Sunday, 1 May 2016

What is Bitcoin?

What is Bitcoin?

 http://money.cnn.com/infographic/technology/what-is-bitcoin/


Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need to give your real name. More merchants are beginning to accept them: You can buy webhosting services, pizza or even manicures.

Why Bitcoins?

Bitcoins can be used to buy merchandise anonymously. In addition, international payments are easy and cheap because bitcoins are not tied to any country or subject to regulation. Small businesses may like them because there are no credit card fees. Some people just buy bitcoins as an investment, hoping that they’ll go up in value.

Acquiring Bitcoins

Buy on an Exchange
Several marketplaces called “bitcoin exchanges” allow people to buy or sell bitcoins using different currencies. Mt. Gox is the largest bitcoin exchange.
Transfers
People can send bitcoins to each other using mobile apps or their computers. It’s similar to sending cash digitally.
Mining
People compete to “mine” bitcoins using computers to solve complex math puzzles. This is how bitcoins are created. Currently, a winner is rewarded with 25 bitcoins roughly every 10 minutes.

Owning Bitcoins

Bitcoins are stored in a “digital wallet,” which exists either in the cloud or on a user’s computer. The wallet is a kind of virtual bank account that allows users to send or receive bitcoins, pay for goods or save their money. Unlike bank accounts, bitcoin wallets are not insured by the FDIC.
Wallet in cloud: Servers have been hacked. Companies have fled with clients’ Bitcoins.
Wallet on computer: You can accidentally delete them. Viruses could destroy them.

Anonymity

Though each bitcoin transaction is recorded in a public log, names of buyers and sellers are never revealed – only their wallet IDs. While that keeps bitcoin users’ transactions private, it also lets them buy or sell anything without easily tracing it back to them. That’s why it has become the currency of choice for people online buying drugs or other illicit activities.

Future in question

No one knows what will become of bitcoin. It is mostly unregulated, but that could change. Governments are concerned about taxation and their lack of control over the currency.

Tuesday, 13 October 2015

Beijing LASHES out at Asia's richest man Li Ka-shing via party mouthpiece

Tuesday, 22 September 2015 07:20

Beijing LASHES out at Asia's richest man Li Ka-shing via party mouthpiece 

 

 The mouthpiece newspaper of China's Communist Party has blasted Hong Kong tycoon Li Ka-shing as "ungrateful" for selling assets on the mainland with the world's second-largest economy facing headwinds.
The 87-year-old, nicknamed "Superman" for his sharp business acumen, has been offloading major property investments in China - where growth slowed to a 24-year low last year and has continued to weaken this year - after investing heavily there in the 1990s.
The move, combined with his selling of assets in Hong Kong, has fuelled speculation that the richest man in Asia is losing confidence in the Greater China region.
The People's Daily said on a verified social media account that China's opening up, vast market and favourable policies had been "the key cornerstone" of Li's success, yet he was now leaving his benefactor in the lurch.


"He shared the prosperity while we had good times but could not beat the odds together with us now that we have difficulties. This is indeed unacceptable emotionally," it said in a commentary Sunday on its account on China's mobile messaging application WeChat, a less formal platform than the printed newspaper itself

No 10 Chen Haibin, 46, Zhejiang DIAN Diagnostics Co Ltd No 9 Lv Bo, 52, DHC Software Co Ltd No 8 Jia Yueting, 42, LeTV Holdings Co Ltd No 7 Zhang Yan, 46, Himile Science and Technology No 6 Yang Hongbing, 47, Harbin Gloria Pharmaceuticals Co Ltd No 5 Han Gang, 47, Beijing Jetsen Technology Co Ltd No 4 Li Zhongchu, 52, Beijing Shiji Information Technology Co Ltd No 3 Liu Xianghua, 52, Hunan CHINASUN Pharmaceutical Machinery Co Ltd No 2 Ao Xiaoqiang, 51, Beijing SDL Technology Co Ltd No 1 Liu Chengyan, 51, ChinaNetCenter

While admitting Li's move may have a "negative impact" on confidence in China, the article sought to downplay concerns.

"China's economy accounts for more than 12 per cent of the world's total... Can the withdrawal of a single businessman affect the fundamentals?" it said.

"We don't need to worry that no investors will come after Li Ka-shing.
"What we can do is not to condescend to persuade him to stay or to hurl invectives out of outrage, but to build the country better to make today's departure tomorrow's regret," it said.

Li, who is currently worth US$32.9 billion (S$46 billion) according to the Bloomberg Billionaires index, started out in business as a plastic flower-maker.

He has been reshuffling his business empire since the start of this year and earlier this month announced the merger of his utilities firms, part of an overhaul seen as paving the way for him to hand over the reins to his eldest son Victor, 51, after he retires.

In one of his recent overseas purchases, Li in March acquired British telecom giant O2 from Spain's Telefonica for $15.2 billion.-BusinessAsiaOne

Segway bought by China company

Segway bought by China company

HONG KONG — Segway, the iconic but struggling U.S. maker of self-balancing personal electric scooters, has been bought by a Chinese rival.
Beijing-based Ninebot, which makes a range of short-distance motorized transport devices, said Wednesday that it bought Segway Inc. for an undisclosed amount. It said it received $80 million from a group of investors to finance the purchase.
Ninebot's purchase of New Hampshire-based Segway is the latest example of a Chinese company acquiring foreign brands or technology. It's also the latest chapter for Segway, which has passed through several owners and generally failed to live up to the great hype surrounding its launch in 2002.
Segway founder Dean Kamen famously promised that his invention would revolutionize transportation, claiming it "will be to the car what the car was to the horse and buggy." But sales of the two-wheeler failed to take off and it earned a goofy reputation thanks to some high-profile mishaps, including President George W. Bush toppling over on one in 2003.
The acquisition comes five months after the U.S. International Trade Commission agreed to investigate Segway's claim that Ninebot and other Chinese companies were infringing on its patents and copyrights.
Segway wanted to block imports of competing scooters into the United States but the deal appears to signal a resolution.
In a statement issued by Ninebot, Segway President Rod Keller said the "strategic alliance with Ninebot will enable us to provide more intelligent and valuable products for our customers."
Ninebot, which was founded in 2012, said it received the $80 million investment from a group including U.S. venture capital firm Sequoia Capital, the Shunwei Foundation and Chinese smartphone maker Xiaomi.
Segway was sold in 2009 to British millionaire entrepreneur James Heselden, who died a year later when he accidentally rode one off a cliff. The company was bought by Summit Strategic Investments LCC in 2013.

 http://www.usatoday.com/story/money/business/2015/04/15/segway-china/25810851/

Wednesday, 12 August 2015

10 Weird Mobile Apps You Won't Believe You Can Download

10 Weird Mobile Apps You Won't Believe You Can Download

cuddlr1) Cuddlr

A location-based social networking app called Cuddly lets you find people in your area to cuddle with. Cute or creepy? You be the judge.
Cost: Free
OS: iOS only, Android coming soon
Download here for iOS.

detivational2) Demotivational Pics

Keep that frown upside down. Make a bad day worse with an app that reminds you just how crappy things can be.
Cost: Free
OS: iOS & Android
Download here for iOS; here for Android.

matey3) Carrr Matey

Forgot where you parked your car? This app can tell you -- in a pirate voice.
Cost: Free, matey.
OS: iOS & Android
Download here for iOS; here for Android.

bathroom4) Places I've Pooped

I mean ... the name really says it all. Mark your territory, literally and digitially, with this map of where you've done your business.
Cost: Free
OS: iOS & Android
Download here for iOS; here for Android.

runpee5) Run Pee

Wondering whether now is the time to relieve yourself of that red slushy you just sucked down? Run Pee will tell you when you can run and pee without missing anything big in the movie. Incredibly weird. Incredibly useful.
Cost: Free
OS: iOS & Android
Download here for iOS; here for Android.

catpaint6) Cat Paint

You know what this picture needs? More cat. Cat Paint helps you add more cat.
Cost: Free
OS: iOS
Download here for iOS.

pimplepopper7) Pimple Popper

If you find pimple-popping therapeutic, this app makes a gross little game out of it.
Cost: Free
OS: iOS & Android
Download here for iOS; here for Android.

yo8) Yo

An app that does one thing: says "Yo" to someone else. #yolo
Cost: Free (thankfully)
OS: iOS & Android
Download here for iOS; here for Android.

spirit9) Spirit Story Box: Ghost Hunting Tool

This app speaks ghost. Use it to get a translation of what the ghosts that are definitely around you right now are saying.
Cost: Free
OS: iOS
Download here for iOS.

paper10) Paper Racing

You know what would make bathroom activities more fun? Competition. Race your friends to see who runs out of toilet paper first. There are no winners in this game.
Cost: Your dignity; but it's otherwise free.
OS: Android

Download here for Android.

Friday, 21 November 2014

Now I wonder... why?

NOW I WONDER WHY?




Only in This Stupid World
......do drugstores make the sick walk all the way to the back of the
Store to get their prescriptions while healthy people can buy cigarettes at the front.



Only in This Stupid World

.....do people order double cheeseburgers, large fries, and a diet coke.

Only in This Stupid World
.....do banks leave vault doors open and then chain the pens to the counters..


Only in This Stupid World
......do we leave cars worth thousands of dollars in the driveway and put
Our useless junk in the garage.


Only in This Stupid World ...........do we buy hot dogs in packages of ten and buns in
Packages of eight..



Only in This Stupid World .....do they have drive-up ATM machines with Braille lettering.


EVER WONDER
...


Why the sun lightens
Our hair, but darkens our skin?


Why don't you ever see the
Headline 'Psychic Wins Lottery'?



Why is
'abbreviated' such a long word?



Why is it that
Doctors call what they do 'practice'?



Why is lemon juice made
With artificial flavor, and dish washing liquid made with real lemons?


Why is the man who
Invests all your money called a broker?


Why is the time of
Day with the slowest traffic called rush hour?


Why isn't there
Mouse-flavored cat food?
Why isn’t there Cat flavored
Dog food?
Why didn't Noah
Swat those two mosquitoes?


Why do they sterilize the
Needle for lethal injections?


You know that
Indestructible black box that is used on airplanes? Why don't they make the whole plane out of that stuff?!


Why don't sheep
Shrink when it rains?


Why are they called
Apartments when they are all stuck together?


If con is the opposite of
Pro, is Congress the opposite of progress?


If flying is so
Safe,why do they call the airport the terminal?

Thursday, 16 October 2014

9 weird home remedies


Listen to your elders advice Not because they are always Right
But because they have more experiences of being Wrong!!


1) Listerine cures toenail fungus
cid:1.1440350515@web113408.mail.gq1.yahoo.com
Soaking your feet in Listerine mouthwash for 15-20 minutes, twice a day, will cure most cases of toenail fungus. Listerine contains antiseptic and disinfectant ingredients; it has been used for everything from curing gonorrhea to cleaning floors.
 
Listerine is also good for curing blisters (dab onto blister 2-3 times per day to dry it out), and dandruff.
 
 
2) Yogurt cures bad breath
cid:2.1440350515@web113408.mail.gq1.yahoo.com
Studies have shown that live bacteria in sugar free yogurt can suppress levels of bad breath-causing bacteria. If the bad bacteria can't survive, your breath smells sweeter.
 
 
3) Olive oil cures Eczema
cid:3.1440350515@web113408.mail.gq1.yahoo.com
Olive oil is rich in vitamin E, so it's a great skin moisturizer. Apply extra virgin, unrefined olive oil to your skin after showering, while your skin is still damp. The olive oil seals in moisture and helps soothe painful Eczema flair-ups.
 
 
4) Sugar stops the hiccups
cid:4.1440350515@web113408.mail.gq1.yahoo.com
Hiccups are annoying, but now you can stop them within one minute simply by swallowing a teaspoon full of dry sugar. Experts believe that the sudden sweetness on the tongue overloads the nerve endings in the mouth and stops the hiccup spasm.
 
 
5) Chewing peppermint or cinnamon gum eases commuting stress
cid:5.1440350515@web113408.mail.gq1.yahoo.com
Studies have shown that chewing peppermint or cinnamon gum increases awareness and reduces fatigue by as much as 20%. Test subjects reported 25% less frustration and 30% increased alertness. The drive also seemed 30% shorter for those who chewed the gum, versus those who did not.
 
 
6) Biting on a pencil cures headaches
cid:6.1440350515@web113408.mail.gq1.yahoo.com
Tension headaches can often arise from unconsciously clenching your jaw. Gently holding a pencil between your teeth forces your jaw muscles to relax, easing your headache.
 
 
7) Vodka cures stinky feet
cid:7.1440350515@web113408.mail.gq1.yahoo.com
Wipe your feet with a vodka-soaked rag to eliminate foot odor. Vodka contains alcohol, an antiseptic that is very drying. Alcohol destroys odor-causing fungus and bacteria and dries out the moisture that lets these organisms grow.
 
 
8) Olives and lemons cure sea sickness
cid:8.1440350515@web113408.mail.gq1.yahoo.com
Motion sickness causes excess saliva, which can make you queasy. Eating olives or sucking on a lemon at the first signs of sea sickness can help ease nausea thanks to the tannins contained in these items.
 
 
9) Tomatoes cure acne
cid:9.1440350515@web113408.mail.gq1.yahoo.com
Tomatoes have a lot of vitamins C and A, antioxidants and acidic content, so they can be used to treat a variety of minor skin ailments. This cure is especially good for oily skin. Mash one small tomato into a pulp, then spread the pulp on your face and let it sit for one hour. Wash it off with tepid water and pat dry. Repeat once a day for a week.

Thursday, 25 September 2014

VAWTRAK Plagues Users in Japan

VAWTRAK first made the rounds via attachments to fake shipping notification emails in August 2013. The attachment was actually a ZIP file that contained a malicious file, detected as BKDR_VAWTRAK.A, which was initially known for information theft from FTP and email clients. This 2013 variant stole credentials from several Windows email clients, however, more recent VAWTRAK variants have expanded their capabilities to include a wider range of theft. Among these capabilities were banking Trojan routines such as stealing banking credentials and credit card information.
What is the VAWTRAK malware family?
VAWTRAK is a family of online banking malware. It was originally spotted in August 2013 for its information theft routines but more recent variants are known to steal banking credentials, more prominently in Japan.
Why is VAWTRAK noteworthy?
VAWTRAK is noteworthy because its routines have vastly "improved" from simple information theft to stealing banking data from certain banking institutions in Japan. VAWTRAK is also notable because its routines make malware cleanup difficult. VAWTRAK restricts users from running files related to antivirus software by adding specific registry entries to infected systems. It checks for various security software (including Trend Micro products) and downgrades the software privileges to render the antivirus capabilities ineffective.
Despite its routines, VAWTRAK’s malware behavior is not particularly innovative. Stealing FTP credentials are similar to the FAREIT malware. VAWTRAK is also similar to ZBOT as it has a configuration file, which contains code for web injection and a list of sites it monitors. Another major reason why VAWTRAK is notable is that it managed to target four major banks and five credit card companies based in Japan. These sites then lead to the Angler Exploit Kit, which leads users to various Flash and Java exploits used to install VAWTRAK in systems.
How widespread are VAWTRAK variants in Japan?
Data from the Trend Micro™ Smart Protection Network™ in the pie chart above shows that most of the VAWTRAK infections are found in Japan. The United States and Germany trail far behind. The increase in banking malware that target banks in Japan can be attributed to the increase in information stealing malware such as TSPY_AIBATOOK that have added capabilities allowing the malware to steal banking credentials.
What are the notable VAWTRAK variants?
Some of the more notable VAWTRAK variants include BKDR_VAWTRAK.PHY, BKDR_VAWTRAK.SM, and BKDR_VAWTRAK.SMN. A common malware routine for these variants involve checking for the presence of certain security-related directories in the Program Files and Application Data folders. These security products include the following:
  • a-squared Anti-Malware (now Emsisoft Anti-Malware)
  • a-squared HiJackFree (now Emsisoft Anti-Malware)
  • Agnitum
  • Alwil Software
  • AnVir Task Manager
  • ArcaBit
  • AVAST Software
  • AVG
  • Avira
  • BitDefender
  • BlockPost
  • Doctor Web
  • DefenseWall
  • ESET
  • f-secure
  • FRISK Software
  • G DATA
  • K7 Computing
  • Kaspersky Lab
  • Lavasoft
  • Malwarebytes
  • McAfee
  • Microsoft Security Essentials
  • Norton AntiVirus
  • Online Solutions
  • pTools
  • Panda Security
  • Positive Technologies
  • Sandboxie
  • Security Task Manager
  • Spyware Terminator
  • Sunbelt Software
  • Trend Micro
  • UAenter
  • Vba32
  • Xore
  • Zillya Antivirus
Once VAWTRAK finds any of the above-mentioned security software installed, it creates the following registry entries to force the antivirus installation to run under restricted user privileges:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\
CodeIdentifiers\0\Paths\{generated GUID for the AV software}
ItemData = "{AV software path}"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\
CodeIdentifiers\0\Paths\{generated GUID for the AV software}
SaferFlags = "0"
What are its main routines?
VAWTRAK’s main routines include backdoor commands, such as keylogging and capturing screenshots. It also steals FTP credentials and stored email credentials, as well as data from Internet browsers. VAWTRAK also tracks data that contains banking and credit card information.
How will I know if my system is infected?
Users will know that their systems are infected if there is an existing {random filename}.dat or {All Users Profile}\Application Data in the ProgramData folder. The .DAT file is actually a .DLL file present in the autorun registry.
Another symptom for VAWTRAK infection is users’ inability to run antivirus-related processes. VAWTRAK adds policy-related registries that restrict users from running files under antivirus-related folders.
How does a typical VAWTRAK infection chain look like?
Below is a sample infection chain that shows how VAWTRAK arrives on a system via a Java.exe file that originates from a malicious or compromised site. The .DAT file is actually a .DLL and the final payload, aka, the VAWTRAK malware.
VAWTRAK system arrival via java.exe
Here is another sample infection chain that shows how VAWTRAK arrives on a system, this time using a Flash.ocx file that leads to the final payload, a .DAT file that is actually a .DLL (VAWTRAK).
VAWTRAK system arrival via Flash11e.ocx
How do I protect myself from VAWTRAK?
Users are advised to disable or uninstall browser plugins such as Java, Adobe Flash, and Adobe Reader if they are not needed. Since the attacks illustrated in the infection chains above originated from and involved certain software, it is always best to minimize the risk of infection by applying software patches and keeping systems up-to-date. Cybercriminals may utilize vulnerabilities and system bugs should these holes be uncovered and exploited.
Lastly, users must be sure to only visit legitimate banking websites to lessen the risk of clicking fraudulent links embedded in emails or spammed messages.
Does Trend Micro protect users from this threat?
Yes. Trend Micro products detect and delete VAWTRAK variants via the Smart Protection Network’s file reputation services. Web reputation services blocks access to the domains where VAWTRAK variants connect to.
FROM THE FIELD: EXPERT INSIGHTS
"We may continue to see VAWTRAK in the wild since its newer, specialized routines may lead to complicated cleanup solutions. There are definitely clear signs of VAWTRAK further advancing and improving. Newer variants now have features such as having a configuration file that contains the banking and credit card institutions which it monitors. The older arrival vectors were just spammed messages, but now VAWTRAK is seen to arrive via Java exploits." –Jimelle Monteser, threat response engineer
"The VAWTRAK threat is ultimately a threat toward all people who utilize online banking. Since online banking has gone mainstream for a large percentage of users, ranging from home users to enterprises, VAWTRAK poses grave a threat to all." –Rhena Inocencio, threat response engineer

 http://about-threats.trendmicro.com/us/webattack/3141/VAWTRAK+Plagues+Users+in+Japan