Tuesday, December 30, 2014

NAS Exern device – PC All

Hello

I have a NAS in the form of WD MyCloud.

It is connected to my router and it is possible to access it via the web. It’s called lovkulle.

I would now be able to access it as a self drive in Windows Explorer, such as c:.

When I try to assign a drive letter can not I connect to the without entering the password.

The problem is that I do not know the password, I will enter …

I have Windows 8 installed on your PC.

Accompany a screenshot of how it looks. Hope something will understand what I mean …

Grateful all the help I can get!

/ Akutssk


LikeTweet

Monday, December 29, 2014

Exchange News reaches some more while than others – Swedish newspaper Svenska Dagbladet

As the Stockholm Stock Exchange first computerized trading system was introduced at the beginning of 1990’s performance was second to none. The system was designed to handle about 6,000 transactions a day, with a maximum delay of a few seconds. Twenty-five years later, the stock system handle 250,000 transactions per second, with a delay of no more than 60 microseconds (0.00006 seconds). Into account for the eye’s “resolution,” or reaction time, the Exchange may, in other words rummaging up to 50 000 outlets before a person has any physical opportunity to even consider react. For this reason, many technology-oriented brokerages and trading firms to hire their computers in the Exchange server room in Lunda industrial area so as not to lose valuable time.

– It is often said that one kilometer in tow “cost” five microseconds . Would you compare the actors who have their computers locally in Lunda with actors who have their jar in Stockholm, so has the first deals done already when the price pass Bromma airport on the way into town, says a source who works with financial technology to SvD Business.

But the opportunity to react in so negligible periods of time makes the stock markets and the relevant authorities before a piquant issue. Frequently company news, as a quarterly report, is, like the actual prices a vital part of the market’s information base. The first to become aware of, for example, a profit warning, you simply take advantage of this by selling shares before the rest of the market. This is and has always been a part of securities trading rules. Just because also requires the Stockholm Stock Exchange by the listed companies to all trading participants will have access to new information at the same time.

But what is the meaning of “same time”, when the distribution time literally depends on the length of the fiber cables? The answer is that this is an unregulated and more or less unexplored area.

– We have seen that the timeframes have been shortened, but there are no rules or recommendations that specify how it should look like, says the Stockholm Stock Exchange Monitoring Officer Joakim Battle .

In practice, Battle mean, mean exchange rules to the listed companies must hire a distributor who can ensure that any new information reaches the market on “equal footing”. Cision, one of the distributors, provides a cloud-based service where customers can enter a press release which are then distributed to the market at a given time. Exactly how this works would not Cision tell you, when viewed as business secrets, but from a purely-term relationship between the company not to smaller time periods than whole seconds.

– We can not guarantee that all data is received simultaneously because it depends on how it looks on the receiving end. Our task in the market is to ensure that the information is distributed simultaneously. And with concurrency, we mean a second. We send out everything within one second, says CIO Alexander Mason.

This would possibly less problematic if there were people who sat on the receiving end. Today, these are not seldom machines. When the Riksbank in mid-July lowered the interest rate by 0.5 percentage points, cabled a press release via Cision’s cloud service a couple of seconds at 09:30. The message was received at the news agency Six o’clock 9:30:13. Within one second, the Agency had read the information machine and sent out nine news alerts.

– We have developed a software that reads through press releases and automatically generates news alerts, says Håkan Carlson, Director at Six News.

It is understood not just the news agencies that have seen the possibility of mechanical interpretation, but also market participants.

According to Svenska Dagbladet’s source can be the fastest trading firms make transactions within one ” few microseconds, “and therefore read and act on price sensitive information far faster than a thousandth of a second. Therefore occurs price changes today almost immediately, and not infrequently even before the news can be read from any screen. For long-term investors this is possibly not a big problem, but the concept of “simultaneity” seems indeed to have been a relative meaning.

LikeTweet

Saturday, December 27, 2014

Razer Naga Epic Chroma – GameElite.se

 
  The Razer Naga Epic Chroma
Review – PC
 
 
 


  Impressive or terrifying. Razer’s new gaming mouse can be both, depending on who you ask. The reason is that the mouse is large and has twelve buttons on the thumb.

One thing is for sure, it takes some time to get used to the Razer Naga Epic Chroma – especially on the twelve thumb buttons. Since Naga Epic Chroma is large in comparison with many other mice, it also takes a while to get used to the size.

The size was nevertheless quite quickly getting used to, and after a while the mouse felt pretty comfortable to use. It did, however longer before I learned to quickly access and press the right button. Since there are twelve thumb buttons so it can be difficult to remember which button does what. There, the Razer supposed to. They have created a grid on the screen while playing. It describes the functions connected to the buttons. You can change the transparency of windows, which is great.

But what should we use all these buttons for? You who plays very MMOs have enough good handle on that extra buttons really do not hurt. MMO – Massively Multiplayer Online – are Internet games with many many simultaneous players. Most common in MMO’s probably MMORPG where the RPG stands for Role Playing Game (role playing game).

You can, for example, allowing each button to get its own spell (spell). That way you can quickly throw the right spell at the right moment. Speed ​​is of course sometimes a virtue in MMORPG and buttons can really speed this up.

Now there is much talk about MMOs. The mouse’s meant for this particular genre, but besides MMO, I found the benefit of the mouse during enspelarkampanjer in the role play. Incidentally, I do not think the mouse is especially useful in other game genres. You can also use the Naga Epic Chroma for various applications. Although profits may not be as obvious as it can add various macros from word, image and video processing on the keys. Though, it is as well to point out that – Naga Epic Chroma is primarily a mouse for MMO enthusiasts.

Design-wise differs Razer Naga Epic Chroma sharply apart from other mice. It is mainly the twelve thumb buttons that allow the mouse is great and gets an odd look. The mouse looks very clumsy, but is nevertheless quite comfortable to use. I have not tested the predecessor to Naga Epic Chroma. Therefore, I was skeptical of the twelve keys because I thought they would be difficult to reach. However, I was surprised that they actually are fairly easy to achieve, even if it initially felt strange with so many buttons. The buttons are relatively large and positioned in such a way that they are fairly easy to reach.

In addition to the twelve thumb buttons are six additional buttons – the two standard keys, mouse wheel, which has buttons in three directions, and two buttons behind the mouse wheel. They work all really good and you can change the function of all the buttons in this handy program Synapse 2.0.

That said all buttons can be equipped with various features. Among other things, you can create macros and connecting them to the various buttons. It is easy to record a macro where your hubby in the game, for example, throws a certain spell. Then connect the macro to certain button and in this way to get quick access to the macro, and thus the spell in question.

Synapse 2.0 is a very comprehensive software that controls the mouse drivers. With its help you can change the mouse sensitivity up to 8200 DPI. I myself have never had the advantage of quite as high DPI, but there are certainly gamers who have it, especially if they have a big screen. With Synapse you control even the light that flows from the mouse. You have millions of colors to choose from and you can let the light change color or constant light of a particular color.

A good feature of the Naga Epic Chroma is that you can use either wireless or wired. I have not noticed any performance degradation when the mouse is wireless as compared to when the cord has been plugged. Therefore, I really prefer the wireless mode. A good feature is that if the battery runs low, simply plug in the cord. Then the mouse not only the power but the charged simultaneously. It even comes with an external charger which sets the mouse when not in use. The battery lasts a long time so it’s not too tightly between charges (20 hours according to the specifications).

Naga Epic Chroma from Razer is really a hit for all MMO players. The many buttons facilitate gambling much. The mouse’s precision is also good, but even though I think it is somewhat clumsy as it is pretty good in my right hand. In games where all the buttons are not needed, however, Naga Epic Chroma not my first choice, but where I prefer a smaller, leaner mouse.

Product Features

• 19 MMO-optimized programmable buttons

• mechanical thumb buttons 12

• Scroll wheel with tilt and click function

• 4G laser sensor with a resolution of 8200 DPI

• Wireless technology adapted for gaming

• Chromaljus with 16.8 million customizable color options

• Razer Synapse-enabled

• 1000 Hz reading

• 200 inches per second / 50 G acceleration

• Quiet musfötter with Zero-acoustic Ultraslick technology

• 2.13m lightweight, braided fiber cable

• Approximate size: 119mm (depth) x 75 mm (width) x 43mm (height)

• Approximate weight: 150g

System

• PC or Mac with a free USB port

• Windows® 8 / Windows® 7 / Windows Vista® / Windows® XP (32-bit) / Mac OS X (10.7 – 10.9)

• In-game configurator support is Compatible with Windows® 8 / Windows® 7 / Windows Vista® only

• Internet connection

• 100 MB of free hard disk space

• Razer Synapse Registration (requiring a valid e-mail), software download, license acceptance, and internet connections needed to activate the full features of product and for software updates. After activation, full features are available in optional offline mode.

LikeTweet

Friday, December 19, 2014

How does the false base station? – New Technology

       

What’s a fake base station, called IMSI catchers?

They have been around for over ten years and is used by both police forces in various countries of criminals and States’ intelligence services. The equipment was initially high but has since been greatly reduced in size.

How small?

There are models that can fit in a jacket pocket.

How does the IMSI-catcher?

A mobile phone connects to the bass station with the strongest signal. Is the false base station closest to or have the strongest transmitter, connected mobile call and data traffic there, and then listened to. The traffic is forwarded from the IMSI-catcher to mobile phone base stations. IMSI catcher thus performs as what is called a “man-in-the-middle attack”.

But is not the mobile network encrypted?

IMSI prisoners capable of reading the encrypted connections in GSM network, but not the more advanced encryption technology used in 3G and 4G networks. Therefore, they try to fake base stations outsource disturbances on 3G and 4G bands to make mobile calls to switch to GSM network. They can also instruct the phone to disable the encryption.

But you can not be intercepted if you do not speak Mobile?

Well, in some cases, the cell phone to function as a microphone and thus convey what is said nearby.

Why is the IMSI-catcher possible?

The mobile network must mobiles authenticate to the base station, but the base station does not have to authenticate to the mobile. This is a known security hole that allows IMSI prisoners possible.

What is being done to prevent this kind of eavesdropping?

Just over a year ago began to mobile developers within the international community XDA Developers to build a mobile app to be able to detect and warn of IMSI prisoners. Now they have released a first test version for Android phones. It is available to download and test this.

How can I detect if there is an IMSI catcher nearby?

It requires special test equipment or software in the mobile. Special mobiles can also show that the encryption is disabled. However, there are some things everyone can look out for:
– If the IMSI-catcher is active and manages a call can not normally handle other calls simultaneously. Other mobiles in the vicinity connected to the IMSI-catcher can not make or receive calls.
– IMSI catcher can usually only handle calls made from mobile and forwarded to the mobile network – not vice versa. If you are connected to the IMSI-catcher should therefore not be able to receive calls, even though one can make calls.

How do I know if I had been bugged?

IMSI catcher listening to the call and sends it on to the mobile network base station. But in contact with the base station occurs IMSI catcher as a mobile phone with own SIM card, and also pay for the call. A call via the IMSI-catcher charged therefore not on the wiretapped phone bill. In other words: If you have made a call and then not on a detailed phone bill, there is reason for suspicion.

Like New Technology on Facebook

LikeTweet

Unexpectedly Swedish companies keynote speaker at CES – New Technology

       

Ericsson boss Hans Vestberg was one of the keynote speakers at the gigantic CES show in January earlier this year.

Nästa once, in January 2015, Electrolux chief technology manager, Jan Brockman invited as one of the key note speakers. He shares the prestigious contract with top executives of Samsung Electronics, Intel, Ford, GM, Qualcomm and Philips.

One explanation is the company’s bet up the sensors, control electronics and software in their products, which in January Brockman talked about in an interview in New Technology earlier this year.

Developments in the appliance industry is similar to the auto industry, he said, but the price pressure on refrigerators and washing machines are much tougher.

– So we must develop innovative solutions for consumers to have counsel, said Jan Brockman in new technologies.

On the Electrolux are of course pleased to get the chance to showcase itself as a high-tech appliance company.

– Jan Brockman will give Electrolux perspective on how we and the world are affected by the increasingly widespread the use of phones and tablets, says Daniel Frykholm, Communications Manager at Electrolux.

– The online home begins after all get a completely different and larger relevance compared to a few years ago. And Jan will talk about how it affects the form and function of products ovens, refrigerators and washing machines.

Electrolux has no presence in CES, but has a refrigerator in a demonstration of connected products put together by Qualcomm.

LikeTweet

Thursday, December 18, 2014

If cyber war will – Swedish Radio

A week ago, Telia was hit by a denial of service attack that got unusually large consequences. This time it was not just a specific goal that knocked out, such as government website – now you could not get online at all for Telia customers and the problems continued for several days.

Rumor has it that the reason was that the hacker group Lizard Squad subjected game company Electronic Arts for a denial, but it can also prove to be a much more alarming than disgruntled individuals in a loosely organized protest group that is behind the This nätat quilts.

And while IT security experts warn us that digital attacks on important social functions will become more common and more sophisticated, so talking military strategists cyber world as a new battlefield and create new military organizations only concerned with trying to meet cyber threats – or develop their ability to attack other states through cyber warfare.

Attack of the digital world has in recent years become so common, and so sophisticated that military strategists worldwide have begun talking about cyberspace as a new battlefield.

This is a development that led to the nations of the world started to develop specific strategies to defend against the new threat. Some nations have even set up new military organizations that simply directs its efforts against cyber world. But how serious are the cyber threats and how can we protect ourselves from them?

In the freelance journalist Kristoffer Gunnartz program from 2012 participates Roland HeickerŠo , information security expert and associate professor of military science at the National Defence College in Stockholm. Mathias Ekstedt Associate Professor in the Department of Industrial and Information Systems at the University of Technology in Stockholm. Anders Hansson , Head of the Computer Emergency respose Team at the Swedish Civil Contingencies Agency.

The program is a rerun.

LikeTweet

Thursday, December 11, 2014

Stubbornly wireless network name – PC All

It’s not often I have reason to with your mobile phone search for wireless networks.

Usually, however, “amuse Me “with it when I travel by bus because the bus company for a long time claimed to have WiFi on board all buses. Therefore, is a lie.

Sometime last summer appeared, on the bus, a network up that I began to feel again.

I pulled then, erroneously, concluded that it must be any passenger who uses the hotspot.

When I saw that the network was available when I was alone on the bus, I realized that something was wrong. Do not remember what I did to get rid of it, probably just a reboot of the phone.

Yesterday when I was at work, I happened to be spot on this network. “Nicke”

It’s there in the list and when I try to connect box pops up where I should enter the strike.

Is still there. I can not choose “Never” because I have never been connected to it.

How can it be that such a network clinging ??

 Attachment Screenshot_2014-12-11-17-45-20.png 243,41K 0 Number of downloads


LikeTweet

Wednesday, December 10, 2014

Unknown computer name – M3

When I open mycomputer I see the Network icon, in addition to mycomputer, another 5 Computer Name: Eva-PC, PC Martin, etc. Have no idea how these computer name ended up there. I click with the left button on any of these computer name, I get a box that says: To connect to Martin Computer enter the password. I click with the right button, then I get: Expand, connect with Remote computer, open in a new fönster.Jag would of course get rid of them. How do I?


LikeTweet

Monday, December 8, 2014

FBI warns of malware – Dagens Industri

The FBI warns of malware

                  2014-12-02 01:28
             

US Federal Police FBI warns US companies malware used in the attacks in the US.

In the confidential and five-page warning letter described how the software destroys data on hard drives and can knock them out completely and darken the network.

It is, according to the FBI, extremely difficult – if not impossible – and expensive to repair hard disks that are infected with the malicious code.

The warning letter is sent out after last week’s devastating cyber attack against the film studio Sony Pictures Entertainment. But the FBI does not want to disclose the attacks, spoken of in the warning letter was directed to the company. Police commenting nor any entity or entities who have been targets for attacks.

LikeTweet

Friday, December 5, 2014

Elekta: Cooperation with Avera in the US, reported over $ 20 million in Q2 – Dagens Industri

Elekta: Cooperation with Avera in the US, reported over $ 20 million in Q2

                  2014-12-04 07:40
             

 (SIX) Avera Health and Elekta entered into a collaboration on introduction  of MOSAIQ Oncology Information System to provide cancer care in  South Dakota, Minnesota, and the surrounding states. Over 20 million  dollars of agreement reported in the second quarter of Elekta  fiscal year 2014/15.       It is clear from a press release.       The partnership will allow Avera can create an integrated oncology systems  which enables the seamless care solution, from preventive measures  and screening to palliative care and recovery.       The contract includes:       * Versa HD linear accelerators       * Elekta Infinity       * Leksell Gamma Knife Perfexion       * Brachyterapilösningar       * Monaco, a treatment planning systems for radiation oncology       * METRIQ, a software for cancer registration       A cloud-based solution will be used for all software.       The State of South Dakota has a population of a   bout 850,000 people.        Johan Eklund, +46 31 350 64 87  mailto: johan.eklund@six-group.se  www.blogg.six.seSIXNews  SIX News 

LikeTweet