четверг, 8 марта 2012 г.

iOS and Android. Which OS is faster?


HTML5 today is a kind of lingua franca of the Internet, but unfortunately, the game written on it, while still working too slowly.


A platform to learn how to handle the HTML5-code faster than others are more likely to gain an advantage over competitors. Therefore, the developers of the test is conducted Spaceport.io mobile platforms such as iOS and Android for performance in HTML5.

If the game starts and shows a rather quick work on HTML5, it may subsequently have a positive impact on its sales and increase in popularity, because games are written in HTML5 - Cross-platform and can run on any mobile OS.

The test proved to iOS 3 times faster than the competition from Google. To carry out such tests Spaceport.io created special tools to measure performance PerfMarks HTML5-code. The main criterion for calculating the performance was the ability of a device to change the image on the screen - the basis of all games. A good result was the rate of 30 frames per second, which offers the most usual format is for the person using the application.

As a result, the tests that were conducted several times, iOS showed itself every time better than Android. the latest generation iPhone scored 252 points based on the results of the measurements, and the iPad 2 showed as much 327 points. In turn, iPhone 3GS, model 2009, was able to give only 53. For comparison - Samsung Galaxy Nexus index was noted at 147 points, and somehow scored Kindle Fire 25.

At the moment, the iPad 2 is the most productive in terms of HTML5 device, and was the only Galaxy Nexus of Android-smartphone, which could change the picture on the screen with a frequency of 30 frames per second. But here on Android tablet can not boast of the results, close to the Galaxy Nexus and even more so to the iPad 2. For example, Samsung Galaxy Tab 10.1 scored slightly more than the old 3GS - 65 points.

But both operating systems as iOS 5 and Android 4.0 (latest version) - showed a significant improvement in the implementation of the HTML5-code. For example, the fourth version of the "green robot" has become a much more friendly for HTML5 in comparison to Android 3.0, which is carried out tests in general behaved inappropriately.

Here's what the founder says Spaceport.io Ben Savage (Ben Savage): «Processing of HTML5 becomes more rapid, it can be seen on the latest operating system updates iOS and Android. And while HTML5 is becoming popular, there is still a lot of things over which you should carefully work. We hope that our program will PerfMarks demand among software developers in the HTML5 ».

The following report is based on data PerfMarks, will be published on May 21 Conference Game Developer Conference in San Francisco. Does Android have time to correct the situation or just iOS only strengthen its leadership?

Moderators of social networks have access to all your content


According to The Telegraph, moderators content of popular American social networks have access to much more information of users, rather than declare its representatives.

Moderators have access to content not only to the "offensive" images and messages, but also to the names of users who download them, as well as those which mark the photographs. In addition, the moderators also receive information about the user who reported the offensive content.

The security settings of social networks also do not prevent the moderators got screenshots of personal photos, videos and posts of users.

The Telegraph has received this information from former content moderator Facebook Amin Derkaui (Amine Derkaoui), which showed some screenshots of the publication, who see the moderators in deciding on the deployment of a content.

Derkaui said that the social network does not provide any "decent security" in order to ensure the privacy of users.

Facebook denies all the charges, arguing that third parties control the publication of a small amount of content social network.

Representatives of the social network said: "We have taken security measures to protect our users' data." In Facebook also claim that the moderators have access only to the verifiable information, as well as user data, which notified the offensive content.

понедельник, 5 марта 2012 г.

Hacker attacks are more dangerous than the terrorist attacks


The head of the FBI said that the hacker attacks on computer systems around the United States may soon terrorism threat level.

"In the near future, we anticipate that cyber threats present a threat number one for our country - said the head of the FBI, Robert Mueller (Robert Mueller) at the RSA Conference 2012. - We should learn a lesson from the terrorist attacks and to apply it in the fight against cybercrime. " It is reported by The Register.

Mueller said that if the computer systems upon which modern society would be put out of action, the result is chaos and anarchy begins. But Mueller said the IT-specialist Bruce Schneider (Bruce Schneider), who noted that the purpose of terrorism is to intimidate, and if the phone stops working, then people are unlikely to be in terror, and is likely to be irritated.

According to Mueller, there must be a sharing of information in order to defeat the "enemies" in the future. In this regard, the FBI intends to improve and make changes in business practices.

All special agents of the FBI is currently studying e-literacy, and those who specialize in this area will receive the best education. The FBI is working to create virtual meeting rooms, in which investigators will share information on cases under investigation.

In addition, Mueller also wants throughout the United States passed a law according to which the victim of hacking will be required to provide all the information about the attacks. Currently, such laws are only 47 U.S. states.

Why are security professionals do not use antivirus software


Last year, companies worldwide spent more than three billion dollars on anti-virus software, and private users, and even more - about five billion.

Another $ 6.5 billion estimated market firewalls, according to research firm Gartner. Known in the past, a hacker MafiaBoy Jeremiah Grossman (Jeremiah Grossman), now - the technical director of White Hat Security, considers it a waste of money.

Of course, Grossman has its own interest, to articulate this point of view, because his firm is engaged in consulting in the field of computer security. One of the first tasks in a conversation with a client - explain that they have installed anti-virus software does not protect against all existing threats. Moreover, it does not protect at all from any real threats that really threaten the company (information leakage, industrial espionage, sabotage, etc.).

Tellingly, Grossman was not alone in his mistrust of the antivirus software, says Wired. Many security experts also do not install antivirus software on your personal computer. They are smart enough to not go to questionable sites and do not open files from untrusted sources, so that the typical route of infection they do not work, and these ways are the focus of anti-virus.

Experts also believe that anti-virus software is often not useful not only for them but for corporate users. They say that over the past ten years, the effectiveness of anti-virus markedly decreased. The reason is that if someone really has set a target to attack the company, it will check its advance method to the most anti-virus products, and make sure that they do not find the threat. There's even a free web site called Virus Total, which allows a malicious file to verify all popular antivirus software.

However, just abandon the anti-virus companies do not have the opportunity. The fact that this is the first line of defense against the stupidity of the rank and file employees. Yes, anti-virus software do not protect against targeted attacks, but they are still effective against the stupidity of office workers, who tend to go for bad sites, open files from unknown sources and do everything else that a security will not do. In addition, some companies are required to have anti-virus, in accordance with state regulations. For example, such a requirement is contained in the Standard Payment Card Industry (PCI) Data Security Standard for the payment systems.

However, many security consultants insist that the company would be better off spending their budgets, not on the monthly payments for the licenses box products, and more reasonable, for example, on a careful analysis of the vulnerabilities in corporate networks, the overall security audit log analysis, penetration tests etc. Experts agree that anti-virus and firewall are useful, but now the company is too expensive to pay for this "passive" protection, while the investment in the "active" defenses are more effective.