Nature

Poetic beauty of nature.

Universe

The vastness of the universe.

Wallpaper

Beautiful pictures of nature.

Snow white

Winter cold.

Icebergs

Beautiful pictures of nature 2.

Chủ Nhật, 1 tháng 9, 2013

Website FTU Syrian surprise attack by hackers

Today, the site of the base 2 Foreign Trade University (HCMC) at http://cs2.ftu.edu.vn/  sudden foreign hacker attacks changed the entire contents .
According to information on the website, the attacker has the nickname "Syr! 4N M43STR0" Syria is a hacker. Hacker has sent a message of access to "justify" the Syrian government story is framed in the use of chemical weapons earlier this week. Information about the incident was worldwide media coverage frantic, but the hacker, the government of Syria entirely innocent.
Website FTU Syrian surprise attack by hackers
 

Also because of the work on which NATO is putting pressure on the UN to conduct military operations here. Military situation in Syria is very stressful, attracting the attention of people around the world. According to the published information, NATO is planning to put troops into Syria.
Website FTU Syrian surprise attack by hackers
 


It seems that the Syrian people, and here are the hackers are trying to get the trust of other countries in the attack and the whitewash on the website of the country.

Thứ Tư, 28 tháng 8, 2013

10 should not do when using the computer

PC as well as all other electronics need maintenance, maintenance and need the attention of the user during use. But many of us have some bugs to the "care" not good cause computer problems on hardware, software, worse, data loss. Previously we had pretty much all share about what to do, but what not to do something, why?
1. Do not update your operating system and your applications
Windows_Update
I know that the updated operating system and applications are really upset with some people because they do not have the time, or sometimes the improvements in the new software version makes them feel familiar. For that reason, many of you will choose to turn off the auto-update, ignore the new updates and leave like that. However, when doing so is that you have inadvertently caused his computer to be "fragile" than with regular updates. Not when the manufacturer does not release the software update, it is used to fix the existing errors, improve software performance, add new features, interface changes ... With the operating system and increasing the error correction performance as more important because it helps us to work more smoothly, faster, less error prone than machines. It's wasteful when we refuse to use the improvements that developers hand delivered to us.
Therefore, take the time to try and update the software offline. With Windows , you can set the machine to inform the new update and choose yourself the download / update, so it will be little slower, less Internet bandwidth occupied over. If you are able to install and update, the computer itself was wonderful then. Similar to other software applications, if you choose option than the temporary bypass. Most of the app will have a button "Remind me later" to remind you to update later, but remember it is not okay to ignore. Browser, Flash, Java needs to be updated regularly by the very things they are vulnerable to attack from outside.
2. To close the computer too much dust
After a period of use, desktop or laptop will be dust. Dust will cause the fan turns slowly away, the air circulation is reduced and the temperature increase in our PC. If there is too much dust, heat dissipation system of the device may not work as good as the original design to computer overheating and the computer will automatically shut down. I once had a friend who uses a laptop, a system crash every 5 minutes even though he had installed the machine, complete software update, replace both batteries at. It turned out that due to the dense dust in the equipment slot radiator overheating and causing computer operating system of the PC-break operation. Just use the map blowing spray blowing dust a few times this condition is gone. Due rubber squeeze as they cost tens of thousands of contract and you can purchase at most computer stores.
To limit the above situation, you should always open the desktop case and cleaning inside it. In Vietnam, we do not have a lot of dust and gas should this need to be conducted more frequently. If you have time, you can do 2 a week, otherwise once a month. As for the laptop, you will need to open the machine for cleaning. It is very easy to open, with most laptops, we just need to open some screws underneath the machine, remove the bottom plate of the saw with the mainboard slot heatsink and fan. However, the laptop is able to stamp the warranty will be torn open, so if you are not familiar with it should bring out the best services to their computer to help you.
3. No data backup
I know this is very very very many people do, because they hesitate to take time, take extra backup capacity (!?). Even you know more about your computer and your data is not backed up by ... lazy. Why are you lazy while currently there are many tools for automated data backup? Just a little search on the Internet and you will see a lot of software has the function of "auto backup", both for Mac, Windows and Linux. Windows 8 users are even available free backup feature built into the operating system, you can also use the Mac Time Machine with equivalent functionality.Many data backup only proceed once they have experienced loss and "traumatic experience", do not become one of them okay for you.
A few rules when backing up data:
  • Restrictions on the backup storage device installed in the computer:  for example, many of you often create a backup partition on the computer and then copy data from drive C, drive D through it. This is almost useless because if you lose your computer, why? Or the hard drive fails, what to do? It is best to backup an external hard drive. HDD then current price is quite reasonable, just about 1 million is genuine 500GB drive to back up data before, about 700-800 thousand is good 320GB drive. If available HDD / SSD left over from the previous round of upgrade, please take advantage of it always okay. In addition, you also need to choose a safe place to put this backup drive offline. For example, if you put in pairs when theft is going to take the data on your computer and backup drive.
  • Regular backups : backup set schedule at least once a week, not for a month to do this once because of no backup data is very large, consuming our time. In addition, the regular backup will also help to limit to the minimum amount of lost data in the worst case.
  • Backing up on many different drives : if your data on the type of the utmost importance, the nature of "survival" with work or your life, do not regret the money again to buy a backup drive with a content. So you will have at least two backup drives, plus data on another computer, the safety is much higher. Of course, if necessary, feel alone, you do not need to invest in a backup drive Monday.
4. Plug the computer directly into a power outlet
You have the power cord plugged straight desktop or laptop into a power outlet is not? You should not do that okay by unstable power source, which can increase fire component, which power your home or flashes of lightning will be "poignant" this. Adapter laptop too, although not directly affect the computer, but the money to replace and fix adapter pretty much. Instead, you should plug in a splitter and from splitter plugged into the wall. The reason for the split will often fuse, if power is too strong, the fuse off, bought out electric shop instead is done, both cheap and fast. Some have not only broken, it fuses itself only, not the device is plugged in to the same fate, and then buy back the share is still cheaper than buying the adapter and computer components. You note that the Department should avoid sharing three (in some places called Trident) okay because we do not have fuses, protective effect is not there. Used to split the socket is pure.
5. Defragment SSDs
With HDD on computers running Windows, the defragmentation is commonplace and we have done this a long time ago. But with SSDs, so you should not defrag. Why?
HDD will write data to the disc plates, and top with the task of finding them when you need access to. It so happens that the HDD is a condition that one data file (probably) have been stored in the different parts of the blade disc, leading to the access speed is reduced significantly, referred to as the fragmentation (fragment). Therefore, the operating system will have a function called Defragment (Defragment) to collect the pieces of data together to reduce this situation.
However, SSDs are made as well as other mechanisms HDD activity. Data is stored on the Flash memory chip, so despite being fragmented, but SSD does not use the word to search for data access should still take place immediately. Therefore, do not need and should absolutely not run defrag app for your SSD. Doing this meaningless and even harmful to the SSD because it's starting to make an overworked (SSD longevity is calculated according to the number of write / erase data that defrag programs that move data from place to another).
6. Running multiple antivirus software at the same time
You should run only one antivirus program on your computer at a time only. The antivirus app will dig into the system to manage the operation of the machine, check the software before running, scan everything you download or peripherals are plugged into the PC. If you have more than one anti-virus app, they will conflict with each other during the operation makes the machine "behavior" strange, is even reboot or blue screen of death. Some even get anti-virus software as malware and try to remove it from your computer again.
Also because of this, usually, when the anti-virus software installed, you will receive a warning similar to what I said above. Some apps, such as Kaspersky or Norton, will not let you proceed with installation if not uninstall antivirus software are.
7. Blocking airflow heatsink
As mentioned whimper, the computer needs to be properly heatsink to work best. In addition to ensuring that dust does not stick in the slot with heatsink, make sure that you do not let anything stop before this gap. If you use a desktop, do not leave it against the wall thermal losses (or grab something covered) by the hot air has no place to escape. If using a laptop, do not let up mattresses gaming machines and other heavy work done by the mattress will block vents.Similarly, do not put your laptop in your lap if your thigh is capable of blocking the gas. Keep in mind that space for heat dissipation is critical, while surfing the web or simple chit chat is fine, but when running intensive tasks, the machine needs a lot cooler.
8. Using powerful graphics card overkill
If only the office if you need to AMD HD 7990 card for gaming?
Everyone likes to have a powerful PC, but most people do not use all the power of the machine. If you build a desktop for a girlfriend, the wife, the parents, the more likely you will not need a powerful graphics card, even using onboard graphics chip has enough. The powerful graphics cards will consume a lot of energy even when you are not running graphics-heavy tasks. That power waste our money to buy something that costs almost never need to. Even if you have enough money, you should not do that, please save to buy something else better, more useful.
9. Refrain from using old CRT
If you are still using the old CRT, it will consume a lot of power and thereby increase your electric bill. Not to mention the CRT has lightning phenomena (flickr) was not good for the eyes and cause headaches when used in a long time. If possible, upgrade to LCD or LCD screen with LED backlighting for the screen type current was also very cheap then, to have various sizes from small to large are spoiled for choice. In addition, the LCD screen also helps you save a lot of desk space compared to the old CRT monitors used, which are bulky and big.
10. Do not make the desktop and hard drive clean and tidy
Good practice is to always clean your desktop and hard drive to make it tidier and less cluttered than. It not only helps us to more easily find that sometimes your desktop neat and less on the things that will make your computer run faster - in case you use a Mac. For the hard drive too, the file is no longer used to delete it and gather them into a file folder to help management easier.Take time for other things instead of sitting for a picture file on your hard drive or a cluttered desktop.
Supplement:
11. Remove the laptop battery when plugged in
This was a mistake that countless people have. You could argue that removing the battery and power only helps for longer battery life than the bottle, when you replace the battery on time.However, this is dead wrong because if the voltage is not stable or components may burn, and least flammable source chip. I've met a lot of you are like that then, very traumatic experience.With Macs, had proven that the test remove the battery and only power plant efficiency will decrease significantly.
The battery of the laptop is now using a new technology, besides it will interrupt power to the battery when the battery to 100% and switching to new sources should be used very long cylinders only a few% only. You should not worry then, lo the damaged machine back to the suffering. You want to change the batteries last few years a million times or want to spend money to fix my laptop?

A number of security issues that the hacker will be presenting at Black Hat and Def Con 2013

This week, thousands of computer hackers going to Las Vegas to attend the Black Hat and Def Con, two facts about the security and safety information globally famous. Participants will often reveal new findings at two conferences of this, the media is also closely monitored to know that things seemed safe could suddenly turn off "attack" users. Some things have been revealed at the Black Hat and Def Con last year as the hack can tell in a minute via iPhone charger off, access to the system of bank surveillance camera, prisons, military facilities only the manipulation of the "simple", or as the hack ATMs to spit it out without money to your bank account. But this year, why?
Hacker can find out your self-destruct message
Poke Facebook app is the ability to send messages, photos, videos to one or more friends.Message from Poke the recipient will see the display for 10 seconds and then disappear.Snapchat, Wickr app features are similar, and also send text messages that self-destruct message. We thought that this app is safe because it does not save anything, but the reality is not so. Two expert digital examination and Kyle O'Meara Drea London will go on stage at Def Con 2013 to talk about how to read the message seemed to have been deleted. By looking in the phone's memory, test data, as well as ping is sent to the application server, the two men know how to retrieve messages from Poke, Snapchat, Wickr before, during and after messaging users.
Camera GoPro sports camera can be turned into tracking
Camera_GoPro
Imagine the following scene: your GoPro camera attached to his hat to prepare for a trip by motorcycle Donate with friends. This camera means terrible, just beautiful recording, which is small and flexible, both the integrated Wi-Fi. But there is also the possibility that someone is listening to every word that you say through the wireless connection of the machine. Two security researchers Zach Lanier Todd Manning and found not one, but many ways to turn your GoPro a tracking device into a voice, they can also control it remotely. This problem will become more serious in the case of soldiers using GoPro to record their military campaigns, such as this video.
Using computers to hack and create 3D models of door key
O_khoa_cua
Locks Wi-Fi, or smart locks are prey to bad hacker, who would have guessed it., So many people still use traditional locks. But this is also not safe because a hacker group can create 3D models of any keys that are manufactured by Schlage Primus, a company specializing in high security locks of America. All you need is some hacker group series of locks, and when they have, they will come model in 3D, and that is the key to life.
In addition, a group of security experts also make a way to "open, pass or decode" a common locks in seconds. They wait to Def Con announced more details about this.
You could be eavesdropping on phone calls with mobile devices $ 250
Tram_di _Multioutlers
Two years ago, the hacker has to know how to listen to the call on the mobile phone runs on GSM only device is priced under $ 1,500. Now, a third-party security adviser has found a way to do the same with phones running CDMA network, and the cost to purchase the equipment for this hack is only $ 300 or less.
On the Black Hat website, this team revealed: "I have a box on the desk and your phone will automatically connect to it when you send or receive calls, text messages, email, web browsing. I own this box. I see all the data passing through it and you did not even know that you are connected to me. " This box is actually a femtocell, a small broadcast stations located in the household to help increase signal coverage and capacity of mobile networks. The box will cost only about $ 250, some phone companies do not even give their customers. When in range of the femtocell, your phone will automatically routing data to go through the box without informing the user.
These tiny computers are recording your every move
Brendan O'Connor, a security expert, has created a system valued at $ 60 includes a sensor mounted around the region or around the city. The system can track almost everything, from phones, tablets, PC. Corresponding signal will be sent to the central database in the monitoring process and then it will be mapped onto a map. Currently, each of the lines carries at least one mobile device, so that the above system can track every step of the way our country. Hear action movies like that. It is known that many of the projects Brendan O'Connor has been funded by the Agency for Research Projects of National Defense (DARPA) of the U.S. government.
Hacker can shut down a power plant
Nha_may_dein_hat_nhan
Wireless networks are often used to control power plants, and in fact, it was present in the nuclear power plants, thermal power, hydropower. Two hackers have recently discovered a security flaw in the system equipment manufactured by three wireless automation company leading the world.When successfully exploited the vulnerability, the hacker would have evil intentions may read and write data to the device above the 64km distance only by a radio receiver.
Once you have access to the control system devices, hackers can cause false test results of the sensor, override unauthorized data. This action will result in the plant is not running at full capacity, the voltage can be increased suddenly, and oil to run the generators could be wrong mix ratio. In addition, hackers can simply disable the wireless network and for decommissioning the plant. This attack can leave extremely serious consequences, depending on the size and scale of the plant. It sounds horrible to you, right? Just as the movie Live Free and Die Hard.
Hackers can break into your smart home
Den_LED_Gunilamp_tinhte_9
Let's start with the Smart TV: Hackers can access this smart TVs to steal personal information, install viruses, hijack your webcam and microphone, while still eating corn and watch movies with his girlfriend without knowing anything. And if you suddenly feel the space suddenly becomes hot, the thermostat can the hacker was then corrected. In the case of continuous flashing lights, automatic door suddenly opened like ghost movies can also interfere with the hacker has your home already. These are just some small examples show that smart appliances are increasingly provide many benefits, but it also comes with the huge security risk.
You may be shocked by the death of his pacemaker
May_tro_tim
In 2006, in the U.S. alone, approximately 350,000 of the 173,000 pacemaker and defibrillator implanted into the patients. This was also the year that the Department of Food and Drug Administration approved the United States began medical devices have wireless connections.Celebrity hacker Barnaby Jack plans to show the access and take control of medical equipment, the individual with a pacemaker, he can order them up or stops working electrical pulses to the patient in eternity. The hack can be carried out at a distance of 9m. Sadly Jack died suddenly last week, but his findings also still have to make people frightened.
Session presentation at the Black Hat Jack remain unchanged and we will use that time to commemorate the work of his very useful. Before that he was looking for ways to make ATM cash injection out without resorting to any bank account. Jack also discovered errors allowed hack insulin pumps and "assassinate" a remote patient.
Hackers can control your car when you are driving it
xe_o_to
The hack and cars is becoming a trend among hackers this year. The security expert can break into your vehicle and control it remotely, they also know how to tweak parameters on the front panel to the steering wheel. More of the situation "as the film" appears here: hackers can disable the brakes, steering wheel controls illegal, suddenly speed up, or empty the fuel tank as the screen is still showing full average. Charlie Miller, a security expert from Twitter, along with Chris Valasek, director of security firm IOActive, recently demonstrated the hack above to view Forbes magazine. Four other groups will also demo the same thing at Def Con.
These are just a few things to take place at the Black Hat and Def Con 2013. Let's wait and see what surprises are appearing again.

Microsoft is testing Windows Phone 8.1, may be released next year

Recently, Tom Myles, a Chinese developer has released application called Love Wallpaper HD.Based on the data in the logs, Tom discovered a number of devices running the operating system version is Windows Phone 8 is installed your application. Tom said the current version of Windows Phone 8 last he is allowed to access 8.0.10328.78, however, the other device to use the new version are as 8.10.12073.0, 8.10.12086.0, and 8.10.12100.0 8.10.12102.0. Therefore, we have grounds to suspect that Microsoft has begun to test the OS version Windows Phone 8.1 .
Microsoft is testing Windows Phone 8.1, may be released next year


But more likely, Microsoft will be launching Windows Phone update GDR3 allowing smartphone use Full HD display and quad core chips in the fourth quarter last year. Hence, time release updateWindows Phone 8.1 will be coming back in 2014. It is expected that the operating system version 8.1 will have additional deficiencies present messages as notification center, improved performance when multitasking and supports screen rotation lock.

Apple co-founder: Microsoft lags for flexibility and creativity not by Apple

In 2007, when Apple first launched the iPhone, Steve Ballmer had boldly declared that iPhone "can not stop" as opposed to Microsoft, and is optimistic that "Windows operating system will be used in 60%, even 80% of mobile devices across the globe. "

Steve Wozniak said that Microsoft does not slow as flexible and innovative as Apple
Steve Wozniak said that Microsoft does not slow as flexible and innovative as Apple

However, the reality is the opposite occurred with the predictions of subjective Steve Ballmer.The trip across the battle, Steve Jobs eager to culminate iPhone. Until 2010, the new Microsoft began offering Windows Phone. But the efforts of U.S. software firms too late. In a world changing by the minute, three years is enough time for Apple's iPhone and Google's Android to create a consumer trend that Microsoft is hard to overthrow.
According to Steve Wozniak, the reason for Apple's success is always flexible and creative as soon as the company became a major. This is what Microsoft did not get under Steve Ballmer. "Steve Ballmer Bill Gates does not matter," Apple co-founder emphasized.
However, Apple is also Samsung has been overcome to become the phone maker's largest smartphone world. So Apple is "day bed" like Microsoft? The answer to this question, Steve Wozniak said that those who are criticizing Apple because it does not bring anything new to understand that "great progress for humanity does not happen every year."

Steve Wozniak who was "straight intestine horse". Not only public comment on the competition, in the past many times and Wozniak criticized shortcomings in the products of Apple as Siri, Mac OSX, ... In an interview with the Daily Beast, he revealed that his request to use the iPhone because the beauty of this phone. But he estimated the iPhone will have the same abilities as the Motorola Droid phone.

The beautiful fountains around the magical world


Fountains at Lake Burj Khalifa, Dubai.

Nozzle near the foot of the Eiffel Tower makes the scene more romantic Paris France.

Sprinklers Merlion at Marina Bay is where any visitor to Singapore were also pose.

Buckingham fountain in Chicago, Illinois, United States.

Fountains Show in Shanghai, China attracted many tourists visit.

Fountains in front of a modern shopping center in Port El Kantaoui in Sousse, Tunisia.

Fountains at the war memorial in Washington DC, USA.

Magic fountain in Barcelona, ​​Spain.

Sprinklers in the building south of John Ferraro, Los Angeles, California, United States.

Fountains Square in downtown Seattle, Washington, USA.

Fountains in a park in Warsaw, Poland.

Sprinklers Parque de la Reserva in Lima, Peru.

Thứ Hai, 26 tháng 8, 2013

Microsoft's next CEO be?

After Microsoft CEO, Steve Ballmer claims that will be "retired", technology news site Bussiness Insider has released a list of candidates who will predict worthy name to replace Steve Ballmer during future. Here are some names that are likely to become the next CEO of Microsoft in the future to the technology news site famous world making.
Bill Gates
Lots of Bill Gates will be able to replace Steve Ballmer
Many will likely be Bill Gates Steve Ballmer's successor.

The first item on the list is nominated to become the Micrsoft CEO of Business Insider Bill Gates is not a stranger to most of us. Explain why it is said that Bill Gates because he is the founder of Microsoft and drove it cross from a small technology company to become a world-renowned group and no one can "take care "Mircosoft better than the people who were born into a" giant ".
In addition, most of the senior members of Microsoft are now working a long time for Bill Gates when he was in the company. Thus he became the CEO will not cause any disturbance which left nothing for Microsoft to also make this machine operate more smoothly.
Elon Musk
He ranked second in the list of candidates is Elon Musk.
He ranked second in the list of candidates is Elon Musk.


Monday in the list can become Elon Musk is the CEO of Microsoft, was an inventor, entrepreneur, billionaire South Africa. He is best known as co-founder of SpaceX and Tesla Motors car company founded and e-commerce company PayPal. According to Business Insider Elon Musk is a lot of patrons rated as the best candidate for the CEO position of Microsoft. Since he was very young, only 42 years old, with age, the Elon Musk can completely take over as CEO of Microsoft in a long time (at least more than 20 years).
Furthermore, Elon Musk is a popular research and human research and technology development and support very bold new ideas. So if Musk is the CEO of Microsoft, the technology giant village is entirely possible to create breakthrough products high. However, Elon Musk recruited a difficult time "genius" are very much busy with major projects such as developing cars running on electric power, participation in projects related to space technology. vvChinh so difficult to invite the "generals" under his this on Microsoft.
Steven Sinofsky
The 3rd in this list is Steven Sinofsky, who left Microsoft nearly a year ago because of disagreements with the old leadership. In terms of experience, the Steven Sinofsky, who spent a lot of ups and downs with Microsoft hiccup. In addition, he was one of those who have brought no small success for the OS version Windows Vista, Windows 7. One thing in particular is that Steven Sinofsky is also one of the people that loved Bill Gates because he's likely to become CEO of Microsoft is not small at all.
Marissa Mayer
Marissa Mayer is also good candidates.
Marissa Mayer is also good candidates for the CEO position Microsoft.

Candidates fourth Yahoo CEO Marissa Mayer. Bussiness Insider reported that Mayer is a CEO that most technology corporation wishes for her full convergence CEO virtues of a modern and dynamic business acumen. And it has been proven through her time working at Google and Yahoo. 
However, like Elon Musk recruiting Mayer will be very difficult when the CEO of Yahoo this is not a human being "is the new old place." Moreover, her ambition in Yahoo just beginning and that Mayer will certainly not want that his plan will outline his left turn halfway. In addition, she has little experience related to software development, computer operating system, the core business of Microsoft today.
Nikesh Arora
Arora is Microsoft help candidates develop market
Arora is Microsoft help candidates develop the market.

The name of this list is Nikesh Arora, who is a fourth in only after Google executives Larry Page, Eric E. Schmidt, Sergey Brin, now he is a vice president in charge of business and Google. 
As Bussiness Insider is if Microsoft decides to hire a talented executives in the sales and marketing of products as well as market development Arora will be the number one choice. 
Evidence from joining Google in 2004, Nikesh Arora is usually placed in an important position.Most recently, he led the direct sales activities across the globe of Google. He also developed and managed the company's operations in the markets of Europe, Middle East and Africa and is responsible for creating and expanding strategic partnerships in those regions for the benefit of increasingly large number of users and Google advertisers.
In addition, the list of Bussiness Insider There are many other famous names like Satya Nadella village technology (vice president in charge of Microsoft's enterprise cloud), Scott Forstall (known as team leader development of Apple's iOS operating system for many years), Mark Hurd (co-chairman of implacable opponents with Microsoft as Oracle) and a few other famous names.
It is difficult to answer the question of who will be the new CEO of Microsoft.
It is difficult to answer the question of who will be the new CEO of Microsoft.

Currently it is difficult to claim that the captain who will be capable of holding rudder "ship" Microsoft. Simply because of the above candidates are those who are talented people, each of them has its own forte. To choose a worthy person to sit in this position is not simple at all.Reportedly, Microsoft will announce a new CEO in the near future and we look forward to see who will be the giant technology village "in safe hands" okay.
Refer Bussiness Insider

Thứ Sáu, 23 tháng 8, 2013

WINDOWS 8: ENABLE HIGH-SPEED STARTUP, HIBERNATE

Enable  Hybrid Boot  will make your computer boot into  Windows 8 Developer Preview  Express after every shutdown, hibernate is already familiar to the user. 
Hibernate (turn the machine on hibernation status) and Hybrid Boot (boot mode hybrid super-speed hybrid boot "cold" and restore traditional computer from hibernation mode) are present in the Windows 8 Developer Preview .
To enable Hibernate and see the location of the Hybrid Boot, you do the following: - Press the key combination  Windows + R  to call the box  Run , type command  powercfg.cpl  and press Enter to open the  Power Options , or press Right-click the icon  in the system tray and select  Power Options . - Next, you click on the line  Choose what the power button does  lie in the left list.  



- In Window  System Settings , click on the line  Change settings Furniture are currently unavailable  to appear grayed out options below, including  Enable Hybrid Boot (recommended)  and  Show Hibernate . 

By default, the option  Enable Hybrid Boot (recommended)  is available marks, so you only need to check the option  Show Hibernate  Hibernate mode to display the shutdown dialog. Finished, click  Save changes .

Now, when pressing Windows + I and click on the icon  Power  on the table right of the screen (or press Ctrl + Alt + Del and click on the icon  Power  bottom right corner), you will see the Hibernate out back.

Thứ Ba, 20 tháng 8, 2013

Design Flat (Flat design) - The trend of the future!

The term  flat design  can be disseminated in the past few years but has quickly become a major trend of the future. Coming here, flat design will appear again on one of the hottest products of the technology world is  iOS 7 . So what is the flat design? And why did it become the trend of the future technology.
11 flat design flat design (Flat design) Future Trends
 What is a flat design?
Definition,  flat design  is a method does not use any effects in designs such as shadow, bevel, emboss, slope and other factors contribute to the depth, highlights of the design on the screen to make the image easier. The name itself  "flat"  of this design also implied not contain 3D elements.Flat design is also considered a relative of  Minimalist , stylish design a minimalist.
21 flat design flat design (Flat design) Future Trends
Therefore, it is easy to see in a design style is flat images, buttons and logos are usually simplified to the maximum, the style is different than the simulated designs are material Skeuomorphic used on iOS devices. Understandable words, planar design interface like apples and oranges as  Live Tiles Windows Phone user or  Metro UI  on Windows 8.
31 flat design flat design (Flat design) Future Trends
Live Tiles interface is a typical example of the flat design
Having said that, does not mean flat design does not use any effects yet, flat design still contains some effect but the amount is less than other design styles.
Why flat back design to the throne?

1. Simplicity

As mentioned above, the most striking feature of the design is the simplicity that plane. This is the most outstanding features of this design. The simplicity of the flat panel design enabling designers to more easily create their own products. Instead of focusing on the effects and eye-catching image for your product design, they just need to pay attention to these factors less complicated.
One of them is the color factor can be considered mainstream style of this design. Try to get Windows Phone as an example: The window with colorful designs simple and easy than with the icons of iOS or Android. Instead of having to design an image for its products, the designers simply pick a tone and then apply a certain effect. In addition, combining the colors together in a design is also said to be simpler than is required to create the image relevance and similarity.
41 flat design flat design (Flat design) Future Trends

2. Applies strong and highly effective

Use as background color, flat design also bring positive for everyone because they will minimize distractions before a series of 3D imagery, as often seen. The interface design is often placed flat on the effectiveness beautiful. The button design flat design does not need too many and too complex.Just everything is clarified, the well will be effective for users.
51 flat design flat design (Flat design) Future Trends
Moreover, the use of eye-catching colors can also contribute to attention and create more powerful effects for users. Especially when the designers know how to work effectively with concrete grams strong opposition as black and white. That is probably what is wanted Johny Ive driven for 7 upcoming iOS in next time.
In addition to color, flat design also has the ability to impress users through other factors such as Typography .  There are many definitions of typography in design, however, easy to imagine readers let us temporarily Read Typography is the arrangement of stylized fonts in a particular order or rule to get people to pay attention.
Typography is one of the reasons to bring efficiency to design flat with this design because users will get more information instead of just looking at the beautiful icons and alone. Anyone who has used interface of Windows Phone or Windows 8 can easily see this. Being able to see the direct application of information without having to open the actual application that is novel experiences and handy.

3. Overcoming weaknesses Skeuomorphic design (style simulated material)

Skeuomorphic design style is so realistic simulation possible using a reference image to the actual objects and apply effects to create depth. Let's look at the examples below to see it more clearly.
61 flat design flat design (Flat design) Future Trends
Some examples of design Skeumorphic
However, Skeuomorphic has exposed some shortcomings as follows:
Interface is sometimes difficult to observe:  As the clock icon that Apple uses in the picture above. Obviously when viewing pictures like this watch we will take more time compared to the number of clock hours and minutes only.
How to simulate it may confuse developers:  Finding and creating an image of Skeuomorphic cause difficulties for designers.
Requires more screen space of mobile devices for unnecessary decoration:  This is a practical design which placed heavy Skeuomorphic images with eye-catching decorations. For example, the design of the interface image above schedule, users often want to know today is how much those things. It is not necessary to show both a calendar month as a real.
Limiting creativity:  Design Skeuomorphic capital model is taken out of the actual material. So the designer does not need much imagination to do the things that I think the only way to make it possible.And high probability that there will be many  "big ideas meet"  with a little bit different.
Being more hardware resources :  Applying multiple effects in a well designed Skeuomorphic cons of this style because that would make the mobile device the weak capital strength hardware, small amount of time Battery power will have to be put out on display Skeuomorphic.
The above disadvantages can be overcome with completely flat with the design described above.

Structures

Style " false material "  (Skeuomorphic) age was 33 years with a mission to create a material link between the old, familiar, and something completely new and hardly used as a computer to help users grasp start easier with technology.
However, today's times are different, the extensive development of the mobile device with the ability to quickly grasp the technological devices that users are gradually retreating Skeuomorphic. And flat design will have the task of replacing obsolete Skeuomorphic as an indispensable principle of evolution.