The marketing revolution: The semantic web

The idea that a digital service (search) alters the way we behave normally might seem absurd. Before the semantic searches were to Google (and all other search engines); they were busy indexing websites and struggling to sort through the relevant information so that they could emerge, spam-free, high-quality results response to a search query. Continue reading The marketing revolution: The semantic web

Rwanda and Seychelles to Strengthen Tourism Partnership

You might wonder what the land-locked East African state of Rwanda and the Seychelles, a group of islands in the Indian Ocean, have in common. Both are part of Africa, of course, but beyond that there would seem to be little to link them. In fact, although both states are culturally diverse with their own unique attractions, they both have stunning national parks and the opportunity to view wildlife in its natural habitat. This means there is opportunity for them both to benefit from the other’s experience in promoting tourism. Continue reading Rwanda and Seychelles to Strengthen Tourism Partnership

Honor 5X touchdown: A midrange 2015 who wants to be the best in its category in 2016

Last year, the mobile phone was an unusual character. Accustomed to the high-end models carry the baton, 2015 was a year of inflection in which we saw a lot of phones that cost about 200 dollars proving to be a solution very capable for most users: Motorola Moto G, BQ Aquaris M5, X5 Aquarius, Xiaomi Mi4i, Alcatel Idol 3, Xperia M4 … the list was long and the trend for this year pointed in this direction as well. Continue reading Honor 5X touchdown: A midrange 2015 who wants to be the best in its category in 2016

Ring – how to crack the Wi-Fi doorbell

Specialists companies Pen Test Partners describe a simple method that allows you to see your password on your home wireless network after spending an attack on the doorbell. The process takes a few minutes and can be made transparent to the owner.

Solutions from the field of IoT are becoming available, but often they threaten the security rather than improve it. Now they appeared on the market “smart” doorbells of different firms. One of the popular models – Ring – is equipped with a proximity sensor, camera, speaker and the module Wi-Fi 802.11 b / g / n 2.4 GHz. Such calls can be easily connected to a home wireless network and become part of the security system.

Wi-Fi doorbell

Ring activates the recording by pressing a button or self-fixing approach. Video and audio are transmitted on a smartphone or other mobile device owners through the Internet. The free app Ring App is available for OS Android, iOS and Windows 10. For an additional fee of $ 3 per month, you can connect corporate cloud service for archiving video.

Optional call is connected to the electronic lock, so this allows you to manage security door remotely. Right on your phone, you can see who came to answer the visitor through the built-in speaker, or open the door for him, even while away from home.

This would seem obvious convenience and a step towards a “smart home”, but at the level of implementation is not so smooth. During the study, the experts found Pen Test Partners mismatch Ring basic safety requirements. Videocall easily removed from the fixtures. Aware of this problem, the company even guarantees the free replacement of the stolen unit. However, to find out your password Wi-Fi, the call did not necessarily take home.

On its reverse side has an orange button that, when clicked, translated Ring setting mode. This built-in HTTP-server Gainspan starts as a point of Wi-Fi access with a standard name: Ring-XXX, where XXX – last three octets of the MAC-address.

For video calls Ring in access point mode, you can connect without authorization known address: http://192.168.240.1. Just type it into your browser and go to the Configuration tab: http://192.168.240.1/gainspan/system/config/network

This page displays the basic wireless settings of the call, including the SSID used by the Wi-Fi network and the password to connect to it. Key PSK Set in tags [password]. It is displayed in plain text form, as well as all other data.

Calculating the developer are that the company did not shut down the dangerous functions embedded HTTP-server and does not use additional security measures – such as encryption of configuration files, access authorization and complexity of physical access to the outside.

After getting acquainted with the results of Ring, the developers have changed the mounting system and released a new version of firmware. Patched modules video call does not store passwords in the clear. However, they left the other vulnerabilities associated with light physical access to e-filling. To solve their need is already on the physical level.

 

Fours Essential Strategies for Testing Software

We all know that testing software is an important part of the development cycle, but it’s vital that it’s done using a carefully planned approach in order to ensure that it’s effective. There are a number of possible strategies when it comes to testing and you need to choose the most effective ones for your project. Continue reading Fours Essential Strategies for Testing Software

Four tips for optimising the efficiency of your IFA business

If you ask people what they think is the best solution to improve business efficiency, one of the top answers you are likely to hear is automating as many tasks as possible. While this is true in the broadest sense – for example, using software to handle everything from staff management to client management to day-to-day transactions – knowing when not to automate is of vital importance when optimising efficiency for businesses such as IFAs. Continue reading Four tips for optimising the efficiency of your IFA business