Thursday, October 6, 2016

Play Store Now Lets You Stream Games Before Buying Them


We have been hearing about app trials in Google Play for a while now and it looks as if the feature is finally arriving to users in full force. The feature is pretty nifty, even though it wasn’t discussed at all in Google’s latest event


Various users have reported seeing a “Try Now” button appearing next to the “Buy Now” one. Tapping it takes you into a 10-minute free trial of the game where you can assess the quality and experience.

The way this works is quite similar to the cloud-based gaming we have seen on services like OnLive, where the game is actually run on the company’s servers with only the video and audio being transmitted. The controller feedback is sent back to the company servers.

Gameplay:

There is a floating menu to offer help or exit the stream. A countdown timer tells you how much your allotted time is remaining. The cloud services aren’t particularly known for the consistency of their experience but hopefully Google will fare better here.
This is a far less strenuous method than installing a free trial of an app and then assessing it, or worse, paying for an app before deciding you don’t like it and then scrambling for an uninstall. If done well, it can allow for even more action-packed titles on both newer and older devices, which could be an industry changer.

Future Expectations:

The games, reportedly, can be played as many times as possible though no saves will be available. The feature is not available everywhere, requires compatible hardware and supports only limited titles. If all goes well, Play Store could launch a complete streaming service for all apps and games, but that’s just wishful thinking for now. Let’s hope we hear some positives about this new feature in the coming few days.

Image Source : Android Authority

Wednesday, October 5, 2016

The Internet Has a New Controlling Authority & It’s Not the U.S


The Government of United States has handed over the control of the Internet Assigned Numbers Authority (the internet’s address book) to ICANN, an independent international body made up of a number of governments, corporations and individual users.


What is Internet Assigned Numbers Authority (IANA)?

The IANA manages the allotment of IP addresses all over the globe. It also delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities.
In simple terms, the IANA is a database that stores all the domain names on the internet. For example, if you type “propakistani.pk”, the IANA is responsible for directing you to our website.

Who owns the IANA now?

Initially, IANA was established as an informal way to reference to various technical functions for the ARPANET by Jon Postel and Joyce K. Reynolds. They alone were responsible for managing the IANA from 1988 to 1998.
In 1998, the Department of Commerce created ICANN, a nonprofit organization that is responsible for coordinating the maintenance and procedures of several databases. With participants from all over the globe, the organization’s purpose is to keep the Internet secure, stable and interoperable.
After Postel’s death in 1998, they granted ICANN a contract to manage the IANA. ICANN was to get the full ownership of IANA eventually, but the process was bogged down due to politics. Numerous political leaders from the Republican Party, including Ted Cruz, have opposed this move. However, ICANN finally approved a transition plan this year.
On the 1st of October, a judge ruled in favor of the plan, allowing it to move forward. As of this moment, the ICANN is now the official owner of the IANA.

Facebook Messenger Chats Now Offer End-to-End Encryption


Facebook is finally capitalizing on the promise it first made back in July, of making conversations on Messenger completely encrypted. The platform isn’t the first to offer such a feature but is definitely among the most used ones, even if it doesn’t offer it in full glory.



The feature, dubbed Secret Conversations, is now available to the billion or so active users of Messenger, as confirmed by Wired. It is turned off by default so it requires turning on manually. It also doesn’t make every conversation that has occurred in the past encrypted.

How to Activate:

In the latest version of Messenger, you’ll see a new secret icon in the top right corner of the app. Tap that and you can start an encrypted chat. Existing conversations can also be converted to secret ones, by tapping their name at the top, and toggling the Secret Conversations option.

Encryption Tech:

Messenger uses the renowned Signal encryption system, developed by the nonprofit Open Whisper Systems, which has already been implemented in the privacy-centered Signal Private Messenger. That app has the blessings of none other than Edward Snowden.
Of course, both the users need to update to the latest version of Messenger to use the updated security feature so first make sure that is done. The conversations can only be carried out on a single device at a time.

Room For Improvement:

The functionality of these conversations is a bit more limited in comparison to normal ones, with GIFs and videos not supported, yet.
The feature was first tested in beta in public back in July and only now is it arriving to the all users.
Messenger isn’t the first platform to offer such privacy, as Signal, Telegram and Whatsapp among others have had it for long. Though, it is certainly among the most used messaging apps. That will happen of course if you trust Facebook with your privacy in the first place.

Tuesday, October 4, 2016

WhatsApp Adds Snapchat-Like Doodling in New Update


A feature that has been in Google Allo and Snapchat from the start is now making its way to WhatsApp. You can now doodle on images or add stickers and emojis on them.


New Features in the Update

Aside from doodling and adding emojis on images, the update brings front facing flash support (screen flash) for selfies and video zooming options in the app’s camera.
The update was available in WhatsApp beta and is now available for the general public. Only Android users can avail this update for now. iOS users will have to wait.

According to the WhatsApp blog:
"When you capture a new photo or video or share one that’s already on your phone, you’ll automatically see the new editing tools. The WhatsApp camera feature now supports the front-facing flash so you can take the perfect selfie."
"In low light and at night, this will brighten up your screen and improve the quality of your photo. We’ve also added a convenient zooming feature for recording videos – just slide your finger up and down to zoom in and out. And to quickly switch between front and rear facing cameras, double tap on the screen."


Adapting to the Competition

This isn’t the first time Facebook has copied Snapchat’s features. They copied Snapchat stories and introduced it in Instagram, renaming it to Instagram stories.
It should be mentioned that Facebook CEO Mark Zuckerberg once offered to buy Snapchat from its CEO Evan Spiegel a few years ago.
Even though both Facebook Messenger and WhatsApp boast around a billion users each, Snapchat still poses a major threat because of its immense popularity among teens and the younger demographics. Facebook seems to be adapting and introducing new features in anticipation of the fact that Snapchat will become a major competitor to its messaging platforms soon.
The update is not yet available at the Google Playstore but is expected to be available today

Beware ! to open JPEG 2000 Images


Researchers have disclosed a critical zero-day vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library, which could allow an attacker to remotely execute arbitrary code on the affected systems.



Discovered by security researchers at Cisco Talos group, the zero-day flaw, assigned as TALOS-2016-0193/CVE-2016-8332, could allow an out-of-bound heap write to occur that triggers the heap corruption and leads to arbitrary code execution.

OpenJPEG is an open-source JPEG 2000 codec. Written in C language, the software was developed for coding and encoding JPEG2000 images, a format that is often used for tasks like embedding image files within PDF documents through popular software including PdFium, Poppler, and MuPDF.


Hackers can exploit the security vulnerability by tricking the victim into opening a specially crafted, malicious JPEG2000 image or a PDF document containing that malicious file in an email.


The hacker could even upload the malicious JPEG2000 image file to a file hosting service, like Dropbox or Google Drive, and then send that link to the victim.


Once downloaded to the system, it would create a way for hackers to remotely execute malicious code on the affected system.


The flaw was caused "due to an error while parsing mcc records in the jpeg2000 file,...resulting in an erroneous read and write of adjacent heap area memory," Cisco explained in its advisory.

"Careful manipulation of heap layout and can lead to further heap metadata process memory corruption ultimately leading to code execution under attacker control."


The researchers successfully tested the JPEG 2000 image exploit on the OpenJPEG openjp2 version 2.1.1. The flaw was discovered by Aleksandar Nikolic from the Cisco Talos Security team.


The team reported the zero-day flaw to OpenJPEG developers in late July, and the company patched the flaw last week with the release of version 2.1.2.


The vulnerability has been assigned a CVSS score of 7.5, categorizing it as a high-severity bug.