Friday, October 5, 2012

BitDefender Total Security 2013 for Your Networks

This is a Sponsored post written by me on behalf of Bitdefender for SocialSpark. All opinions are 100% mine.

Antivirus is a software application that is used to detect and remove viruses or malicious programs that can harm and destroy the data, applications, and computer systems. This antivirus application can determine whether a computer system has been infected with a virus or not. Generally, the software runs in the background and perform a scan of all the files that are accessed as it opened, modified, or when stored.

Keeping your network to be secure with Bitdefender Total Security 2013 and block threats to sensitive information no doubt, and it is your top priority, especially for those of you who run businesses who are constantly using the internet, but the internet is becoming extremely important in our daily functions, external threats can make its way them to get into your home without you knowing and it's not what you expect.

Bitdefender

BitDefender is one antivirus application choices are very tough to maintain the computer network from malicious virus attacks such as malware, spam, and other various types of virus variants. The features and advantages of the BitDefender antivirus connected with all web traffic, email and instant messaging from viruses and spyware in real time. And also there are several other advantages, namely:
  • BitDefender Safepay: How will this help you feel secure in your online purchases?
  • BitDefender Autopilot: BitDefender operates on its own, without a pop up every 5 minutes. Enjoy your computer experience without constant interruptions.
  • Bitdefender Anti-Theft: BitDefender protects you from more than just online threats; it can track lost or stolen devices!
  • Social Network Protection: Filters the links you receive from your Facebook and Twitter friends and monitors your privacy settings.
  • Parental Control Options: BitDefender allows you to block inappropriate content, restrict Web access between certain hours, and it helps you remotely monitor your children's online activity – even on Facebook!
Anti Malware Software - Bitdefender Total Security 2013-3

BitDefender is ranked #1 in Antivirus software and that BitDefender earned CNET Editor's Choice and PCMag Editor's Choice, what you already have BitDefender? 
You can get BitDefender to purchase directly on their site and you can also win a computer that has been installed BitDefender.

Visit Sponsor's Site

Sunday, September 30, 2012

Protect Yourself from Identity Theft

This is a Sponsored post written by me on behalf of LifeLock Twitter for SocialSpark. All opinions are 100% mine.

Identity theft occurs when someone accesses the data another person's identity with the intent to commit fraud or theft. The data include names, addresses, tax, date of birth, credit card numbers and other. Identity theft is widely used for opening a credit card account fraud, filing a loan or obtaining mortgage / car.

When we understand how identity theft occurs, fraud by various methods tend to have two categories. Low-tech methods such as clean up the trash and phone scams are easier to overcome because they are taking advantage of the victim's personal habits. But when the understanding of identity theft methods with high technology, not much you can do because personal information was stolen from someone you provide for business purposes, such as buying a house or get insurance quotes.

A large number of cases involving identity theft by children caused by the misuse of identity that parents do their own children, but there are still many cases the perpetrators are friends or even family members. The best thing to do is to keep your personal information safe, although safety box at a bank is still a good idea if you are able to hire. Fraudulent use of e-mail is probably the most famous, because a fraudster can send thousands of emails at a time. But this is really just a phishing techniques to bring you into the conversation over the phone, so the phone fraud is a real danger.

AmeliaIZEA | skitch.com

Importance of identity protection:
  • Households earning $100k + per year have the highest identity fraud rate at 7.4% 
  • The average cost per person of having identities stolen is $1,513 
  • 11.6 million adults were victims of identity fraud in 2011 and a total of $18 billion was lost.

Alarming stats for social media/ smartphone users that have experience identity fraud: 
  • 6.6% of victims are smartphone owners 
  • 6.8% of victims are social media users who click on the applications 
  • 8.2% of victims are social media users who have “checked in” using their smartphone GPS 
  • 10.1% of victims are LinkedIn users

Do you know how fast a professional hacker can breach your password security? 
  • If you have 6 characters in your password with no symbol, it only takes a professional .000224 seconds 
  • If you have 10 characters and one symbol in your password, it takes up to 20 days for a professional to break in. 
  • What would this mean to your online banking, personal information and overall privacy? 
  • Are you alarmed by the stats listed?
  • How hack-friendly is your password?

Theft with high technology is very difficult to trace, where their professional thieves spread Malware, Malicious Software, Viruses, Worms, Trojan Horses, Spyware, and Rootkits, only those professionals who can ward off identity theft. LifeLock has many professionals who will help you from potential identity. Warranty service LifeLock will spend up to $ 1 million to hire experts, lawyers, investigators, consultants, and anyone who needs to help your recovery.

LifeLock provides five important points of protection such as Monitoring, Scanning, Responding, Guarantee and tracking. With the protection that we do not have to worry if someone tries to commit identity theft, and LifeLock will contact you to rectify the situation quickly, check out  LifeLock on Twitter.

Visit Sponsor's Site

The Flow of Water Found on Mars


Mars rover robot creations National Aeronautics and Space Administration (NASA) found evidence related to the flow of water that have occurred on Mars. These findings provide evidence of the early existence of water on the red planet. This evidence suggests the rocks that once fed by the water and this is the first of its kind. "From the size of pebbles, we interpret the water was moving about 3 feet per second range in depth from ankle to hip," says scientist William Dietrich University of California at Berkeley.

He said many studies reveal about the channels on Mars with a variety of different hypotheses about the flow of water in it. This is the first time that scientists see gravel carried by the flow of water on Mars. Curiosity found this site which is located between the northern part of Gale Crater and the base of Mount Sharp. Initial image captured through the orbit of Mars may provide additional understanding of these pebbles.

A captured image shows alluvial material washed by the water and move to the edges. Spherical shape of some of the rock shows it moving from a distance, where the channel called Peace Vallis pointed to the alluvial fan. The number of channels in the alluvial fan indicates that water flows in continuous motion. The flow was also repeated each time in a long time, not just once or over several years.

Specialized Search Engines for xxx Domain


A specialized search engine pornographic content has been launched by ICM Registry. Xxx Search.xxx only bring results to minimize malware / Malware and spam are often found in the search engines and prevent users from Google autocompleting wrong.

Autocompleting is a component that automatically search the data according to the typing in a combobox and texfield, this melting can usually be done by looking for the exact same data or data that is almost similar.

"The search engine only for pornographic content. Machine through the many porn sites that can be searched," said ICM Registry CEO Stuart Lawney.

This search engine itself to use the domain. Xxx, domain formally generally sold in December last year. Meanwhile, the use xxx domain becomes a center of controversy because of a number of parties filed legal action to enter the domain into the "red zone" internet.

Xxx web domain officially go on general sale in December last year, despite the ongoing legal bid to block the creation of a so-called "red light zone" internet.

Cyber Celebrity Dangerous Threat to Security


Celebrity has always been a target of the paparazzi and the media spotlight. Their popularity can be utilized by cyber criminals to spread malicious software or steal personal information. Cyber ​​security company computers, McAfee speaking at the film Harry Potter star, Emma Watson is the celebrity most "dangerous" to search in cyberspace.

It is revealed because some sites use keywords Watson to trick users into downloads malicious software or steal personal data. When users search for actress 22-year-old Watson's, McAfee found one in eight chance to access a malicious site that likely unnoticed by users.

This is the sixth time security technology company owned by Intel is lifting his studies. Last year a similar incident had occurred and called Heidi Klum as a celebrity who was at the peak of popularity. Several other celebrities are said to be harmful when searched in the online world, call it Jessica Biel, Eva Mendes, Selena Gomez and Halle Berry.

Monday, July 16, 2012

Access Network Using the Technology of Glasses

This is a Sponsored post written by me on behalf of Zenni Optical for SocialSpark. All opinions are 100% mine.

zenni_IG_800.png (800×2152) Some smart glasses technology that has been designed and continuously developed like Google Augmented Reality Glasses, Robotics eyeglassess, Contact Lenses. Robotics Eyeglassess that will help the blind to read braille through a sensor camera so they are easily and quickly receive the information they need. Contact Lenses are combined with hundreds of LEDs that will help the eye see the text and images on a smartphone, speech translate into real-time caption, visual navigation, internet and social media access and many other functions. Glasses continue to develop into functional and stylish accessories. Emerging technologies takes glasses to a new level with other stylish glasses.

Emerging optical technologies will certainly bring positive change for everyone who has used eyeglasses. Research and development of smart glasses has been done by Google, where they have created a smart glasses that can be used to take pictures, record videos, and run the applications and their range of services such as Google Map, Google docs, Google + and so on.

These smart glasses real form of future technologies. Google augmented reality glasses will bring smarthphone features into it. Google Augmented Reality Glasses is displaying various information such as weather forecasts, temperatures, maps that will help you in your journey. Not only that, Google Augmented Reality Glasses is also able to scan a concert poster and display information about ticket prices and other details of the concert. Check out  this Emerging Technology Info Graphic from Zenni Optical and take a look at some of the fantastic deals on their website.

When you in a bookstore, Google augmented reality glasses can also give information about the discount program, and will also help to find the book you need. By using Google's advanced eyewear, you also took some photos and video can then be directly shared with colleagues or people you care about. Google glasses can also prevent users from breaking down because Google augmented reality glasses can inform any track the jammed as well as providing an alternative route suggestions.

Visit Sponsor's Site

Saturday, March 24, 2012

The Vanishing Painting Leonardo da Vinci is Revealed

After more than 30 years of searching for mural painting of Leonardo da Vinci's long lost, Maurizio Seracini found evidence that the legendary mural was hidden in the wall where he painted in 1503. Some time ago, Seracini and his colleagues report that they have found chemical evidence that the painting titled The Battle of Anghiari work of da Vinci, was behind a mural younger.

The Battle of Anghiari a mural depicting the work of da Vinci battle between Milan and the Italian League-led Republic of Florence, in the field in 1440 Aghiari ago. Mural is in the Palazzo Vecchio's Hall of the 500 (Florence town hall), then in 1563 lost and art historians argue that the work was destroyed when Giorgio Vasari's hall remodel. Vasari to paint six murals along the walls of the new hall from east to west.

Proclaimed Live Science, Friday (03/16/2012), a new mural was made by Vasari did not destroy it. An evidence reveals that da Vinci's mural covered only by a mural titled The Battle of Marciano work of Vasari. To see the mural behind Vasari's work, researchers led by investigators Seracini entering the camera through the six-point, by choosing a position that will not break Vasari painting.

"Although we are still in the early stages of research and there is still much to be done to solve this mystery, evidence has shown that we are not misplaced," said Seracini which is the Founding Director of the Center of Interdisciplinary Science for Art, Architecture and Archaeology at the University of California San Diego.

Support the hypothesis of the location of da Vinci painting, Seracini and his group reported four evidence. First, one of which successfully obtained a sample containing a black material that has a chemical composition similar to the black pigment on the painting of Mona Lisa and St. Petersburg. John the Baptist.

Second, fragments of red material found estimated that consists of organic matter associated with varnish. Third, through the high definition image obtained by surveillance cameras, investigators found a cream-colored material on the original wall, and they can only be made with a paint brush.

Finally, the researchers confirmed the spaces left between the brick wall where the mural work of Vasari, the wall behind him. It has also been found in an earlier study using a radar scanner.

Saturday, February 25, 2012

The New Species of Leaf-Nosed Bats

New bat species discovered in Vietnam, has a peculiar shape of the face with hair and bumps that resemble leaves. When scientists first saw leaf-nosed bats Griffin in Chu Mom Ray National Park in 2008, almost any animal that has been identified with known species, the large leaf-nosed bats, said Vu Dinh Thong, from the Vietnam Academy of Science and Technology in Hanoi.

However, Vu Dinh Thong and his team, thinking that the bat is still a chance as a species new to science, using nets to catch some of these domestic animals.  "When arrested, some bats with similar body size, the large leaf-nosed bats, reacted very angrily. Leaf-nosed bat, but Griffin seems to be quite soft," he said.

The team noted the frequency sonar that bats were captured and took tissue samples from several specimens. The results revealed that the bats removing the call at a different frequency of large leaf-nosed bat, which suggests that the specimen was a new species.

According to researchers, the genetic results confirm that the species was named Hipposideros griffini then it has different genetics. So far, only little is known about Hipposideros griffini. Like all leaf-nosed bats, mammals, newly discovered to have a strange shape that resembles a leaf in his nose.

But the peculiar shape of the nose was actually serves to help in sending sound waves and listening to the echoes that bounce off objects, including prey. Bats are also found only in two national parks, although further research may reveal more about the creature's habitat.

Michael Jackson Died Due to Stress.

Michael Jackson's personal physician, Dr. Conrad Murray filed a plea for alleged negligence resulting in death of the King of Pop, Michael Jackson. In his defense, the Conrad Murray revealed that the man who is familiarly called Jacko died of stress.

He also asked the judge to cancel the charges to him. Jacko assessed the stressful so make him take sedatives in large numbers. Michael has owed ​​USD440 million, and he was very depressed to lose all his property.

Conrad Murray was convicted for the death of Jackson. He allegedly did not immediately give first aid when I discovered the singer was in critical condition when taking an overdose of sedatives

Thursday, February 23, 2012

Mozilla Developed the Apps Store

Mozilla was a serious climb to build its own operating system project that is named Boot to Gecko (B2G). It is expected that Mozilla will soon announce his new platform at the Mobile World Congress 2012 next week.

B2G is itself a cross-platform operating system and device, because it's based mobile browser that supports HTML5. Well, it was rumored that B2G would require a separate application, which means that Mozilla will bring Mozilla Apps Store or a Marketplace to distribute their applications.

"We will soon announce the Mozilla Web Apps platform, which is a tripartite approach to developers to build applications to a higher level," Mozilla said in a statement.  Although Mozilla has explicitly announced the presence of online stores, it is expected that the Marketplace will also provide a neutral territory for the mobile operating system to come.

The presence of new services is of course out simboisi mutualism for mozilla and developers, especially with the theme that it is web apps, to save costs. The company is hoping that the combination of open standards for development will be an attractive approach for developers.

Android 5.0 Coming Soon

Android Ice Cream Sandwich has only one percent of market share, but Google seems to be on the verge of releasing his successor. Recent rumors that the next release of Android 5.0 or Jelly Bean will be unveiled in the second quarter of this year. Jelly Bean Android 5.0 will bring further optimization for larger screen devices, tablet and netbook computers.

One of the key features of the upcoming release of Android will be the ability to dual-boot Chrome OS. Cloud-based platform is still struggling to make a big impact and Google's apparent plans to use Android are very popular to change it.

Dual-boot Android 5.0 will also make a Jelly Bean easier to market with computer makers. Given the popularity of Prime Transformer Asus, there may be a niche for ultrabook with extremely long battery life and good performance, even if they do not run regular desktop OS.

Wifi Hard Drive Using Cloud Technology

Technological developments in the category of data storage devices become more sophisticated, after the Cloud-based system that has recently campaigned aggressively, now present data storage media wireless (WiFi) use the technique Cloud, with real physical infrastructure in the hands of users.

"GoFlex Satellite serves to bridge the physical infrastructure of mobile data storage hardware, with wireless connections that can be used simultaneously, with a maximum of three the number of access devices" said Renee Doenggio, Country Manager, Seagate Technology

Seagate's data storage products is a solution to the growing need for storage capacity data (files, music, video, photos, or documents) to the user's smart phone, notebook or PC. That said, this is an innovative step from Seagate to meet market demand.

GoFlex Satellite has an easy to use interface. In addition, he says, "Users can change language settings, can classify any data in it, ranging from music files, office files, and other data". GoFlex Satellite range capability is able to reach a radius of 9 meters. GoFlex Satellite supports multiple operating systems and multimedia platform that is in it,

"Media Sync can be run on two platforms Mac and Android. GoFlex Satellite is very easy in a file sharing "he added. Currently, Seagate has been holding iBox to promote mobile data storage products nirkabeli. This collaboration is expected to attract customers and be able to increase sales figures.

Google Will Release a Second Generation Chromebooks

Google will soon release the second generation of notebooks based operating system Google Chrome, Chromebooks, with reliability in speed and other advantages.

 Sundar Pichai, senior vice president of Chrome said, "Chromebook is in the stage of journey". This is a sign that soon Chromebook second generation will be present on the market.

The birth of the second generation of this Chromebooks be good news for investors to invest in Chromebook. "We are very excited about the Chromebook, we really get a lot of positive feedback," said Sundar.

"Google has done an update on Chrome every six weeks, so the Chromebook performance is much better than when the first came on the market. We're really looking forward to the next generation of Chromebooks. We will increase the dimensions of speed, simplicity and security", explained Sundar Pichai

Chromebook currently being designed with low power consumption, long battery life capabilities, and how to make it have a low price. However, Chromebooks will not be intended for the needs of gaming or editing high-resolution images but rather the level of social activity online.

Enjoy the Beauty of the Ocean Floor with Google Earth

Divers and conservationists throughout the world ocean will soon be able to enjoy the beauty of coral reefs in the Great Barrier Reef, the largest collection of coral reefs in the world without the need to dive. All this thanks to Google Earth, which is working with its partners to offer a sea view in a different way. A research survey will map the Great Barrier Reef, which has not been done before, and allow virtual divers to enjoy the unique ecosystem through 360-degree angle.

Coral reef ecosystems are rarely seen and under the sea, photographed and mapped by a pair of unmanned underwater camera that has been done since September. "Most people who dive in the Barrier Reef is only up to a depth of approximately 20 meters. But 93 percent of coral reefs that there lies between 30 and 100 meters, where light can still penetrate and rarely delved into this area," says Ove Hoegh-Guldberg from the University of Queensland

Hoegh-Guldberg, who led the research project, and is a partner of Google, NGOs and sponsored by British insurer, Catlin. The pictures will be posted on Panoramio, Google Earh, Google Maps, YouTube and viewed in the viewer who made ​​360 degrees. With this project, said Hoegh-Guldberg, they will seek the help of a global audience in assessing the health and composition of the reef.

"The public can help us to more closely study and detail about the amount of coral and fish. Hopefully this virtual diving experience will raise awareness about climate change," he explained. "It also enables people and scientists to discover which species migrate as a result of climate change on their sea lanes," said Hoegh-Guldberg. New views of the sea has been unveiled at the World Ocean Summit in Singapore on Thursday, and for the first time has successfully brought together leading economists, CEOs and scientists.

Saturday, January 28, 2012

Upload a Video Contest Cube Now

This is a Sponsored post written by me on behalf of Contest Factory for SocialSpark. All opinions are 100% mine.

Pimp cube until now still continue to open opportunities for you to upload a video about office cubicle / workspace unkempt and make you uncomfortable while in your cubicle. This video is about what is in your office cubicle / cube / work space such as tables, chairs, computers, shelves, or even less room lighting conditions. Your video should be fun, funny and telling the explain the details of each condition that occurs in your video so that those watching will understand how the condition of your office / cube / work space, and it will open your big chance to win.

There are currently no videos uploaded to their terrible cube so that the chances of winning are very likely for your video, and when the video was uploaded soon invite friends work, your family or anyone who is willing to choose your video so you'll get a lot of points to win Pimp My Cube Contest for  cube / office / work space that is so horrible. Sweepstakes points will be awarded at the time you register, voting, and comments.

Your cube grand prize to be 'pimped' will be selected by judges based on various criteria including the CF for the most votes, the best video (actually worst) and the most interesting stories. This contest has a total prize value of approximately $ 1,200 to update the cube / office / work space with either one of three prize packages that will be like new high end computer systems, new desk, chair and Decorations, new entertainment package with high-end stereo, espresso machine etc.

The contest period is from 12/5/11 at 12:00PM to 1/31/12 at 12:00PM

I think this is a good time to upload videos and easy entry of phone or webcam. So you immediately visit the site PMC for registers and uploads your video to win the contest. After the video cube / office / work space you have been approved do not forget to invite all your friends and family to vote your video to win in this contest.

Visit Sponsor's Site

Corpse Flower Blooms in Bogor

Rare corpse flower Amorphophallus Titanum species that grow in the Bogor Botanical Gardens in Indonesia will soon bloom. "Amorphophallus titanum will bloom in a matter of days. Beginning in February may be the perfect bloom," said Dra. Sofi Mursidawati M.Sc., researcher at the Bogor Botanical Gardens.

This corpse flower blooms are rare events. The same new plant will bloom again within the next 4 years. Amorphophallus titanum flower that blooms this time is a collection that was taken from the territory of Lahat, South Sumatra in 2009. Inflorescence is the first time for the individual during the growing interest in the Bogor Botanical Gardens.

Meanwhile, the corpse flower inflorescence at the Bogor Botanical Gardens was the umpteenth time. Noted, carrion flower inflorescence has occurred since 1942. Currently Amorphophallus titanum is still a bud will bloom with more than 50 cm high. Section protector flowers light green while the cob purple flowers.

Amorphophallus titanum is endemic flower of Sumatra, Indonesia. This interest was first described scientifically by an Italian botanist, Odoardo Beccari, in 1878. This type of carrion flower is just one of 25 types of flowers Amorphophallus genus in Indonesia and 18 species of endemic genera Indonesia.

Researchers from the corpse flower Bogor Botanical Gardens, said, "corpse flower is always interesting to watch because it's always different every individual." For researchers, the corpse flower inflorescence can be an opportunity to examine phenology, for example, how the flowers bloom, specifically the time and direction of inflorescence. Specifically, the corpse flower that blooms this time will be a giant flower preservation study tool. The plan, the preservation program will be conducted through cooperation with South Korea.

Friday, January 27, 2012

Android Apps Infected With Malware

Symantec reported, approximately five million Android users could have been a victim of fraud malware, which is packaged as 13 different applications and come from three different publishers. Symantec dubbed malware attacks such as "Android.Counterclank". Malware that has a wide variety of titles, ranging from "Sexy Girls Puzzle" to "Counter Strike Ground Force."

"It seems they are not pnerbit really exist. This is not an application rebundled, as we have a lot we saw earlier," said Kevin Haley, Director of Security Response Team. A common tactic used by malware authors Android, they resemble a legitimate application with attack code, then do a re-release to the market in the hope that users will be confused to distinguish between genuine and fake.

By combining the total number of downloaded applications, Symantec estimates the impact is in the range of one million users at the lowest point, and five million users at the highest point. Android.Counterclank is a Trojan horse that when installed on a smartphone Android, would work to collect various information, including copies of bookmarks and handset makers. In addition, this malware also modifies the browser.

Although the infected applications require a large number of privileges which must be approved by the user, and only a few bothered to read their requests. "If you are the type of critical, may be wondering why they asked for permission to modify the browser or send GPS coordinates," but most people do not bother "said Kevin Haley. Some of the 13 applications that have been identified Symantec, already circulating in the Android Market for at least one month, according to the revision dates posted on the e-store.

Monday, January 23, 2012

Get a special Discount For Your Prescription

This is a Sponsored post written by me on behalf of Walgreens for SocialSpark. All opinions are 100% mine.

Drugs have become an indispensable part of everyday life, both in order to treat the disease or just for health care. The use of drugs to health must be in accordance with a predetermined dose. The use of continuously increasing and the possible effects of uncontrolled hazardous to your health. The information contained on the label is not easy to understand, especially for us who have no knowledge about medicines.

When you have decided to use drugs, you should consult with a physician or other medical personnel. And it is a wise move to get prescriptions are appropriate for your body. We should not try to diagnose themselves with reference to the symptoms that we feel are still common. Often to ensure certain types of diseases required physical examination, laboratory and so on.

I was greatly aided by the presence of online pharmacies, prescription information necessary to quickly discover that a better understanding of the usefulness of the drug to be used. Walgreens is a pharmacy has experienced resources to provide full service 24x7 in a week to help patients get better. Chat with Walgreens pharmacy professionals will help you to get accurate information for your prescriptions.

Walgreens is offering a special discount on annual membership for its Prescription Savings Club at Walgreens :
For $10 a year, a family membership covers everyone in your immediate family, including a spouse, dependents 22 and younger and pets. Individuals may join for $5. Join and receive discount prices on your prescriptions.

Other benefits include:
-Savings on more than 8,000 brand-name and all generic medications
-Discounts on flu shots, pet prescriptions, nebulizers and diabetic supplies
-Bonuses when you purchase Walgreens brand products and photofinishing services

Walgreens pharmacies provide various services for a variety of prescriptions that you need such as for health care, minor illnesses or chronic diseases such as allergy, antifungal, antiviral treatments, arthritis and pain, asthma and COPD, birth control, blood pressure and heart health, cholesterol, cold and cough, diabetes, vitamins and nutritional health, weight management, women's health and more. To find the latest information please follow the Walgreens on Twitter for your prescription. For those of you who have a Facebook account, you can communicate through the support of Walgreens on Facebook to pricing, coupon codes and special discounts from a variety of your prescriptions.

Visit Sponsor's Site

Saturday, January 7, 2012

Asteroids that Will be a Moon

Along with small asteroids trapped by gravity, and spend more time to circle the Earth, one might say that the asteroid into hundreds of small moon orbiting around Earth. Researchers have long suspected asteroids that pass, sometimes approaching the Earth at a distance close enough to be trapped by gravity. Asteroids is exactly what will be a moon while.

Mikael Granvik from the University of Helsinki in Finland, along with his colleagues run a computer simulation, to find the frequency of various near-Earth asteroids, and their likelihood of being caught gravity when approached. To be caught, an object must start out of the orbit is quite identical with the Earth. Team estimates that, on average, an asteroid with a size of 1 yard or 1,000 space rock measuring approximately 4 inches, may be orbiting the Earth.

 "There's a lot more than people might think," said Mikael Granvik. These asteroids, generally stay in orbit around the Earth for less than one year. Although the simulations were done by researchers, also expressed some asteroids may have stayed longer.

Copy Paste Religion in Sweden

The Swedish government has recently acknowledged a doctrine that venerated principle of a variety of information freely. A religion that calls itself Kopimism now been legally recognized in the country. Adherents of the Church Kopimism believe all things to share information, especially on the internet, is something sacred. Because according to them, form 'Copy Paste', is the value of information that can be used together. This teaching also holds the 'CTRL + C and CTRL + V', which is the keyboard shortcut for copying and pasting, as a sacred symbol of their religion.

Kopimism have attempted to achieve legal recognition in Sweden for over a year. Chairman of the Council of Churches, Gutstav Nipe, said Kopimism have tried three times to register at the Swedish Agency for Administrative Services. But just before Christmas yesterday, officially recognized religions. With this recognition from the Swedish government, the Church will Kopimism legally protected in the country and have potential access to funding assistance from the government.

Recognition Kopimism Church is the latest success for Europe are struggling to provide free and open internet freedom. The presence of this teaching in accordance with the Pirate Party ', which was formed in Sweden in 2006. The party aims to reform copyright laws and patents and to protect online access to information. Pirate Party won more than 7 percent of the vote in the Swedish general election of 2009, and has spawned an international movement under the banner "Pirate Parties International".  Not everything has gone smoothly for the Church Kopimism. Many of the international insistence on the existence of such teachings because it is still controversial.

Microsoft to Kill Windows XP

Microsoft wants Windows XP users to immediately move to the latest version of Windows and proved successful. Therefore, the current number of users of OS XP ​​gone down drastically. According to the research firm, the number of XP users up to December 2011 dropped dramatically. Lots of computer users now have started to be willing to move to Windows 7. In fact, according to research static, users of Windows 7 is almost past the XP users.

Currently the distance between the users of Windows XP with other Windows thinning. This is because globally has been a decline of 3.5 percent from December 2011. Moreover, the software giant is known to openly would 'kill' XP in the near future.

For a year now XP users experience a decrease reached 48.8 percent, which is inversely proportional to the increase achieved Windows 7, which jumped 44.5 percent from 27.7 from last year. However it is felt differently by Windows Vista has declined 4.5 percent, from the previous 15.1 percent to 11.4 percent in the desktop OS market globally.

Symantec's Norton's Source Code Stolen

Following claims made by a group of hackers from India who has managed to steal the source code belongs to Symantec's Norton, the antivirus companies immediately begin an investigation into the matter. Symantec has analyzed it and said that one document dated 28 April 1999 contains details on the Application Programming Interface has indeed been 'lost, but no source code in the document.

The company also found that some of the source code of two security products, Symantec Endpoint Protection 11.0 and Symantec Antivirus 10.2 is made ​​available publicly through online. "Symantec could confirm that the segment of the source code used in the two old products our company has been accessed, one of which has been discontinued," said Symantec.

"The code is taken, is a long document about four or five years ago, but this does not affect Symantec's Norton products for our consumer customers," he added. The company also claims that the code was not stolen through a breach of the network, but perhaps at the expense of the network from a third party entity.

Previously reported, a group of hackers called 'The Lord of Dharmaraja" claims to have stolen the source code and documentation from the Symantec server Indian intelligence agencies. Theft is also in conjunction with the intellectual property of other software companies that have contracts with the government of India.