Custom Search

Thursday, April 1, 2010

21 secrets the tech industry does not want you to know

The list of 21 secrets the tech industry does not want you to know the site was compiled by PC World with a view to inform and advise what to do about them.


- Internet media company we have fully identified. - Internet media company We Have Fully Identified. At least, ISPs have that power and used to track for example, those who use P2P networks and even whether protected content is being downloaded for the rights of self. At least, ISPs and power That Have Used to track for example, use P2P networks Those Who and Whether Even Being protected content is downloaded for the rights of self. And as in Chile, the different organizations that ensure these rights are seeking the law allows them to tap into the connections and what each user is doing on the Internet to pursue these "crimes." And as in Chile, the Different Organizations Ensure That These rights are the law seeking "Allows them to Tap Into the connections and What Each user is doing on the Internet to Pursue these" crime. "

- The phones do not cause the aircraft to crash. - The phones do-not cause the aircraft to crash. Because despite what we all believe and not allow even turn the phones during a flight, there is no evidence that actually cause interference with navigation systems of aircraft. Because Uncle Tom What we all believe and not allowed turn the phones Even During a flight, There Is No Evidence That Actually cause Interference with navigation systems of aircraft. In fact, you probably do not even have a sign in the air, eliminating any risk. In Fact, you do Probably Not Even Have A sign in the air, Eliminating Any Risk.


- Navigation features "private" Internet browsers is not as secret. - Navigation features "private" Internet browsers is Not as secret. While this feature leaves no trace on the computer of the pages you've visited, like creating a record, thanks to the IP address and Internet provider company can know everything. While this feature leaves no trace on the computer of the pages you've visited, like Creating a record, thanks to the IP address and Internet provider company dog know everything. To avoid this, programs such as anonymized. To Avoid this, Programs Such as anonymized.


- The ink cartridges are unreasonably expensive. - The ink cartridges are unreasonably expensive. Because large companies have created advertising campaigns to convince users to buy spare parts or refill cartridges alternative is highly damaging to the printer. Because large companies created advertising Campaigns to Have convinces users to buy spare parts or refill cartridges is highly Damaging alternative to the printer. Apparently, the truth is not so well, and while there is a higher risk that ink will come out and stain and spoil the printer (or do not work perfectly) the price difference makes it worth risking . Apparently, the truth is not so well, and while There Is a High Risk That Will Come Out and ink stain and spoil the printer (or do Not Work Perfectly) the price makes it worth risking Difference. The savings are more significant than that. The savings are more Significant Than That.


- The license governing the rights of software may not be effective. - The license Governing the rights of software May Not be effective. That's because each country has different laws, and in some places, these licenses would be invalid. That's Because Each country has Different Laws, and in Some places, these licenses would be invalid.
- The cyberwarfare is increasing, and the U.S. - The cyberwarfare is Increasing, and the U.S. being lost. Being lost. The wars of the future will not be with lethal weapons and great battles between armies. The wars of the future will be with Not Lethal Weapons and great battles Between Armies. The way to undermine an enemy country is through the Internet, which is already happening, with continuous cyber-attacks aimed at breaking down different systems. The way to Undermine an enemy country will be Through the Internet, That Is Already something happening, with continuous cyber-attacks Different Aimed at breaking down systems. And getting the collapse is very simple, for example, through a simple DDOS attack, such as that directed against the U.S. North Korea And getting the collapse is very simple, for example, Through a simple DDOS attack, Such as That Directed Against the U.S. North Korea in July. last July.
- Google has the power to put the finger. - Google has the power to put the finger. And much more. And much more. The world's most used search engine handles much information about what we do, where we are and what our behavior on the Internet, would be sufficient to make a cross for detailed information. The world's most Used search engine handles much information about What we do, Where we are and What Our Behavior on the Internet, would be Sufficient to make a cross for Detailed Information. Only just think of the amount of data they handle who has a Google mail, calendar activities in Google Calendar, keeps his contacts there, share documents of all kinds on their servers, upload videos to YouTube, photos to Picassa and shouts to everyone where it is thanks to Latitude. Only just think of the amount of data Who They handle you to Google mail, calendar in Google Calendar Activities, There Keeps historical contacts, share documents of all kinds on Their servers, upload videos to YouTube, photos to Picassa and shouts it to everyone WHERE is thanks to Latitude.


- Pacemakers can also be hacked. - Pacemakers Can Also be hacked. At least, that showed a study by the University of Washington. At least, That Show a study by the University of Washington.


- Computers are highly toxic. - Computers are highly toxic. And although manufacturers have been diligent in removing harmful components, are still certain percentage of elements such as mercury, which if they are mishandled can cause a dangerous contamination. And although Manufacturers Have Been Diligent in Removing Harmful components, are Still Percentage of Certain Such elements as mercury, Which if mishandled They Are A Dangerous cause of contamination.


- The virus is not as effective in protecting the computer. - The virus is Not as Effective in Protecting the computer. There is always something that escapes and leaves a door open, which is quickly exploited by hackers to breach the systems. That There is Always something escapes and leaves a door open, Which Is Quickly Exploited by Hackers Breach to the systems.


- Your cell phone gives you away. - Gives You Your cell phone away. It is easy to know exactly where is a person through their phone, and although it has no GPS (which enable a more accurate location) simple triangulation of antennas which delivers data broadcast signal of our behavior and how we move. It is easy to know Exactly where is a person-through Their phone, and although it has no GPS (Which enable a more Accurate location) triangulation of simple antennas Which Delivers data broadcast signal of Our Behavior and how we move.
- There is no such thing as a cheap smartphone. - There is no such thing as a cheap smartphone. Whatever the option, usually on free loan to buy the company that subsidiarity in the end you end up paying thousands of dollars for their use. Whatever the option, Usually on free loan to buy the company That subsidiarity in the end you end up paying Thousands of dollars for Their use.


- You will spy webcam. - You will spy webcam. Of course, because even if one believes it is turned off, these devices can be operated for remote control. Of course, one Believes Because Even If It Is Turned Off, These Can be operated devices for remote control.


- Your boss can spy on you. - Your dog boss spy on you. And according to PC World, certainly does. And PC World According To, Certainly does. It's as easy as having one installed in the computer software to track everything you do instead of working. It's as easy as HAVING one installed in the computer software to track everything you do INSTEAD of working. Or to work, of course. Or to work, of course. In fact, a light indicator report that two thirds of employers monitor e-mails of their employees in the U.S. In Fact, a light indicator report two Thirds of Employers That monitor e-mails of Their Employees in the U.S.


- It is still possible to fight the industry that wants to stop piracy. - It Is Still possible to fight the industry That Wants to stop piracy. Several lawsuits against "pirates", charged to download content protected by copyright reason has been given to users, contrary to what associations representing the recording industry or looking film. Several Lawsuits against "pirates", charged to download content protected by copyright reason've Been Given to users, Contrary To What Associations Representing the recording industry or looking film.


- Electronic passports can be tapped. - Electronic Passports Can be tapped. Modernity put a chip indicates that these documents would make everything easier, but if you hack, can alter the data and making an innocent citizen, a dangerous criminal. Modernity put a chip Indicates That These documents would make everything Easier, But if you hack, can alter the data and making an innocent citizen, a criminal Dangerous. This, thanks to the technology they use, RFID, allows access to the chip through the air, using electromagnetic waves. This, thanks to the They use technology, RFID, Allows access to the chip-through the air, using electromagnetic waves.


- Social networks will never forget. - Social networks will never forget. And though one will regret having exposed on sites like Facebook, and the profile is deleted, the records are stored forever. And one will regret HAVING Though Exposed on sites like Facebook, and the profile is deleted, the records are stored forever.


- Almost any service contract may be terminated without paying a fine. - Almost Any service contract terminated May Be Without paying a fine. The law protects consumers. The Law Protects Consumers.


- The CIA knows everything. - The CIA knows everything. For the National Security Agency U.S. For the U.S. National Security Agency is simple and sniff the network involved in the activity of any user. is simple and sniff the network Involved in the activity of Any user.


- Facebook applications know more than necessary. - Facebook Applications Than know more necessary. You almost do not even realize, but when you install any new application, they are given permission to enter all our files and data, including those that are not visible. Almost Not Even You do realize, But When you install Any new application, They Are Given permission to enter All Our files and data, Including Those That are not visible.


- Geolocation Data are not private. - Geolocation Data Are Not private. Operators to store data on calls from their users, their movements and their rate plans, and eventually, they can sell this to others. Operators to store data on Their calls from users, Their Movements and Their rate plans, and Eventually, They sell this to Others.

No comments:

Post a Comment