Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

How to Using VoIP on Android Phones?

Bateeilee blog admin will share How to Using VoIP on Android Phones?. Android is an operating system specially adapted for mobile phones and handsets launched by Google. If you are using a phone running Android, like the Nexus One, the HTC Hero, the Samsung Galaxy, to name but a few, you can take advantage of the power of VoIP to make free or cheap calls on your mobile. First, you need a connection, either through Wi-Fi, 3G or WiMAX and get subscribed to one of the following VoIP service providers.

1. Truphone


Truphone is a leading VoIP service provider for mobile phones in the sense that has been the first to provide a VoIP application for the iPhone and for the Nexus One. Truphone allows Android users to make free calls to other Truphone users over Wi-Fi, with cheap rates otherwise. It also allows the user to make partly-VoIP calls over their GSM (cellular) network, through its Truphone Local plan. This allows the user to use the cheap service anywhere outside Wi-Fi. Note that Truphone on Android does not support 3G so far.

2. Skype


Using Skype's application for Android, which you can download from there on your phone itself, you can make free Skype-to-Skype calls worldwide, over 3G and Wi-Fi. However, t the time I am writing this, users in the US aren't able to make 3G calls.

3. Voxofon


Voxofon is a cool and easy way to use VoIP on your Android and at the same time save money on international calls. You don’t need Wi-Fi or 3G – you can make calls through your GSM network itself. Here is how it works. You enter any international number and click to call. Before the call starts, the service determines the cheapest route and you are shown what it will cost. The cost will be the local cost plus Voxofon’s cost, which is no more than a couple of cents per minute.


6. RF.com

 

RF.com is first known as a service that supercharges the iPhone with the ability of making cheap VoIP calls through the GSM network. It also allows SIP URI calls and calls to Voice over IM Services (such as Skype, Google Talk, MSN Messenger and Yahoo! Messenger), and other IP-based voice services. Now RF.com also works with some models of Android phones, including the G1.


4. Fring


Fring is another VoIP service that works the common way – free calls to other Fring contacts over EDGE, Wi-Fi or 3G, and paid calls to other phones. Fring also allows you to communicate with people on other networks like Skype, Google Talk etc.


5. Raketu


Yet another of the common mobile VoIP applications, with the possibility of communicating to contacts on other networks like Skype, Yahoo IM etc. Raketu also has many different ways of starting a call, 8 in all, as it says on its site.


7. PhoneGnome


PhoneGnome is one of these box-based VoIP services that ship you a box through which all magic works. The add-on device can allow you to use your mobile phone to make cheap international calls, any mobile phone, including the Android.


8. MO-Call


MO-Call for Android works on many Android phones and can work even without an Internet connection on the mobile device. The cheap VoIP calls may be routed to the IP network, wherre VoIP will come into play, through the local GSM network.


9. Vonage Mobile


Android users using Vonage can extend to the Vonage Mobile service and install the application for Android on their phones. This will allow them to make calls over Wi-Fi and GSM, with cheap international rates in over 60 countries. Calls can be made only on AT&T, T-Mobile, Verizon and Sprint network.


10. Jajah Mobile Web


Jajah is a web-based VoIP service. It doesn’t actually have a VoIP application for the Android – it doesn’t have any for any phone really, because its service is accessed only through the web, and practically most of the phones out there with web-connecting capability will be able to use it to place calls over Wi-Fi or 3G.


11. Native SIP Clients


More skilled VoIP users can use SIP clients that are native to the Android platform to make their calls through SIP. These are merely applications that allow you to use VoIP that support SIP and that do not have a (good) VoIP application for Android. Examples of such applications are the SIPdroid client, SIPez, the Skuku client etc.


What is Android?

Bateeilee blog admin will share What is Android?. Android is an OS (operating system) owned by Google, used in smartphones (some still prefer saying ‘sophisticated mobile phone’) and tablet PCs. For those of you who are novices to the computer world, an operating system is the first and main software that is installed on your computer, mobile phone or any electronic device. It controls all the operations, other software and hardware of your computer. In its original sense, Android means a robot that has human shape, hence the small green robot on the Android OS logo. Android is a Linux-based operating system that is now the most used among mobile operating systems. In fact, when you say Android today, nearly everyone thinks of the mobile OS rather than the original definition.


What Makes Android so Popular? 

 

We have been using mobile phones for decades and – most of us without knowing – we have been running mobile operating systems on our machines. Apple’s iOS that runs on the iPhone has changed the way smartphones look and work, and Android as a competitor has brought this demarcation further.

Android includes all the goodies you can have in a modern and sophisticated smartphone, including full multimedia, connectivity, user-friendliness with touchscreen support, multi-tasking etc. But what makes the big difference is that it is fully open. This makes it possible for just everyone, expert or not, to develop applications for Android phones. As a result, an Android user can download and install great applications for free from the Android Market, from a wealth of tens of thousands of apps.

Moreover, unlike Apple’s iOS, Android powers devices that are built by many different manufacturers worldwide, Samsung and HTC being the leaders. This grows the Android community worldwide, causing the devices to fit into all spheres of activity, into all global and local markets, also fitting most budgets. If you want an iPhone, you need to pay the price, since there is one and only, although you may save some bucks on the phone’s specs like memory. On the other hand, you have both cheap low-end and expensive high-end phones running Android. So you get to use the OS even with limited hardware features, and for cheap.


Android Versions

 

When you download an app from the Android Market, or when you ask yourself whether your favorite app is supported, one consideration is important: the Android version. Throughout the versions, features kept being added and improvements made

I noticed that most apps require version 2.1 and later. The most used version today is 2.3 Gingerbread , which adds multi-touch software keyboard, support for extra large screens and high resolutions and embedded Voice over IP support as improvement over version 2.2 Froyo which was already rocking with everything that other smartphone operating systems were offering.

The latest version is 3.0 Honeycomb, which is optimized to tablet PCs and video communication.


Phone Models Running Android

 

Here is a list of the most popular phone models that run Android, and that have pleased many: Samsung Galaxy family (including S, S2, Ace, Geo and Mini), Google Nexus S, Motorola Photon, HTC Droid Incredible, T-Mobile G2x, Samsung Infuse 4G, HTC Thunderbolt, HTC Sensation 4G, Motorola Droid Razr, HTC Rhyme, HTC Evo 4G, HTC Wildfire, Samsung Epic Touch 4G, among many others.
Android tablet PCs: Asus Eee Prime Transformer Prime, Sony Tablet S, Samsung Galaxy Tab, Toshiba Thrive, Acer Iconia Tab, T-Mobile G-Slate, Lenovo IdeaPak, HTC Flyer, Motorola Xoom, LG Optimus Pad, among many others.


The Android Market

 

If you own an Android phone or tablet, you will find the Android Market one of the most interesting places to go. How do you go there? Just type market.android.com on your computer’s browser or that of your Android device and you will land on a Web site that shows thousands of apps one more interesting than the other. Most are free to download and install. Some others are priced very low.

The apps are for all areas of activity, starting from the most useful productivity tools to the silliest games and time-wasters, passing all the way through widgets, tweaks, viewers, managers and what not.

Each app carries its rating, which is a good indication as to its safety and worth. You also have plenty of user reviews, along with a lot of useful information on the app itself, including the number of downloads and popularity.


Making Free Phone Calls on Android

 

Thanks to VoIP, you can make free calls to your contacts around the world through you computer or mobile device. Android makes this even more easy and interesting. To make free or cheap local and international VoIP calls on your Android device, you need to have Internet connection with decent bandwidth, either through a 3G or 4G data plan or a Wi-Fi hotspot, and you need to install a VoIP app from the Android Market. Here is a list of the main apps for using VoIP on Android.


Android Features 

 

Android OS has many features, among which are the following:
  • Enhanced interface with the array of icons on the menu. Android adapts to high quality 2D and 3D graphics, with multi-touch support.
  • Android supports multitasking, i.e. many applications can run at the same time, like in a computer. This is not possible with simple mobile phones and many other smartphones.
  • All new means of connectivity are support : GSM, 3G, 4G, Wi-Fi, Bluetooth, GPS etc.
  • Android supports many languages, including those with right-to-left text.
  • Multimedia messaging system (MMS) is supported.
  • Java runs great on Android. Applications for Android are developed in Java, but instead of a Java Runtime Environment, Android uses the Dalvik Executer, which is lighter on resources.
  • Android supports most voice and video media formats, including streaming media.
  • Additional hardware like sensors, gaming devices, other touchscreens can be integrated in Android.
  • Voice and Video over IP. VoIP has many benefits, and Android manages cameras and has embedded support for seamless use of VoIP for free and cheap calls.
  • On versions 2.2 and up, tethering is possible, which is the ability to use the Android device as a mobile Wi-Fi hotspot.

What is a DDoS attack?

Bateeilee blog admin will share What is a DDoS attack?. Trojans are often used to launch Distributed Denial of Service (DDoS) attacks against targeted systems, but just what is a DDoS attack and how are they performed?

At its most basic level, a Distributed Denial of Service (DDoS) attack overwhelms the target system with data, such that the response from the target system is either slowed or stopped altogether. In order to create the necessary amount of traffic, a network of zombie or bot computers is most often used.

Zombies or botnets are computers that have been compromised by attackers, generally through the use of Trojans, allowing these compromised systems to be remotely controlled. Collectively, these systems are manipulated to create the high traffic flow necessary to create a DDoS attack.

Use of these botnets are often auctioned and traded among attackers, thus a compromised system may be under the control of multiple criminals – each with a different purpose in mind. Some attackers may use the botnet as a spam-relay, others to act as a download site for malicious code, some to host phishing scams, and others for the aforementioned DDoS attacks.

Several techniques can be used to facilitate a Distributed Denial of Service attack. Two of the more common are HTTP GET requests and SYN Floods. One of the most notorious examples of an HTTP GET attack was from the MyDoom worm, which targeted the SCO.com website. The GET attack works as its name suggests – it sends a request for a specific page (generally the homepage) to the target server. In the case of the MyDoom worm, 64 requests were sent every second from every infected system. With tens of thousands of computers estimated to be infected by MyDoom, the attack quickly proved overwhelming to SCO.com, knocking it offline for several days.

A SYN Flood is basically an aborted handshake. Internet communications use a three-way handshake. The initiating client initiates with a SYN, the server responds with a SYN-ACK, and the client is then supposed to respond with an ACK. Using spoofed IP addresses, an attacker sends the SYN which results in the SYN-ACK being sent to a non-requesting (and often non-existing) address. The server then waits for the ACK response to no avail. When large numbers of these aborted SYN packets are sent to a target, the server resources are exhausted and the server succumbs to the SYN Flood DDoS.

Several other types of DDoS attacks can be launched, including UDP Fragment Attacks, ICMP Floods, and the Ping of Death. For further details on the types of DDoS attacks, visit the The Advanced Networking Management Lab (ANML) and review their Distributed Denial of Service Attacks (DDoS) Resources.

Fake Antivirus Software

Bateeilee Blog will post Fake Antivirus Software. Have you ever installed an antivirus software thinking it was a legitimate program but you later found out you installed a fake application? If this has happened to you, chances are you installed a Trojan horse virus. This often happens when you visit a website that is infected with malware and are prompted with a pop-up message stating that your PC is infected. The pop-up window will include antivirus icons and will highlight a fake list of malware that has been detected on your machine. The fake antivirus window may even mimic the Windows Security Center. Consequently, you’re enticed to click on the scan button in order to quickly remove the infection. However, if you do, you will inadvertently install the Trojan horse virus. Furthermore, the Trojan horse virus may inform you that you have to pay to register the fake application in order to remove the false malware threats.


What is Winwebsec?

 

A variety of these fake antivirus applications exist. One of the most common Trojan horse viruses that fall under this category is called Winwebsec. Winwebsec has been distributed under several different names, which include:
  • Disk Antivirus Professional
  • Live Security Platinum
  • MS Removal Tool
  • Security Shield
  • System Security
  • Win 8 Security System
Please be aware that all of the above are fraudulent antivirus applications and you should avoid clicking and installing them.


Payload

 

When the fraudulent antivirus application is installed and executed, it performs a fake scan of your computer and reports false infected files. In addition, Winwebsec prevents you from launching your applications by displaying a message stating that the process is infected. It specifically targets and disables processes related to Windows Update, Windows Security Center, and antivirus software products. However, Winwebsec is sophisticated enough to allow Internet connectivity processes, which enables it to communicate to other infected hosts, download additional malware, contact the remote attacker, etc.


How to Protect Yourself from Winwebsec

 

Most users become infected with a Winwebsec variant by visiting an infected website. If you suddenly see an antivirus display box with a list of infected files after visiting a webpage, do not install, click on “scan”, or click on “remove all” if you are not 100% positive that the display is from your official antivirus program. Instead, access Windows Task Manager to view the running processes, applications, and services. Once on Windows Task Manager, I recommend closing your Internet browser application as well as anything associated with the suspicious antivirus program. Then, launch your antivirus application, install the latest virus definitions, and run a full-system scan of your PC to ensure that you did not become infected with the Winwebsec Trojan horse virus. In addition, you can take the following steps to prevent infection on your computer:
  • Install the latest system updates -- Ensure you have the latest updates installed on your computer. System updates help protect your computer form malware. Use Automatic Updates in Windows to automatically download and install Microsoft security updates for your computer.
  • Use an antivirus software application -- Once you install an antivirus software on your PC, you must update the application with the latest signature files. Configure your antivirus software to routinely check for updates and schedule your application to scan your machine on a regular basis.
  • Enable your firewall -- Firewalls monitor the network and are capable of blocking suspicious traffic. You can enable the Microsoft Windows Internet Connection Firewall for your computer.
  • Open email attachments with care -- Use extreme caution when handling emails and attachments you receive from unknown sources.
By following these steps, you significantly decrease your chances on becoming infected with Winwebsed. In addition, these steps will also protect you from other high risk malware threats.

What is a Trojan Horse virus?

Bateeilee Blog admin will post What is a Trojan Horse virus?. A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database. 
 
Now, there are Trojan Horses and there are viruses, but there's no such thing as a Trojan Horse virus. In fact, the very definition of each precludes any chance of there being such a thing. A Trojan does not replicate. Viruses do. That fact alone means there can never be a "Trojan Horse virus".

The Visa description continues with, "A Trojan Horse is an email virus usually released by an email attachment." Not so. A Trojan may be sent as an attachment in email, but it's certainly not an email virus. (In fact there are few true email viruses, but that's a whole other topic). So it may or may not arrive in email, and it's equally likely to have been downloaded from a website or resulted from a P2P file transfer. In other words, vector has nothing to do with whether something is or isn't a Trojan.

Just what is a Trojan then? A Trojan is a program that appears to be legitimate, but in fact does something malicious. Quite often, that something malicious involves gaining remote, surreptitious access to a user's system. Unlike viruses, a Trojan does not replicate (i.e. infect other files), nor does it make copies of itself as worms do.

There are several different types of Trojans. Some of these include: remote access Trojans (RATs), backdoor Trojans (backdoors), IRC Trojans (IRCbots), and keylogging Trojans. Many Trojan encompass multiple types. For example, a Trojan may install both a keylogger and a backdoor. IRC Trojans are often combined with backdoors and RATs to create collections of infected computers known as botnets.

But one thing you probably won't find a Trojan doing is scouring your hard drive for personal details, as the Visa description alleges. Contextually, that would be a bit of a trick for a Trojan. Instead, this is where the keylogging functionality most often comes into play - capturing the user's keystrokes as they type and sending the logs to the attackers. Some of these keyloggers can be pretty sophisticated, targeting only certain websites (for example) and capturing any keystrokes involved with that particular session.

But why is it important to know the difference between a virus, a worm, and a Trojan? Because a virus infects legitimate files, thus if antivirus software detects a virus, that file should be cleaned. Conversely, if antivirus software detects a worm or a Trojan, there is no legitimate file involved and action should be to delete the file.

Magna Carta Holy Grail Fake App

Bateeilee Blog admin will post Magna Carta Holy Grail Fake App.  Android users have been vulnerable to a malware attack disguising itself to be Jay-Z’s Magna Carta Holy Grail. This Trojan horse targets Android users who want to purchase Jay-Z’s album on their Samsung Galaxy device. A Trojan horse is a program that appears to be legitimate, but in fact does something malicious. For example, a Trojan horse may appear to be a game or a screensaver (in this case, Jay-Z’s legitimate app). A deceived user will download the application and the Trojan horse is released once the user executes the program. Quite often, the Trojan will process malicious attacks involving gaining remote, stealthy access to your system or device.

The Jay-Z’s Magna Carta Holy Grail Trojan horse app was discovered by McAfee Mobile Security. This Android Trojan horse hides within a pirated copy of the Jay-Z app. Samsung users were targeted because the legitimate app was released exclusively for Samsung devices on Google Play.


How To Detect the Fake App

 

If you downloaded the Trojan application, you would realize that the infected app functions identically like Jay-Z’s legitimate app. However, in the background, the Trojan horse transmits data about your infected device to the attacker every time your phone is initiated. Like most malware, this Trojan horse attempts to download and install additional malicious packages. If you had this fake application installed on your Samsung device, you suddenly had your background wallpaper image changed to an image of President Barack Obama on July 4th. The attacker designed a time-trigger event with the Trojan horse app to swap your wallpaper image with the President Barack Obama image.

This vulnerability is a reminder of how Google Play allows apps to be published on their app store. Google attempts to keep the installation approach as open as possible. With Android, you are able to conveniently install apps through multiple means, which include Google Play, non-Android stores, and sideloading. There’s hardly any red tape a developer must encounter when compared to Apple, and consequently, this is how the bad guys submit their malicious apps.

Google launched an Android security feature called Bouncer. Bouncer scans Google Play for malware and eliminates malicious apps before they reach our Android devices. However, some security experts are not too impressed with Bouncer as they have found flaws within the system. An attacker can disguise an app from being malicious, while Bouncer is running, and deploy the malware on a user’s device. Whether Bouncer is safe or not, it’s best to download from a legitimate app store such as Google Play. Jay-Z’s Magna Carta Holy Grail Fake App was downloaded from a pirated album copy that has been found in several other sites.


How To Stay Safe from Malware

 

You should always be cautious about the apps you download and install on your device. The malware payload can cause damage to your mobile device, as well as intrude on your privacy and personal information. You can take the following preventive measures for installing infected apps:
  • Only download from a reputable app store, such as Google Play or Amazon Appstore.
  • Glance at app reviews -- People will often rate an infected app poorly and will usually warn others through the app reviews.
  • Avoid downloading unofficial apps -- It's always safer to install official apps from an official app store.
  • Keep your mobile device up-to-date -- Ensure you have the latest updates installed on your device.
  • Don't download pirated software.
  • Use strong antivirus protection such as McAfee Mobile Security

Android Master Key Vulnerabilities

Bateeilee blog admin will post Android Master Key Vulnerabilities. Mobile device users, including myself, constantly hear about mobile threats and how unsafe mobile devices are against the latest malware attacks. Jay-Z’s Magna Carta Holy Grail Fake App, for example, hides within a pirated copy of the Jay-Z app. If you had this fake application installed on your Samsung device, you suddenly had your background wallpaper image changed to an image of President Barack Obama on July 4th. Recently, we heard of another threat called Master Key that affects all Android users.


What is the Master Key Vulnerability?

 

The Master Key vulnerability was discovered by a security group called Bluebox. Bluebox consist of well-respected security developers who are dedicated in the fight against mobile attacks. The Bluebox Security research team discovered a vulnerability within the Android security model that allows an attacker to turn any legitimate application into a malicious Trojan horse. The hacker accomplishes this by modifying the APK code without modifying the application’s cryptographic signature. The Android Application Package file (APK) is the file format used by Google’s Android operating system to distribute and install applications. An APK contains many elements, including the app’s code and certificates. Android apps come with digital signatures. A digital signature is what makes an application legit. Digital signatures confirm the identity of an app’s developer and they ensure that future updates are issued solely by the app’s developer. Breaking the cryptographic signature of any app is an indication that the app has been tampered with. The Maser Key vulnerability not only allows the attacker to make these changes to Android apps, the changes are unnoticed by the app store, mobile device, and end user.


What Are the Implications?

 

The Master Key vulnerability is scary. Attackers can literally create Trojan horse apps (fake apps) on the fly, which will allow them to gain full access to your Android system and all applications (including your data). So what does this mean? Well, the Trojan horse is capable of capturing your personal data (email, SMS messages, photos, documents, etc.) as well as user account information and passwords. Furthermore, it can launch attacks, such as make phone calls or send text messages and maybe even turn on your camera and record calls.

For enterprise users, there are other issues to deal with. Because users in the workforce may have elevated privileges to corporate information, it may be possible that the vulnerability can allow an attacker to gain access to sensitive information.


What Can Be Done to Prevent This?

 

Google has released a fix in response to Bluebox Security’s findings. Google stated that the security hole has been patched and has been released to the Original Equipment Manufacturers (EOM). So, Google has responded well and quickly developed a patch to correct this issue. It is now up to the mobile device manufacturers add the security patch to upcoming updates. While you wait for your provider to release the update, you can mitigate the Master Key vulnerability by:
  • Use an Android Antivirus app -- McAfee Mobile Security offers security against this vulnerability.
  • Be cautious about identifying the app’s publisher you want to install.
  • Download from Google Play Store – Google is on high-alert and the assumption is that they will be aggressively monitoring APKs for any kind of suspicious acts. Downloading apps from other sources could be dangerous.

How Are Hidden Administrator Apps?

Bateeilee blog admin will share How Are Hidden Administrator Apps Installed. Android devices have been under attack more so than in previous years. Jay-Z’s Magna Carta Holy Grail Fake App, for example, hides within a pirated copy of the Jay-Z app. If you had this fake application installed on your Samsung device, you suddenly had your background wallpaper image changed to an image of President Barack Obama on July 4th. We also heard of another threat called Master Key that affects all Android users. Master Key allows an attacker to turn any legitimate application into a malicious Trojan horse. The hacker accomplishes this by modifying the APK code without modifying the application’s cryptographic signature.

Recently, another malware threat known as Hidden Administrator Apps has targeted Android users. Hidden Administrator Apps is not an actual name for the malware, but should be viewed more of a category of malware with characteristics that include stealth implementation and elevated user privileges.

A Hidden Device Admin app is an infected application that installs itself with administrator privileges. The app hides itself and you have no means of knowing if this was installed on your device. You can’t remove the app because you simply can’t see it on your screen and you don’t know that it’s there. With administrator privileges, the malware takes complete control of your device and can enable the attacker to utilize it.


How Are Hidden Administrator Apps Installed?

 

When the malware attempts to install on your device, it will ask you to grant it the elevated privileges. If you’re attentive and deny this request, the malware displays frequent pop-up messages once the device restarts. If you install the infected app, you can attempt to uninstall the app by deactivating its administrator privileges by going to Settings ->Security->Device Administrators. However, this technique may not work all the time because variants of the malware will hide this deactivation option.


How Can You Prevent or Remove Hidden Administrator Apps?

 

You should always be cautious about the apps you download and install on your device. The malware payload can cause damage to your mobile device, as well as intrude on your privacy and personal information. You can take the following preventive measures for installing Hidden Administrator Apps:
  • Only download from a reputable app store, such as Google Play or Amazon Appstore.
  • Glance at app reviews -- People will often rate an infected app poorly and will usually warn others through the app reviews.
  • Avoid downloading unofficial apps -- It's always safer to install official apps from an official app store.
  • Keep your mobile device up-to-date -- Ensure you have the latest updates installed on your device.
  • Don't download pirated software.
If your device is infected with a Hidden Administrator App, you can search Google Play for utilities that can detect the Hidden Administrator App and will remove its elevated privileges. You then can uninstall the app because it will no longer have the administrator rights. A solid solution is McAfee Mobile Security. One of the many features that McAfee Mobile Security provides is Hidden Administrator App detection.

Is Google Play Safe?

Now Bateeilee will share Is Google Play Safe? If you’re an Android user, you’re familiar with Google Play. Google Play, formally known as the Android Market, is the online store where Android users download mobile apps. The Android Market was released in October 2008, which housed around 50 apps. Today, close to 700,000 apps are available on Google Play, but are they all safe?


Android and Malware

 

When compared to Apple’s App Store, Google Play’s track record with malware is not too good. Why is this so? Well, Google and Apple have very different strategies. Apple operates within a tightly-controlled system where developers must pass Apple’s strict requirements.

Unlike Apple, Google attempts to keep the installation approach as open as possible. With Android, you are able to conveniently install apps through multiple means, which include Google Play, non-Android stores, and sideloading. There’s hardly any red tape a developer must encounter when compared to Apple, and consequently, this is how the bad guys submit their malicious apps.


Google Play Bouncer

 

What is Google doing about this issue? In February 2012, Google launched an Android security feature called Bouncer. Bouncer scans Google Play for malware and eliminates malicious apps before they reach our Android devices. Sounds good, right? But just how effective is this security feature?

Security experts are not too impressed with Bouncer as they have found flaws within the system. An attacker can disguise an app from being malicious, while Bouncer is running, and deploy the malware on a user’s device. That doesn’t sound as good.

Google is Not Done Fighting the Baddies

 

While Bouncer can be compromised, Google is looking at other solutions to fight off malware. According to Sophos and Android Police, Google Play may be deploying a built-in malware scanner. This will enable Google Play to perform real-time malware scans on your Android device.

This has not been confirmed and whether Google will launch a built-in scanner within Google Play remains to be seen. However, I believe this is a good thing. If Google moves forward with this new security initiative, it will give Android users the peace of mind they deserve when downloading apps.


How To Stay Safe from Malware

 

In the meanwhile, you can take the following preventive measures for installing infected apps:
  • Only download from a reputable app store, such as Google Play or Amazon Appstore.
  • Glance at app reviews -- people will often rate an infected app poorly and will usually warn others through the app reviews.
  • Avoid downloading unofficial apps -- it's always safer to install official apps from an official app store.
  • Use strong antivirus protection such as Lookout Mobile Security, AVG, and Norton.

What is Malware?

Bateeilee Admin will post What is Malware? Protecting your computer from malicious software is perhaps the most important aspect of computer ownership. A wide range of products are available that offer computer security. However, did you know that certain products only offer protection against a few malicious attacks? Are you concerned that your computer may not be fully secured? Before you take the necessary measures of securing your computer, you should understand the different types of attacks that could harm your machine.


What is Malware?

 

Malicious software (malware) is the wide range of software applications developed with a malicious intent. The methods used for malware installation is unlike any other software installation you are accustomed to because malware is installed through devious means. People often use the terms virus and malware interchangeably. However, a virus is a type of malware. Other major malware types include:

Virus


A virus contains malicious code that attaches itself to an application. When the infected application is executed, the virus is launched and will attempt to spread to other computers. A virus typically will not cause immediate damage as it needs time to replicate in order to infect other computers. Eventually, the virus will deliver its payload. The payload can cause significant damage such as deletion of critical system files, random reboots of your computer, and can corrupt hard drives and make them unbootable. Viruses are delivered to systems in a variety of ways. Email is the most common method for spreading viruses. For example, spammers will email viruses as attachments and will entice users to download and open the attachment, which in turn will execute the virus. Users can also transmit viruses by using infected USB flash drives. Most operating systems have Autorun enabled, which enable infected USB flash drives to execute the virus as soon as the device is plugged into the machine.

Trojan Horse


Trojan horses trick users by posing as legitimate applications. For example, a Trojan horse may appear to be a game or a screensaver. A deceived user will download the application and the Trojan horse is released once the user executes the program.

Worms


Unlike viruses and Trojan horses, worms do not need to be executed. Worms reside within memory and can travel throughout a network without depending on an infected computer application or interaction. Worms replicate themselves exponentially and can literally crash networks by consuming its bandwidth.

Spyware 


Spyware is installed on a machine without the user’s awareness or consent. Spyware attempts to gather specific user information and send it to a third party. You can determine if your computer is infected with spyware if your Internet home page has suddenly changed, if your web browser redirects web searches, or if additional software has been installed on your machine. Another form of spyware is adware. Adware launches pop-up windows to display unwanted advertisements.


Logic Bomb

 

A logic bomb is malicious code embedded within an application that executes based on certain events. The logic bomb lies dormant until that event occurs. The event may be when a specific date is reached or if an employee’s record is removed from an organization’s payroll information system.

Rootkits


A rootkit is the combination of programs designed to infect your computer without being detected. Your antivirus application communicates with your operating system to identify threats. However, rootkits breaks down this communication process. Consequently, your antivirus software will think that everything is fine and will not report that your computer is infected.

You can find security tools that will protect your computer from the above threats. In most cases, one tool is not enough. You may need to use a combination of utilities to fully project your system. Understanding the major types of malware can help you make informed decisions about acquiring tools to project your computer.

Android Viruses and Malware

Bateeilee admin will share Android Viruses and Malware..?  When compared to the average personal computer found in millions of our homes, the threat from viruses and malware to your Android smartphone is relatively small. Sadly, any platform which attracts millions of users, and which could potentially contain personal information such as email addresses, bank details, credit card information and website usernames and passwords, is always going to be targeted by criminals and others who want that information. As you entrust more and more of you life to your phone, it is important to understand and protect against the threat of viruses and malware.


Previous Virus Threats

 

Thankfully, as mentioned above, there are relatively few known viruses which can affect your Android phone. One of the best known outbreaks was a trojan-SMS virus known as Fakeplayer. This virus was capable of sending SMS messages from an infected phone to premium rate numbers without the user having any clue what was happening until their next bill arrived. Fakeplayer is thought to have infected hundreds of thousands of devices before it was identified and could be stopped.

Other well reported viruses include Gingermaster, which was used to steal user information from the infected device (including user ID, SIM details and IMEI numbers). This information could potentially be used to clone your phone, resulting in large bills which were nothing to do with you. DroidFungFu was different, giving hackers back door access to a users device and allowing then to copy or remove files stored on the phone.

DroidDream is sometimes called both a virus and malware. Whatever it was classified as, it wasn't something you would have wanted on your phone. Thought to have been included in as many as sixty fake apps on the Google Play Store in 2011, DroidDream installed additional software on the device and then stole data of various sorts. Google was quick to release a fix for this threat, but not before thousands of Android users were affected.


Google Vs Viruses

 

Google are quick to stamp on any virus outbreaks which come from apps on the Play Store, and have also taken steps to stop these apps appearing in the first place. But whilst apps are also available from third-party stores, and people are free to click on any link they want on their mobile browser, viruses and malware will only continue to increase.

Google takes the threat of malicious software as seriously as we might expect. It is getting quicker at removing suspect apps from the Play Store, and in 2012 the company introduced Bouncer. Bouncer provides automated scanning of the Play Store for potentially malicious software without disrupting the user experience or requiring developers to go through an application approval process. As well as Bouncer, Android also features several things that reduce the threat of malware and viruses.
  • Sandboxing – A virtual wall between apps and system software, so it is more difficult for malicious apps to cause harm if they do get on your phone.
  • Malware Removal – Android now has measures in place which prevent malware or viruses modifying the system software or hiding on a device. This makes malware removal easier.
  • Permissions – Every time you install an app, you will be shown the permissions the app requires. If you don't think a game needs access to your phone dialler, for example, don't download the app.

 

Protecting Android From Viruses

 

It isn't really enough to let Google do all the work in detecting and fighting against viruses on your phone. Here are a few simple things you can do to reduce the risk of virus infection.
  1. Install Anti-virus Software – Just like on your home PC, there are numerous anti-virus apps available for Android phones. Choose one from a name you trust, and take the time to set it up properly.
  2. Avoid Sideloading – Installing apps from websites or app stores other than the Google Play Store leaves you open to virus infection. If you can't find an app in the official store, think carefully about why that would be.
  3. Disallow Unknown Sources – Usually found in the Security settings of your Android phone, Unknown Sources means anywhere other than the Play Store. This can help prevent .apk files being downloaded without you knowing.
  4. App Permissions – Always check the permissions an app needs before you download it. If you don't like the sound of any of the permissions, think carefully before you go ahead and install it on your phone.
  5. Software Updates – Keep on top of updates, both to the system and to individual apps. System updates, even incremental updates, often fix holes in the software which could potentially be used by malicious apps. 

What is Google Android?

Today Bateeilee Blog will share about What is Google Android? Android is an open mobile phone platform that was developed by Google and, later, by the Open Handset Alliance. Google defines Android as a "software stack" for mobile phones.


So, what's a software stack? It's made up of the operating system (the platform on which everything runs), the middleware (the programming that allows applications to talk to a network and to one another), and the applications (the actual programs that the phones will run). In short, the Android software stack is all the software that will make an Android phone an Android phone.


Android is based on the Linux operating system, and all of its applications will be written using Java. Google says Android will "ship with a set of core applications including an email client, SMS program, calendar, maps, browser, contacts," and more.


Anyone can download an Android software development kit from Google and write an application for Android.

Why Should You Care About Google Android?

 

Android is an open mobile phone platform that was developed by Google and, later, by the Google-developed Open Handset Alliance. Google defines Android as a "software stack" for mobile phones.

A software stack is made up of the operating system (the platform on which everything runs), the middleware (the programming that allows applications to talk to a network and to one another), and the applications (the actual programs that the phones will run). In short, the Android software stack is all the software that will make an Android phone an Android phone.



Now that you know what Android is, let's talk about the important stuff: Why should you care about Android?


First off, it's an open platform, which means that anyone can download a software development kit and write an application for Android. That means that--eventually--you should have plenty of Android apps that you can download to your phone. If you like Apple's App Store (one of the most raved-about features of the iPhone), you should be pleased with Android.

Google has a very good reputation when it comes to creating software. The company's Gmail service, its online suite of applications, and its Chrome browser have, for the most part, been favorably received. Google is known for creating simple, straightforward applications that are inherently usable. If the company can translate that success to the Android platform, users should be pleased with what they see.

While the software will come from Google--and anyone who chooses to write applications for Android--you will have some choice in both hardware and cellular carrier. This is where Android differs sharply from the iPhone. The iPhone hardware is made by Apple, and your cellular carrier is AT&T (unless you jailbreak your phone, and therefore void any warranty). An Android phone can be made by anyone and made to run on any network. T-Mobile is launching the first Android phone, but it won't be the last; Sprint is already rumored to have an Android phone in the works, too.

These are just a few of the reasons why Android has the potential for huge success. Now we have to see if it can live up to the hype.

What is Android Platform?

 

Introduction:

 

Android is a Linux-based mobile phone operating system developed by Google. Android is unique because Google is actively developing the platform but giving it away for free to hardware manufacturers and phone carriers who want to use Android on their devices.

Beyond the Phone:

 

A modified version of Android is used in the Google TV, the Barnes & Noble Nook eReader, the Samsung Galaxy Tab, and countless other devices. Parrot makes both a digital photo frame and a car stereo system powered by modified versions of Android.

Open Handset Alliance:

 

Google formed a group of hardware, software, and telecommunication companies called the Open Handset Alliance with the goal of contributing to Android development. Most members also have the goal of making money from Android, either by selling phones, phone service, or mobile applications.

Android Market:

 

Anyone can download the SDK (software development kit) and write applications for Android phones. Google doesn't screen developers or applications. These apps can be downloaded from the Android Market. If the app costs money, you pay for it using Google Checkout. T-Mobile also has an agreement to allow their phone customers to purchase some apps and have the fee added to their monthly phone bill.
Some devices do not include support for the Android Market and may use an alternative market.


Service Providers:

 

The iPhone has been very popular for AT&T, but unless you void your warranty to unlock it, you can only use an iPhone with AT&T. Android is an open platform, so many carriers can potentially offer Android-powered phones. That doesn't mean individual carriers won't lock the specific phone they sell you to their service, but every major carrier in the US offers an Android phone. Android is currently the fastest growing phone platform in the world.

Data Plan:

 

To use Android on a phone, you need a data plan on top of your voice plan. You can't even activate an Android phone without a data plan enabled. Some networks in the US offered tiered data service, and some offer unlimited plans.

Google Services:

 

Because Google developed Android, it comes with a lot of Google services installed right out of the box. Gmail, Google Calendar, Google Maps, and Google Web search are all pre-installed, and Google is also the default Web page for the Web browser. However, because Android can be modified, carriers can choose to change this. Verizon Wireless, for instance, has modified some Android phones to use Bing as the default search engine.


Touchscreen:

 

Android supports a touch screen and is difficult to use without one. You can use a trackball for some navigation, but nearly everything is done through touch. Android also supports multi-touch gestures such as pinch-to-zoom in versions 2.1 (Eclair) and above.

Keyboard:

 

The initial release of Android required a separate keyboard. However, "Cupcake," (Android 1.5) and later editions have all supported an on-screen keyboard. That means you can use models like the Verizon Droid 2 that include a slide-out physical keyboard or the HTC EVO that rely entirely on the touch screen.

The Bottom Line:

 

Android is an exciting platform for consumers and developers. It is the philosophical opposite of the iPhone in many ways. Where the iPhone tries to create the best user experience by restricting hardware and software standards, Android tries to insure it by opening up as much of the operating system as possible. This is both good and bad. Fragmented versions of Android may provide a unique user experience, but they also mean fewer users per variation. That means it's harder to support for app developers, accessory makers, and technology writers (ahem). Because each Android upgrade must be modified for the specific hardware and user interface upgrades of each device, that also means it takes longer for modified Android phones to receive updates.


Fragmentation issues aside, Android is a robust platform that boasts some of the fastest and most amazing phones and tablets on the market.

Nokia Lumia sold 7,4 million units

Nokia Corporation announced that it has sold 7,4 million units of Lumia smartphones until the second quarter ending June 2013.

With that number means an increase of 32 percent from the previous quarter and reflects the strong consumer demand for the Lumia models, the Nokia in the second quarter 2013 financial report published on Thursday (18/7).

However, Lumia sales increase sales growth was not followed by other models of Nokia mobile phones.

Overall, sales of Nokia mobile phones in the second quarter reached 53.7 million units, down 8 percent from the previous quarter.

Value and volume of sales and service Nokia mobile device during the second quarter of 2013 was reported down in all areas ranging Europe, Middle East and Africa, China, Asia Pacific, North America, to Latin America.

Decrease in the volume of sales in the Chinese market reached 48 percent, and Asia Pacific and Latin America 29 percent.

Regarding the financial performance of the first half of 2013, the Nokia Group has posted net sales of 11.5 billion euros, down 22 percent compared to the same period last year.

Due to loss of the first half of 2013, the net loss per share to be borne by Nokia 0.13 euros, better than the same period of 2012 which reached 0.63 euro.

Apple Testing iPhone Jumbo

Now Bateeilee Blogs will share Apple Testing iPhone Jumbo. Apple reportedly testing iPhone with a jumbo-sized at 13-inch landscape display. This news comes following the release of the iPhone photo sailing jumbo. By Weibo, the image obtained from Apple's supplier partners.

Mentioned, Apple is now experimenting makes iPhone a great sail from 4.7, 5.7 to 13 inches. This information corroborated the testimony of a senior who says LCD manufacturers, Apple had requested the display panel shipments larger than usual.

As reported by The Sun, Monday (22/7), Apple declined to comment on the iPhone will be produced jumbo. But if true, this means the company from Cuppertino trend has swept away large producing phones that had been initiated by his main rival, Samsung.

The news was sticking when the emergence of the increasingly widespread news iPhone 5S is believed to be equipped standard 4-inch screen. iPhone 5S continues to be the talk since the beginning of the year, reportedly will also include the ability to scan fingerprints.
 
Including the 12 MP camera with handset casing made ​​from "Liquidmetal" aluminum. Apple releases new hero phone is expected to coincide with the launch of "cheap iPhone" with a body made of colorful plastic.

Seven Secret IOS 7

iOS 7 - Hidden features ready to present to your iPhone and iPad

Sure you already knew about iOS 7? Think again. Of course you can see the advanced features that OS, but Apple does not have enough time to dissect further than what it can do its new software at WWDC.

Now the developers have told what features are there on iOS7 to us. Ranging from the effects of the new, hands-free controls, to make it easier to see where you are, Apple has a lot of surprises in store in this new system.

So, join us to learn the advanced features available in iOS 7.

1.You can control it by moving your head

Samsung Galaxy S4 can know when you're staring at the screen, and still make it stand by. So, what is offered in rival Apple's advanced features? They do so by making you can control the iPhone and iPad by moving the head. Indeed, it is intended for a more practical reason, anyone can make use of these devices with limited gestures. But we also get to see a new convenience in operating the phone hands-free.


To enable the feature, try to go to Settings, Accessibility, Switch Control, and select Switches. You will see a menu Switch Source as above. Then you can specify a function to move the head to the left or right. Activate by pressing the touch control, by moving the cursor over each option on the screen, then select one of them, just move your head to the left. Or return to the home screen, move it to the right. Maybe you need a little getting used to, but it's not difficult.

2. Tell me where you are


There is already a lot of talk about the effect of parallax on iOS 7. When you turn on the phone, it looks like the icon appears to be floating above the background, adding a measure of depth that can usually only be seen with 3D glasses. But did you know that it effects change depending on where you are?

Which leads to the folder icon will make you feel 'closer' to your mobile phone wallpaper. Because the background move slightly when you move the phone, it will make you closer as if to physically images. Minimize the application switcher screen to multi-tasking and a slight slope will make the background appear swinging.


As in almost all the design tweaks in iOS 7, this feature has a practical value, helps remind where you are located. This feature also makes Apple very cool.

3. iOS7 can take pictures in one touch screen

Too bad for those who like to send naughty messages on mobile phones. Did you know that there are all naughty messages on Snapchat and likes your post? The messages that you think would disappear, and only stored in memory only a few moments? And it turns out Apple making the messages stored longer. And worse you do not know. It would be very disturbing.

On iOS 6, if you take a picture with Snapchat, anyone who sends you a message will know that picture because there is a warning. The warning depends on the active cancellation of a touch on the screen to find out that a picture has been taken. However iOS7 will not cancel an active touch when you take a picture the screen. Which means there is no warning and no one knows that you just keep it for a long time.


Of course, before iOS 7 Snapchat can delete the message. But if it can not be removed, then there are two ways to eliminate them, first the people should be able to stop sending naughty messages. Or web can be inundated with a written message, the sender thinks is funny that no one else will ever see what you send.

4. New animation

Apple has clearly paid attention to Microsoft's Windows Phone operating system. Not only has the bright colors, such as Windows Phone, but the icons on iOS 7 is also animated, just like Microsoft's Live Tiles.

Features not only make the homescreen looks more 'alive', and dynamic, but also give you the info you need in an instant. For example, Clock application will be ticking like a real clock, so you do not have to open it to see the time.

Flashlight function is also made ​​with some nice animation. Press, and iPhone flashlight will light up at the same time with the switch icon icons are shifted upwards.


But the coolest thing is a spirit level, when two circles only meet when you are on the surface is completely flat.

5. Background changed to the face

Background plays a larger part than ever in iOS 7, although there are some pretty soft touch. Thanks to the translucent layers, your background will appear when you perform certain functions, such as calling someone. The dominant color in the background you will determine the color scheme in the foreground. So if you have a forest image as wallpaper, will be the green call button.

As already mentioned, the background will rotate when you turn on your phone. And how often will rotate depending on where you are.


But you can also do other neat tricks using your background. If you specify a panorama as your wallpaper, the background will shift the entire picture when you move the phone, as if there is a magnifying glass at the top of the picture. Again, not all of them have merit, but is guaranteed to make users happy.

6. Less confident, less hassle

We all often experience it, when the battery is low and you're at a friend's house, so you're forced to connect your iPhone to their computer. IPhone then carry out their duties, to try to sync contacts, music, photos, and more. Apple has made iOS 7 is much less trust with other devices. Plug in your iDevice to your Mac or PC and your device will not be recognized, and will ask if you want to charge the battery, or provide computer access to all files and photos.


This is just a small change, but it will help us from all the hassle when you're in a pinch. iOS 7 will also stop showing iTunes show up on your computer while it is trying to charge, which is good news for you and your friends. Especially if your friends feel embarrassed if others saw their playlist.

7. Chat more sophisticated

Here are other small changes, but once you try it, you will wonder how you terbantunya. Say you're shifting the email list that seems endless, look for one important piece of information. iOS 7 makes it much easier.

In the list of emails, text messages each given a different color to the last. So, when you are exploring a long conversation, you can see at a glance when someone has just sent a message. That means you can open it quickly, safely, and you will not miss in finding what you are looking for. It certainly can save you time.


SMS conversations also seem confusing. When you shift your chat messages, text bubbles bounce a bit when you stop. This is not a huge change, and this feature has little or no practical value, but the resulting effect looks cool. And make what's on the screen feels a little more real.

Four Tips to Select-Select Tablets

Tablets are now increasingly mushrooming in various brands and features offered. Ranging from the famous to the local product. How to choose a tablet so as not to waste your money? There are Four tips that may be useful in choosing a tablet as reported apakabardunia.com site:

1. Make sure your vision with the coveted tablet. Before stepping to the counter sales of the tablet, try to ask myself, "Why would I buy a tablet?" Any suitable type of tablet brands certainly there are advantages and disadvantages, so you should be sure not to regret later.


Example, if you want to use as many apps, the iPad certainly the best choice. And is competing with the Galaxy, although still below the level of Apple. If you want to frequently connect to Windows-based computers, than the iPad then you should select the operating system that supports Windows.


2. Note the data capacity. There are many options in accordance tablet data capacity, for example 16 GB, 32 GB, 64 GB to 128 GB. Small capacity prices would have been much cheaper, but is it enough with all your needs? If you want to collect songs, photos, apps, 16 GB certainly less precise.


Then should choose a large capacity 128 GB tablet? Not really. You certainly will not be using the tablet for everything. Unless your employer or a movie addict who wants to put all the movies on the tablet. Certainly there is no suggestion that rigid about this, return again to the first point, "What is my goal to buy a tablet?"


3. Need Data Plan? In many current tablets are often offered as an optional Data Plan so that you can use a 3G or 4G internet. But sometimes the money that you pay at the end of the month even more expensive than the services you use wifi. If in a place without wifi network, yet you still can use the mobile phone as a parent and tablet use. Apparently, the money you have to spend per month is cheaper than Data Plan.


4. Remember "Price Determinants of Quality". However, this applies to all sorts of goods you buy, including tablets. If you plan to have a tablet without a bored and long-lived, there is no harm in choosing a price slightly higher.


This is related to point No. 2. For example, a tablet of the brand A offers the option of 8 GB, 16 GB, and 32 GB. 8 GB capacity prices would have been much cheaper, but it does suit your needs? In addition, the tablet with a trusted brand and a broad service network should be an option.

What's New in Windows 8.1

We built Windows 8 to bring a modern computing experience to businesses and to help professionals stay connected to their colleagues and clients from anywhere, anytime. Windows 8.1 advances this vision and introduces new manageability, mobility, security, user experience and networking capabilities that will be available later this year – with the goal of offering customers the best business tablets and versatile modern business PCs driven by the most powerful operating system designed for today’s modern businesses.

Below is a list of some of the new and updated features that we invite to you test out when the Windows 8.1 experience becomes available later this month.

Bring Your Own Device (BYOD) Enhancements

Workplace Join
A Windows 8 PC was either domain joined or not.  If it was a member of the domain, the user could access corporate resources (if permissioned) and IT could control the PC through group policy and other mechanisms.  This feature allows a middle ground between all or nothing access, allowing a user to work on the device of their choice and still have access to corporate resources With Workplace Join, IT administrators now have the ability to offer finer-grained control to corporate resources.  If a user registers their device, IT can grant some access while still enforcing some governance parameters on the device.
Work Folders
Work Folders allows a user to sync data to their device from their user folder located in the corporation’s data center. Files created locally will sync back to the file server in the corporate environment. This syncing is natively integrated into the file system.  Note, this all happens outside the firewall client sync support. Previously, Windows 8 devices needed to be domain joined (or required domain credentials) for access to file shares.  Syncing could be done with third-party folder replication apps. With Work Folders, Users can keep local copies of their work files on their devices, with automatic synchronization to your data center, and for access from other devices. IT can enforce Dynamic Access Control policies on the Work Folder Sync Share (including automated Rights Management) and require Workplace Join to be in place.
Open MDM
While many organizations have investments with System Center and will continue to leverage these investments we also know that many organizations want to manage certain classes of devices, like tablets and BYOD devices, as mobile devices. With Windows 8.1, you can use an OMA-DM API agent to allow management of Windows 8.1 devices with mobile device management products, like Mobile Iron or Air Watch.
Mobile Device Management
When a user enrolls their device, they are joining the device to the Windows Intune management service.  They get access to the Company Portal which provides a consistent experience for access to their applications, data and to manage their own devices.  This allows a deeper management experience with existing tools like Windows Intune. IT administrators now have deeper policy management for Windows RT devices, and can manage Windows 8.1 PCs as mobile devices without having deploy a full management client.
Web Application Proxy
The Web Application Proxy is a new role service in the Windows Server Remote Access role. It provides the ability to publish access to corporate resources, and enforce multi-factor authentication as well as apply conditional access policies to verify both the user’s identity and the device they are using resources, and enforce multi-factor authentication as well as verify the device being used before access is granted.
RDS Enhancements
Enhanced Virtual Desktop Infrastructure (VDI) in Windows Server 2012 R2 with improvements in management, value, and user experience. Session Shadowing allows administrators to view and remotely control active user sessions in an RDSH server. Disk dedupe and storage tiering allow for lower cost storage options. User experience for RemoteApps, network connectivity and multiple displays has been improved. Administrators can now easily support users with session desktops to provide helpdesk style support. Administrators now have even more flexible storage options to support a VDI environment without expensive SAN investments. End users will find RemoteApp behavior is more like local apps, and the experience in low-bandwidth is better, with faster reconnects and improved compression, and support for multiple monitors.
NFC Tap-to-pair Printing
Tap your Windows 8.1 device against an enterprise NFC-enabled printer and you’re all set to print. No more hunting on your network for the correct printer and no need to buy a special printer to take advantage of this functionality. Simply attach an NFC tag to your existing printers to enable this functionality.
Wi-Fi Direct Printing
Connect to Wi-Fi Direct printers without adding additional drivers or software on your Windows 8.1 device, forming a peer-to-peer network between your device and the printer.
Native Miracast Wireless Display
Present your work wirelessly with no connection cords needed; just pair with a Miracast-enabled projector via NFC and Miracast will use Wi-Fi to let you project wire-free.

Mobility Enhancements

VPN
We have added support for a wider range of VPN clients in both Windows and Windows RT devices. We have also added the ability to have an app automatically trigger VPN connections. 
Mobile Broadband
At Windows 8 launch, the devices had embedded radios that were separate components within the devices.  Windows 8.1 supports embedded wireless radio, which gives you increased power savings, longer battery life, also enables thinner form factors and lower cost devices. 
Windows To Go
With Windows To Go in Windows 8.1, the Windows Store is enabled by default. Windows To Go users may roam to any number of machines and access the Windows Store and use Windows Store apps. 
Broadband Tethering
Turn your Windows 8.1 mobile broadband-enabled PC or tablet into a personal Wi-Fi hotspot, allowing other devices to connect and access the internet.
Auto-triggered VPN
When you select an app or resource that needs access through the inbox VPN – like a company’s intranet site – Windows 8.1 will automatically prompt you to sign in with one click. This feature will be available with Microsoft and third-party inbox VPN clients.

Security Enhancements

Remote Business Data Removal
Corporations now have more control over corporate content which can be marked as corporate, encrypted, and then be wiped when the relationship between the corporation and user has ended. Corporate data can now be identified as corporate vs. user, encrypted, and wiped on command using EAS or EAS + OMA-DM protocol. This capability is requires implementation in the client application and in the server application (Mail + Exchange Server). The client application determines if the wipe simply makes the data inaccessible or actually deletes it. 
Improved Biometrics
All SKUs will include end to end biometric capabilities that enable authenticating with your biometric identity anywhere in Windows (Windows sign-in, remote access, User Account Control, etc.). Windows 8.1 will also be optimized for fingerprint based biometrics and will include a common fingerprint enrollment experience that will work with a variety of readers (touch, swipe). Modern readers are touch based rather than swipe and include liveliness detection that prevents spoofing (e.g.: silicon emulated fingerprints). Access to Windows Store Apps, functions within them, and certificate release can be gated based on verification of a user’s biometric identity.
Pervasive Device Encryption
Device encryption previously found on Windows RT and Windows Phone 8 is now available in all editions of Windows. It is enabled out of the box and can be configured with additional BitLocker protection and management capability on the Pro and Enterprise SKUs. Consumer devices are automatically encrypted and protected when using a Microsoft account. Data on any Windows connected standby device is automatically protected (encrypted) with device encryption. Organizations that need to manage encryption can easily take add additional BitLocker protection options and manageability to these devices.  
Improved Internet Explorer
Internet Explorer 11 improvements include faster page load times, side-by-side browsing of your sites, enhanced pinned site notifications, and app settings like favorites, tabs and settings sync across all your Windows 8.1 PCs. Internet Explorer 11 now includes capability that enables an antimalware solution to scan the input for a binary extension before it’s passed onto the extension for execution
Malware Resistance
Windows Defender, Microsoft’s free antivirus solution in Windows 8, will include network behavior monitoring to help detect and stop the execution of known and unknown malware. Internet Explorer will scan binary extensions (e.g. ActiveX) using the antimalware solution before potentially harmful code is executed.
Device Lockdown
With Assigned Access, a new feature offered in Windows 8.1 RT, Windows 8.1 Pro, and Windows 8.1 Enterprise, you can enable a single Windows Store application experience on the device. This can be things like a learning application for kids in an educational setting or a customer service application at a boutique, Assigned Access can ensure the device is delivering the intended experience. In our Windows Embedded 8.1 industry product, we deliver additional lockdown capabilities to meet the needs of industry devices like point of sale systems, ATMs, and digital signs.

Modern UI Experience

Variable, Continuous Size of Snap Views
You have more ways to see multiple apps on the screen at once. You can resize apps to nearly infinite sized windows, share the screen between two apps, or have up to three apps on each monitor.
Boot to Desktop
We have made configuration options available which will allow you to boot directly to the desktop in Windows 8.1.
Desktop and Start Screen
Improvements have been made to better support users who prefer a mouse and keyboard experience to access applications.

These are just some of the key features available in Windows 8.1 We encourage you to test out and try these features when you evaluate Windows 8.1 for use both in your work environment as well as at home in your personal life. Please note that Windows Server 2012 R2 may be required in order for some of these features to be available.


Source Page : http://technet.microsoft.com/en-us/windows/dn140266.aspx