HTML5 & CSS3 Tutorials resources

CSS3 3D Transformation Functions

Here we have come up with another useful collection of HTML5 and CSS3 tutorials & Techniques for you. These tutorials will be very useful for the web developers as their work mainly depends on HTML5 and CSS3. Web developers create stylish and extremely trendy website and web applications by the help of these two languages. This is the reason why HTML5 and CSS3 play so much important role in the web development.
Scroll through our wonderful collection and do let us know what you think about this compilation. Feel free to share your opinions and comments with us via comment section below.
Continue reading “HTML5 & CSS3 Tutorials resources”

The compression algorithm Brotli in Chrome and Firefox

Data Compression

Good news for those waiting compression algorithm Brotli launch and integration in Chrome: Soon Internet browser can be faster and consume less electricity from the battery can be used when the smartphone.

Brotli can be more efficient, with up to 26% to the current compression algorithm, Zopfli and better data compression means that web pages load faster, less traffic on mobile devices and a battery that takes longer.

Continue reading “The compression algorithm Brotli in Chrome and Firefox”

Puritanism, moralize, censorship and other social network burdens

Censorship

Let’s talk about censorship in social networks, not censorship from governments or other power bodies, but the censorship imposed by the networks themselves through their terms of use, or better I must say, through the interpretation of those terms, because actually they are often so vague and general that leave in the hands of each company the chance to ‘play’ with its true meaning.

Conditions that work as a must contract so that the user can access the platform, and which can be subject of blocking or removal if broken. Conditions, moreover, that not infrequently come into conflict with local laws or fundamental rights guaranteed in each country constitutions, causing an obvious malfunction.

Continue reading “Puritanism, moralize, censorship and other social network burdens”

Firefox With Simplified Hello Video Chat Service

Mozilla have WebRTC-bases Hello video chat service plus including support for MP4 video on OS X.

Just like before, you can start these plugin-free video chats by sharing an automatically generated link with whoever you want to talk to or by using the contacts from your Firefox account to start calls. Before, you had to sit and wait for your contact to join the room. Your contacts can be on Firefox, Chrome or Opera. Now, a small window with a self-view pops up and you can continue to surf the Web until your contact joins the call. It’s a small but welcome change for those who regularly use Firefox Hello.

firefox-hello

Facebook shifts News Feed, gives priority to friends via Daily Mail Online

Lately Iam browsing little in Facebook. Paradoxically Feed me appear in publications friends who could not see before.

I think Facebook, previously focused on publications show based on the users and not by topics or keywords.

I hope it improves. But I have learned that “recent news show” a good start to “discover” that the less frequent friends post.

Source: Facebook shifts News Feed, gives priority to friends | Daily Mail Online

Create a Google Account without Gmail email

Create a Google Account Without a Gmail Address

If you want to use some Google services like Google+, Drive, Calendadario, Keep or Google Play you can do no see forced to use a Gmail account.

It’s interesting to notice That the only Google service That Uses the new form and lets you use your own email address is Google Drive. You just click “I prefer to use my current email address” and skip creating a Gmail account. Here’s the link to this version of the form: https://accounts.google.com/SignUpWithoutGmail.

Create a Google Account Without a Gmail Address

You can also use URLs : like: https://accounts.google.com/NewAccount?service=cl

Note: You can also use your own e-mail to the backup and sync Chrome

Update: This option is no longer available: 2015

Firefox add-on shows you how your browsing is being monitored

Mozilla has developed a Firefox add-on called Lightbeam that could change the way you look at your daily Internet activity. Mozilla says that Lightbeam “enables you to examine individual third parties over time and space, identify where they connect to your online activity and provides ways for you to engage with this unique view of the Web.” As you browse, your activity is constantly being monitored by third parties on the websites you visit, often without any signs or warnings whatsoever.

Lightbeam delivers an interactive visualization of each third-party element on the sites you visit, increasing in size with every new site you travel to. All the information is stored locally as well and can be removed instantly by uninstalling the add-on. Mozilla has been passionate about Internet tracking for quite some time and hopes to illuminate the Internet even further with Lightbeam, giving users a simple tool to keep track of the countless connections occurring through their browsers every day.

Spies and watchmen

spies and watchmen

spies and watchmen

A new publication by Wikileaks shows how new technologies massive spying all possible barriers violate the right to privacy. It is the publication of 200 documents about eighty private industry companies espionage and show that the new technologies allow real time spy communications of millions of people. Hidden Programs (or “passive”, in the jargon) that instantly reconstruct conversations from Facebook, MSN or WhatsApp, without the knowledge neither the user nor the provider. Software that allows not only intercept and record a conversation but at the same time to identify who is speaking and from where. Trojans that infect computers and steal their secret communications encryption keys. Everything you do with the phone, internet, or satellite phone handy, or all communications. Everything can be intercepted and somewhere in the world, is being intercepted. Not even sparing the conversation face to face, because the market today offer powerful headphones to listen to anyone anywhere. So click selling satellite equipment.

The documents, which were analyzed in a joint investigation by Wikileaks and nineteen newspapers of the world, show that there is no defense against massive spying technologies available in the market. It is also an industry virtually unchecked opaque, offering everything from missiles to cell phones for special forces in hazardous areas, with panic buttons connected to a GPS, and sensors to detect and send a signal if the user’s phone is dead. As a private industry has not state control and unquoted no public control of big business, but practically their only customers are governments and large enterprises and Internet telephony.

Among the most important documents is a contract to install the program FinFly telephone from the former Soviet republic of Turkmenistan. The program allows infecting computers with a Trojan that is lowered each time a user accepts an update from iTunes, Winamp, Open Office or similar programs. Inclusive offers trout updates available to the user lowers thinking companies are recognized when they are actually sent by FinFly undetectable Trojans. The documents show that the company would Dreamlab FinFly server installed in Oman.

The “Files of spies” have three parts. The first contains brochures of products offered by various companies. The second shows any contracts and confidentiality agreements. The third is the list of countries visited primarily responsible for these companies in recent years through a track that would have made ​​of her cell phone. This file shows that South America is by far the least visited region by these specialists. Just recorded a visit to Brazil by three experts in June to participate in a training seminar IPP company, which was made to train security forces in the region in intelligence techniques. The IPP website shows that the next seminar in Brazil will be in November 2015. Another country, Chile, is mentioned in part two of the files. It is in an agreement signed between the companies Dreamlab and Gamma, written in German, which identifies Chile as well as Switzerland, Bulgaria and Hungary as Dreamlab customers. In other words, under the contract, Chile client would the company that installed the computer program FinFly infection in Turkmenistan and Oman servers.

The satellite tracking of entrepreneur spying industry also show occasional visits to Mexico, which is also mentioned in a brochure of Thales, who explained how he had installed a communications center with 750 police in Mexico City , a kind of police call center for emergency calls.

Worth mentioning that none of these companies, you know, illegal acts. In many countries like Argentina there are no laws against the sale of these tools, but against its use, since the law of 2010 computer security worth the “penetration” of computers, and only the Intelligence Secretariat is authorized to tap phones. But both telephone companies as large ISPs should buy some of these programs to comply with court orders. However, these spy equipment far beyond what any judge can order, at least in Argentina, because one thing is to order the closure of a site or removal of a photo intrusive, another thing is sort of chats espionage or emails.

Here are some of the bells and whistles that appear in brochures business intelligence:

– VasTech : Monitoring massive satellite phone . Discover the communication protocol and analyzes the extracted information. Mobile phone networks and Internet : monitoring massive network data storage , voice recognition , traffic data processing . With the Zebra program can take voice , SMS , MMS , email and fax. You can store ” thousands” of terabytes of information ( A tera thousand gygas ) . You can listen to a hundred thousand conversations simultaneously , or capture interceptions billion per day.

  • Cassidian : missiles and anti-aircraft systems . Sensors and radars. Detection equipment nuclear explosives and chemical weapons . More than 25,000 employees worldwide in 700 projects in 80 countries for over 400 clients .
  • Hidden Technology : All kinds of gadgets and gizmos connected with GPS signals , including devices with magnets to stick them under cars .
  • Glimmerglass , Netoptic , NetQuest : Fiber Optic Technology . You can intercept the submarine fiber optic pipes that take and bring communications from one continent to another to intercept communications of entire countries from outside of these countries , but countries ‘ knowledge. For example, Gmail Hotmail or Skype servers are out of Argentina , come and go through these pipes fiber optic and can be intercepted.
  • Cobham : Intercept tactics. As a person is moving , it changes cell antenna which receives the signal. This program allows you to jump from antenna to antenna with the puncture.
  • Scantarget : Analyze real- time web . Search on SMS , Twitter , Facebook , blog , chat forums , etc. . key words to know if anyone is planning a terrorist attack.
  • Ipoque : massive interception and network monitoring . Detects encrypted protocols such as Skype , BitTorrent , SSLand and VPN tunnels . You can search the web up to 25,000 keywords simultaneously.
  • Qosmos : Software that intercepts 550 000 gygabits in real time. All communications of a city like Lauquen Dam fit in 200 gygabits . It also allows more than one thousand enforce “rules” or instructions simultaneously.
  • Silicom : Give a ” redirector ” that acts as a triple plug to redirect electricity to more than one place. In this case you can redirect millions of data to another country or a spy agency without the user or the provider of value added services to find out, using the technique ” man in the middle ” (man in the middle) , which in this case would be duplicated and redirects interceptor communication. 
  • Autonomy Virage : Cameras and face recognition .
  • CRFS : radiofrequencias monitoring . Radios detection trout. Intercept radio communications.
  • Berkeley electronics: microphones detects interference on cellular communications .

From today “spies files” are available on the site Wikileaks

By  Santiago O’Donnell

Speed up the performance of the Firefox

Firefox Logo

When you run the Firefox browser and open a new tab browser performs some quick effects that the user may not notice it, but it consume a lot of memory.

The user can get rid of these effects in order to speed up the performance of the Firefox browser, to the implementation of this process we write in the address bar “about: config” and then look for “browser.tabs.aimate” ,then clicking on it twice to the value is converted to “Flase“,then the user notes speed in the performance of the browser.

Firefox most faster

BlueGriffon: New WYSIWYG content editor for the WWW

BlueGriffon
BlueGriffon
BlueGriffon – Main Windows

Powered by Gecko, the rendering engine of Firefox, it’s a modern and robust solution to edit Web pages in conformance to the latest Web Standards.

It’s free to download (current stable version is 1.7) and is available on Windows, Mac OS X and Linux.

Because Gecko lives inside BlueGriffon, the document you edit will look exactly the same in Firefox. Advanced users can always use the Source View to hard-code their page.

BlueGriffon is tri-licensed under the Mozilla Public License 1.1, the GNU General Public License Version 2 and the GNU Lesser General Public License Version 2.1.

Read more:http://www.bluegriffon.org/

download page: http://bluegriffon.org/pages/Download