyed 90,000 developers around the world on their favorite, least-favored, and favorite languages.

The youngest languages are popular
The 10 preferred languages are Rust, Python, Microsoft TypeScript, Kotlin, WebAssembly, Swift, Clojure, Elixir, Go, and C #. These languages all have in common that they have been created in the last 10 years or so, with the exception of Microsoft C # and Python.

It also seems that developers are showing little attraction for older languages. The 10 least popular development languages all appeared more than 20 years ago.

The most feared language is Visual Basic for Applications (VBA), followed by Objective-C, PHP, Erlang, Ruby, R, C ++ and Java. Python, becoming one of the most popular, is also the "most wanted" language for the third year in a row, according to the Stack Overflow study.

Other languages that developers would like to learn, but do not use yet, include JavaScript, Go, TypeScript, Kotlin, Rust, C ++, WebAssembly, and Java. According to a SlashData report, JavaScript and Java are already among the languages with the most developers in the world (11.7 and 7.6 million respectively).

The Stack Overflow survey also provides an overview of remuneration according to the development languages under control. Worldwide, Clojure is associated with the highest salaries, with an average of $ 90,000. Other languages associated with salaries over $ 70,000 include F #, Go, Scala, Elixr, Ruby, WebAssemnbly, Rust and Erlang.

The highest wages reported in the United States are far above the median overall wages for all languages included in the survey. HTML / CSS and C # are related to the lowest wages in the United States.

For Web developers, Visual Studio Code and Visual Studio Studio are the most popular development environments. Just over half of mobile developers say they use Google's Android Studio and the same proportion say they use Visual Studio Code.


Share:

download and install Android Studio

Are you starting to develop your own Android apps? So you'll need Android Studio, the development environment created by Google. Follow our tutorial to learn how to download and install it.
Are you tired of being a user and want to go to the other side of the mirror to create your first applications? Have you already started learning a compatible programming language?

So all you have to do is get started. For this, you will necessarily need Android Studio. But what is it, and how can you install it? We will guide you.

What is Android Studio?
Android Studio is the development environment directly provided by Google to create applications for its mobile operating system. A development environment is software that immediately provides all the tools you need to program, compile, and test your application before launching.

Thus, Android Studio provides an improved text editor to allow you to create your code and access all Google APIs, but also an integrated compiler to be able to create your final application, and all it takes to test this application by through an emulator or by sending it directly to your mobile phone.

Android Studio allows you to test everything on any device in the Android universe, from the many types of smartphones available to Wear OS or Android TV. Once your project is complete and tested, you can send it directly to Google for publication on the Play Store.


How to install Android Studio

Install Android Studio on Windows
The procedure is very simple. First you need to download the latest version of Android Studio from the Google site. This is a simple .exe like any application.

When installing, do not touch the default settings. At the end of this one, you can import a previously made configuration from your development environment. On a first installation, select "do not import". Let yourself be guided, and you will soon be ready to embark on Android development.

Install Android Studio on Mac
First download Android Studio as a .dmg file from the Google site. Launch it once, then drag Android Studio into your Applications folder.
The configuration is then the same as for Windows.

Install Android Studio on Linux
On Linux, you will first have to download the dedicated .zip file from the Google site. Uncompress the file in a suitable place, such as / usr / local / or / opt / if you want the application to be shared locally with other users.

To launch Android Studio, launch the terminal, move to the / android-studio / bin / directory and run studio.sh.

On a 64-bit Ubuntu machine, you will also have additional libraries. To install them, run the following command:
"Sudo apt-get install libc6: i386 libncurses5: i386 libstdc ++ 6: i386 lib32z1 libbz2-1.0: i386"

On 64-bit Fedora, the command is this:
"Sudo yum install zlib.i686 ncurses-libs.i686bzip2-libs.i686"

So you are ready to code your first application!

Share:

Android 10 Q will allow you to retouch the blur of your photos in third-party applications

Among the new features announced by Google on Android 10 Q, there is one that should particularly appeal to photographers. It will be possible to modify the background blur from one application to another.
For the last two years, smartphone manufacturers have been multiplying software and hardware solutions to detect the depth of their photos. It can be a second sensor only to calculate the depth, as on the OnePlus 6T, or a particularly effective sensor through the image processing, as on the Google Pixel 3.

Nevertheless, one of the main concerns with these background blur effects was their incompatibility from one application to another. With the exception of Google Photos or Facebook, apps were unable to change this blur effect, either to increase, soften, or change the focus on another subject in the frame.


Possible retouching on third-party applications
It must be said that the images extracted from these photo applications are simple JPG files that can not integrate more than just visual data. It is in this context that Google has announced the arrival, with Android 10 Q, "XMP metadata related to the elements of depth, with a map of the depth integrated in the same document for the devices that support it". In concrete terms, this means that the depth data in an image can be integrated directly into the file.

We can imagine that third-party applications will take advantage of this to modify the depth of field, the background blur, or to add color elements depending on the depth of this or that element. A feature that could for example be taken by applications allowing image editing such as Instagram, Photoshop Express or Snapseed Google.

Share:

The Huawei P30 Lite is discretely made official by the brand

A Filipino dealer had already pre-ordered the Huawei P30 Lite before it was introduced by the manufacturer. However, the brand itself has now quietly formalized the phone on its website.
On March 26, Huawei presented with great fanfare the P30 Pro and P30. At the same event, the brand also unveiled Watch GT Active and Elegant watches, FreeBuds Lite and FreeLace headphones, as well as connected glasses.

However, during this conference, we did not see any trace of the Huawei P30 Lite yet in the pipes and already certified by the TENAA. The manufacturer has made no statement about this ... but the same can not be said of a Filipino reseller, Abenson, who has already published a full page on this light version of Huawei's flagships, highlighting its strengths , especially on the photo and selfies.

Abenson offers indeed the Huawei P30 Lite pre-order today even though the brand itself has not yet officially communicated about it.

A good opportunity to discover the features of the Huawei P30 Lite:
- 6.15 inch screen, Full HD, water drop shaped notch
- 6 GB of RAM
- 128 GB of storage
- 3340 mAh battery, compatible with 18W fast charge
- Triple camera at the back: 24 megapixel, 8 megapixel main sensor, ultra wide-angle - 2 megapixel, depth sensor
- 32 megapixel front photo sensor
- Fingerprint reader on the back
The embedded SoC is not communicated, but we can easily assume that it is the Kirin 710 HiSilicon.

On sale mid-April
The pre-order period indicated by Abenson ends on April 12, the date on which the phone will certainly be marketed, with first deliveries promised as of April 10. The price displayed by the trader is 16 900 Philippine pesos, or about 285 euros HT. Another dealer from the same country, Shopee Mall, has also opened pre-orders for this product.



Share:

Inside a central computer unit

Whether you have a desktop computer or a laptop, your computer always consists of a CPU. Indeed, a CPU is the part that allows your computer to function properly.

If you have a laptop, the CPU is located inside the computer since you only have one block. In the case of a desktop computer, the CPU will be a block completely separate from the screen, the keyboard and the mouse. Indeed, these will be peripherals of the central unit which will be the heart of the computer. A computer, laptop or desktop, can only work in the presence of the central unit.

A central unit is composed of several elements that are mandatory. These elements are the processor which is a computer chip playing the role of computer brain, the motherboard which is a large circuit board with connection ports and which plays the role of nervous system of the computer, the memory which is also called RAM and which allows the computer to start and store data, the graphics card which is also called video card allows the display of the content on the screen of the computer, the sound card which is also called audio card and which manages the sound of the computer, the hard drive that allows the computer to store the data and keep them even when you turn off your computer and the DVD player which can be a simple player , a single burner or a burner drive allowing you to play DVDs and CDs.

In addition to these elements, other elements are also connected to the central unit. These are called devices. Since the CPU is the centerpiece of a computer, it must be properly protected. Thus, a central unit is protected by a plastic or metal case whose role is to protect the various components of the central unit against electromagnetic waves in addition to acting as sound insulation. The protective case of the CPU is often called the "tower" for a desktop. When you buy a desktop computer, you have the choice between three types of cases namely the big tower case, the middle tower and the mini tower. Whatever type of enclosure you choose, it must be equipped with a power supply.


Share:

How do computer programming languages work ?


To work, a computer program needs computer software. These are developed from precise languages that describe the set of consecutive actions that a computer must perform. Based on precise algorithms, it is not always easy to know how it works. Here is a brief, helpful summary.

Computer programming languages allow software and programs to communicate with machines. They are the ones who give orders to tell the machine how to respond to a particular request from the user. This is a basic approach and computer programming is much more complex than that. The programming language is thus classified into two major programming families: the imperative language and the functional language.

The difference between his two families results in the way instructions are given and processed by the machine. In the imperative language, the program follows a series of instructions that the program executes. They are subject to a condition that if not fulfilled prevents its operation. The functional language consists of a program built by functions. The functions fit together. We speak of recursion when the function is called itself.

Computer language is also classified into two general categories. We thus find the interpreted languages and the compiled languages. The difference lies mainly in the way the communication is handled. The interpreted language thus needs an auxiliary program that will translate the given instructions. Languages such as MATLAB, PHP to develop websites or Prolog for artificial intelligence. We speak of compiled language when the file is completely autonomous.

For this he needs a compiler that can translate a program once that can work anywhere. The resulting file is an executable! This type of file is very convenient since it can only be modified by one owner. Anyone who tries to modify it must compile the file again. Among the most common computer languages compiled, there are the C, C ++ that are used in programming video games or applications for example.

There are also intermediate computer languages that combine both the interpreted language and the compiled language. In this category we find languages like Python, Java or LISP ...


Share:

What is javascript ?

Originally created by the American Brendan Eich, JavaScript can create interactive web pages. It is used inside a web page. It has many features. Its uses are not limited and it is characterized by a standard. JavaScript and Java are two different concepts.

Its main function is to perform several actions. He is currently a key position in computer development. It can be triggered by a user either by a Mouse or a button. JavaScript can be available in any communication accessory such as Smartphones, tablets, PhoneGapd'Adobe, applications for Windows 8, but also multiplatform software.
JavaScript can add many elements and interactive elements such as pop-up messages, display, pop-up and pop-up. It can also design windows, redirect links without forgetting its input data control function. Thanks to JavaScript, you can chat in the social network Facebook. You can also play videos on the web with the JavaScript feature. Young and old can play powerful games like 3D Tetris or Torus. A lightweight scripting language, JavaScript makes it possible to verify the data. It makes a site more alive and dynamic. It can also create tooltips. Its function is to scroll through the images. It can display or hide text. JavaScript creates slideshows.

JavaScript has the ability to communicate with the web server. It speeds up the speed of using an online site. Very secure, JavaScript limits the theft of confidential data and information. It saves you from destroying files. It is accepted by the majority of visitors. Its ambition is to accelerate the opening of a website. It offers many possibilities and is an ideal solution for the web designer. You can make scripted slideshows and running images via JavaScript. The design of a JavaScript function requires a certain programming skill and several languages ​​related to computing. In recent years, JavaScript is becoming more widespread and global. It has become a significant tool for all web applications. For a better use, it is important to understand all the peculiarities of JavaScript language. In addition, for maximum success of your operation, you must manipulate the tips and tricks of JavaScript.


Share:

Which programming language to choose to start?

Beginners in programming will be able to choose a specific programming language that suits their level. This activity can be used to create software, the trick to make the manipulation easier is to choose the right technique. IT developers have to master some computer languages if they want to create the website.

What programming language is used when you are a beginner?
Novice IT developers could get started in this business by learning to master the C language. C ++ is a computer language also available to neophytes in computer science. Note that Java is also an interesting alternative for beginners who want to learn this practice. A software developer passionate about technology has reported an interesting track on the ideal programming language for apprentice computer developers.

The choice of programming languages ​​varies according to the motivations of the apprentice developer. It is possible to associate 9 programming languages ​​at the start of your IT career: Java, JavaScript, Python, C, C ++, C #, PHP, Ruby, Objective-C. Recall that Matlab, OCaml, HTML / CSS are other programming languages ​​making the computer developer job accessible to beginners.

IT developer fact sheet
The computer developer is a professional programming language. This technician analyzes the needs of companies and creates customized programs or improves the performance of existing tools. When the developed software is finished, the creator of the tool is responsible for testing it, establishes technical documentation, assumes the use and training of the user of the product.

To exercise its function, the IT developer works from a set of specifications entrusted by the client. This specification can be done by the IT developer in person. He will then have to carry out all the tasks chronologically. The main missions consist in identifying and analyzing the needs of client companies, programming software, conducting a series of tests ...

Skills required to become IT developers
To be a computer developer, you need to know the programming concepts, to master several programming languages. According to the computer developer's job description, this expert must understand the constraints of the project, find solutions to problems, be creative and imaginative in order to propose innovative solutions. The IT developer must also have a good general IT background, be self-taught, and at least English proficient to understand how different code languages such as HTML work.


Share:

How to solve the problem of transferring large files

At the moment, where file transfer has to happen almost instantaneously, businesses and individuals have a choice of file-sharing solutions. Among the best offer of the market, GrosFichiers site to transfer free and without commitment up to a volume of 4GO.

How to quickly send large files?
Using high-performance free file sharing software has become a necessity for both businesses and individuals. Indeed, the transfer of files is a problem that occurs daily and many are those who seek preferably a free and reliable solution. The GrosFichiers tool is perfect for sending heavy files, videos, images, zip, which are too large to be transferred via a regular mailbox. Admittedly, there are many solutions online but no need to look further to find a free and powerful solution up to 4 GB. With GroFichiers you have at your fingertips a simple tool to share your files without paying.

Find the best file transfer solution
Today it is possible to transfer directly through the GrosFichiers interface several large attachments, to send a lot of photos and images up to 4GB. Simply go to the site and without registration load the files you want to share just by indicating the address of the mailbox of the recipient or recipients with whom you want to share the free file. You can increase the duration and the file size with a maximum of 4 GB. Depending on the speed of the Internet connection, the file arrives in the recipient's box with a download download link.

Take advantage of a free powerful tool
With its free tool up to 4 GB GrosFichiers is one of the best solutions for large file transfer from the Web. To use a simple browser is enough because GrosFichiers serves as relay between the sender and the recipient (s) of transferred files. The interface is simple but yet the tool is powerful and the user has no difficulty to transfer files too heavy for mail. It manages the availability of the link but it can also be done automatically when the recipient has downloaded via the link sent to him. Until the recipient has downloaded the file, it is stored safely on the servers of this free web service.


Share:

Tips for Successful Powerpoint Presentations

The presentation of an idea at work such as the defense of a proposal in front of a jury, the illustration of a course, or a project ... Whatever the circumstances, a presentation must be prepared. From creation to editing, here are some guidelines to give you every opportunity to persuade your audience. Note that there are agencies on the market that prepare your work in PowerPoint format such as http://www.davytopiol.com

An idea rhymes with a slide that represents the basic rule for a successful PowerPoint presentation. Your slides should be as explicit as possible. Many use a fairly basic rule: 6 Points / Slide and 6 Words / Point. Be aware, however, that this procedure remains a maximum restriction to assist you in lightening your exhibitions! But the ideal would be to write a minimum of text. A concept is summarized in one word, or even two. In some circumstances, you can use a sketch, an image, a Smart Art. It is particularly important to ignore her theory in textual terms. Do not forget to organize yourself before starting work. If you know beforehand, what you want to put in your Powerpoint is impeccable. It is recommended to take time, to write all your plans on paper, or on Word. Start with a bulk, an excellent organization, the establishment of a precise, analytical project, the addition as and when the perspectives that appear. Through this basic text, it will be a huge gain of time for the creation of the support. In addition, you will be able to fill in the comment cells, an excellent basis for an oral interview. Go through Storyboard which is a kind of synthesis of your story, allowing deconstructing and PowerPoint design beforehand. The technique seems basic: sketch your slide briefly, then slowly add what you want to put in the content. Draw on your detailed program and introduce next to the drawings to be treated in the presentation. Be careful in the use of animations. In general, an exhibition without animations makes more apply. In principle, a controlled summary attracts the attention of the audience. Other instructions: promote basic animations, fast, measured; adapt the depth of the idea to develop, do not exceed the limits. It is very important to build your chart and honor it. Microsoft PowerPoint incorporates an awesome accessory called slide masks. Compared to the colors, do not increase the layers of color, choose one or two colors by focusing on the hues, font size, bold, italic.
Share:

What is the difference between hardware and software?

The two concepts Hardware and Software are two different domains. Indeed, the hardware designates the physical material constituting the desktops, the PC, the external equipments while the software is a software and an application which runs a computer.

First of all, the software is an English word which means the software. It is an invisible part of a computer. Indeed, the software is used to facilitate and to prolong the life of a computer. Software is characterized by machine-readable instruction sequences. They determine the tasks that can be analyzed by the machine. The software data is organized as a file. The machine takes the place of the computer or a calculator. According to experts, the software is called the smart part of a computer. It operates the machine or the PC. The software is a set of programs that can be executed by one or more machines. It is immaterial and it can be stored thanks to a memory medium. Thus, even inside a computer, the Software is a centerpiece of a computer. You can distinguish 3 broad categories of software, including system software, application software, and programming software. You have heard of Microsoft or MS-DOS, they are software used every day by Internet users, individuals and professionals. To be able to work, a computer needs a software and a hardware. Thus, in a general way, the software and the hardware are indissociable. While the hardware is the physical or computer hardware side. It is characterized by spare parts of computing devices. They are placed inside and outside the computer case. The pieces are made by different firms and different brands. They are mounted on printed circuits. For proper operation of your computer, you must use compatible computer equipment that meets the standards. All parts built into the computer can receive information. They can also send, store and process them. All hardware operations must follow the instructions of each software. For a problem in your computer tool, you must contact either a computer hardware maintenance technician or a technician who specializes in computer software maintenance. Many experts remain available on the web to help you out at any time.

Share:

Is there any job for beginners in computer science?

Beginners in IT can be reassured, because they can easily apply to find a job related to this area of activity. Jobs for beginners in computer science are jobs that provide jobs. From this observation, we understand more the interest of young people who wish to move towards computers. Computer learning is a study that can be done at any age.

Some examples of jobs related to the computer sector
Jobs for beginners in computer science may concern different fields of activity. Indeed, there are several types of jobs available to people who have specialized in the field of computer science: engineer and beginner computer development, information technology engineer beginner, engineer studies and development beginner Java / JavaScript, Java developer beginner, computer technician, computer science engineer, project engineer, Java developer, computer maintenance technician ...

Computer job offers that accept entry-level candidates are legion. For example, a position that recruits a developer in Python programming language, developer engineer, digital printing machine operator, computer technician, engineer / computer scientist, IT project manager ...

Why apply for a job for beginners in computer science?
IT is now accessible to all. Indeed, employees, students, young people and even retirees can take an interest in this sector of activity and learn to master it as well in a professional as it is playful. In addition, IT is very useful in all departments of the company. She is involved in the daily management of the various activities of the company such as human resources, accounting, marketing, administrative services ...

The use of computers is also useful in every step of the life cycle of a product created by the company. Computer science is involved from the design phase to the marketing stage without forgetting the manufacture of a product. All trades require various applications such as CAD, CAM, CAM, CMMS, DTP.

Tips for exercising the computer industry
To apply for a job for beginners in computer science, the candidate must acquire basic skills in logic and mathematics. Once these skills are mastered, they can be combined with other skills, namely advanced technical skills such as the operating system expert job, application manager or programming language.

Depending on the affinities of the learner, he can deepen his mastery in finance or economics, develop applications managing data flows, monitor market orders ... The computer scientist can specialize in consulting expertise by becoming a consultant, by acquiring artistic qualities as a graphic designer, webmaster ... improving his technological vision, embedded computing ... With so many job diversities, young computer science graduates can find a job that fascinates him.

Share:

How to create an android application for free?

An Android application is created very simply according to its own design. It is even possible to make changes and optimize it to exactly meet the needs of each user.

An application that is created quickly
It is often mistakenly believed that an Android application is difficult to create. On the contrary, it can be easily and freely created by following some advice on the software found on the internet. A simple smartphone application is sufficient and the user proceeds in the same way as it would on a conventional computer, a procedure that is not complicated. Just choose its layout, add the features that you want to find before proceeding to the publication of the Android application created.

Develop an Android application
To develop an Android application it is important to select pleasant interfaces as they serve as first contact. These must also take into account the configuration of the user's smartphone. It is advisable to use Textviews and Webviews to create text as well as HTML. By following the tutorials and advice on software, it becomes child's play to create a free Android application that will be accessible very quickly.

Learn how to create an Android application
The Android universe provides access to a large choice of software of great utility in everyday life. With the explosion in the number of smartphone users, creating a free Android application can become autonomous by designing Android applications that simplifies everyday life. It is advisable to master the basics of Android creation so that the user can achieve basic applications compatible with most computer terminals. Gradually it can evolve to more advanced Android applications to take advantage of the maximum potential offered by software.

Share:

Honor 10 Lite cheapest: where to buy it at the best price

    The Honor 10 lite is Huawei's latest midrange smartphone offering features that are satisfying for most users. Features that are almost identical with those of the Huawei P Smart 2019 with which this Honor 10 Lite also shares the same design. The smartphone is not available in physical store, but only online at a price of 219 € at partner merchants.
    Huawei launches the year 2019 with the Honor 10 Lite which is launched a few days after the Huawei P Smart 2019 which is its alterego of the catalog of the mother brand. We have been able to test this Honor 10 Lite which is an excellent smartphone for its value for money. A mid-range model equipped with a 6.21-inch Full HD + and FullView screen (ration 19.5: 9). It is powered by SoC Kirin 710 clocked at 2.2 GHz.

    The processor is supported by 3 GB of RAM and offers a basic storage of 64 GB. It is possible to add up to 512 GB additional thanks to the presence of a microSD port. Level photography, Honor 10 Lite is based on a dual sensor of 13 MP (f / 1.8) + 2 MP with depth of field. The catches are obviously not comparable with what Huawei does best (P20 Pro and Mate 20 Pro), but the light version of the Honor 10 takes very good quality photos for a smartphone at this price as we have seen at during our test.

   Level design, the Honor 10 Lite which had already been presented in China late last year is a beautiful smartphone with a dressing made of a material perfectly imitating ceramics. However, the mark does not specify which materials were used. At the front, there is a discreet notch in the form of a drop of water at the top, in the center.



Share:

Huawei: what could its 5G foldable smartphone look like

   Huawei's compatible 5G foldable smartphone is unveiling a series of 3D renderings based on patent schemes. Not surprisingly, the phone can turn into a real tablet, for gaming for example.
    For many years, Huawei has been working on a collapsible smartphone competing with Samsung's Galaxy F. The suspense finally comes to an end. Huawei intends to introduce a compatible 5G compatible smartphone as part of the Barcelona MWC, which will take place from 25 to 28 February 2019.

These renderings imagine what the Huawei 5G foldable smartphone looks like

Based on the latest patents filed by the Chinese manufacturer in his native country, our colleagues at LetsGoDigital have designed a series of 3D renderings. At first glance, the terminal obviously recalls the first prototype appeared in public of the Samsung Galaxy F foldable.

You can see a large folding screen connected by an invisible hinge. As promised by Richard Yu, the smartphone turns into a real tablet once unfolded. Once folded, the smartphone has the size of a phone lambda, with recess more thickness.

As can be seen, the smartphone does not fold inwardly but outward, so that the screen covers the front and back. For now, we still do not know what's called the Huawei foldable smartphone. The latest news, the Chinese manufacturer hesitate to name his foldable smartphone 5G Mate F, Flex, Flexi or Fold.

Moreover, no price and no element of the data sheet has yet been revealed. According to LestgoDigital, it could be equipped with a SoC Kirin 980, like the Mate 20, and cost up to 1500 €, like the Galaxy F. We tell you more as soon as possible. What do you think of these renderings? Could you crack for a collapsible smartphone like this?


Share:

Private VPN test: the protection of personal data first and foremost

    If it does not shine by its speed or its price, PrivateVPN Trunkspace promises a strong protection of privacy.
The name PrivateVPN is not unknown, but the latest service from Trunkspace Hosting should not be confused with the Swedish site PrivateVPN.com. The Trunkspace service makes it easy to connect to servers in 48 countries.

Features and services

The Windows Trunkspace VPN offers a single panel interface listing all supported national connections. The VPN usually offers at least two possible choices per country. To connect to a specific server, simply select it and click the Connect / Disconnect button to the right of the country name.
    A bar at the top of the window is colored red to indicate that there is no connection in progress, it turns yellow when the VPN establishes a connection and green when the connection is active. In the "Settings", which are accessed by the menu icon located in the upper left corner, there are additional options. The Stealth VPN check box is used to hide traffic to bypass network firewalls that block VPN connections.

    In "Advanced Setup" on the "Settings" page, there is an option to disable the Internet at logoff, cutting off any Internet access when the VPN connection is interrupted. Finally, in "Routing", it is possible to specify that only certain domains can pass through the VPN. This option is useful if you only want to protect the connection to an enterprise mailbox, for example, while maintaining occasional browsing outside the VPN. The routing function is not particularly difficult to use, but it is rather reserved for experienced users.
    Strangely, Trunkspace chose not to add the app icon to the taskbar. To make it appear, you must open the system tray, then click on the icon to display the application in the foreground. When our colleagues asked Trunkspace CEO Atif Khan why he chose this approach, he replied that many Trunkspace customers preferred not to have a VPN icon in the taskbar. "From our experience and from what we've seen, the VPN is typically like" set and forget ". Many of our early customers have complained about finding the icon in the taskbar, because it's not an application like Microsoft Word, an email client, or a web browser that you need to interact with. permanently ".

Performance

Trunkspace's performance was good in some cases, but overall not as good as other services. According to tests of our colleagues at PCWorld, PrivateVPN's speed averaged 19.26%. This is not high considering that the performance of the best services tested reaches 50% and the average performance of all VPNs tested is about 30%. But that does not mean that Trunkspace speeds are not fast. As the testers state, most PrivateVPN scores are double-digit, but not high enough to score better. However, as usual, everyone's experience may vary depending on the ISP, the router and the devices.

Confidentiality, anonymity and trust

Trunkspace is officially based in Montreal. The service is domiciled in a UPS shop in the city, but it's not unusual for a small company whose employees work remotely. The CEO of Trunkspace is, as mentioned before, Atif Khan, and the technical director is Jessica Chan. The Trunkspace Privacy Policy or Terms of Service do not contain any logging commitment. But the homepage of the VPN indicates that it does not record any "personal information" such as "IP addresses, connection and disconnect timestamps, bandwidth consumption, and DNS queries".

 It's a good thing to find this information somewhere, but presented as it is, it has more marketing argument than opposable engagement. Trunkspace has recognized the nuance and plans to include these elements in its privacy policy or terms of service in the coming weeks. To register with Trunkspace PrivateVPN, you must also provide the company with more information than many other services claim, including its name, email address, postal address and phone number, regardless of the mode. of payment. Trunkspace accepts payments by PayPal, credit card, bank transfer, gift cards, and several cryptocurrencies.

Conclusion

The VPN approach of Trunkspace is clear. The service does not offer additional features like some VPNs, and its speeds are acceptable, but not exceptional. But, given the offer, the price is a bit too high. There are cheaper solutions on the market with similar privacy policies that require less personal information at registration. PrivateVPN's privacy policy commitments are significant. And if the service revised its tariff down and required less personal information, PC World testers would recommend it more strongly.

Share:

A flaw in the PHP Adminer tool exposes sites to data theft (update)

    The attacks perpetrated by the Magecart group on online transactions may well have exploited a flaw in the PHP Adminer tool, widely used by MySQL database administrators and PostgreSQL.
     A localized vulnerability in the PHP Adminer tool used to administer various databases, including MySQL and PostgreSQL, allows attackers to retrieve data - or inject it - onto websites or e-commerce sites using open source databases. The flaw is associated with the MySQL Load Data command. The information was first reported by the Security Boulevard website. Several other sites, including BleepingComputer, and security researchers have commented and detailed, including on Reddit.

    The flaw can be exploited to access data on which a client has read rights during an interaction between that client and a MySQL server that has been configured to accept connections to unreliable servers. The MySQL documentation also mentions the risks associated with the use of Load Data associated with the keyword Local on the client workstation. An attacker can in fact use the malicious server to make a Load Data Local response and request any file on which the client has read access.

Exploited for Magecart attacks on online payments

    According to researcher Willem de Groot who spoke on the Reddit discussion on January 20, it is this flaw that would have been exploited by the group of attackers Magecart to intercept payment transactions on different sites by the insertion of a code . The Magecart attacks listed included British Airways, Ticketmaster Entertainment and Cathay Pacific Airways. For Willem de Groot, those intervened in October 2018 would have gone through this fault (mdj).

    In a post published a few days ago, the researcher describes the various steps that allow attackers to proceed using the Adminer tool, widely used among administrators of different databases. "Attackers can abuse it to fetch passwords on popular applications like Magento and Wordpress, and take control of the site's database," he wrote, detailing how they are doing. "I tested Adminer versions 4.3.1 to 4.6.2 and found them all vulnerable. Adminer 4.6.3 was delivered in June 2018 and it looks healthy. " He adds that it is unclear whether the security breach was corrected voluntarily or by chance, as Adminer did not release a security update.

Share:

Blog Archive

Recent Posts

Contact Us

Name

Email *

Message *