Ir para o conteúdo

FGR*

Tela cheia

FGR* Blog

3 de Abril de 2011, 21:00 , por Desconhecido - | No one following this article yet.

Android Studio Development Essentials: Android 5 Edition (English Edition)

28 de Abril de 2016, 20:25, por FGR* Blog



Compre agora!


The objective of this book is to teach the skills necessary to develop Android applications using Android Studio and the Android 5 Software Development Kit (SDK).


Note: This is the Android 5 edition of the book. For coverage of the Android 6 SDK and the latest version of Android Studio we recommend Android Studio Development Essentials: Android 6 Edition.


Beginning with the basics, this book provides an outline of the steps necessary to set up an Android Studio based development and testing environment.


An overview of Android Studio is included covering areas such as tool windows, the code editor and the user interface Designer tool. An introduction to the architecture of Android is followed by an in-depth look at the design of Android applications and user interfaces using Android Studio.


More advanced topics such as database management, content providers and intents are also covered, as are touch screen handling, gesture recognition, camera access and the playback and recording of both video and audio. This edition of the book also covers features introduced with Android 4.4 including printing, transitions and cloud-based file storage.


In addition to covering general Android development techniques, the book also includes Google Play specific topics such as implementing maps using the Google Maps Android API, in-app billing and submitting apps to the Google Play Developer Console.


Chapters also cover advanced features of Android Studio such as Gradle build configuration and the implementation of build variants to target multiple Android device types from a single project code base.


Assuming you already have some Java programming experience, are ready to download Android Studio and the Android SDK, have access to a Windows, Mac or Linux system and ideas for some apps to develop, you are ready to get started.



Oracle quer simplificar o marketing orientado por dados

28 de Abril de 2016, 18:41, por FGR* Blog


A Oracle quer simplificar marketing orientado por dados, e pretende fazer isso por meio da computação em nuvem. A fabricante reforçou ferramentas direcionadas aos CMOs e seus times.

Sua tecnologia de Marketing Cloud ganhou recursos que usam dados diferenciados sobre públicos para alocação de investimentos em mídia paga, orquestrar interações em vários canais e otimizar a experiência dos clientes.

Segundo a companhia, agora é possível aprimorar a experiência dos clientes por meio de uma nova integração direta entre os aplicativos Maxymiser e Responsys. Essa conexão permite orquestrar mensagens entregues pelas ferramentas em um site em conjunto com mensagens de e-mail, SMS, MMS, mobile e digital signage.

Segundo a Oracle, novos elementos analíticos adicionados a suas ferramentas reduzem a complexidade do marketing orientado por dados, oferecendo uma melhor perspectiva sobre como o engajamento dos clientes pode gerar receita.

Para melhorar ainda mais a usabilidade, um recurso gráfico de segmentação de públicos permite que profissionais de marketing de consumo se beneficiem da lógica de segmentação que é mais fácil de visualizar, testar e reutilizar.


Fonte

10 Most Anticipated Games of 2016 Yet to Come

28 de Abril de 2016, 18:02, por FGR* Blog


With 2016 approaching the halfway mark, here are 10 game titles to keep your eye on.


Source link



A “fuga” dos profissionais de TI

28 de Abril de 2016, 17:28, por FGR* Blog

Alguns fatores, toda atenção para o último item:

  • As ridículas faculdades sugadoras de dinheiro e com péssimos professores;
  • O fim das bolsas de estudos;
  • Redução absurda da remuneração;
  • As empresas brasileiras querem os idiotas obedientes, não os profissionais com atitude.

Canadá, Estados Unidos, Alemanha, Inglaterra, Islândia (isso mesmo…), são alguns destinos dos excelentes profissionais que não suportaram e foram embora.

A solução? Não cair na conversa de que você, profissional de TI qualificado e competente, guerreiro, será um dia valorizado na terra tupiniquim. Condições para viajar, um passaporte, coragem, estratégia e atitude é o que precisamos, essa é a solução final.



Mastering Bitcoin

28 de Abril de 2016, 16:34, por FGR* Blog

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you’re building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or collaboratively building new financial innovations that will transform our understanding of currency and credit, this book will help you engineer money. You’re about to unlock the API to a new economy. This book is your key.



Open365

28 de Abril de 2016, 16:24, por FGR* Blog

Open365 é uma suíte de produtividade online alternativa às plataformas Office 365 e Google Docs, entre outras do mesmo segmento. A ideia é a de possibilitar que os usuários possam dispôr de um ambiente de produtividade pessoal na nuvem, gratuito e de código aberto para poder gerenciar e sincronizar arquivos entre dispositivos através da nuvem, assim como, a visualização e edição de documentos graças à integração de LibreOffice Online.

Atualmente o Open365 está em fase beta pública, disponibilizando 20 GB de espaço, com a possibilidade de criação de uma conta de usuário (nome_do_usuário@open365.io).

Open365



Senado protocola criação de CPI para investigar Anatel

28 de Abril de 2016, 14:40, por FGR* Blog


Com apouo de 45 senadores, o senador Hélio José (PMDB-DF) protocolou no Senado o pedido de criação de uma comissão parlamentar de inquérito para investigar a atuação da Agência Nacional de Telecomunicações (Anatel).

Um dos eixos de trabalho vai ser apurar a possível limitação dos contratos de banda larga, conforme está em discussão no país. O assunto ganhou destaque, nas últimas semanas, após a notícia de que as operadoras poderiam oferecer planos de internet fixa, usada nas residências e empresas, com limite de download. Significa que o serviço pode ser suspenso quando o usuário atingir uma determinada quantidade de dados baixados. Até então, a Anatel havia determinado apenas que as operadoras informassem os usuários sobre o esgotamento dos pacotes.

O presidente da Anatel, João Rezende chegou a afirmar, no último dia 18, que a era da internet ilimitada havia morrido. Por causa da pressão da sociedade, a agência recuou uns dias depois e proibiu as operadoras, por tempo indeterminado, de limitar o acesso à internet de banda larga fixa. A proibição vai valer até que a agência julgue a questão, o que não tem data para ocorrer.

— Não não poderíamos ficar quietos nem calados perante a tamanha irresponsabilidade. A medida forçaria milhões de usuários a aderir a franquias mais caras em um momento de grave desemprego e arrocho salarial —, protestou Hélio José.

Outro assunto a ser apurado pela CPI da Anatel no Senado, segundo o senador, será a precariedade no funcionamento da internet móvel. Hoje, o serviço de internet fixa é cobrado de acordo com a velocidade de navegação contratada, sem limite de uso. O sistema proposto pelas operadoras seria semelhante ao sistema de internet usado para celulares.

Na Câmara dos Deputados, depois de entrar com representação na Agência Nacional de Telecomunicações (Anatel) e no Conselho Administrativo de Defesa Econômica (Cade) pedindo a apuração de infrações das operadoras de telefonia, a Frente Parlamentar pela Internet Livre e sem Limites se reuniu esta semana com o presidente da Ordem dos Advogados do Brasil (OAB), Claudio Lamachia, para discutir o combate à proposta que limita a franquia de dados da internet fixa e a consequente redução da velocidade de navegação na rede.

A intenção do presidente da frente, deputado JHC (PSB-AL), é transformar a frente em mista, o que, na sua opinião, vai fortalecer o pleito do Congresso. Por isso já está conversando com alguns senadores. JHC disse ainda que vai promover uma comissão geral no Plenário da Câmara para discutir o assunto com especialistas.

Na próxima terça-feira (3), a CCT vai debater o que pretendem as operadoras de celular em relação à banda larga fixa. A comissão aprovou requerimento do senador Fernando Bezerra Coelho (PSB-PE) para que sejam convidados o ministro das Comunicações, André Figueiredo, e o Diretor-Presidente da Agência Nacional de Telecomunicações (Anatel), João Rezende, à audiência. Os senadores querem esclarecimentos sobre decisão da Anatel que determinou que as empresas de banda larga fixa de internet se abstenham de reduzir velocidade, suspender serviços ou cobrar tráfego excedente após esgotamento da franquia.

Para a mesma reunião, que será feita em conjunto com a Comissão de Meio Ambiente, Defesa do Consumidor e Fiscalização e Controle (CMA), serão convidados também o coordenador do subgrupo da Telefonia da Comissão do Direito do Consumidor da OAB-DF.

Também foi aprovado requerimento de Lasier Martins para a realização de audiência pública com o objetivo de discutir o limite ao uso de dados de banda larga do tipo ADSL, que as operadoras pretendem implementar em 2017. Para a reunião, serão convidados o coordenador do subgrupo da Telefonia da Comissão do Direito do Consumidor da OAB/DF, Kleber Gomes e o pesquisador do Instituto Brasileiro de Defesa do Consumidor (Idec), Rafael Zanatta.

*Com as agências Câmara e Senado.


Fonte

Deus Ex: Mankind Divided Story Details And Collector’s Edition Unveiled In 101 Trailer

28 de Abril de 2016, 14:01, por FGR* Blog

Deus Ex: Mankind Divided takes place in a world of strife between augmented individuals and those without cybernetic enhancements. Following the events at the end of Human Revolution in which augments went berserk, the golden age of human advancement has turned into a dark period of strife.

Square Enix is laying the foundation for the upcoming game with a “101” trailer that explains more of the story. It also shows off some of the new tools available to Adam Jensen for taking aggressive and stealthy approaches.

Additionally, Square Enix has revealed Day One and Collector’s Editions. The latter includes all of the Day One content.

Day One Edition ($59.99)

  • An additional in-game mission
  • Covert agent pack (in-game items, cosmetics, upgrades)
  • Digital soundtrack sampler
  • Digital art book, novella, comic

Collector’s Edition ($139.99)

  • Special packaging
  • 9” Adam Jensen figurine
  • 48-page art book
  • Steelbook case

Click to enlarge.

There’s also a digital standard edition ($59.99) that includes the day one content and a digital deluxe edition ($89.99) that adds the season pass to the base version. Deus Ex: Mankind Divided will be out on August 23 for PlayStation 4, Xbox One, and PC. For more, check out our coverage hub from the May 2015 issue.


Source link

Modelagem Chuva-Vazao Utilizando Redes Neurais Artificiais

28 de Abril de 2016, 12:23, por FGR* Blog



Compre agora!


Este livro apresenta uma metodologia para modelagem da relacao de transformacao chuva-vazao de uma bacia hidrografica utilizando uma abordagem hibrida com redes neurais artificiais e algoritmos geneticos. Os resultados dessa modelagem sao comparados a um modelo autorregressivo de media movel e demonstram a capacidade das redes neurais artificias juntamente com algoritmos geneticos de explicar um fenomeno nao-linear como o processo de transformacao chuva-vazao.”



The Critical Hole at the Heart of Our Cell Phone Networks

28 de Abril de 2016, 12:13, por FGR* Blog

In February 2014, the US ambassador to Ukraine suffered an embarrassing leak. A secret conversation between him and US Assistant Secretary of State Victoria Nuland got posted to YouTube, in which Nuland spoke disparagingly about the European Union.

The conversation occurred over unencrypted phones, and US officials told reporters they suspected the call was intercepted in Ukraine, but didn’t say how. Some people believe it occurred using vulnerabilities in a mobile data network known as SS7, which is part of the backbone infrastructure that telecoms around the world use to communicate between themselves about how to route calls and text messages.

A little-noticed report released by the Ukrainian government a few months after the leak gives credence to this theory. Although the report didn’t mention the ambassador, it revealed that for three days in April that year, location data for about a dozen unidentified mobile phone customers in Ukraine got mysteriously sent to a Russian telecom using SS7 vulnerabilities. Text messages and phone calls of some of those customers also got diverted to Russia, where someone could have eavesdropped on the conversations and recorded them.

The telecom industry has known for years that SS7 is vulnerable to spying, but did little about it because many assumed the risks were theoretical. This changed in the wake of the Ukrainian incidents, says Cathal McDaid, head of the threat intelligence unit for AdaptiveMobile, a mobile telecom security firm. His company and others devised ways to detect SS7 attacks, and since then they have discovered suspicious activity in the networks of multiple telecom customers, suggesting that SS7 attacks are very much real—and ongoing. AdaptiveMobile released a report in February highlighting some of those attacks.

SS7 is just now getting more public attention because of a 60 Minutes piece last week, which showed two German researchers using SS7 to spy on US Congressman Ted Lieu, with his permission. Lieu has called for a congressional hearing to look into SS7 vulnerabilities, and the Federal Communications Commission has plans to examine it, too.

So what is SS7 and why is it so vulnerable?

Graph showing how  one system in Western Europe used SS7 to track a single subscriber over two minutes by sending location requests to the subscriber's carrier. A minute later, a cascade of tracking requests for the same subscriber came in over SS7 from multiple systems in different countries.
Graph showing how one system in Western Europe used SS7 to track a single subscriber over two minutes by sending location requests to the subscriber’s carrier. A minute later, a cascade of tracking requests for the same subscriber came in over SS7 from multiple systems in different countries.AdaptiveMobile

SS7, a Primer

SS7, also known as Signaling System No. 7, refers to a data network—and the series of technical protocols or rules that govern how data gets exchanged over it. It was designed in the 1970s to track and connect landline calls across different carrier networks, but is now commonly used to calculate cellular billing and send text messages, in addition to routing mobile and landline calls between carriers and regional switching centers. SS7 is part of the telecommunications backbone but is not the network your voice calls go through; it’s a separate administrative network with a different function. Think of it like a passenger train system—SS7 is the maintenance tunnels workers use rather than the main tunnels through which passenger trains travel.

SS7 is often used now to set up roaming so that when you travel, say, from New York to Mumbai, you can make and receive calls and texts outside your carrier’s range. An outside carrier will send a request to your carrier via SS7 to obtain your phone’s unique ID to track your device, and also request that your communications be redirected to its network so that it can deliver calls and text messages to you. It’s a way of making sure calls and messages are delivered between networks.

The Problem

The problem is that SS7 is based on trust. Any request a telecom receives is considered legitimate. Therefore anyone with access to a server or gateway on the SS7 network can send a location or redirect request to your telecom for purposes of roaming, and the telecom will likely comply, even if the roaming request comes from St. Petersburg or Mumbai and you and your phone are in New York. This makes it possible for a remote attacker to spy on lawmakers, corporate executives, military personnel, activists and others. It should be noted that in grabbing your texts and calls in this way, an attacker will also be able to grab your two-factor authentication log-in codes that Gmail and other services send via text so you can access your accounts. An attacker who already knows the username and password for an account can intercept these codes before you receive them in order to log in to your accounts.

Who has access to SS7? Hundreds of telecoms around the world use it. Government intelligence agencies can also gain access to the network, either with the permission of telecoms or not. Commercial companies also sell SS7 phone tracking services to governments and other customers. Criminal groups able to purchase access from corrupt telecom workers can also use SS7, as can hackers who hijack unsecured SS7 equipment.

It wasn’t until December 2014 that telecoms began to implement ways to thwart SS7 attacks. That’s when Karsten Nohl of the Berlin-based Security Research Labs and an independent researcher named Tobias Engel gave presentations about SS7 at the Chaos Communication Congress in Germany, months after the Ukrainian incidents were discovered. Engel had demonstrated an SS7 method for tracking phones in 2008, but that method wasn’t as refined as the ones he and Nohl described in 2014. The latter prompted regulators in Northern Europe to demand that carriers there implement measures to mitigate SS7 attacks by the end of 2015.

“[T]he bulk of SS7 attacks can be prevented with technologies that are readily available,” Nohl told WIRED. “There’s a few cases that require more involved defenses that one could argue could take two years to implement… but at least the basic defenses [are] in most networks in Northern Europe and in many other networks around the world.”

Those fixes have apparently not been implemented by two vulnerable carriers in the US: T-Mobile and AT&T. Nohl and a colleague showed on 60 Minutes that both were still open to SS7 attacks. Verizon and Sprint use different protocols to exchange most of their data, so in theory are less vulnerable. But McDaid notes that all mobile networks will eventually migrate to a different signaling system called Diameter. That system “uses a lot of the same concepts and design as the previous SS7 network,” he notes, including the assumptions of trust that plague SS7.

How Exactly Can SS7 Be Hacked to Track You?

To track you, an attacker could send what’s called an Anytime Interrogation request to your carrier to get the unique ID of your phone and identify which mobile switching center (MSC) your phone uses—usually one MSC covers an entire city. Carriers use this information to determine your location to route your calls and messages through the cell tower closest to you. By sending repeated Anytime Interrogation requests to get this and your GPS coordinates, an attacker can track your phone, and you, to the street block where you are standing, using Google maps.

Carriers could thwart this by blocking Anytime Interrogation requests coming from outside their boundaries, Nohl says. But there are other ways to get location information using different queries via SS7, and these are not as easily blocked, he says.

This isn’t hypothetical. We know this kind of tracking exists in the wild. AdaptiveMobile’s report describes one SS7 tracking operation in which the attacker sent requests for location information from a number of systems. Requests to track the same phone customers came from SS7 systems around the world instead of from a single system—presumably to avoid suspicion, since many requests from one system would be more noticeable. These systems sent several hundred queries a day to track some phone customers, but only queried once or twice a day for others the attackers were trying to track.

“Obviously the more you use [a system to send requests], the more possibility that you give [yourself] away. But these are low-volume, high-value type of targets,” McDaid says. “As long as you keep these in low-volume, chances are these aren’t actually going to be noticed.”

Another operation in a European country that McDaid won’t identify tracked phones in the Middle East and Europe from systems installed at each of the European country’s four telecoms, suggesting the telecoms were complicit in the tracking. “That’s our assumption … if it is an espionage system or state system, they actually may not have much choice in the matter.”

Interception

Nohl describes three techniques for intercepting calls and texts using SS7. One he demonstrated last year for 60 Minutes Australia when he sent a request from Germany to a carrier in Australia requesting a politician’s voicemail settings be reconfigured to forward calls to Nohl. Networks could easily prevent this by only complying if the customer’s phone is in the region where the request originates, but few do this check, Nohl says.

Another method abuses a feature for rewriting numbers you call. If you’re out of the country, for example, and dial a number from your contacts list, the rewrite function will recognize that it’s an international call and automatically add the country code.

“[A]dding in the country code for instance is done by taking the phone number that is the ‘wrong’ number and sending back the ‘right’ number [with the added country code],” Nohl says. Convenient, right? But an attacker can tell the system to replace any number with his own. When calls arrive, he forwards them to the correct number, setting himself up a in the middle of the conversation to listen and record.

A third way takes advantage of the fact that mobile phones are usually in sleep mode until they receive a call or text and won’t contact a network until then. During this time, an attacker can tell your carrier that you’re in Germany and any communication intended for you should be redirected there. Eventually, your phone in the US will wake up and tell your carrier where it is. But the attacker can send another message contradicting this.

“As long as we do this every five minutes, there is only a very, very short time you will exclusively receive your calls or texts, and then all other times we will receive them,” Nohl says. You would later notice the roaming charges on your bill, but by then the damage to your privacy would be done.

“It’s not the most elegant [interception method] because … you will have to pay for these roaming calls. But this one works really well,” he says.

What Can Be Done?

That kind of attack should be easy to thwart with an algorithm that knows it’s illogical for a subscriber to move back and forth between the US and Germany every five minutes. “But, again, nobody has implemented these smart checks,” Nohl says.

There’s not much you can personally do. You could try to protect your communications by using an encrypted service like Signal, WhatsApp or Skype, but McDaid says an attacker could send a request to your carrier to disable data use for your phone, preventing you from using these services.

“[S]o all you’re left with then is text messages and phone calls if you’re in an area with no Wi-Fi,” he says, leaving you vulnerable to an SS7 interception attack.

McDaid says that telecoms are working to thwart SS7 attacks, but most have addressed only the easiest methods so far.

“Now they’re in the stage of having to implement much more sophisticated types of firewalls and [algorithms] to try to detect and block the more sophisticated stuff,” he says. “They’re harder for an attacker to do, but also harder for defense to stop…. Believe me, it is being worked on.”

Go Back to Top. Skip To: Start of Article.


Source link

FGR*

0 amigos

Nenhum(a)

0 comunidades

Nenhum(a)