FASTEST KICK STARTING

Use 2 mig file with same ID. So that you will have a clone of your ID. Enter in to the room from one mig file and after that enter the second mig file. Now the first mig file you entered in the room will be in the back room. Now leave the room from the second mig you entered (which is the active one) and again take chat rooms and get ready to enter the room. But don't enter the room yet, just keep it ready to enter. Take the person who you want to stat a kick from the one in the back room and make it ready to request a kick Enter in to the room from the one which is ready to enter in to the room and at the same time request the kick from the one in the back room. No one else can start a kick to kick you. No one will be as fast as you.

FASTEST KICK STARTING

Use 2 mig file with same ID. So that you will have a clone of your ID. Enter in to the room from one mig file and after that enter the second mig file. Now the first mig file you entered in the room will be in the back room. Now leave the room from the second mig you entered (which is the active one) and again take chat rooms and get ready to enter the room. But don't enter the room yet, just keep it ready to enter. Take the person who you want to stat a kick from the one in the back room and make it ready to request a kick Enter in to the room from the one which is ready to enter in to the room and at the same time request the kick from the one in the back room. No one else can start a kick to kick you. No one will be as fast as you.

Windows Phone 7 has uphill climb in winning mobile market

Developers reluctant to create apps specifically for Windows.

To get an idea of how far behind Microsoft Corp. is in the mobile and tablet space, look no further than Brian Greenstone.

The 43-year-old president of Pangea Software Inc. has built a thriving business developing games for Apple Inc.'s popular iPhone and iPad. Among his best sellers: Enigmo, in which players try to catch drips with a system of pipes.

Greenstone, who has developed games for Windows in the past, says he won't bother developing a version specifically for Microsoft, because Microsoft hasn't got a significant presence in mobile products.

Click here to find out more!Pangea "will simply do quick ports of their iPhone" apps to Windows Phone 7, the latest version of Microsoft's mobile operating system, Greenstone says. Porting means modifying a game to run on a system other than the one for which it was designed.

Greenstone's reluctance to develop apps for Windows underscores just how far Microsoft has fallen behind rivals Apple and Google Inc. in the fast-growing mobile market. Windows Phone 7, a well-regarded but little-used operating system, has just 8% of the mobile market, according to comScore. Apple and Google, on the other hand, control a combined 56%. Microsoft also doesn't have an operating system designed for tablets, a hot market that is cutting into PCs, Microsoft's strong suit.

On Friday, the tablet market will likely get even hotter, when Apple begins selling the second generation of its iPad device.

FBR Capital Markets, an investment bank, sees tablet sales eating away 8% of the PC market's growth in 2011. Redmond, Wash.-based Microsoft is still reliant on PC product sales, which generated 57% of its $36.1 billion in revenue posted in the first half of the fiscal year.

Microsoft hasn't said when it will have a tablet-compatible OS on the market, though it did say in January that the next version of Windows will work on tablets.

Microsoft declined to comment for this story.

Analysts say Microsoft's tablet-ready OS will probably be available by next year's holiday shopping season. By that time, Apple will likely be on the third version of its iPad product and Google will have refined its Android mobile OS, which has already been optimized for

Symantec Finds Fake Google Android Update

Symantec found an application called the "Android Market Security Tool" that is a repackaged version of the legitimate update by the same name that removed the DroidDream malware from infected devices.
The fake security tool sends SMSes to a command-and-control server, wrote Mario Ballano of Symantec.
The company is still analyzing the code, which it found on a third-party application market targeted at Chinese users.
"What is shocking is that the threat's code seems to be based on a project hosted on Google Code and licensed under the Apache License," Ballano wrote.
The fake security tool shows that hackers are taking an interest in Android, which is the fastest growing mobile OS according to analyst Gartner. More than 67 million Android devices were sold last year.
Google took the rare step last week of forcing the "Android Market Security Tool March 2011" onto devices to remove DroidDream. Typically, phone manufacturers and operators are responsible for issuing updates to devices, not Google.
The move came after more than 50 applications within Google's official Android Market were found to be contaminated with DroidDream, which stole information such as the phone's International Mobile Equipment Identity (IMEI) number and the SIM card's International Mobile Subscriber Identity (IMSI) number, and sent it to a server located in Fremont, California.
DroidDream could also download other code to a person's mobile phone. It used two exploits called "exploid" and "rageagainstthecage" to infect the phone. Google has patched the vulnerabilities in Android versions above 2.2.2, but many Android users do not have the latest version of the software.
The "Android Market Security Tool March 2011" does not actually fix the vulnerability that allowed DroidDream to infect phones but merely removes the malware, wrote Timothy Armstrong, a junior malware analyst with Kaspersky Lab, in a blog post.
The intervention by Google also underscores problems with how Android is updated, he wrote.
"Due to the nature of Android in its current state, it's very difficult and expensive to push security updates as you would on a desktop operating system like Linux or Windows," Armstrong wrote. "Unlike iPhone, which installs patches via iTunes, or Windows Mobile which uses ActiveSync, Android works almost entirely via over-the-air communication."
Google officials contacted in London did not have an immediate comment.

Latest Mobile Phones 2011 – a trend towards tablet-like devices

The mobile phone industry is going to experience a lot of hi-tech inputs in latest mobile phones 2011. With changing life styles users are tend to use devices that can take care of all their technical requirements. Apple first came with concept of iPad and it is already a hit in the market. The company has recently introduced its next version with improved features. However, all other mobile phone manufacturing companies like LG, Samsung, Sony Ericsson, Blackberry, Nokia and others are also in row to come with handsets that can serve users with several tablet like features as well.

The Motorola Xoom an example of Android device that comes with wider display screens and huge applications in one. One can use latest and coming soon mobile phones of this year in several purposes. There will be assortments of uses like you can watch videos with great resolution in the larger screens. Camera features will be upgraded high mega pixel cameras included into it as well. Moreover, you also can get faster Internet connectivity with advanced browsers included into them. There will be significant up gradation in software in them and with hi-tech processors in action, you can expect much of speed in these devices as well.

Many users who want to make documents and spreadsheets with their handsets can find several options in latest handsets of this year also. As far as space in these devices, you will get more than expected with larger space in internal memory and the facility to expand that with cards. Not only that these latest mobile phones 2011 will bring forth range of pluses with handsets, but also there will be assortments of convenient tariff plans from all networks like Vodafone, Orange, O2, T mobile and others with them as well. Free gifts are supposed to pay more dividends to customers and with that there will be large cut on call rates with them. The trend of making online comparisons in the Internet will continue with high end facilities with them. Moreover, you can get them in more competitive price ranges this year. Thus, hunt for better handsets tend to increase and all manufacturing and network companies are also in mission to pull customers with more beneficial packages as well.


Van Dameny shares his knowledge on technical gizmos which makes you able to find the plans that best fits your needs. He has won appreciation from people for write about Mobile Phnes Deals, Best Mobile Phones and latest Mobile Phones.
 

Five Big Security Threats for 2011

We introduce you to this year's batch of security vulnerabilities to watch out for.


Online malicious activity was a major headache in 2010, and so far, 2011 is no different: We've seen scams and malware on Twitter, Facebook, and the Android Market, as well as a rise in politically motivated online attacks. But that's no surprise to security experts such as Graham Cluley, senior technology consultant for security firm Sophos. Cluley says that Sophos analyzes about 95,000 pieces of malware every day that is either brand-new or a variant of an older attack.
The bad guys are hard at work figuring out new ways to infect your system. The good news is that the latest antivirus programs do a better job than ever at detecting suspicious activity before it can damage your computer.
But security software can't always protect you; sometimes the best defense is a dose of common sense and a little bit of knowledge about what to watch out for. Whether it's fake antivirus scams, malware on social networks, or good old-fashioned e-mail attachments loaded with viruses, it pays to be on your toes so you don't end up becoming a victim to identity theft, a raided bank account, or even a home invasion.
So here's a look at 2011's five big security threats, and the steps you can take to avoid becoming a victim.

Threat 1: Mobile Apps



What it is: It isn't surprising that smartphones are a hot new malware target: 85 percent of adults in the United States own a mobile phone, according to a recent study by the Pew Internet and American Life Project, and the smartphone market is growing at a rapid pace.
As recently as March 1, more than 50 third-party applications on Google's official Android Market contained a Trojan called DroidDream. When you run a DroidDream application for the first time, the malware gains administrator access over your phone without your permission, according to mobile security firm Lookout. That means it could download more malicious programs to your phone without your knowledge and steal data saved on your device.
Google was able to stop the DroidDream outbreak by deleting the bad apps from the Market and remotely removing malicious apps from Android users' devices, but it's only a matter of time before the next outbreak occurs.
And malicious apps on the Android Market aren't the only way that malware authors can target phones: A recent Android malware outbreak in China spread through repackaged apps distributed on forums or through alternative app markets.
The threat of malware, coupled with other security threats (such as data leakage from a lost phone) may soon impact your ability to use personal devices at work, according to Andrew Jaquith, chief technology officer of Perimeter E-Security. Companies may begin to set some serious ground rules for putting company data on personal mobile devices by enforcing "policies for passwords, device locking, remote wipe, and hardware encryption," Jaquith says.
Protect yourself: You can't trust that all apps on the Android Market are malware free. Make sure you read app reviews in the Market and on reputable app review sites such as PC World's AppGuide. And avoid installing any applications you get from unknown sources. That .apk file may be titled "Fruit Ninja" but in reality is a Trojan horse waiting to be unleashed. Don't forget that a number of mobile antivirus apps are available for Android, and it may be wise to have at least one installed on your phone.
Also, read an app's permissions screen carefully--it details what kinds of data an Android application can access (Google makes it mandatory for developers to have a complete list of permissions for every feature that an app has access to on your phone). You can find this list on every app's page in the Android Market (it appears right after you tap the button to download an app). See if you can uncheck undesirable permissions. If you're downloading a wallpaper application, for example, chances are it doesn't need to know your exact location.
iOS users aren't off the hook, either: Some bad actors have slipped by Apple's censors in the past despite the company's third-party app-vetting process. Over the summer, for example, a flashlight app that had hidden functionality got approved to the App Store. The actual risk may be low, but it isn't impossible for a seemingly legit app to have some hidden, malicious capabilities.

Threat 2: Social Network-Based Scams

Graphic: Diego Aguirre
Social networks such as Facebook and Twitter may be a great place to connect with friends, but they are also a breeding ground for malicious activity. Cluley says some of the most rapid growth in online attacks comes from social networks. In November, antivirus maker BitDefender made a similar statement, saying 20 percent of all Facebook users are active targets of malware.
Social network scams often take the form of phishing attacks that try to lure you in with photos or videos, and harvest your personal information or Facebook login--or worse, infect your PC with malware--along the way. Often, these links will come from Facebook friends who fall victim to these scams. You could also run across rogue Facebook applications that try to access your Facebook data and that of your friends.
While it's probably no big deal if scam artists find out what your favorite movies or quotes are, your profile may contain critical data--such as your date or place of birth, cell phone number, and e-mail address--that can be used to build a profile about you and even steal your identity. Such bits of information may be the final data point a bad actor needs to impersonate you online.
You could even become a specific target for criminals through social networks. In September, three young men ran a burglary ring in Nashua, New Hampshire, by looking at Facebook postings about people going out and then targeting homes they believed were likely to be empty. Police said they recovered over $100,000 in stolen property after cracking the ring, according to New Hampshire's WMUR-TV 9.
Protect yourself: Be wary of any social networking postings that offer you the chance to see a cool photo or video or making claims you know to be untrue--such as a recent Twitter scam that offered to let you see who is viewing your profile. Often, these scams can be stopped by just revoking the app in your security permissions and changing your account password. Another smart thing to do, according to Cluley, is to stop and ask yourself why a Facebook application wants to post messages on your wall or access your friends list. If you can't think of a good reason the app would need to do this, perhaps it's not worth authorizing.

Threat 3: Fake Antivirus

Photo Credit: Securelist
What it is: Although they've been around for a few years now, fake antivirus scams are on the rise, according to Cluley. In the last eight months, Sophos says, it has analyzed more than 850,000 instances of fake antivirus. Also known as "scareware," these scams start by convincing you to download a free antivirus program, sometimes appearing to be software from a reputable security company. Then the software claims your computer is under threat from a virus and you can save your system by buying a "full" version of the antivirus program for a one-time fee.
Once you do that, however, not only have you allowed more potential malware onto your computer, but you may have also handed over your credit card credentials to identity thieves. At that point, the bad guys can drain your bank account or steal your identity.
The irony of all this, says Cluley, is that these scams owe some of their success to the fact that we are becoming more aware of computer security. Since we want to protect ourselves as much as possible from malware threats, we become easily seduced by software promising enhanced security.
Protect yourself: First and foremost, make sure you are running a security program that's current--especially one that effectively blocks brand-new malware (see our reviews of the latest security suites and antivirus programs for which to buy). And never download a security program from a pop-up window you see online or from a third-party site.

Threat 4: PDFs


It may be the oldest online scam in the book, but e-mail loaded with malware attachments is still a big problem despite a high degree of awareness and robust antivirus scanning in Webmail clients such as Gmail and Yahoo Mail. Cluley puts the number of malware-related e-mails sent every day in the "millions," and says that "more and more spam is less about touting Viagra or fake degrees, but [is] turning malicious in nature."
PDF documents appear to be a prime method for these attacks, according to a recent report by MessageLabs, a division of Symantec. "PDFs are potentially one of the most dangerous file formats available and should be treated with caution...Because it is significantly easier to generate legitimate and concealed malicious content with PDFs," MessageLabs said in its February 2011 Intelligence Report (a PDF link--oh, the irony).
In 2010, 65 percent of targeted e-mail attacks used PDFs containing malware, up from 52.6 percent in 2009, according to MessageLabs, which further predicts that by mid-2011, 76 percent of targeted malware attacks could be using PDFs as their primary method of intrusion.
It's not just businesses that are targets of e-mail scams either. Sophos recently discovered an e-mail scam in the U.K. purporting to offer an $80 gift certificate to customers of a popular pet supply retailer.
Protect yourself: Make sure you are running an antivirus program and that it's up-to-date. Also, never open an e-mail attachment that you weren't expecting.
Last but not least, make sure that you keep Adobe Reader (or the PDF reader of your choice) up-to-date; Adobe regularly releases security updates that fix known flaws. The new Adobe Reader X has an updated security architecture that can better protect you against malicious PDF attacks.

Threat 5: War Games


State-sponsored malware attacks, industrial espionage, and hacktivism are on the rise, according to Perimeter E-Security's Jaquith. They may not be threats that affect everyone, but if you manage security for a business, they are the sorts of issues you should be paying attention to.
The hacktivist group Anonymous, for example, grabbed headlines this year for mounting attacks in defense of whistle-blower site WikiLeaks, and attacking government Websites in support of recent protests in Egypt, Tunisia, and Libya. The group also leaked a cache of e-mail messages from a security researcher who was trying to identify Anonymous members. "Whether it's WikiLeaks, Anonymous, or a Chinese or Russian attacker, theft of industrial secrets is shaping up to be one of the key issues of 2011," Jaquith says in a statement.
Protect yourself: If you are trying to safeguard your company's secrets or are worried about data leaks, monitor your company's network traffic for suspicious activity and conduct regular reviews of employee data access privileges.
The Internet may be filled with malware and potential threats, but that doesn't mean you need to panic. Keep your guard up, use common sense, and keep your software up-to-date, and you should be able to reduce your risk of falling victim to attack.

Connect with Ian Paul (@ianpaul) and Today@PCWorld on Twitter for the latest tech news and analysis

Opera opens mobile software store with Appia

HELSINKI (Reuters) - Opera Software unveiled on Monday a deal with privately-held Appia Inc to run a mobile software store for more than 100 million users of mobile browsers of the Norwegian firm.

Opera said in its testing state, the store had more than 15 million users in February, achieving more than 700,000 downloads per day, and establishing it among top 10 mobile application stores globally.

Since Apple's App Store opened in 2008 and created the market for mobile software sales dozens of companies have opened their own stores.

The revenue-sharing deal between Opera and Appia, which changed its name from PocketGear last month, lasts three years. The deal doubles Appia's 100 million subscriber-base.

Opera is the world's most used mobile browser ahead of Apple, Nokia and Google's Android, controlling 21.2 percent of the market in February, according to Web analytics firm StatCounter.

The iPhone, Nokia and Android browsers all have 15 to 18 percent market shares.