Category Archives: Technology News

What is the Anodizing Process?

An electrochemical process which is carried out to change ordinary metals into decorative, corrosion-free, and durable with anodic oxide finish is known as anodizing process.

You can use magnesium and titanium for this procedure but aluminium is considered an ideal metal for anodizing. The aluminium oxide is not put onto the surface as with plating or paint, however, is completely incorporated with the fundamental aluminium surface, so it can’t chip or strip.

Image credit

The procedure of anodizing:

In the process, aluminium is immersed into an acid electrolyte bath through which the current is passed. The cathode is separately mounted in the tank and aluminium itself works as the anode. So oxygen particles are delivered from the electrolyte to join with the aluminium iotas at the outside of the metal part being anodized. Anodizing is, in this manner, a matter of profoundly controlled oxidation applied on metal surface. For more information on Anodising, visit a site like

Image credit

Anodized aluminium:

Aluminium is very useful and widely used metal among all the metals due to its anodizing features. Anodized aluminium is being used in hundreds and thousands of households and commercial items. Even it has applications in spaceships to make them stronger. It can protect the spaceships from extremes conditions in space. It provides an attractive look and long life for all products.

Poeton is a well-renowned company for its services in this regard. They have adopted this field and therefore enjoying fame around the world.

A darknet network wants to boost phishing through an automated kit

The phishing is one of the most profitable techniques for cybercriminals. A new report published by Imperva reveals that so-called key ring services make it an even more effective practice.

The firm’s researchers explored the darknet markets to get a rough idea of ​​the cost of a phshing campaign, as well as to get a realistic view of the business model of these hackers. What they discovered in a Russian market is that a network tries to boost the PhaaS or Phishing as a Service throughout the darknet through facilities in the purchase and very reduced prices. Continue reading A darknet network wants to boost phishing through an automated kit

Android N, what users are looking for?

Google surprised all and sundry with the launch (early) of the preview of Android N. The new functionality that supports the new version of Android is very interesting for those of us who are passionate about green robot operating system, of course. However, always the question of whether what they were looking for users is.

The first problem we face when assessing Android N is that, unless you possess a Nexus (and not all), it will be difficult to see Android N in action in quite some time. In fact, the previous version of Android, Marshmallow, is still at least 2% of the terminals say a lot.

Google still has a problem with fragmentation of versions, but is not new. The terminal update rate makes this new Android surely see M version if we bought a terminal next year, and probably not at all. Continue reading Android N, what users are looking for?

Honor 5X touchdown: A midrange 2015 who wants to be the best in its category in 2016

Last year, the mobile phone was an unusual character. Accustomed to the high-end models carry the baton, 2015 was a year of inflection in which we saw a lot of phones that cost about 200 dollars proving to be a solution very capable for most users: Motorola Moto G, BQ Aquaris M5, X5 Aquarius, Xiaomi Mi4i, Alcatel Idol 3, Xperia M4 … the list was long and the trend for this year pointed in this direction as well. Continue reading Honor 5X touchdown: A midrange 2015 who wants to be the best in its category in 2016

Ring – how to crack the Wi-Fi doorbell

Specialists companies Pen Test Partners describe a simple method that allows you to see your password on your home wireless network after spending an attack on the doorbell. The process takes a few minutes and can be made transparent to the owner.

Solutions from the field of IoT are becoming available, but often they threaten the security rather than improve it. Now they appeared on the market “smart” doorbells of different firms. One of the popular models – Ring – is equipped with a proximity sensor, camera, speaker and the module Wi-Fi 802.11 b / g / n 2.4 GHz. Such calls can be easily connected to a home wireless network and become part of the security system.

Wi-Fi doorbell

Ring activates the recording by pressing a button or self-fixing approach. Video and audio are transmitted on a smartphone or other mobile device owners through the Internet. The free app Ring App is available for OS Android, iOS and Windows 10. For an additional fee of $ 3 per month, you can connect corporate cloud service for archiving video.

Optional call is connected to the electronic lock, so this allows you to manage security door remotely. Right on your phone, you can see who came to answer the visitor through the built-in speaker, or open the door for him, even while away from home.

This would seem obvious convenience and a step towards a “smart home”, but at the level of implementation is not so smooth. During the study, the experts found Pen Test Partners mismatch Ring basic safety requirements. Videocall easily removed from the fixtures. Aware of this problem, the company even guarantees the free replacement of the stolen unit. However, to find out your password Wi-Fi, the call did not necessarily take home.

On its reverse side has an orange button that, when clicked, translated Ring setting mode. This built-in HTTP-server Gainspan starts as a point of Wi-Fi access with a standard name: Ring-XXX, where XXX – last three octets of the MAC-address.

For video calls Ring in access point mode, you can connect without authorization known address: Just type it into your browser and go to the Configuration tab:

This page displays the basic wireless settings of the call, including the SSID used by the Wi-Fi network and the password to connect to it. Key PSK Set in tags [password]. It is displayed in plain text form, as well as all other data.

Calculating the developer are that the company did not shut down the dangerous functions embedded HTTP-server and does not use additional security measures – such as encryption of configuration files, access authorization and complexity of physical access to the outside.

After getting acquainted with the results of Ring, the developers have changed the mounting system and released a new version of firmware. Patched modules video call does not store passwords in the clear. However, they left the other vulnerabilities associated with light physical access to e-filling. To solve their need is already on the physical level.


6 ways to prevent online fraud

There are many types of fraud in the cyberspace and scammers could easily steal our money by using different kinds of tricks. Monetary damages could bring multiple negative effects. Victims could lose a significant amount of money and have the personal details distributed in the Internet. As the result, they can become repeated victims of email frauds and other types of frauds.  Continue reading 6 ways to prevent online fraud

Draw with a digital pen allows for early detection of Alzheimer’s or Parkinson

One of the great forgotten in today’s technological world, and will not be because he has not tried, is the digital pen. I do not mean to pointers to facilitate data entry or management with touch screens (they were very helpful with weathered old type) but the model that allows for instant scanning of all that we wrote with him. Continue reading Draw with a digital pen allows for early detection of Alzheimer’s or Parkinson

The neural networks based on IBM processor grows, and has 48 million digital neurons

A year ago, IBM announced the creation of a different processor than we had known. According to them, they had managed to produce a design inspired by the Brain and working as a neural network chip ( here we explain everything you need to know about them ) rather than as a conventional computer. This week announced a step forward on this project.

IBM explains that have managed to create a system with 48 million digital neurons. This figure approaches to having a small rodent. In the US company it is clear that the future of computing is to create two types of computers those that work conventionally and work with those synaptic connections. Continue reading The neural networks based on IBM processor grows, and has 48 million digital neurons

Optogenetics in action, small wireless mouse to control LEDs in their neurons

One of the most promising science future is optogenetics that allows brain cells turn on and off with pulses of light that can be controlled very accurately. So far one of the difficulties was precisely to carry these impulses to neurons in animals like mice with which they are working, but now there is a solution to that problem. Continue reading Optogenetics in action, small wireless mouse to control LEDs in their neurons