На информационном ресурсе применяются рекомендательные технологии (информационные технологии предоставления информации на основе сбора, систематизации и анализа сведений, относящихся к предпочтениям пользователей сети "Интернет", находящихся на территории Российской Федерации)

Geek Portal

61 подписчик

iPhone 6: Four things we need, but may not get

I live in a mixed household. I use a Samsung Galaxy S5, my wife uses an iPhone 5s. Half of my friends use Android phones, the other half use iPhones. The iPhone 6 may be bigger, but will it be fundamentally better? So, I know both worlds. Unlike some knee-jerk smartphone fans, I can see there's a
...Далее

Smartphone cameras need an Incognito Mode

The camera you use is the one you have on you. This simple fact, combined with internet connectivity makes the smartphone the ultimate camera for most people today. Camera tech — including cloud storage to hold all our photos — has improved immensely over the last year to support our habit of
...Далее

This Amazingly secure Android phone was able to discover fake cell phone towers

We’ve always been suspicious of folks being able to snoop in on phone conversations or intercept data, but there isn’t much we can do to prove that happening or to prevent the foul act. One secure phone seems to have changed that, however. ESD America’s GSMK Cryptophone 500 (which is basically
...Далее

Tests compare Mac OS X anti-malware products

Every day, independent test lab AV-TEST.org captures more than 400,000 new malware samples for Windows and 5000 new samples for Android. For the Mac they identify less than 100 per month. But there is malware out there for the Mac and it does hit users in the real world, if less often and less
...Далее

FBI probes celebrity photo hacks, Apple confirms investigation

The FBI has reportedly begun inquiries into reports that hackers stole and leaked private and intimate pictures of over 100 celebrities. According to Associated Press, the FBI said on Tuesday it is "aware of the allegations concerning computer intrusions and the unlawful release of material
...Далее

Картина дня

наверх