Google's calculator function is far more powerful than most people realise. As well as doing basic maths (5+6 or 3*2) it can do logarithmic calculations, and it knows constants (like e and pi), as well as functions like Cos and Sin. Google can also translate numbers into binary code – try typing '12*3 in binary'.
2. Site search
By using the 'site:' keyword, you can make Google only return results from one site. So for example, you could search for "site:hyip-man.blogspot.com linux" and only get stories on linux from the HYIP-MAN website.
Currency conversions and unit conversions can be found by using the syntax: <amount> <unit1> in <unit2>. So for example, you could type '1 GBP in USD', '20 C in F' or '15 inches in cm' and get an instant answer.
4. Time zones
Search for 'time in <place>' and you will get the local time for that place, as well as the time zone it is in.
5. Translations
A quick way to translate foreign words is to type 'translate <word> to <language>'. So for example, 'translate pomme to english' returns the result apple, and 'translate pomme to spanish' returns the result 'manzana'.
6. Search for a specific file type
If you know you are looking for a PDF or a Word file, you can search for specific file types by typing '<search term> filetype:pdf' or '<search term> filetype:doc'
7. Check flight status
If you type in a flight number, the top result is the details of the flight and its status. So, for example, typing in BA 335 reveals that British Airways flight 335 departs Paris at 15.45 today and arrives at Heathrow Terminal 5 at 15.48 local time.
8. Search for local film showings
Search for film showings in your area by typing 'films' or 'movies' followed by your postcode. In the UK, this only narrows it down to your town or city. In the US this is more accurate, as results are displayed according to zip-code.
9. Weather forecasts
Type the name of a city followed by 'forecast', and Google will tell you the weather today, including levels of precipitation, humidity and wind, as well as the forecast for the next week, based on data from The Weather Channel.
10. Exclude search terms
When you're enter a search term that has a second meaning, or a close association with something else, it can be difficult to find the results you want. Exclude irrelevant results using the '-' sign. So for searches for 'apple' where the word 'iPhone' is not used, enter 'apple -iPhone'.
10. Exclude search terms
When you're enter a search term that has a second meaning, or a close association with something else, it can be difficult to find the results you want. Exclude irrelevant results using the '-' sign. So for searches for 'apple' where the word 'iPhone' is not used, enter 'apple -iPhone'.
12. Related search
To search for web pages that have similar content to a given site, type 'related:' followed by the website address into the Google search box. For example, typing 'related:telegraph.co.uk' gives a list of other UK newspaper websites.
3. Package tracking
If you have a package tracking number from the USPS, UPS or FedEx, simply plug it into Google Search and it will provide a convenient link for you.
14. Define
Google's dictionary function allows you to type define:term and get definitions of words. So a search for define:discombobulated tells you that it is the past participle, past tense of discombobulate, which means to disconcert or confuse.
15. Barrel Roll
Simply type “do a barrel roll” into the search bar and Google dutifully obeys. Warning: this Google trick is known to make grown men squeal with delight.
By Sophie Curtis
The latest Battlefield 4 update for PC has been rolled out today, bringing numerous fixes to the game including an audio bug where audio would sometimes randomly drop out. Below are the full patch notes for today's update, which should download automatically upon booting up.
CHANG LOG:Symantec has discovered a new Linux worm that appears to be engineered to target the “Internet of things”. The worm is capable of attacking a range of small, Internet-enabled devices in addition to traditional computers. Variants exist for chip architectures usually found in devices such as home routers, set-top boxes and security cameras. Although no attacks against these devices have been found in the wild, many users may not realize they are at risk, since they are unaware they own devices that run Linux.
The worm, Linux.Darlloz, exploits a PHP vulnerability to propagate itself in the wild. The worm utilizes the PHP 'php-cgi' Information Disclosure Vulnerability (CVE-2012-1823), which is an old vulnerability that was patched in May 2012. The attacker recently created the worm based on the Proof of Concept (PoC) code released in late Oct 2013.
Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability. If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target. Currently, the worm seems to infect only Intel x86 systems, because the downloaded URL in the exploit code is hard-coded to the ELF binary for Intel architectures.
Linux is the best known open source operating system and has been ported to various architectures. Linux not only runs on Intel-based computers, but also on small devices with different CPUs, such as home routers, set-top boxes, security cameras, and even industrial control systems. Some of these devices provide a Web-based user interface for settings or monitoring, such as Apache Web servers and PHP servers.
We have also verified that the attacker already hosts some variants for other architectures including ARM, PPC, MIPS and MIPSEL on the same server.
Figure:The “e_machine” value in ELF header indicates the worm is for ARM architecture.
These architectures are mostly used in the kinds of devices described above. The attacker is apparently trying to maximize the infection opportunity by expanding coverage to any devices running on Linux. However, we have not confirmed attacks against non-PC devices yet.
Vendors of devices with hidden operating systems and software, who have configured their products without asking users, have complicated matters. Many users may not be aware that they are using vulnerable devices in their homes or offices. Another issue we could face is that even if users notice vulnerable devices, no updates have been provided to some products by the vendor, because of outdated technology or hardware limitations, such as not having enough memory or a CPU that is too slow to support new versions of the software.
To protect from infection by the worm, Symantec recommends users take the following steps:
1.Verify all devices connected to the network
2.Update their software to the latest version
3.Update their security software when it is made available on their devices
4.Make device passwords stronger
5.Block incoming HTTP POST requests to the following paths at the gateway or on each device if not required:
Valve’s love affair with open-source operating system Linux has been steadily growing throughout 2013. In February, Valve released its Steam platform for Linux. In May, it released some of its most popular games for the platform. In September, the company announced its Linux-based SteamOS for its living room ‘Steam Machines.’
Today, the company continued its ties to the open source operating system by officially joining the Linux Foundation. alongside Cloudius Systems and HSA Foundation, who are also joining today.
The Linux Foundation, which was founded in 2000, is a collaborative project that aims to help promote and improve Linux-based projects. The company provides financial support for Linux’s kernel developers to keep the operating system up to day and improving, including Linus Torvalds. The Foundation also helps manage and protect the IP associated with Linux.
“Joining the Linux Foundation is one of many ways Valve is investing in the advancement of Linux gaming. Through these efforts, we hope to contribute tools for developers building new experiences on Linux, compel hardware manufacturers to prioritize support for Linux, and ultimately deliver an elegant and open platform for Linux users,” said Mike Sartain of Valve in a press release.
More @
BitDefender is a program to check for Windows viruses and malware. It can be run in the background or on demand when required. Once installed it can be found under Applications - Systems Tools. It can be used as an alternative to clamav/clamtk.
An updated method of installation for BitDefender using Ubuntu 11.04 is described here:
Add the repository by going to System - Administration - Software Sources, click on the 'Other Software' (previously 'Third Party Software') tab. Now click on 'Add' and enter
deb http://download.bitdefender.com/repos/deb/ bitdefender non-free
Click on 'Close' and press 'Reload' when prompted. Ignore the 'public key is not available' message (as we'll add it next) and press 'Close'. Now in Applications - Accessories - Terminal add the repository key:
wget http://download.bitdefender.com/repos/deb/bd.key.asc sudo apt-key add bd.key.asc
Now update the apt cache with
sudo apt-get update
Install the graphical interface and command line program (2 files) with
sudo apt-get install bitdefender-scanner-gui
Once complete you now need to log out and log back in again. a menu shortcut will be generated (Applications - System Tools - BitDefender Scanner).
Before running the scanner it's probably best to install the latest virus/malware signatures by clicking on the 'Update' button.
BitDefender comes with a standard 30 day free license, when first installed. It is free for private and personal use - the license can be extended to one year by requesting a new license key from http://www.bitdefender.com/site/Products/ScannerLicense/ For all business use a paid for license is required.