Sunday, September 1, 2019

Jack Dorsey's Twitter account has been hacked

Twitter CEO Jack Dorsey's Twitter account hacked


Dorsey's hacked account of 4 million followers made racist and immoral shares. 

"The confidentiality of Jack's account has been violated. We are working on it and investigating what happened," Twitter Spokesman Brandon Borrman said in a statement. used.

The shares were deleted in a short time

Monday, August 26, 2019

Which headset sells the most: AirPods or Galaxy Buds?




The wireless headset industry is growing day by day. Apple, including Samsung, Huawei, Honor, Xiaomi, including many brands reveal their products. Which one sells the most?
Apple, the wireless headset with the AirPods 2 model began to give the possibility of wireless charging. Samsung also added this feature to the Galaxy Buds . Even Galaxy S10 and Galaxy Note 10 series phones can charge these headsets thanks to reverse charging technology. Taking advantage of the latest technology, wireless headphones confuse users. Many big brands in the sector, the name of the rope was Samsung.

In the new Consumer Reports report, wireless headsetIn the category of Samsung Galaxy Buds 86 points, managed to outperform its rivals. With only 56 points, AirPods ranked 49th, which could be pretty bad. Both the 2019 Galaxy Buds and Apple AirPods (2nd Generation) were launched in March. However, Samsung's product is sold at a cheaper price.

After its release, Galaxy Buds has been getting better with software updates over the past months. Touch controls and Bluetooth connectivity have been improved, and the quality of streaming and phone calls has improved.

Saturday, August 24, 2019

Block Spam Traffic to Your Site

Spam traffic, which many web site owners complain about, damages seo by affecting bounce rate especially in google . I don't know about you, but it's happened to me a lot. Especially if you are a website owner that advertises and receives enough traffic, they may be infected.




I found a way to avoid this blocking the .htaccess file, which generates links to this traffic on google analytics. In addition, I applied filters on google analytics so that they did not appear in my reports.


The section to be added to the .htaccess file for spam traffic.


Options + FollowSymLinks
RewriteEngine On
RewriteCond% {HTTP_REFERER} semalt \ .com [NC, OR]
RewriteCond% {HTTP_REFERER} buttons-for-website \ .com
RewriteRule. * - [F]


You can extend the list by entering domain names. Most spam sites are as follows.


Known sites that send spam traffic:


I click.aliexpress.co
site32 simpleshare-buttons (.) com
I Buttons-For-Website.co
com
com
lumber
com
I make-money-online.7makemoneyonline.co
com
tongji.edu.cn
I topic56551788.darodar.co
I bycontext.co
I best-seo-offer.co
forum69.info
I iframe-toloka.co
I vi-view.co
I tb.ask.co
I 1and1.co
I inspsearch.co
I webssearches.co
I duckduckgo.co
yoursearch. Up
I sidecubes.co
I safehomepage.co
I v9.co


What's Deep Web?

What is the Deep Web that doesn't have the tip? What's in the Deep Web? Why is Deep Web dangerous?

Deep Web has been playing more and more ears lately. Because scary and secret things are attractive. More importantly, Deep Web accounts for 90 percent of the entire Internet world; 10 percent of all the web sites that Google can enter.

So what's in the dark world of the internet? Why can't Google ever get into this dark side of the internet?

The question of what is deep web is one of the most sought-after questions on Google and Youtube, and the deep web videos that you encounter here, along with suspense music, are very attractive.

In a simple definition, deep web, ie deep internet, is the lower dimensions of the superficial internet that we use. Sites and information not accessible to every internet user can be found here.

It is possible to say that it is an unlimited area without rules, laws or prohibitions…

Of course, when this is the case, what comes to your mind in the sense of crime, this is a dimension that all return. So much so that even though it sounds a little scary, the markets where the kidnapped people are sold, the areas where all kinds of drugs and lethal substances are sold, a world where rented killers javelin… Perhaps much more…

Before coming to the topic of how to enter the deep web, let's give an example of how this concept revives your imagination. Today, the limits of the Internet we know are only 10% of the whole world.

The rest is the dimensions expressed as deep web. It is not a single dimension, but dimensions. So it is possible to go deeper by layer.

Dangerous area even Google can't enter: Stay away!
What is the Deep Web that doesn't have the tip? What's in the Deep Web? Why is Deep Web dangerous?

Deep Web has been playing more and more ears lately. Because scary and secret things are attractive. More importantly, Deep Web accounts for 90 percent of the entire Internet world; 10 percent of all the web sites that Google can enter.

So what's in the dark world of the internet? Why can't Google ever get into this dark side of the internet?

The question of what is deep web is one of the most sought-after questions on Google and Youtube, and the deep web videos that you encounter here, along with suspense music, are very attractive.

In a simple definition, deep web, ie deep internet, is the lower dimensions of the superficial internet that we use. Sites and information not accessible to every internet user can be found here.

It is possible to say that it is an unlimited area without rules, laws or prohibitions…

Of course, when this is the case, what comes to your mind in the sense of crime, this is a dimension that all return. So much so that even though it sounds a little scary, the markets where the kidnapped people are sold, the areas where all kinds of drugs and lethal substances are sold, a world where rented killers javelin… Perhaps much more…

Before coming to the topic of how to enter the deep web, let's give an example of how this concept revives your imagination. Today, the limits of the Internet we know are only 10% of the whole world.

The rest is the dimensions expressed as deep web. It is not a single dimension, but dimensions. So it is possible to go deeper by layer.

After a certain point, special devices are required and very few people can access this dimension. For the deep internet concept, it would be very accurate to define the invisible face of the iceberg.

Now, let's talk about how to enter deep web… There is special software for entering deep web, that is, the backyard of internet world; you need to install this special browser on your computer. This browser gives you instant locations and thus you become anonymous.

Moreover, there is no standard domain or url in this world. Complex urls that end in the form of on .onion appear. However, you should know that this level is the layer of the deep web that is closest to the surface. Going deeper can be quite dangerous.

So is it a crime to enter the deep internet, the Deep Web?

No, it is not a crime to use deep web or just log in. However, an important detail is that 95% of this legal dimension is illegal. There's not much legal business going on here. So you have to be sure what you're getting into.

Let's go into more detail, who uses Deep Web, what's going on here?

Let's quickly tell you about the elements of this illegal world with a few examples. Scientists, murderers, drug dealers, political activists, terrorists, perverts, data vendors, smugglers, agents… We are talking about an environment where many pests such as human beings are bought and sold for many dangerous experiments, pests that provide painless death in seconds, and confidential data are shared.

The famous Wikileaks documents have also leaked from this world for example. Here thieves and murderers walk around.

Dangerous area even Google can't enter: Stay away!
What is the Deep Web that doesn't have the tip? What's in the Deep Web? Why is Deep Web dangerous?

Deep Web has been playing more and more ears lately. Because scary and secret things are attractive. More importantly, Deep Web accounts for 90 percent of the entire Internet world; 10 percent of all the web sites that Google can enter.

So what's in the dark world of the internet? Why can't Google ever get into this dark side of the internet?

The question of what is deep web is one of the most sought-after questions on Google and Youtube, and the deep web videos that you encounter here, along with suspense music, are very attractive.

In a simple definition, deep web, ie deep internet, is the lower dimensions of the superficial internet that we use. Sites and information not accessible to every internet user can be found here.

It is possible to say that it is an unlimited area without rules, laws or prohibitions…

Of course, when this is the case, what comes to your mind in the sense of crime, this is a dimension that all return. So much so that even though it sounds a little scary, the markets where the kidnapped people are sold, the areas where all kinds of drugs and lethal substances are sold, a world where rented killers javelin… Perhaps much more…

Before coming to the topic of how to enter the deep web, let's give an example of how this concept revives your imagination. Today, the limits of the Internet we know are only 10% of the whole world.

The rest is the dimensions expressed as deep web. It is not a single dimension, but dimensions. So it is possible to go deeper by layer.

After a certain point, special devices are required and very few people can access this dimension. For the deep internet concept, it would be very accurate to define the invisible face of the iceberg.

Now, let's talk about how to enter deep web… There is special software for entering deep web, that is, the backyard of internet world; you need to install this special browser on your computer. This browser gives you instant locations and thus you become anonymous.

Moreover, there is no standard domain or url in this world. Complex urls that end in the form of on .onion appear. However, you should know that this level is the layer of the deep web that is closest to the surface. Going deeper can be quite dangerous.

So is it a crime to enter the deep internet, the Deep Web?

No, it is not a crime to use deep web or just log in. However, an important detail is that 95% of this legal dimension is illegal. There's not much legal business going on here. So you have to be sure what you're getting into.

Let's go into more detail, who uses Deep Web, what's going on here?

Let's quickly tell you about the elements of this illegal world with a few examples. Scientists, murderers, drug dealers, political activists, terrorists, perverts, data vendors, smugglers, agents… We are talking about an environment where many pests such as human beings are bought and sold for many dangerous experiments, pests that provide painless death in seconds, and confidential data are shared.

The famous Wikileaks documents have also leaked from this world for example. Here thieves and murderers walk around.

There are even those who claim to steal you and send you the video of that moment. Fake passports and visas are flying in the air, and it is possible to come across any illegal adverts that you cannot even imagine.

That's why we're talking about a very dangerous dimension. Right now, I think we understand that thriller music is the right choice.

Deep web is just the level closest to the surface. From this level it is possible to go further down.

After that, a closed system is needed where special devices are needed and not everyone can access. This level is called Closed Shell System and can be seen with devices with special operating system.

Official currency: The

money returned on Bitcoin Darknet is known to have reached a figure of $ 2-3 billion in a year. The currency of this realm is bitcoin.

According to accessibility, the layers of the deep web and the standard world we are in are as follows;

Level 1 (Surface web) The surface web, which can be accessed without using a special browser. Social networks, news sites, and any sites you've already logged in to using Google.

Level 2 (Bergie web)

Web content that you cannot access with search engines. FTP servers, non-indexed adult (+18) content takes place at this level. It is almost impossible to reach these content with search engines, because they either have a search barrier or are thrown to the end.

Level 3 (Deep web)

Proxy level and Tor level

Level 3 are divided into two groups. The first group of sites that can be accessed by proxy, .onion extension, but blocked by search engines, illegal content is contained within the scope of any site.

Level 4 (Charter web)

Confidential company and market information, predetermined million betting results, billion dollar sales, world-famous arms smugglers, tank-missile-defense system sales, banned movies are found in this section ...


Friday, August 23, 2019

What is Apple Watch

What is Apple Watch 5?


The new smart watch Apple Watch 5, which Apple plans to announce next year, will be quite a different watch. According to sources close to the company claim that the Apple Watch 5 features will look forward to how?
Apple , the next generation of the 5th generation Apple Watch continues to work for. With Apple Watch 4, the company succeeded in attracting users' attention and is now the world's best-selling smart watch brand. In this case, the smart watch industry closely follows Apple.

An Apple Watch with cellular connectivity, LTE support and working with France's GSM operator Orange, has emerged. Claims that this watch is Apple Watch 5 . The claim that this smart watch running the WatchOS 6.0 is a new Apple Watch is based on solid foundations. How does it look that the Apple Watch 5 is leaked to the Internet? Of course, model number A2157. Because, the technology giant received a certificate for smart watches A2156, A2157, A2092 and A2093 with the application made to the Eurasian Economic Commission at the beginning of this week.

How will Apple Watch 5 appear?

The fifth generation Apple Watch will be introduced in September.

Which phones will get the Android 10 update?



The new mobile operating system announced by Google as Android 10 brings many important innovations. So which phones will get the Android 10 update?
Android 10 , the official name of Android Q , brings significant improvements in many areas. There are still many devices that do not buy Android Pie, but Android 10 is coming soon. In the latest Android 10 Beta update, white lines are shown to the users in which direction they can make scrolling movements, while dark opening animation is available for those who prefer dark mode in the operating system.


So on Android 10, if you activate the dark mode or night mode, restart your phone and you will see a dark opening animation. Google even thought about it!




So what phones will get the Android 10 update?


Google


Pixel
XL - Pixel XL


Pixel
XL


Pixel
XL


Pixel
XL


ASUS


Asus Zenfone 5Z


Asus Zenfone 6


BlackBerry


BlackBerry Key2


Essential Phone


Essential Phone


Honor


Honor 20 Lite


Honor 20


Honor 20 Pro


Android 10 operating system phones will be announced
LG


LG G8


Motorola


Moto One


Moto One Power


One Vision Moto


Moto G7


G7 Play Moto


Moto Power G7


Moto X 4 Android One


OnePlus


OnePlus 6


OnePlus 6T


OnePlus 7


7 Pro OnePlus


Nokia


Nokia 8.1


Nokia 9 PureView


Nokia 8 Sirocco


Nokia 7.1


Nokia 6.1


Nokia 5.1


Nokia 4.2


Nokia 3.2


Nokia 2.2


Samsung


Galaxy Folder


Galaxy S10 series


Galaxy Q9 series


Galaxy Note 9


Galaxy A9, A8, A7, A6 + (2018)


Galaxy A80, A70, A50, A40, A30, A20, A20, A10


Galaxy J8 + J8, J6 +, J6


Galaxy M30, M20, M10


Tab S5e, Tab S4


Tab A 10.1 (2019)


Tab A 10.5 (2018)


Redman is


Redman K20 Pro - Q4 2019


Redman K20 - Q4 2019


Redman in Note 7 - Q1 2020


Redman in Note 7 Pro - Q1 2020


Sony


Sony Xperia XZ3


Xiaomi


Xiaomi Mi 9 - Q4 2019


Xiaomi Mi 9 SE - Q4 2019


Xiaomi Mi 8
Pro - Q4 2019


Xiaomi Mi 8 Explorer Edition - Q4 2019


Xiaomi Mi MIX 2S - Q4 2019


Xiaomi Mi MIX 3 - Q4 2019


Xiaomi Mi MIX 3 5G - Q4 2019


Xiaomi Mi A2


A2 Xiaomi Mi Lite


Pocopho F1


In this context Huawei phones will get Android 10 update was also clear.


-Huawei P30 Pro
-Huawei P30
-Huawei P30 Lite
-Huawei Mate 20 Pro
-Huawei Mate 20
-Huawei Mate 20X 5G
-Huawei P Smart 2019
-Huawei P Smart + 2019
-Huawei P Smart Z
-Huawei P20 Pro
-Huawei P20
-Huawei Mate 10 -
Huawei Mate 10 Pro -
Huawei Mate 10 Porsche Design -
Huawei Mate 20 Lite -
Huawei Mate 20 RS Porsche Design


Thursday, August 22, 2019

Nokia 7.2 has been viewed for the first time! What about the features?

Once the legendary phone manufacturer Nokia, this time working on a new phone called Nokia 7.2. The first image comes with what features see the phone leaked to the internet?

Nokia is developing a new phone . The first image of this new phone with the name of Nokia7.2 leaked to the internet. On the back of the camera is a triple camera installation, while next to the LED flash is located. The lower left of the camera is thought to be the depth sensor, while the fingerprint scanner is located immediately below the camera. 

Powered by Qualcomm's Snapdragon 710 processor, the Nokia 7.2 uses 6 GB of RAM. 5G technology that also supports the device, will be a powerful phone against the admiral phones. 


Nokia 7.2 is expected to be introduced at IFA 2019 next month. The device is expected to have a Snapdragon 710 chipset and 6 GB RAM, and will be available with a 3.500 mAh battery and a 6.2-inch display.

Wednesday, August 21, 2019

China's first cloned cat Garlic was born

China's first cloned cat, Garlic, opened his eyes to the world in Beijing.

According to China Science and Technology news in the Daily, said the cloning process that perform biotechnology company Sinog until CEO Wang Jidong developed with relevant Garlic is kitten cat , was born on July 21 the company's laboratory. Garlicin, whose health is in place, said the birth was approved by an unbiased verification agency.

Garlic cloning work began in August last year, said the report, the Chinese Academy of Sciences Zoology Institute researcher Chen Dayuan, said the company has developed a high success rate of technology, he said.

Professor of Veterinary Faculty of China Agricultural University Shi Zhensheng, too, said that it is rare to successfully clone cats, emphasizing that they have different breeding characteristics that make it difficult to clone

What's the difference between LTE, 4G and 5G

Millions of devices are now connected to the Internet, and nobody can think of a moment without an Internet. The speed of the internet that enables us to connect to the world with our phones is of vital importance. So what's the difference between LTE and 4G that we hear so often? What is going to change in our lives with 5G, which is often talked about recently and considered as the technology of the future?
LTE


LTE is derived from the English abbreviation Long-Term Evolution, which stands for Long Term Development. To put it simply in a way that interests us, 4G is another term for speed. So we can say High Speed ​​Internet actually.


In this case, we can summarize as 4G = LTE, LTE-A is the abbreviation of Advanced. So we can summarize as Advanced High Speed ​​Internet. This means 4.5G = LTE-A.


4G


4G, which is defined as the 4th generation wireless communication technology, aims to provide faster speed and better user experience compared to the previous generation 3G wireless technology.


What's the difference between LTE, 4G and 5G


4G will be able to connect to the internet faster with the supported smart phones, and will provide more seamless and high-quality broadcasts with YouTube and Periscope. In addition, 4G, where we can make calls with higher sound quality, aims for a very good user experience.
5G




5G means high speed ... First of all, it will be the basis of 8K video streaming, which is expected to be more in the near future and will replace 4K. However, even if the number of televisions that will use this resolution is quite small and expensive, it is clear that when we think that the phones do not support this technology (for now), we will have to wait a few more years for the change of 5G on this side.


The speed 5G provides will increase the file transfer speed. The 1.5 GB PUBG download will take only seconds. Sounds like a very ambitious sentence; but with 5G, this speed is quite normal.


What's the difference between LTE, 4G and 5G


The online gaming experience will gain importance. Google Stadia platform and derivative examples will increase more. So we won't have to worry about downloading games to the console while we're playing games, or minor or major updates will stop worrying. Because we will have the chance to experience the games by connecting directly to the server opposite us.


The quality and quantity of live broadcasts will also increase. You will no longer have to follow bad broadcasts of image quality; Since 5G provides this speed, we will see a higher resolution.
While augmented reality appears in many different ways, it is still in its early stages. This can change with the high speed of 5G and low latency. In the future, we may see personal ads reflected on your car windscreen or driving directions from a smart windscreen. Since the speed of 5G will facilitate communication between vehicles, we can see that autonomous vehicles are becoming more widespread.


4G AND 5G SPEEDS AGAINST




Theoretical speeds do not give us real-life download speeds, but can give an idea of ​​how to assess the difference. While 4G promises speeds of 100Mb / s on the way and 1Gb / s on the stop, it still hasn't reached these values. Therefore, it is difficult to say the exact speed of the 4G in real life.


In contrast, 5G can theoretically reach speeds of 20Gb / s. Companies say they can achieve speeds of 200Mb / s and 1Gb / s on their 5G networks. However, these speeds can be reached only when the internet traffic is not heavy.


We will probably see a 100Mb / s connection in a city that is collectively switching to 5G.


What is Google Stadia?

On the contrary, you will be able to play every game on the internet with the devices available. In other words, the devices in your hand will only allow the transmission of the image and the commands you give to the other server. That's all! The hardware and other equipment will be on the opposite side, so you will not feel slowness or compromise your speed. More importantly, you will not have to follow the constantly developing hardware market; because you don't have to buy the latest game console or graphics card. If you're connected to the Stadia platform, an iPhone or a smart TV opens up the new magic doors of the gaming world.

What is Google Stadia -What games can be played
Since Google is behind the Stadia brand, there is also integration with YouTube. For example, you stuck somewhere in a game you play and you can't pass the game. In this case, 'How can I pass this place' option to evaluate the game's play or videos that give tips you will be able to instantly see videos from YouTube shared. It is known to everyone that players often watch game videos called 'walkthroughs'; In this sense, it can be said that Google made a wise move.

Stadia doesn't come alone either. Google, the name of Stadia also announced to the world control. So you can play each game easily by having one of these game arms while playing the games. The game controller also has hot keys for taking screenshots and enabling Google Now.

With Stadia, you won't have to worry about updating games; because the game you connect to the server will always be in the most up-to-date state. Now, if you want to come to the 'figures' about the Stadia. As a result of the tests conducted with Stadia, we can say that 4K 60 FPS and even HDR support is also available on this platform. Even in the near future we will be able to see the 8K resolution over the Stadia; of course, without you having to do anything!

What is Google Stadia ,What games can be played?

Stadia servers talking about the power of Google experts, underlined the joint work with AMD. A special GPU developed in this partnership reaches 10.7 teraflops. This is also compared with the Xbox One X and PS4 Pro, and the difference is obvious.

GAMES TO PLAY IN GOOGLE STADIA

Cyberpunk 2077
Superhot
Orcs Must Die! 3
Kine
Darksiders
Watch Dogs Genesis : Legion
Gods and Monsters
Mortal Kombat 11
Windjammers 2
Destroy all Humans!
Farming Simulator 19: Platinum Edition
Samurai Showdown
Grid
Attack on Titan 2: Final Battle
Elder Scrolls Online
Borderlands 3

Wednesday, May 8, 2019

Ramadan Timetable for Melbourne 2019


Boeing knew the software problem in the 737 Max before the crash!


Boeing knew the software problem in the 737 Max before the crash

In a statement from Boeing, 737 Max-type airplanes reported that the problems in the software that informs the problem in the software after the first deliveries of the models reportedly reported.
US aircraft manufacturer Boeing , 737 Max model passenger aircraft, which caused two fatal crashes , the first accident about 1 year ago, admitted that the accident.

According to the news in the BBC, Boeing said in a statement, 737 Max type aircraft, the angle of the direction of air flow between the axis of the aircraft that determines the angle of inconsistency in the software that informs the problem, the models were informed that after the first deliveries were made.

At the outset, the company reported that it was planned to add the alarm system as a standard feature to the control software, but realized that the system could work with an optional additional display hardware after deliveries started.

Boeing officials, the problem will not have a major impact on flight safety and the operation of the aircraft do not need to intervene because they evaluate the problem, a future software update, said they plan to solve the problem.

On the other hand, the US Federal Aviation Administration (FAA) announced that Boeing did not inform themselves about the software problem, until October 2018 when the first accident occurred.

Boeing 737 Max 8 crisis
The Boeing 737 Max 8 passenger airplane of Ethiopia fell shortly after taking off from Addis Ababa to go to Kenya's capital, Nairobi, and 157 people on board died.

In Indonesia, the Boeing 737 Max 8 aircraft from Lion Airlines's JT 610 was crashed into the sea on October 29, 2018, shortly after taking off from Jakarta to Pangkal Pinang on Sumatra Island. The accident, which killed 189 people, was the first accident of this type of aircraft.

After the win in Ethiopia, including Turkey, China, Ethiopia, Great Britain, Germany, France, the Netherlands, many countries, Austria is also among them "Boeing 737 Max" type have ceased operation of the aircraft temporarily and airspace had been closed to these flights.

In both accidents 737 Max type aircraft, the attack angle sensor between the data mismatch of the control system called "Maneuver Characteristic Reinforcement System" (MCAS) was said to be effective in the automatic activation of the control system.

Boeing announced that the 737 Max-type aircraft would provide an update to provide additional security layers if the attack angle sensors provided incorrect data to the MCAS software.

Wednesday, April 3, 2019

Aircraft wing that can change shape during flight


Aircraft wing that can change shape during flight
NASA and MIT engineers have been working on a new generation of aircraft for some time. The most important feature of this aircraft will be to change the shape of the wing during the flight.
The aircraft, which is still in the design phase, has been intensified on the wings of the aircraft in order to be flexible. While engineers are able to develop an aircraft wing that is highly capable of deformation , this wing has the opportunity to change its shape to better control the momentum and direction of the aircraft.

This new generation of aircraft wing, which comes together with hundreds of interconnected small pieces, is much more flexible and lightweight compared to the classic wings. Thus, the airplanes with which the wing is mounted have the opportunity to use the energy much more efficiently.

Another benefit of the new aircraft wing type is the fact that the aircraft has a more balanced movement during landing and take-off.

Monday, November 26, 2018

THY will receive 2 thousand 600 staff


THY General Manager Bilal Ekşi: "THY will expand its fleet to nearly a thousand pilots and 600 cabin officers will be recruited next year. Let's raise the bar with young people. If we grow more at Istanbul Airport, we will need more staff, "he said.

THY  General Manager Bilal Ekdi , the company will expand the fleet next year, a thousand pilots, 600 thousand officers will be taken. 

Eksi, AA correspondent, said THY, depending on the growth of the cockpit every year and the other units said that the staff recruit. 
41 new aircraft will come to THY in 2019 and some of the aircraft will come out of the fleet expressing Ekşi, depending on the expansion of the fleet next year thousand pilots, thousand 600 cabin officers will be procured said. Ekşi, "Especially young friends, both ours and our affiliates to follow the web sites, and apply to apply for job ads. Let's raise the bar of the aviation industry with young people." said.

Ekşi added that Turkish Airlines maintained its growth and added: 
"The companies that serve us are taking more and more staff, especially due to the spatial size of İstanbul Airport. If we grow more at Istanbul Airport, our biggest goal is this, we will need more staff. "

Istanbul Airport in the Turkish civil aviation "to fly" voicing sour, everyone told us that because of the new havalimanıyla pride should not contribute to Turkey.

"ANKARA SECOND HUB, ANTALYA TOURISM 'HUB'S "

Some of the permits were taken from Ankara to travel abroad from Rome to London, Baghdad and Baku, indicating that works are still being carried out for some permits.

According to the protocol signed between the Ministry of Culture and Tourism and Turkish Airlines, Ekşi pointed to the fact that they set a strategy for direct flights from Antalya to Antalya. 
Istanbul will continue to be the main "hub" striking Ekşi, "Ankara as the second hub, while the tourism hub in Antalya will be." he said.

Mr. Ekşi emphasized that the number of voyages to the cities in question will increase after a certain saturation is reached and they expect that this period will take place within a few years. 

Tuesday, November 6, 2018

Zenbo Junior, ASUS 'newest robot

Asus; About two years ago, the smart robot, who could help users at home, introduced Zenbo. Taiwanese technology giant is now; Zenbo Junior, the smarter, more advanced and certainly much more adorable robot, has been introduced to the public. Zenbo Junior is half the size of his relative and much lighter than it.


Zenbo Junior has benefited from the blessings of artificial intelligence. Among the abilities of the cute robot; line sensor, infra red drop sensor, infra red color sensor and sonar wave sensor. The cute robot can easily move where the original Zenbo stumbles. In addition, the Zembo Junior is equipped with a 13 megapixel camera and four microphones to easily detect voice commands.


ASUS did a serious study to improve Zenba's functionality. The new management console; it can be managed wirelessly, allowing multiple Zenbo Junior to be controlled at the same time.

According to the company, the new smart home robot has the skills to trigger developments in the industry. Zembo Junior is expected to provide serious benefits, especially in the field of education. The price and release date of the product has not been announced yet.

Tuesday, September 11, 2018

Demet Akalin cifti ayriliyor

Ünlü şarkıcı Demet Akalın'ın eşi Okan Kurt'un borçları nedeniyle boşanma kararı aldığı iddia edildi.


2012'de dünya evine giren ünlü şarkıcı Demet Akalin'ın eşi Okan Kurt'un borçları nedeniyle Beykoz'daki yalısına dün haciz işlemi yapılmıştı. zor günler geçiren Demet Akalın ve Okan Kurt çifti ayrılık kararı aldığı ve bugün Beykoz adliyesinde duruşması olduğu iddia edildi.


Iranian hackers targeted universities




Universities are seen as a precious metal by cyber attackers. Higher education institutions targeting the various cyber attacks speed does not interrupt the Iranians of a hacker group, including Turkey allegations he found that 14 76 college major phishing attacks in the country brings quite sound nowadays. Comtera Technology security experts, who are at the forefront of the market with their distribution and solutions in the area of ​​information security, are offering recommendations on how universities can stay away from cyber attacks in the upcoming new school year.

Made a new research, Turkey, Australia, Canada, China, Israel, Japan, Switzerland, United Kingdom and the United States, mainly covering 14 of the country at 76 universities belonging to a total of 300 fake website and the home page reveals that a phishing attack organized and demonstrate. According to findings, these attacks are similar to an attack by the Cobalt Dickens hacker group linked to Iran between 2013 and 2017, which led to the accusation of 9 Iranian citizens of the United States. Therefore, despite the claims of some members of the group of hackers, this attack is thought to be their plan.

The threat areas of cyber attackers are expanding day by day, making them more complex and dangerous. The popularity of mobile devices, the high number of users who want to connect to the campus network, and the attractiveness of the intellectual property resources make the universities an area of ​​cheerleading. Stating that universities should focus on reducing the most before the potential damage that may arise during the attack, Comte Technology security experts share suggestions for universities that will become more targeted with the reopening of the training season.

76 Universities 31 Terabyte Data Worked

The cyber hijackers on the last attack on universities at global level use fake websites or home pages to trick users and victims are directed to their schools' online library system. Students or faculty members entering the user information on the fake home page are then directed to a valid entrance session of the university, or the login information is asked again.

Although most of the domain names can not be found in the survey, most of them appear to have been established between May and August 2018. While most of the identified areas point to a single IP address and DNS name server, the latest attack is known to take place on August 19th.

According to a statement by the US Department of Justice on the subject, hackers have targeted 100,000 college professors worldwide with these operations and have managed to access approximately 8,000 accounts. In the description, it was said that the hackers stole a total of 31 terabytes of academic data.

"Universities should embrace their heads against the threat that they are under threat"

Indicating that cyber-attackers aiming to steal information within antellectual property is a commonplace target for universities, but recently it has been increasing, Comte Technology security experts stress that the head of the universities against the attack, which is thought to be exacerbated by the opening of the new school era, Expressing that it is more difficult to provide cyber security in higher education institutions than in many other areas, Comtera Technology security experts say that these institutions are also interesting for hackers in terms of their research and resources.

Reminding students that even a single student brings at least a few different devices to the campus, universities face countless personal challenges that are not governed by security, and Comtea Technology security experts say IT professionals, faculty, and students are all responsible for building campus network security. For this reason, universities must teach simple rules, such as keeping an informative cyber security education to instructors and students, and at least not opening suspicious mails, not using easy passwords to be seized.

New mechanical player keyboard from HyperX



New mechanical player keyboard from HyperX

HyperX, part of Kingston for gamers, announced the launch of the HyperX Alloy FPS RGB mechanical player keyboard. Alloy FPS RGB keyboard; the Kailh Silver Speed ​​mechanical key switches have a shorter key press time and operate with less pressing force. These keys give gamers faster gaming performance. The full size RGB keyboard also features mouse and mousepads on your desk with a compact design with a robust steel alloy frame.

HyperX extends the Alloy FPS keyboard line by adding RGB design and Kailh Silver Speed ​​key switches to the Alloy FPS model . The Kailh Silver Speed ​​key switches, which operate at just 40g, are available for 70 million times. LED lights on the key-blade slot allow the keyboard to have brighter and more eye-catching RGB illumination with five different brightness levels.

The keyboard also prevents the split of games by disabling the Windows key thanks to the game mode. In addition, the keyboard has anti-ghosting and N-Key Rollover functions. Alloy FPS RGB features an easily accessible USB charging input and detachable braided cable at the back for greater flexibility and performance.

"HyperX is thrilled to offer the new Alloy FPS RGB mechanical keyboard with Kailh Silver Speed ​​key switches," said Marcus Hermann, senior manager of HyperX. "These keys are very short to react very quickly and to reduce fatigue with faster gaming performance. are designed with the push point. Thus, they are ideal for players who want to take advantage of their opponents. "

With the Alloy FPS RGB mechanical keyboard, three special lighting profiles can be created directly on the internal memory of the product. This allows you to use the lighting profiles and macro settings on different devices. With HyperX NGenuity software you can customize LED lighting and every key RGB light 1 . In addition, NGenuity's advanced tools include Game Mode and macro settings.

HyperX is taking the slogan "We're All Gamers". Whether you are an amateur or a professional player, each player is designed to exceed expectations with a headset, keyboard, mouse or mousepad.

HyperX Alloy FPS RGB Mechanical Keyboard Specifications

Keyboard

Key switch: Kailh

Type: Mechanics

Backlight: RGB (16,777,216 colors)

Light effects: RGB light on each keypad and 5 brightness levels

Internal memory: 3 profiles

Connection type: USB 2.0 (2 USB connections)

USB 2.0 Transition: Yes (mobile phone charge only)

Query rate: 1000Hz

Anti-ghosting: 100% anti-ghosting

Key Rollover: N-key mode

Media control: Yes

Game Mode: Yes

Operating System compatibility: Windows® 10, 8.1, 8, 7

Key switches

Kailh Silver Speed

Linear, 40 cN starting power

cables

Type Detachable, braided

Length 1.8 m

Dimensions

Width 442,26 mm

Depth 129,81 mm

Height 35,59 mm

Weight (Keyboard and cable) 1100g

Friday, July 27, 2018

Poweghost targets corporate networks!

Kaspersky Lab researchers have identified a new crypto money miner named #PowerGhost. This new miner is targeting #corporate #networks in many regions, especially in #Latin #America. PowerGhost was the latest example of the tendency of#cybercriminals to use miners for income. As this trend grows, corporate companies will continue to be at risk. While miners are charging criminals for their pockets, they sabotage and slow down the corporate networks of corporate companies, damaging all business processes.


#Crypto #money #miners have become one of the most talked-about topics in cyber security. These special "mining" software generate new money using the victim's computers and the processing power of their mobile devices. The harmful miners do this through other users, unaware of the power of their computers and devices. As demonstrated by Kaspersky Lab's previous research, this threat has increased at a rapid pace in recent months and has taken over the ransom software. However, PowerGhost adds a new dimension to this trend. As predicted by researchers at Kaspersky Lab, harmful mining developers are turning to targeted attacks to make more money.


The miner is infected with various openings or remote management tools to the machines. When a machine is affected by this threat, the main body of the miner is being downloaded and working without being stored on the hard drive. When this happens, cybercriminals are automatically updating the mine and releasing it to the network. So the crypto money mining process begins.


"PowerGhost's new targets for crypto-mining software are targeting businesses to install miners," Kaspersky Lab Vulnerability Analyst Vladas Bulavas said. The miner we investigate shows that it is no longer sufficient to target only the users and that the cybercriminals turn their attention to corporate companies. This makes crypto money mining a threat to the business world. "


Kaspersky Lab products identify this threat with the following names:


PDM: trojan.win32.generic
PDM: exploit.win32.generic
HEUR: trojan.win32.generic
not-a-virus: HEUR: The risktool.win32.bitminer.gen


Thursday, May 3, 2018

Terms Bitcoin enthusiasts need to know

As the most valuable member of the crypto money market, Bitcoin stands out as one of the areas invested by many users in recent times. Here are the terms that bitcoin enthusiasts should know ...
The BitCoin market, a new market where many of us are beginning to follow curiously, has become very popular as a platform for those who take risk and those who prefer cautious progress find their investment options. We have compiled the terms for Bitcoin for you ...

Altcoin: An alternative currency that is not as difficult to resolve and therefore to trade as a bitcoin. Since it is less known than Bitco, each subcool may not be traded in every market. Bitco is more cost-effective.
Address: A character bar used to make payments and receive payments. It is also possible to use it as a QR code. If you get a payment from the other side, it is enough to share the address information with them.

Client: The client, a software program, can run on a computer or mobile device. If you connect your work to the network, you can do it on the client.
Inflation: It is a term that shows the continuous increase in the prices used in normal markets during a certain period of time.
Deflation: It is also used in normal markets and is a term that means prices are continuously decreasing over a certain period of time.
Input: Indicates the side on which you pay for the bitcoin market. If bitcoin is already processed, a new bitcoinse input is an address.
Mining: Finding new bitcoin and subcoin through various equipment. Some passwords are broken and coins are accessed for this operation.
Cloud Mining: The process of making the mining process over the internet. There are popular internet sites used for this.
Scamcoin: There are no ideas underneath and coins created to make money. Those who create these coins, collect coins and withdraw from the market.

Arbitrage: It is the business of making profit by taking advantage of the variable value of different financial assets of different financial assets, including both normal markets and bitcoin and subcontinental markets, and by performing trading transactions.
Chart: A bitcoin given to the table showing the increase or decrease in the price at certain time intervals. Investors should follow up frequently.
Wallet: The wallet used to transport bitcoins. It can also be used for storage. It keeps the keys used to reach bitcoins at various addresses. You can view the bitcoins you have in a wallet and the addresses they contain.