Sunday 5 June 2011

iPhone专用U盘曝光 8G售95美元32G售180美元

凤凰网科技讯 6月5日消息,据国外媒体OSM报道,PhotoFast公司即将会推出一款iPhone手机专用的U盘——i-FlashDrive。和普通U盘不同的是,i-FlashDrive有两个接口,一端是普通的USB接口,而另一端是苹果专用的30针接口。
iPhone手机专用U盘i-FlashDrive
i-FlashDrive除了可以直接作为iPhone手机的外接U盘,间接增大iPhone手机的存储空间外,i-FlashDrive还可以作为数据线的角色,通过其USB接口和其他带有USB的设备连接,进行iPhone和其他设备间的数据文件的传输。
i-FlashDrive有自己的文件管理系统,可以管理iPhone内部和外部的电影,照片和MP3,甚至包括备份你的联系人。
i-FlashDrive产品有两种容量可供选择,8G容量售价为95美元,而32GB容量的售价高达180美元。PhotoFas公司表示,i-FlashDrive首先会在六月底在台湾推出,随后进入到美国市场。(编译/黄立强)

Saturday 4 June 2011

报道称苹果iOS 5将具备自动下载功能

腾讯科技讯(中涛)北京时间6月5日消息,据专门关注苹果产品发展动向的科技博客网站MacRumors报道,一名苹果iTunes用户近日在询问应用程序升级问题时,iTunes服务人员无意中透露,苹果针对iPhone等移动设备的iOS 5操作系统将具备“自动下载”功能。
据悉,这名苹果用户在询问如何让iTunes检查用户应用程序升级事宜时,iTunes服务人员称,用户可以手工完成相应检测活动,“但如果你的设备具备应用程序自动下载功能,则用户无需手工同步,相关应用程序升级就会自动被下载到你的设备当中。”
业界人士指出,就目前而言,iOS尚不具备自动下载功能。换句话说,iTunes服务人员很可能无意中透露了iOS 5即将包含的新功能。MacRumors称,苹果iTunes服务人员已删除上述有关自动下载功能的表述。
苹果2011年度“全球开发者大会”(WWDC)大会将于周一(6月6日)上午正式开幕,该公司CEO史蒂夫·乔布斯(Steve Jobs)将在会上发表主题演讲。苹果此前在一份声明中表示,在本届WWDC大会上,乔布斯和苹果其他高管将讨论苹果下一版本的iOS和Mac OS X操作系统,以及苹果即将推出的云音乐服务iCloud。
那么iOS 5是否将具备自动下载功能?这还要等到周一苹果高管来揭晓答案。上月初另有传闻称,苹果正与美国移动运营商Verizon无线展开商谈,内容涉及iOS 5将具备无线升级功能。
在往届WWDC大会上,苹果会宣布推出新款iPhone智能手机。绝大多数分析师预计,在今年WWDC大会上,苹果不大可能宣布推出新款iPhone,预计新款iPhone推出时间将在今年9月左右。

Windows 8硬件需求与Win 7大体相同

北京时间6月5日消息,在D9惊艳亮相的Windows 8,相信不少人都在担心微软是否又会和硬件厂商互相勾结,趁机提高硬件配置要求,让大家升级机器,毕竟这也是Windows的一贯传统。


Windows 8硬件需求与Win 7大体相同

  windows 8 Metro界面

  幸好,这种担心是多余的。微软Windows、Windows Live部门总裁Steven Sinofsky在日前的D9大会上公开表示:“相比于Windows 7,Windows 8不会对硬件更加饥渴,包括内存、硬盘空间等等。”

  微软英国的一位负责人Academic Evangelist也确认说:“比起Windows 7来说,Windows 8不需要在内存、硬盘空间、处理器等方面进行增强。对英国学术界来说令人兴奋的是,Windows 8能够同时在Intel、AMD、ARM的芯片上运行。”

  其实这也是可以理解的。Windows Vista之所以大幅提高了硬件需求,主要是内核架构升级成了全新的NT 6.0,Windows 7/8却没有这么做,而是在保留底层架构的同时进行优化、完善和优化,陆续升级到NT 6.1/6.2,对硬件的要求自然就不会再次大幅跃进了。事实上,得益于微软进行的优化,Windows 7对部分硬件的要求反而更低了一些。

  不过二位都有意无意地忘了一点,那就是要想体验真正的Windows 8,支持多点的显示器是必不可少的,最好还得是多点触摸。

  目前唯一的不确定性因素就是DirectX。DX11正在普及之中,而微软从未透露过下个版本的规划,谁也不知道Windows 8是否会同步带来DX12,或者DX11.1,但是可以预料,DX11引入的曲面细分、 多线程渲染、DirectCompute并行处理等图形技术必然会在Windows 8中得到进一步增强。

  Academic Evangelist还介绍说,Windows 8的应用程序将会分为两种,其一是经典的Windows桌面程序,运行起来和Windows 7中差不多,其二是基于HTML5、JavaScript的新程序,更像是目前的手机应用,运行体验也会和传统程序大为不同,其中就包括IE10,正是它们能够享受Windows 8中的所有新体验。

  最后附上Windows 7的最低硬件需求供参考:

  1GHz或更快的32/64位处理器;1GB(32位)或者2GB(64位)内存;16GB(32位)或者20GB(64位)可用硬盘空间;DirectX 9显卡并支持WDDM 1.0或更高版本。

  作者:李熙 (来源:中关村在线)
  据国外媒体信息周刊消息,一份来自SEC(美国证券交易委员会)提交的文件的显示, NVIDIA英伟达已经与Microsoft微软达成特殊协议,其中有内容涉及防止除了微软之外的第三方收购NVIDIA。

消息称,根据该协议,对于任何一家提出用大约34亿美元试图收购NVIDIA 30%股份的个人或者公司,微软都有优先权和拒绝权,NVIDIA同时也拥有“poison pills毒丸计划”防御机制。该条款将延续十年,不过这并不意味着微软必须收购NVIDIA,很可能只是保持NVIDIA公司独立一个缓冲区。

另外,这项交易协定,微软可以阻止那些不支持Windows或者对Windows设备有严格限制的厂商控制或使用NVIDIA芯片。微软在本月初展示了全新的Windows 8平板电脑,而这台展示平板电脑就是使用的最新4核Tegra处理芯片,而且是首台运行该芯片的真机设备,足以说明微软对NVIDIA芯片的控制力。

Apple 苹果近几年对收购NVIDIA倍感兴趣,他们希望能够使用NVIDIA作为对抗微软的武器,同时在桌面和移动设备上发挥潜在的威慑力量。苹果可以促使 NVIDIA成为真正针对Mac优化的图形芯片,而且放弃对所有Windows设备的支持,并可让AMR架构的 NVIDIA Tegra系列从Windows 8平板路线中消失,最终在未来的iPad和iPhone中享用更好的ARM移动芯片。但微软与NVIDIA的这项协议使Apple的想法破灭。

不过微软很可能并不愿意购买NVIDIA去直接应对竞争,因为这会引起广泛关注。现在微软不仅可以让Apple公司难以使用NVIDIA显卡,而且还可以拉动对所有Android设备支持。事实上目前几乎所有的Andr​​oid 3.0平板,为了在市场上能够击败iPad 2都在使用Tegra 2处理器。毕竟NVIDIA之外的移动处理器会让Android的竞争力变得更弱。

微软不久前才收购Skype,如果微软随后又直接将Nokia和nVidia收购,并结合Windows Phone呢?锋友们对此有和看法?

来自:威锋网(weiphone.com)

Exclusive: CEO says hackers tried to extort data, money


Karim Hijazi knew his nightmare was just beginning when he saw that a mysterious e-mail had arrived in his inbox at 3 a.m. on May 26 that included his e-mail password and the subject line "Let us talk."
That would mark the beginning of a weeklong saga of e-mail exchanges and Internet Relay Chat (IRC) discussions in which Hijazi says a group of hackers told him they wouldn't publicly divulge information they had gotten from snooping on his accounts if he revealed sensitive security information acquired by the botnet-tracking firm,Unveillance, that he launched last year. The hackers, who call themselves LulzSec, wanted to know the whereabouts of compromised computers on the Internet that when remotely controlled are used en masse to attack Web sites, he told CNET in an exclusive phone interview late last night.
Hacking victim Hijazi says LulzSec hackers tried to extort money and information out of him, as evidenced by this excerpt he provided of a chat log.
Hacking victim Hijazi says LulzSec hackers tried to extort money and information out of him, as evidenced by this excerpt he provided of a chat log. Click to enlarge.
(Credit: Karim Hijazi)
When he refused, LulzSec went public with his data, Hijazi says, posting his personal contact information, e-mails, and chat logs for download online yesterday as part of a campaign to embarrass the FBI and its InfraGard partner. The group had hacked the Web site of InfraGard Atlanta and grabbed usernames and passwords for about 180 members, including Hijazi. Because Hijazi had used the same password on the InfraGard site that he used on his personal Gmail account and his corporate Google Apps account, the hackers were easily able to spy on his personal and business activities.
Hijazi contacted the FBI right after that first LulzSec e-mail and said he plans to prosecute if he can.
"They had me under the gun for a little over a week with threats and extortion," said Hijazi, chief executive of Unveillance. "The very nature of having to contend with someone who is holding something ransom is not pleasant."
Another excerpt from chat logs provided by Hijazi. Click to enlarge.
(Credit: Karim Hijazi)
"I don't believe it will impact our organization; it just sucks for my family and me," he said when asked whether his business would suffer as a result of the incident.
The first signs that something was amiss in Hijazi's world were suspicious activities related to Unveillance's corporate network that started about a week before he was contacted by the hackers. Someone kept repeatedly trying to sneak into the network using a VPN (virtual private network) tunneling tool called iPredator designed to let people traverse the Web anonymously.
And then there was what appeared to be a lurker on a company conference call when Hijazi heard the telltale beep sound of someone joining the call but no new participant was identified. In a chat log, one of the hackers threatens to play a recording of a conference call they listened in on.
However, Hijazi started to get a sense of real dread when he witnessed the group's snooping activities firsthand, though. The night of May 25 he was going through his mail when he noticed a message go from being marked as "unread" to "read" and back again to "unread" right before his eyes.
He immediately changed his password but considered that maybe a friend was playing a joke on him somehow. Hours later the first LulzSec e-mail arrived. "I think they were locked out then and they got frustrated," he said.
"I was not entirely shocked because we clearly were being watched and targeted," Hijazi recollected. "I thought 'I knew it!' First you think 'now it all makes sense.' And then you immediately think 'this is not good.'"
A final excerpt from the chat logs provided by Hijazi. Click to enlarge.
(Credit: Karim Hijazi)
He didn't know who his adversaries were until the InfraGard data was released. "They clearly wanted to teach a lesson," he says.
'Give us all the info you can get'
In chat logs released by both him and LulzSec, the hacker group appears to be pressuring him for money and information. But LulzSec denies that extortion was the motive, saying it was instead trying to see if a group of "blackhats"--industry parlance for underground or criminal hackers--could squeeze information out of a "whitehat" like Hijazi.
Hijazi released on his company's Web site an excerpt of a chat log in which one of the hackers allegedly said: "The point is a very crude word: extortion...Let's just simplify: you have lots of money, we want more money...Prepaid Visas, MoneyPaks, BitCoins, Liberty Reserve, WebMoney, the flavor of your choice. Naturally we'll avoid PayPal."
In Twitter messages and a statement, LulzSec insists it was pretending to extort Hijazi as a test and accused him of offering to pay them to destroy his competitors and help find "enemy" botnets.
The hackers appear to take a coercive, bullying approach with Hijazi in the IRC chat released by LulzSec and repeatedly ask him for information, including "government portal/info searches" and "inside FBI alerts."
"Give us all the info you can get and we will do with it what we can. Which is usually a lot," one hacker says.
The hackers also disparage Hijazi's security work. "There's no so (sec) things as whitehats you guys are as corrupt as we are. The only difference is we admit it," one hacker says. "Whitehats are just blackhats that have board meetings with lengthy rhetoric," another says.
Later, the hackers complained about Hijazi providing information to a U.S. nonprofit that wrote a report for the government on cyber threats and opportunities in Libya, saying the data could be used to attack that country. Asked why he participated in the project, Hijazi said "I didn't know the intent and was in marketing mode. I am truly starving guys."
Although it's possible the group just happened to stumble upon Hijazi, the information his company gathers to help its customers stay safe from DoS attacks would certainly be useful to anyone who wants to cause a ruckus online or make a statement. Sony's recent security troubles started with a DoS campaign launched by the Anonymous hacker group.
While DoS attacks are useful for shutting down a site temporarily, LulzSec seems to prefer the smash-and-grab approach of using a SQL injection attack to break into a Web site and steal customer data. That was the method cited earlier this week to grab data from Sony Pictures, and last month against Sony Music Entertainment Japan. Company representatives confirmed the Sony Pictures breach last night and said they are working with federal authorities on the investigation and have hired their own forensics experts.
Last weekend LulzSec hacked into the site of PBS, snatched passwords and posted a fake news story that said deceased rapper Tupac Shakur was "alive and well" in New Zealand,