Category Archives: Internet

6 Reasons to Make Your Online Business Stunted

business online

Selling at online shop is booming and so excellent in business, but that does not mean the turnover obtained will be stable hold. Decline. could occur as well as offline stores that were deserted condition of the buyer.

business online

In addition to the intense market competition, turned out to be a factor of self-seller also determine whether the customer will come back again or do a repeat order. If so you have to discover the cause why it could happen and can fix it immediately.

Display interface is so important

When visiting the online store first thing that you see the exact view or a website interface. Web is filled with pop-up ads for obscure certainly very annoying and often people are reluctant to go back to that site. Ease of navigation is neat and comfortable too will make people linger at home browsing the desired item on your site in addition to the guarantee of safe and convenient online shopping is equally important.

The product description is too excessive

The product description is too excessive and unnatural can actually negatively impact the taste of consumer interest. Although basically the products offered are of good quality it would be wise to avoid words that seem ridiculous. There was the possibility of consumers actually will get suspicious and opinion if your online store selling fictitious.

Bad service

The service is definitely a benchmark of customer satisfaction and from that will determine whether your business will succeed or fail. When customers are satisfied they will not be reluctant to come again and continue to merchandise your book. Customer satisfaction testimonials you can also make a reference for potential customers of your online store.

Lack of testimonials from previous buyers

As mentioned previously, the testimony influence on consumer decisions to buy products at the online store. Usually testimonials serve as a measure of potential customers if the online store cheater or not.

Replace the price is too high

Before listing the price you should check shanties competitors. Yes, it was also important to compare prices between sellers and the other one in the online world so easily. As with the offline sales should compare prices from store to store.

Usually the contents of the testimony about the quality of goods is good or not, the seller swift response, conformity of the goods received in the photo, or the delivery process which sooner or later.

In order for your online business running smoothly just take advantage of services online mall with high visitor traffic, even millions of potential buyers. It will certainly help your business.

No need to bother thinking about capital opened a store just like an offline store, imagine, you can already have a store inside the mall without having to reach into venture capital loans in less than 24 hours.

Tips to Make Video 360 with maximum results

video 360

YouTube continues to enrich its services with a variety of features, including video 360. But Since presenting a different format, it takes some special way to upload 360 videos on YouTube.

video 360

To upload and watch videos 360 there are several rules that must be followed, including the selection of browsers and specialized applications.

You must use the latest version of Chrome, Opera, Firefox or Internet Explorer to be able to watch video on the computer 360. As for mobile devices, must use the latest version of the YouTube app for Android and iOS.

YouTube support video uploads and playback browser 360 in the fourth. However, to upload the video file, you need a special application.

More details, Google shares tips for uploading 360 videos on YouTube. Well if interested, you can follow the following steps:

1. Create a video

There are some 360 cameras are compatible with YouTube and is already available in the market that Ricoh Theta, Kodak SP360, and IC Real Tech Allie. You can also make video 360 with a custom camera rig and third parties such as stitching software Autopano Kolor.

To get the best results, copy your video to high resolution and in accordance with the advanced spesifications YouTube.

YouTube currently supports 360 video at 24, 25, 30, 48, 50 and 60 frames per second. You are encouraged to upload a video with a ratio of 16:19 in the 4K resolution (3840 X 2160).

2. Preparation upload

Video files you require specific metadata in order to enable playback 360. You need to download an app Metatada Video 360 for Mac and Windows here and here, according to Google’s suggestions.

Then un-zip file, then open the application and select the video file. After that, select the option Spherical and click Save As. Google warned not to select the option “3D Top-bottom”.

Type a name for the video file to be created and save the file. A new file will be created automatically at the same location as the original file.

Then, upload the new files to YouTube and wait for the 360 effect lasts. This process will take approximately one hour.

3. The process of uploading

When uploading videos 360, do not use a video editing tool and Enhancements YouTube Video Editor on their desktop or mobile device. Both are not yet compatible with 360 videos.

Before you publish, you can ensure playback 360 can be used or not, by watching the video on the computer beforehand. It took approximately one hour to make 360 available video playback.

After that there are a few more things that must be ensured to confirm that you are already in a format video 360. Video 360 has a sliding button on the upper left side and can be played using the WASD keys.

Crushers Features Automatic messages contained in the BBM

bbm crush

Still remember the movie Mission Impossible, a film about a spy who made a great success? The film, starring Tom Cruise that had an almost iconic scene in each series, the secret messages that can be destroyed by itself.

bbm crush

In the film, Ethan Hunt, the main character often get a secret message containing a mission that must be implemented. The messages will then be destroyed by itself.

For some people, the ability of messages that get destroyed itself does look cool and exists only in the movies. However, the actual BlackBerry also provides a similar feature via his service messaging app, BlackBerry Messenger.

A Canadian company that has a feature called Timed Messages are pinned on BlackBerry Messenger. Feature that was first introduced in 2014 and is able to create messages that are sent automatically deleted at the receiver and sender.

Timed via Messages, users can specify how long a message or picture message recipient can be accessed. So when the appointed time arrived, the message will be deleted automatically.

Users can also set the time a message is deleted. The time can be chosen from 1 to 60 seconds. Thus, the confidentiality of a message can certainly be guaranteed.

Fun again, this feature can already be used for free. Since last April, the BlackBerry has announced no longer attractive fees for the use of these features.

Previously, users were required to subscribe to enjoy these features are limited. But now users can easily enjoy the features Timed Messages. How, interested in using the Timed Messages feature in BlackBerry Messenger?

PIN and password can be hacked via Wearable Device

smartwatch

A study reveals that the wearable device is prone to hacking. Unmitigated, ATM PINs and passwords can be hacked through these devices. These results revealed from the study titled “Friend or Foe ?: Your Personal Wearable Devices Reveal Your PIN”.

smartwatch

Scientist at Binghamton University and Stevens Institute of Technology collected data sensors in wearable devices, such as smartwatch and fitness trackers using the algorithm. The goal is to open a gap to obtain a PIN or password.

Researchers conducted an experiment in (key-entry) as much as 5,000 times in 20 adults who use the keyword-based security systems, such as ATMs, for 11 months.

The result is very accurate with an accuracy rate of 80 percent on the first try, and 90 percent after the third attempt.

Researchers have little information recording until the slightest movement of the accelerometer, gyroscope, and magnometer that is in wearable devices without the need to pay attention to his pose.

Researchers consists of Assistant Professor of Computer Science, Yan Wang, followed by Chen Wang, Guo Xiaonan, and Bo Liu of Thomas J Watson School of Engineering and Applied Science at Binghamton University and Head of Research Yingying Chen of Stevens Institute of Technology.

They reveal, this is the first way that can reveal the PIN to exploit information from wearable devices without the need for contextual information

In internal attacks, hackers accessing wearable sensor devices worn on the wrist with malware. Malware will wait until the victim access security system with a password and sends back the sensor data.

In other attacks, hackers put a sniffer on the wireless security system to ‘eavesdrop’ sensor data that is sent to a Bluetooth mobile phone to the victim.

This study is fairly still at an early stage to understand the fragility of the security system of wearable devices.

Although they have yet to find a solution, the researchers suggest to the developers to inject some kind of ‘noise’ so that hackers can not read hand gestures. Developers are also advised to encrypt wearable devices and operating systems. “

Twitter Invest $70 Billion in SoundCloud

twitter

Twitter has invested approximately US $70 million in one of the music streaming service provider, SoundCloud. Value investing is called can still grow up to US $100 million.

twitter

Unfortunately, CEO TwitterJack Dorsey did not mention the details of the investment and the specific reasons behind the company’s decision. Even so, he agrees that Twitter now has a stake in SoundCloud.

SoundCloud spokesman also ensures Twitter has invested in SoundCloud. According to him, the two companies will facilitate and inspire today’s contemporary culture at the same time attract more people around the world.

This investment allows SoundCloud remain focused on building value-added, both for creators and listeners as well as continuing other initiatives such as launching a paid service called SoundCloud Go.

Although the plan has not been established Twitter through this investment, some analysts estimate this is how social media to attract more users.

Meanwhile, SoundCloud can see this investment as a move to introduce a new paid services to more people.

On the other hand, the condition of the two companies is also less well known. Twitter has just convicted Wall Street because it was unable to add users quickly.

So even with SoundCloud called not increased valuations, so it is rumored some investors are concerned with the growth of the company.

Actually, this is not the first time Twitter reportedly close to a streaming music service from German. Two years ago, Twitter was rumored to be buying SoundCloud, but the measure nevertheless turned out to do.

Worst hacker attacks in various countries

Worst hacker attacks

Fears the government in a number of countries over hacker attacks that would cripple critical infrastructure occurred in December 2015, when a further constant threat (advanced persistent threat, APT) attacks on the government of Ukraine.

Worst hacker attacks

The incident became the first cyber intrusion drop and turn off the power of a nation.

Using BlackEnergy malware, hackers remotely disconnect the power 225,000 users and flooded customer service with numerous phone calls to prevent the original customer calls.

In 2015 alone, the government of the United States, the Netherlands, Ireland, and Turkey became prey to DDoS attacks, which intends to create chaos and disrupt operations.

In January 2015 in Thailand, some demonstrators angry about the government’s court verdict and launch malicious attacks against 300 government websites.

In the same month, hackers affiliated with Anonymous also initiated a similar attack against the government of Saudi Arabia and Nigeria.

Web applications and virtual DDoS violations that exploit vulnerabilities in the public sector has become more frequent and damaging.

Global risk consultancy Control Risks (Control Risks Global Risk Consulting) in the map for 2016. The annual risk report said a third of the 36 percent of cyber attacks now targeting the government sector.

DDoS attacks are becoming a weapon of destruction to digital extortionists and terrorists. DDoS attacks come in different forms.

Some of them are intended to disrupt the system, while others flood the system with requests for multiple resources (bandwidth, processor time, disk space, etc.).

In Asia, the faster the APT attacks. Territorial dispute between China, India and Southeast Asian countries continues to increase.

The hacker group known as APT 30 in recent years have been using modular malware to obtain sensitive data from their targets, including government classified secret network.

Some cyber attacks consist of emails written in the language of the recipient containing documents looks legal, but contain malware.

The attackers also made Encryption worm-like, which is attached to the hardware, such as USB thumb drives and hard disks. Once these components are in contact with other systems, such attacks would spread.

Protection against DDoS and risk APT

Derek Manky, Global Security Strategist of Fortinet said a comprehensive approach and multi-layered is one of the best ways to improve the defense of cyber threats.

Effective defense is often found when building a cohesive framework of protection and additional protection.

This framework, he added, is very important because it combines the capabilities of today’s security – technology that began to emerge and have a learning mechanism – creating a follow-up of security intelligence of the new threats detected.

Other measures include the environmental aspects of the network and devise response plans. It’s important to secure the potential narrowing, network monitoring, and make sure they go beyond major attacks and mitigation plan.

It aims to complete removal of all DDoS traffic, the strategy should seek to maintain services – especially essential services – with little disruption.

Detailed plans should include backup and recovery, additional oversight, as well as ways to restore service as quickly and efficiently as possible.

A multi-layer strategy for DDoS protection also involves a dedicated on-premise solutions that are designed to maintain and reduce the threat from all corners of the network.

“IT administrators need to remember that it is not necessary for every employee to have access to certain resources that may contain sensitive data. By limiting access whenever possible, the organization can reduce a lot of attacks,” he added.

Governments need to carefully

A strong partnership with the service provider of security, said Manky also important. Partners can provide information up-to-date and threat intelligence to the IT staff, and determine when an incident reporting channel is detected.

The government agency also should partner proactive cyber security organizations and solution providers to share threat information, so that collectively, the industry can have a more comprehensive view of the global cyber threat landscape and respond better to attack.

Lastly, although the assessment and comprehensive plan can be developed, educate government officials on cyber threats is very important.

Employees with access to sensitive information should be specially trained to know how to handle such data. For example, limiting employee access to the USB drive is a good option to protect the network.

Because, APTs, worm outbreaks, DDoS, botnets, or inbound and outbound attacks today are more sophisticated and intrusive.

“Governments need to carefully consider their security posture, proactive and adopt a multi-layered approach to minimize the risks they face,” Manky lid.