Welcome to tzFree blog we believe in Freedom and Sharing

A Blog about Technological Improvements, Sports, Hacking, Security, Games, Movies, Musics, Videos, Books, Softwares Systems and many more.....

Akilimali George I. Bsc ICTM II(Mzumbe University)

A highly astute, responsible, goal oriented, enthusiastic, people-oriented professional, with ability to work independently or within a team, have a highly Computer Information Technology and Management knowledge and creative enough to successfully solve problems and maintain peak efficiency.

tzFree Blog Description

This website is a free website designed and created by Akilimali george I aiming at providing informations and resources free of commercial charges to the majority of Society who are living under a below normal standard income and therefore can not afford to commercially acquire some essential resources through payments.NOTE: This is Non-Commercial website. By:Akilimali George I

tzFree Blog Description

This website is a free website designed and created by Akilimali george I aiming at providing informations and resources free of commercial charges to the majority of Society who are living under a below normal standard income and therefore can not afford to commercially acquire some essential resources through payments.NOTE: This is Non-Commercial website. By:Akilimali George I

tzFree Description By George Akilimali I

A highly astute, responsible, goal oriented, enthusiastic, people-oriented professional, with ability to work independently or within a team, have a highly Computer Information Technology and Management knowledge and creative enough to successfully solve problems and maintain peak efficiency. .

Monday, September 30, 2013

Sunday, September 29, 2013

Yahoo recycled ID users warn of security risk Users of Yahoo's recycled ID names say they are receiving the former owner's sensitive information through their new accounts.

(Credit: James Martin/CNET)
Yahoo users who got recycled account IDs said they've found a security risk -- they are receiving emails containing the personal information of former account owners, InformationWeek.com reported Tuesday.
The users told the news site that initially, they were receiving junk mail for the Yahoo ID's previous owner, but then other mail with sensitive information started showing up. This included account information, confirmation for appointments and flights, and event announcements. It appears the old owners must still be giving out the email address without knowing they no longer have access to the account.
One user, an IT security professional named Tom Jenkins, described the potential for identity theft as, "kind of crazy":
I can gain access to their Pandora account, but I won't. I can gain access to their Facebook account, but I won't. I know their name, address, and phone number. I know where their child goes to school, I know the last four digits of their social security number. I know they had an eye doctor's appointment last week and I was just invited to their friend's wedding.
We've contacted Yahoo for a comment and will update if we hear back.
Yahoo told InformationWeek that it takes the "security and privacy of our users very seriously," and has received complaints from "a very small number of users who have received emails through other third parties which were intended for the previous account holder." It continues to ask other companies, the ones sending the emails, to verify accounts by adding a date-specific marker.
Yahoo began releasing recycled IDs in late August, after giving users a month to log in to their accounts and stake their claim. Yahoo shut down any accounts that hadn't been logged in for more than a year, and then put the usernames up for grabs.
SOURCE: CNET

Hacker video shows how to thwart Apple's Touch ID The video details how the hacker scans and manipulates someone's fingerprint to fool the Touch ID on the iPhone 5S.

(Credit: Screenshot by Lance Whitney/CNET/Vimeo)
One of the hackers who recently tricked Apple's fingerprint sensor now has a video out showing just how he does it.
Earlier this week, a group of hackers in Germany, known as the Chaos Computer Club, took credit for bypassing the biometric security on the Touch ID fingerprint scanner. That hack was accomplished by scanning someone's fingerprint and ultimately using that to gain access to that person's iPhone 5S.
Posted on Vimeo by one of the hackers known as Starbug, the video takes us through the entire process from the initial scan to the actual fingerprint trickery. The hacker scans an iPhone 5S that already has someone's fingerprint. He then tweaks the scan to perfect the image of the fingerprint.
The scan is printed to paper and then to a circuit board, which undergoes a chemical bath. A dummy print eventually emerges, which is used to fool the security of the Touch ID, thus giving the hacker entry into the iPhone.
Starbug told Ars Technica that the hack posed no challenge. He said he expected the process to take a week or two. Instead, it chewed up around 30 hours from start to finish. With better preparation, he claims it would've taken only half an hour.
Despite Starbug's boasts, the procedure shown in the video seems exact and intricate, requiring manipulated scans, chemical baths, and printed circuit boards. And through it all, the hacker would need to hang onto your iPhone 5S. A process that can mimic your fingerprint certainly raises alarm bells, but this particular hack isn't something your average iPhone thief would be able to pull off.
SOURCE:CNET

Sunday, September 15, 2013

Top Android Apps&Games Release IV Free Download from Tz-Free




2013-09-04 05:59:32 Flipster Pro for Facebook v1.504 - android-zone.org.apkDownloads: 0, Size: 4 MB 2013-09-04 05:57:18 Galaxy S4 All-in-1 Thermometer v1.0.6 - android-zone.org.apkDownloads: 0, Size: 360 KB 2013-09-04 06:02:08 Galaxy S4 IR Remote by ZappIR v1.0.8 - android-zone.org.apkDownloads: 0, Size: 5 MB 2013-09-04 06:07:04 GO...


Thursday, September 12, 2013

Hacker sentenced to three years for breaching police sites

After pleading guilty to computer fraud for hacking into several police Web sites, John Anthony Borell III was sentenced to three years in federal prison on Thursday, according to the Associated Press.
Borell, 22, is from Ohio but was accused of breaching the Web sites of police agencies in Utah, New York, and California, and a municipal Web site in Missouri, in early 2012. According to court documents, the intrusions caused thousands of dollars in damage and forced the Utah police site to be down for nearly three months.
Apparently, after the attack, Borell made several comments on Twitter and other Web sites, which helped law enforcement officials in their investigation.
Borell is said to be a member of the loose-knit hacking collective Anonymous, which has taken credit for numerous online attacks including on the US Department of Justice, Lockheed Martin, Bank of America, and more. Reportedly, the attacks on Utah's police Web sites were done in protest of proposed US anti-piracy legislation.
In addition to his prison sentence, Borell has also agreed to pay $227,000 in damages, according to the Associated Press.
 Source:CNET

Wednesday, September 11, 2013

Indian government said to secretly track Web activity

The Indian government reportedly deploys Lawful Intercept and Monitoring systems to track Internet activities of citizens, separate from similar systems used by telcos in the government's Central Monitoring System project.
The Indian government is reportedly carrying out Internet surveillance on its citizens, in contrast with the government's rules and notifications for ensuring communications privacy.
According to an investigation by Chennai-based publication The Hindu, Lawful Intercept and Monitoring (LIM) systems have been deployed by the country's Center for Development of Telematics (D-DOT) to monitor Internet traffic, e-mails, Web browsing, Skype, and other Internet activities by Indian citizens.
The systems are fully owned and operated by the Indian government, unlike similar systems deployed by local Internet Service Providers (ISPs) which have to comply with Indian Telegraph Act and Rule 419(A) of the country's IT rules, the publication reported on Monday.

Monday, September 9, 2013

Movie You MUST watch..!!World War Z is a 2006 apocalyptic horror novel. Download HIGH QUALITY FREE NOW..!

Initial release: June 2, 2013Through a series of oral interviews compiled by the narrator (an agent of the United Nations Postwar Commission), the story of the global war against zombies, "World War Z," is told. The story begins with the interview of a Chinese medical doctor who relates the story of a young infected boy who is the pandemic's "patient zero", although the origin of the zombie pandemic is unknown. It is implied that the boy was not the first victim chronologically, but his infection (as well as those he infected) is the first to be recorded, and marked the point the Chinese government attempts to contain the infection and concocts a crisis involving Taiwan to mask their activities. Regardless, the infection spreads to other countries by the black market organ trade and by refugees, with a larger outbreak in South Africa, bringing the plague to public attention.
As the infection spreads, Israel abandons the Palestinian territories and initiates a nationwide quarantine, closing its borders to everyone except uninfected Jews and Palestinians. It then puts down an ultra-Orthodox uprising, which is later referred to as a civil war. Pakistan and Iran destroy each other in a nuclear war after the Iranian government attempts to stem the flow of refugees fleeing through Pakistan into Iran. The United States of America does little to prepare because it is over-confident in its ability to suppress any threat. Although special forces teams contain initial outbreaks, a widespread effort never starts as the nation is deprived of political will by several "brushfire wars", and because a rabies vaccine, marketed as effective, creates a false sense of security. When the world recognizes the true extent of the problem, a period known as the "Great Panic" begins. Following the loss of New York City, the U.S. military sets up a high-profile defense at Yonkers, New York, but underestimate the enemy; their modern weapons and tactics prove ineffective against zombies, which "can't be shocked and awed" as they have no self-preservation instincts, and can only be stopped if shot through the head. The unprepared and demoralized soldiers are routed on live television, while other countries suffer similarly disastrous defeats, and human civilization teeters on the brink of destruction...WIKIPEDIA

Tuesday, September 3, 2013

DID YOU KNOW THIS??Google's robo-cars mean the end of driving....!!

How Google's robo-cars mean the end of driving as we know it

Why waste your drive time doing the actual driving, when technology can be your chauffeur? The century-old auto culture is on the verge of radical change, and you can thank Google for where it's headed.
Google's self-driving Lexus RX450h
Google's self-driving Lexus RX450h
(Credit: Google)

Google's self-driving car initiative is moving into a new phase: reality.
Three years after first showing the world what it was up to -- rolling out a Toyota Prius with laser-scanning hardware awkwardly perched on the roof -- Google is moving its big idea out of the lab and into the real world.
Consider recent developments: A spokesman confirmed to CNET that the company was in what were described as productive talks with automakers involving Google's self-driving technology. Separately, Google is reported to be crafting a partnership with auto supplier Continental. And there's even the possibility of Google-powered robo-taxis sometime in the future.


The computerization of cars
Motivation aside, a big change is unde way, and it requires us to start thinking of cars very differently. Vehicles that drive themselves are the clearest example of what happens when cars transform into full-scale, general-purpose computing systems. But it's not the only example. Self-driving and connected cars will bristle with sensors, negotiate with traffic lights, talk to each other about safety conditions, join into train-like platoons, and become members of intelligent urban transit networks.
Historically, the car industry has focused on passive safety -- items like seatbelts and airbags. With the arrival of active safety technology that lets vehicles take pre-emptive action, cars will use data to help them decide what to do when drivers aren't paying attention or don't know what to do.
This illustration shows one advantage Ford sees for vehicle-to-vehicle communication: your car could detect abrupt braking of a car ahead that's blocked by a large van.
A lot of this boils down to communication. Sure, cars are getting more computing smarts, but so much of what's promised requires more data, and that requires ways to transmit it. How will that happen? As with personal computing, it will be a bit of a mess, with multiple networking technologies for multiple needs.
Computing today uses a handful of networks for different circumstances -- Wi-Fi, 3G, 4G, and Bluetooth among them. When automotive computing becomes a facet of personal computing, you can expect those standards to carry over. But then you can add some new network technologies designed to serve vehicles. The biggest are the 802.11p and the accompanying higher-level dedicated short-range communications (DSRC) standards, which govern how vehicles communicate with each other (V2V) and with infrastructure (V2I).
That technology, which rides the 5.9GHz frequency range for radio communications, can be used for things like collision avoidance, managing traffic at intersections, and linking cars into coordinated, fuel-efficient groups called platoons. Carmakers, however, are worried about interference on the 5.9GHz band if the US Federal Communications Commission permits other uses of the spectrum.

SOURCE:CNET

Sunday, September 1, 2013

Easy and Best way to delete your Web accounts...!

Some Web sites make it difficult to figure out how to delete your accounts. JustDelete.me can save you time by providing direct links to the cancellation pages of numerous Internet sites.

Web companies don't want you to close out your accounts with them, which is understandable. If you leave, their revenue-earning potential decreases. Some companies make the process of deleting your account relatively easy, while others make it practically impossible or confusing.
If you've ever gotten lost following support links in search of the right page to delete your Web account, you might want to check out JustDelete.me. The new Web site is a directory of Web services with direct links to their cancellation pages.
JustDelete.me Web site (Credit: Screenshot by Ed Rhee/CNET)

For some sites, JustDelete.me provides additional information on the cancellation process. For example, to delete your Steam account, you're told, "If you contact Steam support, they will most likely tell you just to not use the account. If your account has no games on it, it will be disabled after a while." JustDelete.me also ranks the difficulty of closing out your account, which might be helpful to you if you don't already have an account, but are considering one.

SOURCE:CNET

How to check if a shortened link is safe using URL Uncover:: The Web is a scary place where shortened links can take you to the darkest corner of the Internet.

(Credit: Jason Cipriani/CNET)

There is no shortage of Web services to help you verify that a shortened link is legit and not something that's going to load you up with malware or steal personal information. But when it comes to online privacy, it's always good to have options. Instead of adding a "+" to the end of a bit.ly link, or using Unshorten.it, give URL Uncover a look the next time you get suspicious.

(Credit: Screenshot by Jason Cipriani/CNET)

Addictive Tips recently wrote about URL Uncover, which will let you enter a shortened URL from over 100 different shortening services. After submitting the URL, you'll be given a screenshot of the Web site, the lengthened link, any keywords associated with the page, and most importantly a virtual thumbs-up or -down indicating whether the site is safe (see below). The green thumbs-up is provided by McAfee Site Advisor.

(Credit: Screenshot by Jason Cipriani/CNET)


Perhaps the best part about this particular service is that it's mobile-friendly. I've been able to access the site and use the service on a wide range of devices without issue. Sure, it's a pain to take the time to copy and paste a link from a rogue DM or mention on Twitter into a Web site in another app, but the time it can potentially save you is well worth it.

SOURCE:CNET

Related Posts Plugin for WordPress, Blogger...

Reliable & Affordable Hosting+Web Services