Monday, November 26, 2018

THY will receive 2 thousand 600 staff


THY General Manager Bilal Ekşi: "THY will expand its fleet to nearly a thousand pilots and 600 cabin officers will be recruited next year. Let's raise the bar with young people. If we grow more at Istanbul Airport, we will need more staff, "he said.

THY  General Manager Bilal Ekdi , the company will expand the fleet next year, a thousand pilots, 600 thousand officers will be taken. 

Eksi, AA correspondent, said THY, depending on the growth of the cockpit every year and the other units said that the staff recruit. 
41 new aircraft will come to THY in 2019 and some of the aircraft will come out of the fleet expressing Ekşi, depending on the expansion of the fleet next year thousand pilots, thousand 600 cabin officers will be procured said. Ekşi, "Especially young friends, both ours and our affiliates to follow the web sites, and apply to apply for job ads. Let's raise the bar of the aviation industry with young people." said.

Ekşi added that Turkish Airlines maintained its growth and added: 
"The companies that serve us are taking more and more staff, especially due to the spatial size of İstanbul Airport. If we grow more at Istanbul Airport, our biggest goal is this, we will need more staff. "

Istanbul Airport in the Turkish civil aviation "to fly" voicing sour, everyone told us that because of the new havalimanıyla pride should not contribute to Turkey.

"ANKARA SECOND HUB, ANTALYA TOURISM 'HUB'S "

Some of the permits were taken from Ankara to travel abroad from Rome to London, Baghdad and Baku, indicating that works are still being carried out for some permits.

According to the protocol signed between the Ministry of Culture and Tourism and Turkish Airlines, Ekşi pointed to the fact that they set a strategy for direct flights from Antalya to Antalya. 
Istanbul will continue to be the main "hub" striking Ekşi, "Ankara as the second hub, while the tourism hub in Antalya will be." he said.

Mr. Ekşi emphasized that the number of voyages to the cities in question will increase after a certain saturation is reached and they expect that this period will take place within a few years. 

Tuesday, November 6, 2018

Zenbo Junior, ASUS 'newest robot

Asus; About two years ago, the smart robot, who could help users at home, introduced Zenbo. Taiwanese technology giant is now; Zenbo Junior, the smarter, more advanced and certainly much more adorable robot, has been introduced to the public. Zenbo Junior is half the size of his relative and much lighter than it.


Zenbo Junior has benefited from the blessings of artificial intelligence. Among the abilities of the cute robot; line sensor, infra red drop sensor, infra red color sensor and sonar wave sensor. The cute robot can easily move where the original Zenbo stumbles. In addition, the Zembo Junior is equipped with a 13 megapixel camera and four microphones to easily detect voice commands.


ASUS did a serious study to improve Zenba's functionality. The new management console; it can be managed wirelessly, allowing multiple Zenbo Junior to be controlled at the same time.

According to the company, the new smart home robot has the skills to trigger developments in the industry. Zembo Junior is expected to provide serious benefits, especially in the field of education. The price and release date of the product has not been announced yet.

Tuesday, September 11, 2018

Demet Akalin cifti ayriliyor

Ünlü şarkıcı Demet Akalın'ın eşi Okan Kurt'un borçları nedeniyle boşanma kararı aldığı iddia edildi.


2012'de dünya evine giren ünlü şarkıcı Demet Akalin'ın eşi Okan Kurt'un borçları nedeniyle Beykoz'daki yalısına dün haciz işlemi yapılmıştı. zor günler geçiren Demet Akalın ve Okan Kurt çifti ayrılık kararı aldığı ve bugün Beykoz adliyesinde duruşması olduğu iddia edildi.


Iranian hackers targeted universities




Universities are seen as a precious metal by cyber attackers. Higher education institutions targeting the various cyber attacks speed does not interrupt the Iranians of a hacker group, including Turkey allegations he found that 14 76 college major phishing attacks in the country brings quite sound nowadays. Comtera Technology security experts, who are at the forefront of the market with their distribution and solutions in the area of ​​information security, are offering recommendations on how universities can stay away from cyber attacks in the upcoming new school year.

Made a new research, Turkey, Australia, Canada, China, Israel, Japan, Switzerland, United Kingdom and the United States, mainly covering 14 of the country at 76 universities belonging to a total of 300 fake website and the home page reveals that a phishing attack organized and demonstrate. According to findings, these attacks are similar to an attack by the Cobalt Dickens hacker group linked to Iran between 2013 and 2017, which led to the accusation of 9 Iranian citizens of the United States. Therefore, despite the claims of some members of the group of hackers, this attack is thought to be their plan.

The threat areas of cyber attackers are expanding day by day, making them more complex and dangerous. The popularity of mobile devices, the high number of users who want to connect to the campus network, and the attractiveness of the intellectual property resources make the universities an area of ​​cheerleading. Stating that universities should focus on reducing the most before the potential damage that may arise during the attack, Comte Technology security experts share suggestions for universities that will become more targeted with the reopening of the training season.

76 Universities 31 Terabyte Data Worked

The cyber hijackers on the last attack on universities at global level use fake websites or home pages to trick users and victims are directed to their schools' online library system. Students or faculty members entering the user information on the fake home page are then directed to a valid entrance session of the university, or the login information is asked again.

Although most of the domain names can not be found in the survey, most of them appear to have been established between May and August 2018. While most of the identified areas point to a single IP address and DNS name server, the latest attack is known to take place on August 19th.

According to a statement by the US Department of Justice on the subject, hackers have targeted 100,000 college professors worldwide with these operations and have managed to access approximately 8,000 accounts. In the description, it was said that the hackers stole a total of 31 terabytes of academic data.

"Universities should embrace their heads against the threat that they are under threat"

Indicating that cyber-attackers aiming to steal information within antellectual property is a commonplace target for universities, but recently it has been increasing, Comte Technology security experts stress that the head of the universities against the attack, which is thought to be exacerbated by the opening of the new school era, Expressing that it is more difficult to provide cyber security in higher education institutions than in many other areas, Comtera Technology security experts say that these institutions are also interesting for hackers in terms of their research and resources.

Reminding students that even a single student brings at least a few different devices to the campus, universities face countless personal challenges that are not governed by security, and Comtea Technology security experts say IT professionals, faculty, and students are all responsible for building campus network security. For this reason, universities must teach simple rules, such as keeping an informative cyber security education to instructors and students, and at least not opening suspicious mails, not using easy passwords to be seized.

New mechanical player keyboard from HyperX



New mechanical player keyboard from HyperX

HyperX, part of Kingston for gamers, announced the launch of the HyperX Alloy FPS RGB mechanical player keyboard. Alloy FPS RGB keyboard; the Kailh Silver Speed ​​mechanical key switches have a shorter key press time and operate with less pressing force. These keys give gamers faster gaming performance. The full size RGB keyboard also features mouse and mousepads on your desk with a compact design with a robust steel alloy frame.

HyperX extends the Alloy FPS keyboard line by adding RGB design and Kailh Silver Speed ​​key switches to the Alloy FPS model . The Kailh Silver Speed ​​key switches, which operate at just 40g, are available for 70 million times. LED lights on the key-blade slot allow the keyboard to have brighter and more eye-catching RGB illumination with five different brightness levels.

The keyboard also prevents the split of games by disabling the Windows key thanks to the game mode. In addition, the keyboard has anti-ghosting and N-Key Rollover functions. Alloy FPS RGB features an easily accessible USB charging input and detachable braided cable at the back for greater flexibility and performance.

"HyperX is thrilled to offer the new Alloy FPS RGB mechanical keyboard with Kailh Silver Speed ​​key switches," said Marcus Hermann, senior manager of HyperX. "These keys are very short to react very quickly and to reduce fatigue with faster gaming performance. are designed with the push point. Thus, they are ideal for players who want to take advantage of their opponents. "

With the Alloy FPS RGB mechanical keyboard, three special lighting profiles can be created directly on the internal memory of the product. This allows you to use the lighting profiles and macro settings on different devices. With HyperX NGenuity software you can customize LED lighting and every key RGB light 1 . In addition, NGenuity's advanced tools include Game Mode and macro settings.

HyperX is taking the slogan "We're All Gamers". Whether you are an amateur or a professional player, each player is designed to exceed expectations with a headset, keyboard, mouse or mousepad.

HyperX Alloy FPS RGB Mechanical Keyboard Specifications

Keyboard

Key switch: Kailh

Type: Mechanics

Backlight: RGB (16,777,216 colors)

Light effects: RGB light on each keypad and 5 brightness levels

Internal memory: 3 profiles

Connection type: USB 2.0 (2 USB connections)

USB 2.0 Transition: Yes (mobile phone charge only)

Query rate: 1000Hz

Anti-ghosting: 100% anti-ghosting

Key Rollover: N-key mode

Media control: Yes

Game Mode: Yes

Operating System compatibility: Windows® 10, 8.1, 8, 7

Key switches

Kailh Silver Speed

Linear, 40 cN starting power

cables

Type Detachable, braided

Length 1.8 m

Dimensions

Width 442,26 mm

Depth 129,81 mm

Height 35,59 mm

Weight (Keyboard and cable) 1100g

Friday, July 27, 2018

Poweghost targets corporate networks!

Kaspersky Lab researchers have identified a new crypto money miner named #PowerGhost. This new miner is targeting #corporate #networks in many regions, especially in #Latin #America. PowerGhost was the latest example of the tendency of#cybercriminals to use miners for income. As this trend grows, corporate companies will continue to be at risk. While miners are charging criminals for their pockets, they sabotage and slow down the corporate networks of corporate companies, damaging all business processes.


#Crypto #money #miners have become one of the most talked-about topics in cyber security. These special "mining" software generate new money using the victim's computers and the processing power of their mobile devices. The harmful miners do this through other users, unaware of the power of their computers and devices. As demonstrated by Kaspersky Lab's previous research, this threat has increased at a rapid pace in recent months and has taken over the ransom software. However, PowerGhost adds a new dimension to this trend. As predicted by researchers at Kaspersky Lab, harmful mining developers are turning to targeted attacks to make more money.


The miner is infected with various openings or remote management tools to the machines. When a machine is affected by this threat, the main body of the miner is being downloaded and working without being stored on the hard drive. When this happens, cybercriminals are automatically updating the mine and releasing it to the network. So the crypto money mining process begins.


"PowerGhost's new targets for crypto-mining software are targeting businesses to install miners," Kaspersky Lab Vulnerability Analyst Vladas Bulavas said. The miner we investigate shows that it is no longer sufficient to target only the users and that the cybercriminals turn their attention to corporate companies. This makes crypto money mining a threat to the business world. "


Kaspersky Lab products identify this threat with the following names:


PDM: trojan.win32.generic
PDM: exploit.win32.generic
HEUR: trojan.win32.generic
not-a-virus: HEUR: The risktool.win32.bitminer.gen


Thursday, May 3, 2018

Terms Bitcoin enthusiasts need to know

As the most valuable member of the crypto money market, Bitcoin stands out as one of the areas invested by many users in recent times. Here are the terms that bitcoin enthusiasts should know ...
The BitCoin market, a new market where many of us are beginning to follow curiously, has become very popular as a platform for those who take risk and those who prefer cautious progress find their investment options. We have compiled the terms for Bitcoin for you ...

Altcoin: An alternative currency that is not as difficult to resolve and therefore to trade as a bitcoin. Since it is less known than Bitco, each subcool may not be traded in every market. Bitco is more cost-effective.
Address: A character bar used to make payments and receive payments. It is also possible to use it as a QR code. If you get a payment from the other side, it is enough to share the address information with them.

Client: The client, a software program, can run on a computer or mobile device. If you connect your work to the network, you can do it on the client.
Inflation: It is a term that shows the continuous increase in the prices used in normal markets during a certain period of time.
Deflation: It is also used in normal markets and is a term that means prices are continuously decreasing over a certain period of time.
Input: Indicates the side on which you pay for the bitcoin market. If bitcoin is already processed, a new bitcoinse input is an address.
Mining: Finding new bitcoin and subcoin through various equipment. Some passwords are broken and coins are accessed for this operation.
Cloud Mining: The process of making the mining process over the internet. There are popular internet sites used for this.
Scamcoin: There are no ideas underneath and coins created to make money. Those who create these coins, collect coins and withdraw from the market.

Arbitrage: It is the business of making profit by taking advantage of the variable value of different financial assets of different financial assets, including both normal markets and bitcoin and subcontinental markets, and by performing trading transactions.
Chart: A bitcoin given to the table showing the increase or decrease in the price at certain time intervals. Investors should follow up frequently.
Wallet: The wallet used to transport bitcoins. It can also be used for storage. It keeps the keys used to reach bitcoins at various addresses. You can view the bitcoins you have in a wallet and the addresses they contain.

Sunday, April 15, 2018

Linkedin supports GIF

After popular social media accounts like Snapchat and Instagram started to offer GIF, GIF feature was activated in LinkedIn Messenger.

In the past days, LinkedIn came up with GIF support for LinkedIn after this explanation of Tenor from the GIF platforms stating that they were working on GIF support for LinkedIn Messenger. This feature will be available to users over time. As an added bonus, Tenor was purchased by Google in the past days.

Huawei's foldable phone comes early

Technology giants like Apple and Samsung want Huawei to be on stage with their flip phone. The first details are that Huawei will introduce foldable phone, Samsung and Apple earlier.
According to the rumor, Huawei will design the foldable phone differently than Samsung's. Samsung's choice for this subject is outward folding design. The company will not opt ​​for the OLED screen from Samsun Display, as Apple uses on iPhone X. Instead, the Huawei foldable phone will use OLED panels produced by LG Display.

Major companies like Samsung, LG, Oppo and ZTE are still working on foldable phones. Along with this news, it became clear that Huawei joined the caravan. For additional information, ZTE has a device like this in the industry called Axon M. Also, the ZTE Axon M does not have a twist. Instead, double screen was selected. Finally, it is known that Huawei wants to introduce the foldable phone model next November.

Moto G6 Play once more leaked!

Moto G6 Play, one of the entry-level phones Motorola is expected to introduce in May, has once again been displayed. The design of the Moto G6 Play was completely clear.
The Motoro G6 Play, a new entry-level phone that looks like the design point for the Moto X4, which the company last year went to the market, will come with a 5.7-inch display with a 18: 9 screen format. The device will provide users with 3 GB of RAM and 32 GB of internal storage.