Friday 8 July 2016

‘Pokemon Go’ rolls out on iOS and Android



‘Pokemon Go’ Begins Rolling Out On Android And iOS, Australia & New Zealand Users To Experience It First

Pokemon Go, the highly awaited augmented reality mobile game from Nintendo and developer Niantic Labs, is out now for both iOS and Android users in select countries.
Unfortunately, even though it is now available on Playstore and the Appstore, it appears to be unavailable for some US users at this time. Only users in Australia and New Zealand can access the app on both Android and iOS.
The current version requires approximately 60MB for Android users and 100MB for iOS users. According to the Google Play store, the app requires Android version 4.4 and up, while iOS 8.0 or later is required for iOS devices, notes the Apple’s App Store. Currently, only the first generation of 151 Pokémon are available, but The Pokémon Company plans to “release” addition generations into the wild in the future.
So, what is so exciting about Pokeman Go? Players are split into three groups – Blue, Red and Yellow, like the first three games – as they attempt to catch Pokemon without fighting them and take over gyms. This doesn’t make the battles any less impressive though, since the 3D models used for the Pokemon look great.
The game actually uses the smartphone’s camera to have Pokemon appear in their own homes or even the streets of their town and cities!
When the player catches a Pokemon, they can train them and help them become more powerful. Players are then given the chance to catch even stronger and rarer Pokemon. Catching multiple Pokemon will entail the players with awards in the form of candies that can change the Pokemons to their next forms.
According to Polygon, “Pokemon Go” took some time to develop. Recently, Nintendo opened field testing for the game in the United States, Japan, Australia, and New Zealand.
While the app is free to download, it offers in-game purchases between $0.99 – $99.99 per item.
So, what are you waiting for? Just, go and relive your childhood days.

Linux distros to ditch 32-bit support



Linux to abandon 32-bit support for old PCs/laptops in coming months

Linux started off in 1991 as an alternative to the world’s most popular operating system Windows. The new users adopted Linux because it was open source and it ran beautifully on their older PCs that didn’t have the horsepower to run newer versions of Windows. However, after 30 years, Ubuntu, a majorLinux distro is looking to end support for 32-bit processors.
Ubuntu’s Dimitri John Ledkov has issued a new proposal on the Ubuntu mailing list recently which states that the company will be winding down support for 32-bit processors. Ledkov uses the justification for ending 32-bit support saying that major software vendors and products like Google, ZFS and Docker will be ending 32-bit processors so it would not be feasible for Ubuntu to continue doing so.
“The key point here is a lack of upstream software support and upstream security support on i386 rather than actual hardware being out of stock and/or old,” he wrote in the proposal.
Though 32-bit systems worldwide are on the way out, it’s not denying that governments continue with older PCs due to lack of funds. It remains to be seen how these vintage systems cope with the new Ubuntu proposal.
64-bit processors become an order of the day in 2000s when AMD and Intel came out with 64-bit processors. In last 20 years most PC/laptop processors sold by the two CPU makers were 64-bit chips. It also helped that 64-bit chips blew past the 4GB memory limit giving users more power.

Ubuntu and Canonical to drop 32-bit support

Ledkov said Ubuntu wants to stop providing new 32-bit installations at Ubuntu 16.10. By Ubuntu 18.10 in October 2018, Canonical would completely end support for 32-bit software and encourage running it in a virtual machine or container instead.
Canonical is not the first Linux vendor to end 32-bit support. Red Hat stopped offering a 32-bit version of Fedora Server as of Fedora 24, but it does still offer 32-bit Fedora Workstation. And OpenSUSE Leap never offered a 32-bit image.

Find out if your Facebook account has been hacked or not?



This is what you need to do if your Facebook account is hacked

There is always a chance someone can obtain your password and log into your online account. And, Facebook is no different.
Hackers can breach a Facebook account in different ways. For instance, spammers hack Facebook accounts to gain access to your following. Similarly, automatic logins through Facebook allow hackers access to several different site accounts once they have taken over your Facebook account. Your account also provides the hacker a lot of personal information about you that can be used to steal your identity.
However, there is a simple way to check if you are worried that your account has been hacked. Go to the arrow in the upper left-hand corner of your Facebook page and click on it. In the menu, choose Settings. A new menu will pop up. Select Security and then Where You’re Logged In.
It will provide a list of all the devices that you have logged into and their locations. If there is a login you are not able to identify, there are chances that you may have been hacked. If you notice anything that is not you, click End Activity on the right side of the log to end the session. The hacker will be logged out, momentarily.
In addition, below are some other ways to know if your account has been hacked:
• Your name, birthday, email or password has been changed
• Someone sent out friend requests to people you don’t know
• Messages have been sent from your account, but you didn’t write them
• Posts are appearing on your timeline that you didn’t post
Steps to be taken if your Facebook account has been hacked
Once you click on End Activity, change your password right away. Subsequently, get Facebook’s help. In the event you have been hacked, Facebook has a system to help you.
Go to the Facebook help page, click on I think my account was hacked or someone is using it without my permission, and then click on secure it. Facebook will take you to a page where you log in and then follow the steps to secure your account.

Tuesday 28 June 2016

Now Facebook Is Using Your Location To Suggest New Friends


Facebook suggests new friends by tracking your location, here is how you can stop this creepy thing

Next time you see a suggestion from Facebook to make a local bully your friend, you should know that Facebook has been snooping on you using the location. Facebook suggests new friends who may be your enemies or anti-socials from your area and this may sound very creepy to a privacy loving citizen.
Facebook in the recent past has been in the news for invasion of privacy of its users. According to a report from Fusion, Facebook shows you “people based on mutual friends, work and education information, networks you’re part of, contacts you’ve imported and many other factors.”
If you have got location services enabled for Facebook on your phone, the company can use that data to generate “People You May Know” suggestions, which is partly based on where you are and where you have been. In other words, Facebook tracks the location of your smartphone to suggest “People You May Know” as friends.
“People You May Know are people on Facebook that you might know,” a Facebook spokesperson said. “We show you people based on mutual friends, work and education information, networks you’re part of, contacts you’ve imported and many other factors.” The Facebook spokesperson further added, “Location information by itself doesn’t indicate that two people might be friends. That’s why location is only one of the factors we use to suggest people you may know.”
So, for instance, if you and others have the Facebook app installed, and you all hang out at the same places – such as someone who went to college with you, or someone that shops at the same target, or as a nearby cafe or your apartment block – Facebook will gather your locations, put them together and suggests you friends accordingly.
The only way to avoid this is to check the privacy settings on your smartphone. Most of us have Facebook set to “always,” but in reality it should be set to “never” if we don’t want them to do some scary stuff. However, note that your smartphone won’t be able to suggest nearby events or notify you when a friend is nearby if you change it to “never.”

Sunday 26 June 2016

Users are Switching Back To Android Smartphones From iPhones



Reasons why Android smartphone users go for iOS and then come back.

OS vs. Android has always been a burning topic for debates all over the internet. There are numerous users who have changed their Android smartphone with an Apple iPhone and later regretted their decision. In this article I’ll point out the reasons for which Android users switch to iOS and the problems they face after it.
Okay! First lets discuss about exciting features of Apple devices:

1. Retina Display

A display having pixels density more than 300 PPI(Pixels Per Inch). Apple used the term “Retina Display” for its such displays. It was said that the visual quality offered by retina display will be beyond amazing. It is true, whether you’re watching a movie, playing a game, reading a document or doing any task with your phone, the display will make working with your Apple device a visual delight.

2. Smooth Operation

Yes! This is definitely an attractive “feature” of Apple phones and tabs. When we compare an Android device and an Apple device having similar hardware( RAM size, Processor cores etc), we quickly find out that Apple device performs far much smooth than the Android device. Android users can be seen often complaining about how installing a new game converted their phone into a brick, Apple users seldom face such situation.

3.Camera

The camera of Apple devices is always ahead of the time. That said, an Apple phone or tab having a camera of specific megapixels will always beat the Android phone or tablet having same megapixels. Thanks to the big aperture of the camera lens, decent extra features and better image processing offered by Apple.
This is not it. The list is pretty long but I’ve mentioned the major factors only. Now lets have a look at what actually comes along these features which we get for paying large amount of extra money.

1. No Expandable Memory

Actually it is expandable on iCloud only. And since Android users get used to having an option of increasing the memory just by buying an SD card, it is not easy for them to handle this surprise. So, they have limited memory, the additional stuff can be put on iCloud, which is a paid service itself.

2.Nothing can be Customized :

Customization is almost nothing in Apple phones when compared with Android ones. Google works extensively on its UI to make it attractive and flexible at the same time. Users can personalize their phones on drag-n-drop basis. Although Android devices too have some restrictions but the extent is very different between these two.
So, if you want the freedom to change things at a level similar to Android, you’ll need to jailbreak your Apple device.

3.The Sliders are Annoying:

If you need to lower brightness in your Android, you just open the brightness status bar and put your thumb to the desired place and the brightness is set to that level. But in Apple you have to put your thumb on the slider and then slide it to the desired position, this is damn irritating for an ex Android user.

4.Price is always Sky High:

And no one knows why Apple never worked on providing affordable phones to its users. And the price always depletes to its half in two years. Most of the iPhone lovers are seen to buy an iPhone just after two or two and a half years after its launch.
Well, these were the points one needs to keep in mind while switching. Above all Apple phones and tabs are amazing in their quality. And Android is affordable yet amazing.

Friday 24 June 2016

Now you can Create,View & Upload 360-degree photos on Facebook




Tutorial For Uploading, Checking and Viewing The Awesome 360-Degree Photos On Facebook

Facebook has now officially introduced support for 360-degree photos, an immersive photo that allows you to view and upload 360-degree photos on your News Feed. The feature called “360-de Photos” allows Facebook users to capture a panorama or 360-degree photo on their smartphones, using either the native camera app or a third-party app, and then post it to their Facebook News Feed.
In other words, all you need to do is capture a panorama image and post it like a normal photo. Facebook has its own feature to make it a 360 degree image. There’s also 360-degree video, where you’re inside a moving sphere rather than a static one.
Last month, Facebook announced that 360-degree photos would arrive in the News Feed. By introducing this feature now, Facebook is looking to increase its user base by dragging the average consumer into virtual reality, as they hope that many of the people may find this feature very useful. This new feature is available in smartphone as well as desktop.
In the official release, Facebook product manager Andy Huang wrote, “Along with 360-degree Photos from your friends and family, you can discover stunning new 360-degree Photos on Facebook from public figures, publishers, and other organisations. 360-degree Photos give you the ability to take the stage in front of 100,000 fans with Paul McCartney, get behind-the-scenes access to the Supreme Court via The New York Times, visit the International Space Station with NASA, and more.”
It is very simple to create, view and upload 360-degree photos on Facebook. In this article, we help you get accustomed to the new feature.
To create a Facebook 360-degree photo, you will need to take a panoramic photo using an iPhone, iPad, Samsung device, 360-enabled camera, or using various apps. Once you have taken a panoramic photo using one of the above options and uploaded it to Facebook, it will automatically be converted into a 360-degree photo.

However, keep the following points in mind:

  • You can upload a 360-degree photo the same way you would upload any other photo.
  • If you upload a panorama that’s wider than 100 degrees, it will automatically be converted to a 360-degree photo. You can only upload a single 360-degree photo at a time on Facebook. (You can also upload a 180-degree panoramic photo).
  • Not all panoramic photos you take from your smartphone or camera will be converted to Facebook 360-degree photos.

You can use one of the following devices or apps to take your own 360-degree photos.

Following camera’s support 360-degree photos
  • Ricoh Theta S
  • Giroptic 360 Cam
  • Samsung Gear 360
  • LG 360 Cam
  • IC Realtech ALLie
  • 360Fly
  • Panono
You can use your iPhone or iPad support for 360-degree photos
  • iPhone 4S or newer
  • iPad mini 2 or newer
  • iPad Air and iPad Air 2
  • iPad Pro
You can use your Samsung Galaxy Phones
  • Samsung Galaxy S5 or newer
  • Galaxy Note 2 or newer

Photo Sphere Apps or Devices: Take a panorama using Street View, Google Camera, Cardboard Camera or Theta S.

Image-Stitching Software: The final option to create a 360-degree photo is to use image-stitching software like PTGui.

How to upload a 360-degree photo on Facebook?

Uploading your finished 360-degree photo to Facebook is as simple as uploading a normal photo.
Open the Facebook app (make sure you are using the latest version of Facebook for Android and iOS) > tap the status tool > select Photo/Video > select your photo > tap Post.
You can also view the 360-degree photos from the Desktop version of the social media website. In addition, you can also view 360-degree Photos on the web with Chrome, Safari or Firefox.

How to watch a 360-degree photo?

All 360-degree Photos in Facebook are marked with a compass icon on the right side of the image. This will help you to view the image from every section. You can either view the 360-degree photo by dragging your finger across the photo or moving your phone to see the full 360-degree view.
Simply tap the photo to view the 360-degree photo in fullscreen and enjoy the awesome 360 degree vista.

Things You Should Know About Iphones & Ipads 'Jailbreaking'



What is Jailbreaking, How does jailbreaking work? Why do jailbreaking? Jailbreaking of iPhones and iPads explained

You may have heard from your friend who owns an iPhone saying that he has jailbroken it. You may have wondered what actually is jailbreaking. Lately, the term “jailbreaking” has been doing the rounds of the internet. While it may sound like a vague illicit term, it has nothing to do with breaking out of prison. You may have heard of iOS. Consider Apple’s iOS ecosystem to be a jail and to escape it using a hack is jailbreaking. To know the detailed explanation of what is jailbreaking and its uses, read on…

What is jailbreaking?

Jailbreaking is basically used in connection with the iPhone, the most ‘locked down’ of the mobiles on sale today. iOS jailbreaking is the process of removing software restrictions imposed by iOS, Apple Inc’s operating system, on its devices including the iPhone, iPod touch, iPad, and second-generation Apple TV. Jailbreaking is done by using software exploits, and it permits root access to the iOS file system and manager, so applications, extensions, and themes unavailable through the official Apple App Store can be downloaded.
In general, Jailbreaking in general means breaking the device out of its “jail.” It allows you to install apps that haven’t been approved by Apple, customise the interface in various ways, and generally make iOS.
While Apple naturally wants all its users to run safe apps and stable software, jailbreakers select to take a little more risk for a little more control over their devices. The term is also used in reference to various other devices, from Android smartphones to Kindle e-readers.

A history of jailbreaking

When it comes to computer science, a jailbreak comprises removing restrictions of some kind in the software on a device. The term first became prevalent in regards to the iPhone. It is a hack that gains access to areas of the iPhone, iPod touch or iPad that users are not supposed to mess with. Typically, this is an immediate prelude to either installing cool programs, unlocking the handset for use with another cellular network, or both.
Since it first appeared, the term “jailbreaking” has been used to refer to adapting the code on several other devices, from phones to games consoles. There’s no one fixed definition, so people sometimes use it to talk about putting custom software on mobiles or removing DRMrestrictions on movies.
It’s closely connected to terms like “cracking” (software) or “rooting” (phones). The latter process is a little bit like the Android version of a jailbreak, getting around protections put in place by manufacturers to install alternative mobile OSes like CyanogenMod. These terms are sometimes interchangeable.
Jailbreaking is still most often used in reference to iPhones: iOS jailbreaking started as soon as the original iPhone became available in July 2007 and as of June 2016 has continued into the present day. Apple has responded with updates to iOS patching exploits and with new hardware. In order to apply a jailbreak, you will have to generally pause automatic iOS updates.
One of the reasons for jailbreaking is to expand the feature set limited by Apple and its App Store. However, with iPhone apps now given more access to the OS, jailbreaking is rarer than once it was, and majority of the people won’t even think of doing it. However, if you actually want to control the way your iPhone looks and works, it’s relatively simple to do and won’t cost you anything… although there are disadvantages.

The results of jailbreaking

In general, jailbreaking give you more charge over your device: for instance, installing your own screensavers on a Kindle, or adding extra icons to the iPhone home screen dock. Instead, of Amazon or Apple or anyone else, you become the ‘administrator’ of your device with all the appropriate rights.
You can install any app from the Cydia store after a jailbreak as far as the iPhone is concerned. A good example of this would be retro gaming emulators that are excluded by Apple from its own app store, as they let you play older computer games without buying the original copies. However, it is freely available on Cydia.
You can make changes to numerous aspects of the iOS interface, replace Safari and Messages with alternative default apps, and so on. In contrast, you will no longer be able to receive automatic updates for each new version of iOS directly from Apple. In this case, you will be required to wait for the appropriate hack from the jailbreaking community.
Since, you have more control over your device there are security risks too as well as on all the apps that run on it. Jailbreaking also allows software piracy, so apps and games can be distributed for free. Basically, you are entrusting the developers of all the apps you install rather than Apple.
Most iPhone security scares only affect jailbroken phones because they don’t have the same security measures in place as standard iOS. So, the decision is entirely yours if you think it is worth taking the risks for that extra flexibility. However, at the same time, you also need to watchful if you are thinking about jailbreaking a device.

How a jailbreak works

A jailbreak basically ‘unlocks’ a device to give it skills beyond those allowable by the manufacturer that made it. Usually, forums and sites by hacking communities who want to promote unlimited device use provide jailbreak code for free.
Currently, much to Apple’s annoyance, the legal status of jailbreaking is unclear in most countries; while many prohibit tampering with digital locks they tolerate jailbreaks that do not infringe on copyrights. You will definitely void the warranty on your phone if you jailbreak though, which means if something goes wrong you have absolutely got no safety net to fall back on.
While most jailbreaks come with desktop tools and full instructions to apply the new code, it will also be helpful if you have some technical knowledge as well. As mentioned earlier, new updates from Apple (or Amazon or whoever) usually stop jailbreaks from working, so you will have to frequently disable automatic updates along the way.
Finally, if you are making a decision to get into the world of jailbreaking, you may have to be prepared for a little bit of trial and error. Also, it would be advisable to do some research online and get to know the pro and cons of jailbreaking before plunging in.



WhatsApp Likely To Be Banned In India For Aiding Terrorists



Supreme Court To Hear Plea For Banning WhatsApp In India

Facebook owned WhatsApp is facing a major legal test in India, which is its prime market and has the most users from the world. The popular cross-platform messaging App is being sued by a RTI activist for aiding and abetting terrorists who wants Indian Supreme Court to ban it.
The Indian Supreme Court will be examining whether WhatsApp should be banned following a Public Interest Litigation filed by Haryana based RTI activist Sudhir Yadav.
Yadav PIL petition claims that ever since WhatsApp started to enable its every message with 256-bit encryption since April, it cannot be broken into and that is abetting terrorist who pass on important messages through it.
“Even if WhatsApp was asked to break through an individual’s message to hand over the data to the government, it too would fail as it does not have the decryption keys either,” Yadav said in his petition.
Yadav’s PIL states that the Indian authorities would need 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,935 key combinations in order to break the WhatsApp encryption and that is pretty impossible even for a supercomputer.
Yadav said that before approaching the Indian supreme court, he had approached the Indian telecommunications watchdog, Telecom Regulatory Authority of India (TRAI) and the Ministry of Communications and IT for banning WhatsApp but had not received any reply.
The apex court is now scheduled to hear his public interest litigation (PIL) petition on 29 June. Given Indian Supreme Court’s record in dealing with PIL’s, Yadav’s petition may be headed to dustbin but there is a chance that the Supreme Court may call top WhatsApp officials to depose before it or hand over the encryption keys to Indian authorities.

Wednesday 22 June 2016

15-Year-Old Windows XP Refuses to Die Despite Windows 10 Push


Windows XP was launched no less than 15 years ago, but shockingly, it continues to be one of the most-used desktop operating systems around the world, and statistics show that it still won’t go away too easily in the coming years.


Support for Windows XP ended on April 8, 2014, and despite Microsoft’s warnings, users who were still running it at that time refused to upgrade. And what’s worse, many are still doing it these days, despite the fact that Microsoft launched Windows 10 and pushed so hard for everyone to adopt it.
A quick look at market share figures shows that Windows XP not only didn’t lose too many users when Windows 10 launched, but it even gained more, managing to improve its score for two consecutive months. As compared to May 2015, Windows XP only dropped approximately 4.5 percent, which is extremely low for an operating system that no longer receives updates.
What happened when Windows 10 launched?
One year ago, Windows XP was running on 14.60 percent of desktop computers in the world and gradually dropped until it reached 11.72 percent in July, the same month when Windows 10 officially got to see daylight.
In August, however, Windows XP recovered to 12.14 percent and then jumped to 12.21 percent the next month, before eventually starting to decline once again in September.
The drop continued until January 2016, when Windows XP once again managed to increase its share from 10.93 percent to 11.42 percent, thus going back to the same level as six months before.
In the last few months, Windows XP has continued to lose market share points, but it does it at the slowest and most painful pace possible. It dropped from 10.90 percent in March to 10.63 percent the next month before eventually going down to 10.09 percent in May.
Without a doubt, it’ll take many more months until Windows XP disappears completely, but these stats also show that Windows 10 still can’t make a difference no matter how hard Microsoft is trying.
This is a 1.2GB ISO file that offers XP users a wealth of "missing" features sorted into categories such as Support, Applications, Games, Multimedia, PowerToys, Downloads, Hidden Options, TabletPC and Media Center.
View the screenshots below to see some of the features it can add to XP.





Tuesday 21 June 2016

Top 5 Linux Commands to prevent network connectivity issues


These five helpful networking commands to monitor connectivity issues on Linux PCs


Linux is everywhere and nearly all Linux distros need network connections to offer their services. Network connection failures is one of the major headaches if you are using a Linux based PC or a system. Because if your network fails, all other services will fail and you will be left with a dud system.  For this reason, the administrator must have the appropriate tools and commands to analyze and troubleshoot network connectivity.
Here are five most helpful Linux networking commands to ensure continuity.

1. ip

ip is known as the Swiss Army knife of Linux networking commands because of its ability to work with subcommands. It is designed to work with ip link, to manage and monitor the network link, ip addr to manage IP addresses and ip route to manage the routing table. As a Linux professional you can use ip link show, ip addr show or ip route show to see the current link state, and address configuration, such as router configuration. To go beyond that, use ip addr add dev eth0 10.0.0.10/24 to temporarily assign an IP address to the eth0 network interface.
For more advanced users, ip has advanced options setting as well. You can use ip link set promisc on temporarily sets a network interface to promiscuous mode, allowing it to capture all packets sent on the network — not just packets addressed to its own media access control address. The ipcommand and its subcommands work well for troubleshooting connection issues, but everything done with this command will disappear after rebooting your machine.

2. tcpdump

Tcpdump is another very popular Linux networking command to analyze network activity. This packet sniffing command captures traffic that goes through a specific network interface. If you run it without any arguments, such as in tcpdump -i eth0, the command will reveal large amounts of packets passing by. Another common option is to use -w, as in tcpdump -i eth0 -w packets.pcap, which writes the result to a file that admins can analyze later using the Wireshark utility.

3. Wireshark

Most of Linux users know Wireshark utility, which is also popular with hackers and security researchers. Wireshark is a graphical tool allows you to analyze and sniff network packets. While tcpdump dumps network traffic on the stdout, admins can use Wireshark to click through network communication streams within a convenient graphical interface. This versatile tool can perform a live packet capture, but also can read in a capture file that was created with another tool, such as tcpdump.

4. ethtool

ethtool is for advanced Linux users. If you’re working with traditional physical network cards instead of interfaces in a virtual machine, you’ll like ethtool. This tool allows Linux users to monitor and set different properties of the network card. For example, use ethtool -i eth0 to find hardware-related information about your eth0 interface, orethtool -S eth0 to get usage statistics on packets received and sent through that interface. The command ethtool -p eth0 will cause the LED on the back of the network card to blink, which is a useful notification to swap cables on eth3, for example. But before doing so, verify that you’re working on eth3 instead of another network interface.
Remember, ethtool is dependent on drivers which you use so you may not always receive useful information.

5. ncat

In olden days, Linux users used Telnet to make connection to a specific port in various distros. Ncat or netcat is a replacement for this old telnet utility.
Admins, for example, can use ncat somehost 80 to establish a connection on port 80 to a host named somehost, but ncat has more advanced capabilities, as well, such as establishing a connection between two hosts. Use ncat -l 4444 to have ncat listen on one host, and use ncat hostname 4444 to make a connection to that port from another host. By itself, that isn’t very useful, but using that connection in a pipe creates more options. For example, use ncat -l 4444 > somefile on one host andecho hello | ncat hostname 4444 on the other host, which will send the output of the command over the network to write it in a file on the other host.
If you use anyone of the the above utilities, you can troubleshoot your networking problems with ease. If you use a different utility to monitor your network traffic, kindly mention the same in comments for other readers.







Things You Should Not Do To Avoid Getting Banned On Facebook




 You should know what all is banned on Facebook to avoid getting banned
We should all agree that Facebook is a whole new different type of ecosystem than what we usually encounter. Its members are normal people, activists, freedom fighters, drifters, drug addicts, politicians, etc. and keeping your sanity and posts within the realms of what is allowed is a big job.
We have had 3 students livestreaming their sexacapes on Facebook, a student livestreaming a movie premier earlier. But what caught everybody’s notice was a recent murder of a 28-year-old Chicago man was captured live on Facebook. One minute the man was hanging out with friends and livestreaming on Facebook. The next, there are sounds of gunshots and screaming. Watching this gruesome spectacle on Facebook raises questions about how can the network giant allow such livestreaming.
He was shot Wednesday night, and yet Facebook hasn’t pulled the video from its platform, which begs the question: Why not?
According to Facebook, the video doesn’t violate its community standards because it doesn’t believe the video celebrates violence. According to the Facebook gods, its falls under a different category: Raising awareness. Therefore instead of removing those types of videos, Facebook marks them with a user warning.
Now consider another post in which an ISIS sympathizer killed a police commander and livestreamed it earlier this week. Facebook immediately pulled off that video. As said above, it is really a thin line which you have to adhere to prevent getting banned or suspended.
Facebook’s community standards are broken into eight categories, including attacks on public figures, bullying and harassment, sexual violence and regulated goods. But exactly what it allows and when isn’t clearly defined and may rest solely in the hands of someone at Menlo Park.
The community standards state that it “aims to find the right balance” to keep people safe, encourage respectful behavior, acknowledge cultural diversity, and empower people to control what they see in their feeds.
But you should remember that while a video of a murder is OK by Facebook’s standards, showing a woman’s nipple isn’t. The company does, however, “always allow” photos of women showing post-mastectomy scarring or actively engaging in breastfeeding. Although some genuine breastfeeding posts have been removed. More so before 2014, moms had been complaining that their breastfeeding pics were removed. In 2014, Facebook relaxed its breastfeeding policy a bit to allow for these types of non-sexual images.
However that took considerable effort and a hashtag movement, #FreeThe Nipple, which brought Facebook’s attention to the banning of female nudity on sites like Instagram and Facebook.
Facebook does allow nude paintings, sculptures, and other art that depicts nudes — but sometimes it gets it wrong. Facebook has in the past removed many paintings which it deemed as gross including an artwork depicting Donald Trump’s babydickSimilarly a Facebook post by Lee Rowland of the ACLU was removed because it contained a photo of a nude statue. Facebook’s head of policy management Monica Bickert later accepted that the photo didn’t actually violate Facebook’s policies but was just a mistake.
Facebook draws a hard line on selling prescription drugs, marijuana, firearms and ammunition– which it says are prohibited on the platform.
But you are allowed to post photos of, say, yourself smoking marijuana out of a bong.
Facebook, like other online communities, relies on a mix of user reports and internal moderation to flag inappropriate or illegal content.
That means Facebook has 1.65 billion people helping enforce its standards — but what’s considered “appropriate” is far from universal.

Guess What: iOS 10 has already been jailbroken



 

Apple’s iOS 10 successfully jailbroken even before it is released to its users

iPhone users eagerly await any news of iOS jailbreak because it allows them to escape the clutches of closed door Apple ecosystem and install their own Apps. However it has seldom happened that a jailbreak has been released even before Apple had released a closed beta of its operating system.
This is happening now as iH8sn0w, the iOS hacker, who developed Sn0wbreeze and iFaith, has successfully jailbroken the early build of iOS that were out for developer accounts and also has a video to prove it. Only at the start of this week, Apple had unveiled its beta developer edition of iOS 10.
A few days ago iH8sn0w hinted that he had a jailbreak for iOS 10 when he tweeted that Cydi worked fine with iOS 10. However, the hacker can now be seen in the video with a successfully jailbroken iPhone 5 running Cydia on iOS 10 with no reported crashing “for now?”


The video also shows the jailbreak running on a 32-but device, which is also teasing the verbose mode. It can be assumed that his jailbreak depends on his older iBoot exploit, which allows devices to be jailbroken for life. However, this could help other jailbreakers accelerate development of a jailbreak that works across all devices, even 64-bit one such as the iPhone 6s or iPhone 6s Plus.
However, there is no clarity as to whether the video released by iH8sn0w was to show that it is possible to jailbreak iOS 10, or to keep for his own research and usage purposes rather than issue it to the public.
On the other hand, many are still desperate for an iOS 9 jailbreak, as iOS 10 approaches this fall. The last major release was in October last year, when the Pangu Chinese team launched its popular tool for iOS 9.0-9.0.2 – one that many people are still using and as a result, are stuck on iOS 9.0.2.
While there is still no real jailbreak for the latest public release of iOS 9.3.3, we might have to wait until iOS 10 is officially released to the public before being able to install the jailbreak.