Recent Updates Toggle Comment Threads | Keyboard Shortcuts

  • mkds67 5:23 pm on February 15, 2015 Permalink | Reply  

    FreeDom ft. Maria: Love The Way 

    FreeDom Hoodie Style Look 4

    Following up on the series of previous singles with “Love The Way” we get to hear a lifted, more ‘Surface to Air’ combination of lyrical excellence that is rare in the current existence of ‘Rap’. Here, both Freedom (Dom) and Maria bring together melody, rap and a trail-blazing inverted chorus; much is the fact that all three come together in a fluid, continuous and just right way that similarly contributes to previous works – but with a difference.

    From the outset we get the chorus integrating with a very likeable kicking bassline, while on course to introduce the initial lyrics, Freedom attacks the mic with precision and flawless connection to the build. Together what we hear is a purposely placed misdirection, or mash-up, if you like, that has you believe that this is the work of a more relaxed and approachable collaboration between the two people: Maria giving an incredible input to the track, while Dom’s joint performance fuses together with finely adapted precision. In fact, by the first line of lyrics alone, you find that the song has been selectively written with one topic – one meaning – in mind: Emotions of a heightened degree in which separate that of two amicable’s (Not Freedom and Maria) to the point where they dissolve into a void of tough love and mistrust. And, it is with this track that both musicians have pulled it off perfectly.

    From the lyrics side of the track, we become witness to Freedom’s’ deepened and intricate flow and consistent stabilizing of keeping his level of information steady, but at the same time understandable to the point where upon carrying out the last line of verse the message is heard and very much understood to be that of a personally embraced experience. As we have already seen from “Pain, Anger, Suppression”, “Haters” and “Jack The Lad”, it is the collaboration with Maria which has, especially for ‘The Dark Tower’ enabled this obvious conclusion that Freedom has acquired his very own unique style in all of his works and projects throughout his four year presence.

    For Freedom himself the emotional aspects of personal, political and overall Interstate conflict has given rise to place his thoughts and reasoning into lyrics which raise an eye-brow, trigger frowns and, in some cases create a negative cloud covering by those who feel that the songs this 26-year-old sings affect them in so many ways by measurable relation, self-experience and, of course, by the most obvious reason – provocation by a breaking Status Quo. But certainly, the direction that Freedom is taking with his musical offerings has been both highlighted and applauded in so many ways, that it is clear enough that 2015 can be a time for this new, fresh Rapper to be welcomed as a ‘Best New Comer’ to the music scene.

    Listen To “Love The Way” on SoundCloud <HERE>

    Read “Freedom Review

    Review by Marcus De Storm

    Edited by Wendy St. Knight

    © 1999/2020 The Dark Tower/Freedom. All rights reserved.

  • mkds67 6:50 pm on January 1, 2014 Permalink | Reply
    Tags: Access All Areas, App Market Places, Apple App Store, , Application Flaws, Application Hijackings, Apps For Devices, At Risk, BlackBerry App World, Blowing The Whistle, Bluetooth Hack, Bluetooth Jacker, Candy Crush Saga, Free Apps Danger, Free Apps Download, Global World News, Google Play, Insecure Applications, Invasion Of Privacy, iPads Are Open, iPhone Security Breach, John Collins, Know Your Phone, LG Mobiles, Mobi-Apps, Mobile application development, Mobile Application Programs, Mobile Application Rip-Offs, Mobile Applications, Mobile Devices, Mobile Hackers, , Mobile Phone Security, , Mobile Rip-Offs, No App Regulations, Obama Security Threat, Privacy Invasions, Security Lacking Mobiles, Seeing Is Believing, T&C’s Worthless, Technology Device Flaws, Technology Today, The MKDS Network, , , Wi-Fi Hacker,   

    Because 99% Of Mobile Phone Users Don’t Know… 

    Mobile Applications

    “How safe is your Mobile Phone?”

    Last year The Red Hive and The [MKDS] Network made enquiries on the rising popularity of the ‘Mobi-Apps’ aka ‘Mobile Applications’, to which they received many varied and long winded, if not quite vague details which told them that the Mobile Retailers had no idea – at the very least no clue – as to ‘What’ or ‘How’ many of the various available ‘Mobi-Apps’ were or operated on a physical scale. So, it was with the help of several other ‘Network Associates’ who delved into the dark and murky world of the ‘Mobi-App’ by way of researching the whole infrastructure of the small packets of data that more than (then) 1 billion Mobile Device Users downloaded for Business, Fun and Socialising – what they discovered and what they found would turn around the whole ‘Safe Feeling’ from everyone at The Red Hive as regards to ‘Mobile Application Programs’.

    John Collins, a Freelance Reporter assigned through The Network’s GWN (Global World News) and Tomorrows News Today (T.N.T) took on the story and uncovered Information, Facts and Evidence that would place a dark cloud over the ‘Mobile App Generation’, but most of all, lift the lid off of one of the world’s largest ‘Personal Invasions’, ‘Breaches in Confidence’ and ‘Theft through Possession’. In the article you are about to read, many may be swayed to deploy their disagreement or anger toward The Network’s statement, while others will require more ‘Reliable Evidence’. For the record, Mr Collins and all other ‘Associates’ connected to the above mentioned Groups and Companies did not at any such time acquire any information outside the boundaries of the Internetwork. All the details that you read herein are free to view and look up across the Internet.

    I Love My Mobile Phone…

    Each and every morning I reach out and take my Smart Phone in my hand and turn off the preset alarm that has been ceremoniously activated the night before I went to sleep, just before I jump out of bed and check out the latest news over a hot cup of coffee. This is done through my Smartphone too, as the fastest way to get your Top News Stories these days is by way of Mobile Technology and the ‘Mobi-Apps’ that pop up in their classy and glitzy appearances on multiple platforms of various eStores, such as ‘Play Store’, ‘Apple Online Stores’ and ‘Amazon Market Place’. After the News has been sifted and absorbed, my next call of the day is the ‘Work Schedule’, where I check who is on my ‘Meetings Schedule’, who I have to phone, conference and meet. Everything is organised how I have chosen to set it out on a ‘Day-To-Day’ basis before the crack of Dawn every morning.

    With an estimated outnumbering of 5-1 on Mobile Phones to every human being, not including the Tablets, Laptops or Desktops, the overall flood of ‘Communications Devices’ has pretty much taken the 21st Century by ‘Invasion’. Even the thought of today’s availability of ‘Handsets’ would have been shrugged off forty to fifty years ago, even though the Scientists and Crazies back then would argue that the age of technology would someday in the future overwhelm the Human Race. From the simplest handset during the 1980’s Yuppie Uprise (The Brick), to the more slim line Motorola’s, the more popular that the Mobile Phone became to the General Public, the more the General Public wanted to own a piece of history in the making – and make history it did.

    Through resources and assistance in looking into the ‘Mobile Phone Applications’, it was found that the Industry in which had the billions of daily User’s trust in them circumvented flaws in the Trust. Manufacturer’s and Makers of both Mobile Phones and Mobile Applications allowed many of their Handsets and the Applications, Routines and Securities of both become open and vulnerable. Of course, not everyone who owns a Mobile Phone, especially a Smartphone knows this because they are told that ‘Trust from each and every Customer is the stepping stones in which to continue the unbreakable relationship between Consumer and Technology.’

    The day that we started to research the ‘Dark App Project’, there was much optimism and doubt on whether we would find anything short of ‘App Makers’ making heaps of money through some of the amazing ‘Applications’ that are on offer today. Unfortunately, however, what we were to discover in ‘Off-Line’ circumstances painted a much sinister picture and broke our illusions very quickly.

    The following information is from various sources, including Wikipedia, Google, News International and other Open Domain Conduits. This information is available to the Global Community at any time and for Free, it does not, however contain any information or facts that have not already been put out in the press or news groups around the world.

    What Is A ‘Mobi-App’?

    ‘Mobi-App’ is the abbreviation of Mobile Application the Application Software which is ran on Smartphones, Tablet Computers and other Mobile Devices. Most noted for attainability through ‘Application Distribution Platforms’, such as Apple App Store, Google Play, Windows Phone Store, BlackBerry App World and now Amazon eStore.

    The mainstream function and execution of a ‘Mobile Application’ or ‘Mobi-App’, is that it is chosen from the ‘App Store’ through a search before being clicked and downloaded onto the Customers ‘Target Device’.

    Information obtained using Wikipedia states: “Mobile apps were originally offered for general productivity and information retrieval, including email, calendar, contacts, and stock market and weather information. However, public demand and the availability of developer tools drove rapid expansion into other categories, such as mobile games, factory automation, GPS and location-based services, banking, order-tracking, and ticket purchases. The explosion in number and variety of apps made discovery a challenge, which in turn led to the creation of a wide range of review, recommendation, and curation sources, including blogs, magazines, and dedicated online app-discovery services.”

    The ‘Mobi-App’ began to seep onto the Internet and onto Mobile Devices in 2007-2008, with the popularity being from the small ‘Program-Like’ packets of data that would be of a compressed state so as to be fully transceivable to the User from the Vendor. Becoming very popular in 2010 the ‘Mobi-App’ was listed as “Word of the Year” by the “American Dialect Society” in 2009, while Technology Columnist David Pogue said that newer Smartphones could be nicknamed ‘App Phones’ to distinguish them from earlier less sophisticated Smartphones.

    Bringing the information up to date as best we can, it was the popularity of ‘Mobi-Apps’ that had continued to rise, as their usage had become increasingly prevalent across Mobile Phone Users. In May 2012 ‘comScore reported that during the previous quarter, more Mobile subscribers used ‘Apps’ than those who browsed the web on their devices: 51.1% vs. 49.8% respectively. Researchers found that usage of Mobile Applications strongly correlates with user context and depends on user’s location and the time of the day.

    Market Research from Gartner suggests that 102 billion ‘Mobi-Apps’ will be downloaded in 2013 (91% of them will be free) but they will still generate $26 billion, up 44.4% on 2012’s $18 billion. An analyst report estimates that the ‘App’ economy creates revenues of more than 10 billion Euros per year within the European Union, while over 529,000 jobs have been created in EU28 States due to the growth of the ‘App Market’.

    Developing apps for mobile devices requires considering the constrains of these devices. Mobile devices run on battery and have less powerful processors than personal computers. Developers also have to consider a lengthy array of screen sizes, hardware specifications and configurations because of intense competition in mobile software and changes within each of the platforms.

    Mobile application development requires use of specialized integrated development environments. Mobile apps are first tested within the development environment using emulators and later subjected to field testing. Emulators provide an inexpensive way to test applications on mobile phones to which developers may not have physical access. – Wikipedia.

    What Is MAM?

    Mobile application management (MAM) describes software and services responsible for provisioning and controlling access to internally developed and commercially available mobile apps used in business settings, which has become necessary with the onset of Bring your own device (BYOD) phenomenon. When an employee brings a personal device into an enterprise setting, mobile application management enables the corporate IT staff to transfer required applications, control access to business data, and remove locally cached business data from the device if it is lost, or when its owner no longer works with the company.

    Who’s-Who In The ‘Mobi-App’ Players?

    Amazon Appstore

    Main article: Amazon Appstore

    Amazon Appstore is an alternate application store for the Android operating system. It was opened in March 2011, with 3800 applications.

    App Store

    Main article: App Store (iOS)

    Apple’s App Store for iOS was the first app distribution service, which set the standard for app distribution services and continues to do so, opened on July 10, 2008, and as of January 2011, reported over 10 billion downloads. As of June 6, 2011, there are 425,000 third-party apps available, which are downloaded by 200 million iOS users. During Apple’s 2012 Worldwide Developers Conference in 20, Apple CEO Tim Cook announced that the App Store has 650,000 available apps to download as well as “an astounding 30 billion apps” downloaded from the app store until that date. From an alternative perspective, figures seen in July 2013 by the BBC from tracking service Adeven indicate over two-thirds of apps in the store are “zombies”, barely ever installed by consumers.

    BlackBerry World

    Main article: BlackBerry World

    BlackBerry World is the application store for BlackBerry 10 and BlackBerry OS devices. It opened in April 2009 as BlackBerry App World, and as of February 2011, was claiming the largest revenue per app: $9,166.67 compared to $6,480.00 at the Apple App Store and $1,200 in the Android market. In July 2011, it was reporting 3 million downloads per day and one billion total downloads. In May 2013, BlackBerry World reached over 120,000 apps. BlackBerry 10 users can also side load and run Android apps.

    Google Play

    Main article: Google Play

    Google Play (formerly known as the Android Market) is an international online software store developed by Google for Android devices. It opened in October 2008. In April 2013, there were approximately 850,000 apps available for Android, and the estimated number of applications downloaded from Google Play was 40 billion. Android Apps can also be sideload onto BlackBerry 10 devices.

    Nokia Store

    Main article: Ovi (Nokia)

    An app store for Nokia phones was launched internationally in May 2009. As of April 2011 there were 50,000 apps, and as of August 2011, Nokia was reporting 9 million downloads per day. In February 2011, Nokia reported that it would start using Windows Phone as its primary operating system. In May 2011, Nokia announced plans to rebrand its Ovi product line under the Nokia brand and Ovi Store was renamed Nokia Store in October 2011. Nokia Store remains as the distribution platform for its previous lines of mobile operating systems but will no longer allow developers to publish new apps or app updates for its legacy Symbian and MeeGo operating systems from January 2014.

    Windows Phone Store

    Main article: Windows Phone Store

    Windows Phone Store was introduced by Microsoft for its Windows Phone platform, which was launched in October 2010. As of October 2012, it has over 120,000 apps available.

    Windows Store

    Main article: Windows Store

    Windows Store was introduced by Microsoft for its Windows 8 and Windows RT platforms. While it can also carry listings for traditional desktop programs certified for compatibility with Windows 8, it is primarily used to distribute “Windows Store apps”—which are primarily built for use on tablets and other touch-based devices (but can still be used with a keyboard and mouse, and on desktop computers and laptops)

    Samsung Apps Store

    Main article: Samsung Apps

    An app store for Samsung mobile phones was founded in September 2009. As of October 2011 Samsung Apps reached 10 million downloads. Currently the store is available in 125 countries and it offers apps for Windows Mobile, Android and Bada platforms.

    What Is ACAP?

    The Application Configuration Access Protocol (ACAP) is a protocol for storing and synchronizing general configuration and preference data. It was originally developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in synch across all clients.

    Two International ACAP Conferences were held, one in Pittsburgh, PA, USA, in 1997, and the other at Qualcomm Incorporated, San Diego, CA, USA, in February, 1998.

    ACAP grew to encompass several other areas, including bookmark management for web browsers—it’s effectively a roaming protocol for Internet applications. ACAP is in use by at least four clients and three servers to varying degrees, but it has never achieved the popularity of Lightweight Directory Access Protocol or SyncML. It is a deceptively simple protocol, but the combination of three key features, hierarchical data, fine-grained access control, and “contexts” or saved searches with notification, has caused serious problems for server implementer’s.

    Unlike LDAP, ACAP was designed for frequent writes, disconnected mode access (meaning clients can go offline and then resynchronize later), and so on. It also handles data inheritance, sometimes known as stacking, which provides easy creation of defaults.

    The IETF ACAP Working Group ceased activity in April 2004, having released two RFCs, RFC 2244 (“ACAP — Application Configuration Access Protocol”) and RFC 2245 (“Anonymous SASL Mechanism”).


    Network Working Group – C. Newman

    Request for Comments: 2244 – Innosoft

    Category: Standards Track – J. G. Myers


    November 1997

    ACAP — Application Configuration Access Protocol

    Status of this Memo

    This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements.  Please refer to the current edition of the “Internet

    Official Protocol Standards” (STD 1) for the standardization state and status of this protocol.  Distribution of this memo is unlimited.

    Copyright Notice

    Copyright (C) The Internet Society 1997.  All Rights Reserved.


    The Application Configuration Access Protocol (ACAP) is designed to support remote storage and access of program option, configuration and preference information.  The data store model is designed to allow a client relatively simple access to interesting data, to allow new information to be easily added without server re-configuration and to promote the use of both standardized data and custom or proprietary data.  Key features include “inheritance” which can be used to manage default values for configuration settings and access control lists which allow interesting personal information to be shared and group information to be restricted.

    What ‘Mobi-Apps’ Can Access…

    Check Those Privacy Policy & Advertising Terms Carefully…

    Here is an example of “What you really DO NOT need in your App”.

    Privacy policy & Advertising Terms

    Thank you for downloading this free, ad-supported application! Please read carefully. This application is ad-supported and our advertising partner, Airpush, inc., may place ads within applications and in your device’s notification tray and home screen. Airpush collects certain information in accordance with the permissions you just granted through the prior screen.

    When you click on the advertisements delivered by Airpush, you will typically be directed to a third party’s web page and we may pass certain (missing information) of your information to the third parties operating or hosting these pages, including your email address, phone number and a list of the Apps on your device.

    For more information on how Airpush collects, uses and shares your information, and learn about your information choices, please visit the Airpush Privacy Policy. If you do not wish to receive ads delivered by Airpush in the future, you may visit the Airpush opt-out page or delete this App.

    So, we clicked on the Airpush opt-out page.

    For the record, the information which we had already read through and analyzed, we did an opt-out of our own by closing the pages and returning back to the Game App…And the first thing that hit is in the face from the screen was this –

    First Ad Hits Game Start

    As very keen Games Players (Some of us Games Masters), we believe that people should be aware that they are downloading any ‘Mobi-App’, ‘Game’ or ‘Utility’ with peace of mind. As soon as President Obama revealed to the world that The Whitehouse denied him an iPhone because “It was a security risk” and that it was not a ‘Secure’ mobile device, we became more than intrigued. Here you had a Mobile Phone that was one of the Top Seller’s (If not THE top seller) and it was not secure enough for the President of the United States of America!! Yes, according to some sources in Washington, President Obama has acquired ‘Candy Crush’, ‘Fruit Ninja’ and also ‘ReadIT’ Apps. So, the circle of insecurity may not be too far behind on “T&C’s” and “P&T’s”.


    Know The Risks – From Professionals…

    McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy malware. The permissions in free apps, funded by adware, leak personal information which ad networks use to serve targeted ads; however, McAfee found that 26 percent of apps are likely more than just adware. SMS scams and rooting exploits were among the most popular types of threats seen across a variety of apps.

    “Most consumers don’t understand or even worry about the app permissions they agree to,” said Luis Blando, vice president of mobile product development at McAfee. “Because of that, cyber criminals are increasingly abusing app permissions as an efficient way to deliver mobile malware. Through these agreements mobile consumers are unwittingly putting their personal information into the hands of criminals disguised as ad networks, and opening up endless doors for scammers.”

    The report analyzes FakeRun, malware that tricks users in the United States, India, and 64 other countries into giving an app a five-star rating on Google Play. Once an app developer has been rated highly, other apps they publish will be trusted, which creates more opportunities for a criminal to publish and distribute malware-carrying apps.

    The report also identifies the most popular apps that carry malware. Of the top 20 downloads of malware-infected apps, games won the popularity contest, followed by personalization and a tie between tools, music, lifestyle (a cover category for adult content) and TV.


    ·         SMSend malware was the most serious problem for China, Malaysia, Taiwan, Japan, and Hong Kong

    ·         Four of the top 10 serious threats in China involve premium rate SMS scams

    ·         China was the #1 victim by count in all of the top five most common rooting exploits

    ·         Free apps in the “Games” and “Personalization” categories were the most likely to carry malware

    ·         Russia continues to be the #1 source of malicious apps

    ·         Ice Cream Sandwich (Android OS 4.0.x) is the most popular platform for malware


    We’re bombarded with permission requests each time we install an application and since we want the application to work, we click allow. Giving applications access to contacts, calendar, and photos means it can access and copy your information to their servers anytime and as often as the application wants.

    Protecting the device is important in order to protect the data stored and accessed from the device.  What’s worth protecting is not the pieces of metal and plastic or even the applications, it’s the data and access to that data. Don’t store bank passwords on a mobile device without using a secure, encrypted password manager separate from the operating system.

    Jailbreaking iOS and Android reduces security, putting your data at risk and aiding malware. Manufacturers are adding user-requested features, reducing the need to jailbreak devices in order to be productive.

    According to a Gizmodo article, “the Associated Press reports that smartphone robberies now account for nearly half of all robberies in San Francisco.” Additionally, they report that rates in New York City are up by as much as 40 percent, and in Los Angeles, they’re up by 27 percent over last year. Thieves steal your phone, run up your bill, copy your data, and then sell the device on the black market.  Save yourself some money by setting a passcode as soon as you get a new phone.  Use at least a six-character password to protect yourself from the slightly more tech-savvy criminals.

    Third-party analytics companies are gathering your physical movements to determine what stores you enter, for how long, and which stores you bypass, and then selling that data to retailers.  They are able to do this by tracking the unique MAC address included in broadcasts your device sends out when updating the list of available Wi-Fi networks, even when you don’t connect to these networks or take any action.  Disabling Wi-Fi when not in use will keep your physical location a mystery.

    Criminals have great success bundling malware with popular applications and games such as Angry Birds and offering them for free through third-party app stores. These app stores don’t review submissions as carefully as trusted sources such as Apple and Google.  Avoid third-party app stores to avoid most malware.

    Devices that are lost or damaged are the main cause of mobile data loss, but don’t forget, devices managed by employers can be wiped for security reasons or when changing jobs. Mobile devices include easy configuring, backup solutions that are automatic and wireless.  Make sure you back up your personal and work data before you lose it.

    Protecting data and privacy doesn’t have to be disruptive. If you’re responsible for managing mobile security in your company, picking the right solution that maximizes user productivity, is transparent, and gives enterprise control while protecting user privacy will be well accepted by users and achieve your security goals.

    The Network’s Verdict…

    The Mobile Phone phenomenon is well and truly upon us all, not just those in Business, but for all of the Social Networker’s and Texters too. The knowledge that all of our Information and Data is safe and secure on any device is (or should be) one of the main priorities when selecting our product for making contact, storing, creating, playing games or even setting Tasks and Schedules. It doesn’t have to be tedious or difficult to set any device up to your expectations, and at the same time, it should not be overlooked or groaned upon from the Manufacturers to apply security for their Customers and/or Clientele who put their trust in their Technology.

    From many of the Mobile Phones, Tablets and Smartphones that were a part of this Project, we found that at least 70% of them failed in tests for ‘Security Issues’ due to both ‘Mobi-Apps’ and ‘Software Programs’ which could allow anyone with the basic knowledge of ‘Information Retrieval’ to access, snoop, copy, delete, insert, steal and reformat the device. The iPad was the main device which showed that ‘Security Issue’ accompanying the products purchase was flawed and would allow ‘Bluetooth Jackers’, ‘Hackers’ and ‘Adware Companies’ to have complete access to ALL information within your device. More than twelve ‘Smartphones’ ranging from LG to Blackberry failed in several tests too, with the Blackberry X being one of the most secure from all of them. Our goal or intentions are not to scare people away from buying Mobile Devices or downloading Apps and Games, but to educate them for that moment when everything that you have and own on your Mobile Phone is Wiped, Copied, and Stolen or used against you in the many forms in which Cyber Crimes roll these days. Do not forget, it is YOU who give these ‘Mobi-Apps’ the permissions to access your Phone Book (The private collection of Friends, Associates, Businessmen/women, and Doctors, Solicitors, Judges, Police Officers, Politicians and in many cases Bank Managers), it is you who gives them permissions to check your Bookmarks and other Apps (Bookmarks of webpages you have visited, including any indescretionary adult websites, travel pages, bank pages, PayPal App, Banking Apps), and it is YOU who allows them free roaming and snooping inside your SD/XD Cards and Internal Flash Hard Drive (Where all your personal pictures, photos, word documents, presentations and sensitive information and data can be found). In a nutshell – It’s “Access All Areas” and basically speaking you may as well just hand your phone or device over to them. If you have any secrets on your Phone, Tablet or Smartphone, then this will not be the case when you allow these ‘Exceptions’, and in our book, nobody should have this right or privilege over anyone who ‘Downloads’ an App or Game just for fun.

    The Privacy Conditions argument continues with Facebook today, as much as the Privacy Rulings over ‘Mobi-Apps’ continues until there is something implemented to assure Mobile Users that both their very own Privacy and Equipment is protected, either through the Manufacturer or through the Apps themselves. Until then, Global World News and Tomorrows News Today will certainly be adding more ‘Mobi-Apps’ to the gathered listing so far to warn people to stay away from them.

    Just so that we are completely and utterly clear on this whole thing. If you have a Mobile Device, everything that you do with that device is saved. Much of the information is taken by your Operator and stored as a precaution under the Condition known as Loss, Breakage or the Device being stolen. Today’s technological advancements leave very little room for Privacy Assurance, and with the latest GPS Location, Facial Recognition Software, Social Network Integration and other Cloak and Dagger Fads that tempt and lure us into downloading the very latest Apps and Programs, we sometimes click ‘Install’ without checking the risks just because a Family Member or Friend has got it first. We say Enjoy your Mobile Device, but think before you accept the T&C’s– would you accept candy from a stranger without seeing the candy first? Would you pay for a car under the word that there is a car waiting for you after handing over the money? Or would you really have trust in anyone but yourself in having your Banking Details for complete access and withdrawal?

    Other Projects In Progress…

    Where do all those Cold Calls come from?

    Why phoning for Take-Away Meals is Big Business for the Take Away

    Who ‘Accesses’ your Information?

    Is there a ‘Monopolies Board’ in the UK?

    Companies you really should not trust!

    This Article was written by John Collins on behalf of, and with the assistance of The Red Hive, The [MKDS] Network and Tomorrows News Today (GWN).

    2013/2016 ©™® The Red Hive. All rights reserved.


  • mkds67 6:06 pm on June 28, 2013 Permalink | Reply
    Tags: bootable usb, consumer feedback, Download Win 8.1, iso file, isos, See New Win8.1, setup exe, sha, Win 8.1 iOS, Win 8.1 Slideshow, Windows 8.1 iOS   

    Download Windows 8.1 Preview ISOs Now… 


    Microsoft has made installation ISOs for the Windows 8.1 Preview available to download.

    At the BUILD conference, Microsoft showed off some of the changes in Windows 8.1, responding to consumer feedback about the Windows 8 operating system launched last year. 

    Now you can download an ISO file and install it yourself. 

    Windows 8.1 Preview (English) 64-bit: WindowsBlue-ClientwithApps-64bit-English-X1899605.iso
    SHA-1 Hash: 0xD76AD96773615E8C504F63564AF749469CFCCD57 

    Windows 8.1 Preview (English) 32-bit: WindowsBlue-ClientwithApps-32bit-English-X1899604.iso
    SHA-1 Hash: 0x8BED436F0959E7120A44BF7C29FF0AA962BDEFC9 


    If you are running Windows 8, simply double-click on the ISO file and run Setup.exe. If you are running an older version of Windows, you will need to either burn it to a DVD or create a bootable USB installation.

  • mkds67 6:01 pm on June 28, 2013 Permalink | Reply
    Tags: Exclusive Foxconn Watch, Foxconn Smart Watch, hon hai precision industry, ipads, iPhone Smart, , iwatch, Smartphone Watch, , terry gou, Travel Smart Watch   

    Foxconn Making iPhone-Compatible Smartwatch 


    Foxconn has revealed a smartwatch that will be compatible with Apple’s iPhones. 

    Foxconn (Hon Hai Precision Industry) is the Taiwanese mass manufacturer of electronics goods, typically on contract from large multinational corporations. Apple is one of its largest customers, with Foxconn churning out iDevices to feed a global demand. 

    With rumors circulating that Apple is developing an iWatch that will wirelessly interface with iPhones, iPads and possibly other Apple gear, Foxconn appears set to beat it to the market. 

    At a shareholder meeting, Hon Hai executives showed off a prototype watch that works with Apple’s iPhone. It can monitor health stats from the wearer – heartbeat and respiration – and feed the data back to the iPhone. It also can be used to view messages and notifications from the iPhone, just like Sony’s SmartWatch 2 can pair with NFC-compatible Android devices. 

    “With such a device, you can keep your phone in your pocket and simply check all kinds of messages on your watch,” Hon Hai chairman Terry Gou told shareholders.

  • mkds67 5:58 pm on June 28, 2013 Permalink | Reply
    Tags: fruition, , Google Android Games, Google Console, Google Cost, Google Games, Google Games Console, Google Innovation, Google Pricings, kibosh, smartphones, , wsj   

    Sorry Ouya, Looks Like Google Is Building An Android Gaming Console… 


    According to the WSJ, Google is actively developing an Android-based gaming console and a smartwatch, both of which could potentially launch this year. 

    The move would be huge expansion for Android, which has remained primarily on smartphones and tablets. 

    Additionally, the sources claim Google is building a second version of its failed media-streaming orb, the Nexus Q. 

    As of the last month, Android is now on 75 percent on all smartphones and 57 percent of tablets, beating out rival Applehandily. 

    If the gaming console comes to fruition, it would likely put the kibosh on Ouya and other cheap Android-based consoles that have recently reached the market.

  • mkds67 5:53 pm on June 28, 2013 Permalink | Reply
    Tags: broadband internet services, Check Your Broadband Speed, , European Broadband Speed, European Community, Get Connected, , ISP Capping, Low Internet Speeds, modem router, network congestion, Speeds Unjustified,   

    Euro Net Speed Much Lower Than Advertised: Euro Commission… 


    The European Commission has revealed results of tests that show European broadband Internet speeds run an average of 25 percent slower than advertised. 

    When you buy broadband Internet services, you are given a theoretical maximum speed that you are going to get with the service. On a cabled broadband network, for example, this limit would be set in the modem/router you are provided via configuration updates from your ISP. 

    Whatever the method in defining the maximum speed across services, there are many reasons why service could be subpar to your expectations, such as network congestion or the limitations of remote servers. 

    Still, you rightfully expect a reasonable return for your monthly payments. The European Commission had research conducted on the performance of Internet services offered to consumers throughout the bloc, to see how performance stacks up against advertisements. 

    The report is based on three billion pieces of data from nearly 100,000 households in Europe, that ran 75 million tests. It showed that the average speed in Europe is 19.7Mbps, with cable providers doing the best to deliver promised service at 91.4 percent the advertised speed.

  • mkds67 5:49 pm on June 28, 2013 Permalink | Reply
    Tags: japanese electronics giant, kawano, PS Controller, PS3 Controller, ps3 games, PS3 Will Be Supported, , sony japan, Sony To Save Playstation 3, weekly famitsu   

    Sony Won’t Abandon PS3 After PS4 Launch, Execs Say… 


    With the launch of the PlayStation 4 console set for the holiday season, Sony is reassuring PS3 owners of potential buyers that the console has years left. 

    In an interview with Japanese Weekly Famitsu, translated via Kotaku, Sony Japan president Hiroshi Kawano and his counterpart at Sony Worldwide, Shuhei Yoshida, were asked about the continued life of the PS3 console following the launch of the PS4 later this year. 

    “It’s been seven years since the release of the PS3 and the console continues to sell at a constant pace, plus we have many upcoming titles.” Kawano said. “We have no intention of immediately shifting from the PS3 to the PS4.” 

    He added: “With the 2014 launch of our cloud service in the US allowing users to play PS3 games on the PS4, some people may switch consoles from the PS3 to the PS4. But that’ll be a gradual process, and to say ‘we’re releasing a new console, so trade in your old ones for it’ would be a maker’s ego talking, plain and simple.” 

    Sony continued supporting its PS2 console for years following the release of the PS3 also. After the PS3 was launched, the Japanese electronics giant promised ten years of support.

  • mkds67 5:44 pm on June 28, 2013 Permalink | Reply
    Tags: Christmas Consoles 2013, Console War, Future Proof, Games Console Challenge, lifetime sales, Microsoft Vs Nintendo, , The Microsoft Poll, The Nintendo Poll, , wii consoles, , xbox 360 consoles, Xbox Against Wii, Xbox Challenge   

    Xbox 360 To Pass Wii In US By Year’s End… 


    While the Nintendo Wii console once led Microsoft’s Xbox 360 console by over nine million in lifetime sales in the U.S, it is likely to lose its American crown this year. 

    When the Nintendo Wii first launched in 2006, the Xbox 360 had been on the market for a year in the United States. At that point, there were three million Xbox 360s in the home of gamers. However, the cheaper Wii console which had eaten up attention due to its motion control gaming came along and quickly started to eat into Microsoft’s lead. 

    Month after month you simply couldn’t stop the Wii from dominating the hardware sales charts. It was simply a given that the Wii would win the month, every month, the Xbox 360 would come second, and for a while, the PS3 would finish way behind. 

    But as time went on and the novelty of the Wii reduced, and with the cost of both the Xbox 360 and PS3 coming down while the games got more plentiful and better, it was only a matter of time before the tables would turn. 

    In May 2010, there were over nine million more Wii consoles in the U.S. than Xbox 360 consoles, but that’s where the decline of its American reign began. Starting in June 2010, the Xbox 360 has outsold the Wii every single month. In November and December 2012 alone, 1.75 million more Xbox 360 consoles were sold than Wiis.

  • mkds67 5:38 pm on June 28, 2013 Permalink | Reply
    Tags: content creators, , Huge TV, inch models, Large Televisions, lifelike images, Meet The Big TV, proven engineering, Smart TV, toshiba america information systems, Toshiba Technology, Toshibas' Achievements, Toshibas' Best, Toshibas' New Television, Very Smart Television   

    Toshiba Announces New 58-, 65- And 84-Inch 4K TVs… 


    Toshiba has announced a new series of 4K Ultra HD TVs, available in 58-, 65- and 84-inch models. 

    With 4K TVs, a sobering price tag is to be expected in these early days. The 58-inch model has an MSRP of $4,999, which bumps to $6,999 for 65-inch and $16,999 for 84-inch. Sobering indeed. 

    The L9300U Series are powered by Toshiba’s proprietary CEVO 4K Quad+Dual Core Processor, to deliver the highest quality 4K image processing, including Resolution Restoration to restore clean near 4K image quality from less than 4K content. 

    “While the content creators work to create more 4K content and figure out how to distribute it, consumers can still enjoy the clearer, more natural and lifelike images on a 4K Ultra HD TV,”said Scott Ramirez, vice president of product marketing and development, Visual Products, Toshiba America Information Systems, Digital Products Division. 

    “This year, consumers can enjoy Blu-ray Discs with near 4K resolution thanks to powerful upscaling technology; however when choosing a brand, they should choose one that has high-quality processing and proven engineering skill to optimize the 4K experience right, like Toshiba.”

  • mkds67 5:30 pm on June 28, 2013 Permalink | Reply
    Tags: famitsu, kotaku, PS4 Games Online, PS4 Online, resource investment, shuhei, Sony Announcement, Sony Plus Subscription, , xbox live   

    PS4 Requiring Plus Subscription For Online Play Is Down To Investment Cost… 


    Sony’s Shuhei Yoshida has told Japanese daily Famitsu that PS4 gamers will need to pay to play PS3 games online due to the resource investment in the service. 

    Currently, PS3 owners can play games online for free and smile smugly at Xbox 360 owners who need an Xbox LIVE Gold Membership to do the same. However, when the PS4 was unveiled, it quickly became apparent that the days of free Online Play were coming to an end. 

    “The main pillar for the PS4 will be online play. We’re developing many new ways to play and connect which requires a large investment of resources,” Yoshida said, translated by Kotaku. 

    “Considering the cost, to try to keep such a service free and consequently lower the quality would be absurd. We decided that if that’s the case, then it would be better to receive proper payment and continue to offer a good service.”

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc