Firefox The 13 – Firefox 13 kills the 3.6

Mozilla an open source company has now been thinking how to force people to use what they like, by force updating Firefox 3.6 to Firefox 13. This is very unlikely for an open source project. Firefox has now a days racing with the version, but actually what i think that is actually making the user miss some of the features )all in the name of security) , example Favicons which Firefox proudly removed n name of security risk.

The stability and usability of Firefox 4 or greater have been a great issue on older machine and now Firefox force feeding update will make a lot of users switch . Personally I use to like Firefox a lot had many addons and plugins but since FF4 and above I have only lost addons and plugins for each upgrade (in one of my machine  I was still able to keep FF3.6) that make me switch to Google Chrome, till now i have never found any plugins or addons crashing after any Chrome update.


Are You Sure You want to use Google Drive? – Google Drive vs Dropbox vs SkyDrive vs iCloud.

Cloud has been the hottest topic recently. Like many cloud storage services Google launched its own cloud service named Google Drive. So lets have a look at what the different cloud services offer to their user.

Google Drive

Company: Google

Initial Free Storage Space: 10GB

Supported OS : Windows, Mac, Android.


Company: Dropbox

Initial Free Storage Space: 2GB

Supported OS : Windows, Mac, Linux, Android, iOS, BlackBerry


Company: Microsoft

Initial Free Storage Space: 2GB (25GB free upgrade for old users)

Supported OS: Windows 7, Mac, Android, iOS.


Company: Apple Inc.

Initial Free Storage Space: 5 GB

Supported OS: iOS, Windows 7,Mac.

Well  while selecting a service which will store your essential files you need to be careful. Generally people tend to select the cloud service that offers the largest storage, I personally look for maximum compatibility with different OS/devices. But in a cloud service the most important thing to look is the security and privacy. Well security wise I think Google will do a great job protecting my account from unauthorized action, but when it comes to privacy I have big problem whit Google Drives latest Privacy Policy, and I am sure a lot of people will have the same problem if they come to know it. But usually we just click “I accept”

Here is the terms and conditions, the Privacy Policy. (Please read at least the bold words)

Some of our Services allow you to submit content. You retain ownership of any intellectual property rights that you hold in that content. In short, what belongs to you stays yours.

When you upload or otherwise submit content to our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones.

So in a lay man’s term Google pretty much owns everything what you upload to the Google Drive, wish I could upload my worries.

Max Payne 3 PC version, specs and new screenshots revealed.

The system requirement for the latest edition of Max Payne and some new screenshots were reveled by Rockstar Games.Well this is the most high end specs I have ever seen, but the screenshots proves why this specs are needed.

Max Payne 3 System Requirements as per Rockstar Games

Operating System:
Windows 7 32/64 Service Pack 1, Windows Vista 32/64 Service Pack 2, best online casino Windows XP 32/64 Service Pack 3

Intel Dual Core 2.4 GHZ – i7 3930K 6 Core x 3.06 GHZ / AMD Dual Core 2.6 GHZ – FX8150 8 Core x 3.6 GHZ

2GB – 16GB

Video Card:
NVIDIA 8600 GT 512MB VRAM – NVIDIA GeForce GTX 680 2GB VRAM / Radeon HD 3400 512MB VRAM – Radeon HD 7970 3GB VRAM

Sound Card:
100% Direct X 9.0 compatible – Direct X 9.0 compatible supporting Dolby Digital Live

HDD Space:
35 GB


Some Screenshots of Max Payne 3


Beer best served with iPhone

Recently a huge number of iPhones were being smuggled in China using beer bottles. A  woman was trying to cross the Sha Tau Kok border travelling from Hong Kong to Shenzhen, with large number of empty bottles of beer, when the custom officer went to inspect them, the bottle seemed heavier then filled beer bottles which raised suspicion. The Chinese Police is yet to confirm the number of iPhones and how did the woman planned to sell all those iPhones.

Apple the most vulnerable software company of 2012

Apple software is generally considered to be more secure by many people, but the time has changed. After the recent Flashback Trojan , a new data has been out that shows Apple is one of the top ten software company in vulnerabilities of 2012 (the data is for first 3 months of the year)
  • Apple — 91 vulnerabilities
  • Oracle — 78 vulnerabilities
  • Google — 73 vulnerabilities
  • Microsoft — 43 vulnerabilities
  • IBM — 42 vulnerabilities
  • Cisco — 36 vulnerabilities
  • Mozilla — 30 vulnerabilities
  • MySQL — 28 vulnerabilities
  • Adobe — 27 vulnerabilities
  • Apache — 24 vulnerabilities
Data released by Trend Micro
However it is interesting to see that on the mobile OS Apple iOS is very much secure than its rival Google’s Android. May be its because of Apple’s closed App ecosystem. And the fact that more number of mobile internet traffic is from Android platform, which encourages the black hats to target the Android platform.
Source: MacWorld

Apple updating security info for Apple ID


Currently Apple is adding few security questions (three to be exact)and alternate email id for Apple ID. The process though simple but may confuse a lot of people thinking of it to be a phishing scam. The process starts with a sudden notification while you try to install a new app. I think it should have been better if Apple sent  an email and asked us to update the info.



You will be asked to enter your Apple ID password


You have to select three security questions and answer them.


You have to enter a secondary email address not the one which you used for Apple ID previously.

What I feel like is that Apple should have notified the users about this security info update via email before pushing the notifications. Many common people who are not techsavy tends to think that it might be like one of the malware or other phishing scams.

“Max Payne 1” Back In Action

Max Payne Mobile

On 12th of April Rockstar Games released Max Payne for mobile on iOS device. Personally Max Payne was my most loved game since my childhood. So when the game release on iOS I relived my teenage days.
Max Payne on iOS is one of the app that has the largest file size i have ever seen in App Store. its 1.11GB (that’s the reason i am writing this article so late , i started the download on 12th and it finished today 12:25AM)

The game is very very same to the original PC version it has all the same cut scenes and you get the same feeling, but the touch screen controls takes a little time to get used to. And the best thing is you can use the cheats too!! Yes you read it correct, cheats like you use to do on your PC. And yes it has got Bullet Time too.


Compatible with iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation), iPod touch (4th generation) and iPad.Requires iOS 4.2 or later.

  • Released: Apr 12, 2012
  • Version: 1.0
  • Size: 1.11 GB
  • Price $2.99

Download link here.

Here is a game play video sorry about the audio, could not record it via iOS.



Here are few screenshots from the game.

Max Payne 3 Promotion. Is it coming to iOS also?

Reboot Film – A new Hacker Movie Coming Soon.

“We Are All Connected
On A vast Global Network
And Whoever Controls The Network
Controls The World”

A new  hacker movie is coming very soon by Rosa Entertainment and Jan-Ken-Po Pictures. Written and Directed by Joe Kawasaki, and Produced by Sidney Sherman.
Its a movie that relates to many social and political situations of the present time.A female hacker, (Stat) in LA finds herself left unconscious and a iPhone glued to her hand that is running some code which she tries to figure out….
Look in the trailer to know bit more about the story.
What was most interesting to For over 40 years, NUS Business has offered a rigorous, relevant and rewarding business education to outstanding students around the world. me, the use of some proper tool to show some of the sequences in the movie. Most of the time Hollywood does it all wrong when it comes to technology and hacking things. I liked the way they showed the use of Metasploit in the movie.
Note there is also a Twitter game going on by the movie follow @reboot_film
Fore more details click on the source link.

Government can Spy on Your Beloved Gaming Console too.


Well you knew that Government can peep into your computer and your mobile phone and now guess what, they can do the same with your gaming console ! (Yes, you read it correct gaming console like Xbox360, Play Station, etc). The US Navy was awarded with $177,237 sole-source research contract to Obscure Technologies like gaming consoles encryption key. As we all know that todays gaming consoles can not only play games but can connect to Internet , chat and store data on their massive internal storage, the Government thinks that they can dig a gold mine of sensitive information in them.

But i really wonder why will a terrorist play Modern Warfare over real war? and why will any criminal play Grand Theft Auto over real life crime? And if it happens that some real criminal does stores data that can e used by Government to stop crime or put the bad guys in prison, why wont the Government simply ask the vendor to decrepit the data I am sure gaming console manufactures will do hat for them. We have seen in the past how FBI took help from Google to unlock the Android pattern lock of a criminals phone.
Proof of this content can be found on the source link

Gmail phishing on the rise to steal your Gmail password


We use Gmail and other Google service a lot these days, think what could happen to you if your Gmail password lands up in the hands of cyber criminals. Recently there is a special kind of spam mail going around that is made to believe its from Gmail itself but actually its not. The email says that Google has changed your recovery mail address (which Google or any other mail provider wont do by them self ) and they now want you to confirm or reject it by clicking on a link. Although the links reads as a original Google address and when one opens the site it looks like one of the Google login page but actually its a page designed to steal the login credentials.

Here is a copy of the email content.

Dear Account User,

Thanks for updating your e-mail address with us.We changed your recovery e-mail address in our files to this is correct, you can disregard this e-mail. If the new e-mail address is not correct or you did not request this change. Follow the instruction in updating your account

However, Failure to do so may result in account suspension permanently.

Thanks for using Gmail!.




If you happen to get this email in your account do not click any links on the mail, and delete the email.