تعديل

الثلاثاء، 26 نوفمبر 2013

Introducing YouTube Fan Finder

Introducing YouTube Fan Finder


Behind every great channel are great fans. A few months ago we announced Top Fans, a tool to help you interact with your most engaged viewers. Today we're launching Fan Finder, a new initiative designed to help you introduce and connect your channel to new fans, at no cost to you.

To get started with Fan Finder, just create and upload a video introducing new fans to your channel (more on that below) and then submit it here to Fan Finder.

We'll turn your video into a TrueView video ad, which gives viewers the option to skip after 5 seconds. We’ll show your ad for free across YouTube to connect you with brand new fans. Fan Finder takes into account the interactions that viewers have with millions of YouTube channels in order reach the people who are most likely to engage with your channel.

Ready to get started? Create and upload your ad to your channel, then submit it toFan Finder

Here are some tips for creating an effective channel ad:
  1. Keep your channel ad short and engaging: Introduce the viewer to your content; don’t assume they have heard of you or your channel before. Remember, your channel ad will run as a TrueView ad which the viewer can skip after 5 seconds, so get to the point.
  2. Entertain the viewer: When in doubt “show” what your channel is about, don’t “tell”. If you have a comedy channel make sure your ad is funny, if you have a music channel make sure your ad has music. You get the drift.
  3. Aim for a strong message: Keep your channel ad focused on your channel and why viewers should subscribe or check out your content. 
  4. Have a clear call to action: What do you want your viewers to do? This should be scripted and annotated in your channel ad. Don’t forget to explain what subscribe means (example: want to see more content? Subscribe here).
  5. Branding matters: Make sure your branding is clear and reiterated throughout the ad. You want viewers to remember your channel.
Check out www.youtube.com/yt/fanfinder for more information and to see some great sample channel ads.

The YouTube team

source:

Thinking about buying views?

Thinking about buying views?


We know you work hard on your videos, and perhaps they don't always get as many views as you'd hoped for. But if you're considering paying someone to increase your view count, you may want to think again. You probably won't get what you paid for.

Views generated by some third-party businesses and services will not be counted on YouTube, and can lead to disciplinary action against your account, including removing your video or suspending your account.

Long-term success on YouTube is based on creating great content and engaging with fans. If you're looking for ways to grow your audience, check out the great tips in our Creator Playbook.

There are also legitimate paid options. YouTube's TrueView solutions offer cost-effective ways to build your audience with many targeting options, along with deep insights into the types of viewers engaging with your videos.

If you're considering a third-party service, proceed with care and find out how they intend to promote your content:
  • Ask where your videos will be promoted
  • Ask about transparency of data and analytics
  • Ask about targeted demographics
  • Ask if they require video views in return for access to services or incentives
Remember that ultimately, you are responsible for your video traffic. If you contract a company that gives you spam instead of views, you pay the penalty, not the company.

We’re trying to keep YouTube an even playing field for all creators like yourself, and to keep the focus on great content rather than quickly accumulating views. The next time you come across a company promising lots of views for cash, please think twice.

To learn more about buying and getting YouTube views through third-party services, check out more information here.

The YouTube Team

source:

An update on YouTube comments

An update on YouTube comments


Since we launched the new comments experience on YouTube two weeks ago, we’ve received a lot of feedback from creators on the increase in comment spam. While the new system dealt with many spam issues that had plagued YouTube comments in the past, it also introduced new opportunities for abuse and shortly after the launch, we saw some users taking advantage of them.

We’ve worked hard to combat the increase in spammy comments and have made a number of updates, including:
  • Better recognition of bad links and impersonation attempts
  • Improved ASCII art detection
  • Changing how long comments are displayed

We know the spam issues made it hard to use the new system at first, and we’re excited to see more of you getting involved as we’ve fixed issues. New features like threaded conversations and formatted comments are coming to life, thanks to you and your fans.

So what's next? We're moving forward with more improvements to help you manage comments on your videos better. Bulk moderation has been a long standing creator request and we'll be releasing tools for that soon. At the same time, we’re also working on improving comment ranking and moderation of old-style comments.

Thanks for sticking with us.

source:

تصميم جديد لفيس بوك ماسينجر على أندرويد وiOS


بعد أن قامت بإختبارات سابقة على النسخة التجريبية، قامت شركة فيس بوك بإطلاق نسختها الأخيرة من تطبيق Facebook Messenger رسمياً لمستخدمي أندرويد وiOS بشكل وتصميم مختلف كلياً عن السابق.
وإضافة إلى التصميم وسرعة الأداء فإن تطبيق Facebook Messenger بإصداره الجديد يحمل أيضاً العديد من المميزات والخصائص الجديدة، لعل أهمها دعم رسائل الـSMS بشكل أفضل من السابق، زيادة إلى دعمه لأرقام الهاتف الخاصة بالمستخدمين، حيث أصبح بالإمكان إجراء المحادثات والتراسل بين الأشخاص الذين يتشاركون أرقام الهواتف فيما بينهم كما هو الحال مع تطبيق الواتس آب، دون ضرورة أن يكون هؤلاء الأشخاص أصدقاء بالفعل على الشبكة الإجتماعية فيس بوك.
هذا وقد أشارت فيس بوك من خلال مدونتها الرسمية إلى أن تطبيقها الجديد صمم بالشكل الذي يقدم للمستخدم تجربة تواصل مختلفة، كما تضيف الشركة أنها مستمرة في عملية إجراء الإختبارات على مجمل خدماتها الأساسية وستقوم بتحسينها بإستمرار.
من جانب مقابل يرى الكثير من المحللون أن قيام فيس بوك بهذه الخطوة يعتبر بمثابة رسالة واضحة لباقي الشركات الأخرى على دخول الأخيرة غمار المنافسة في مجال تطبيقات التراسل.
في الأخير نشير إلى أنه بالإمكان تحميل الإصدار الأخير من Facebook Messenger من متجر قوقل بلاي من الرابط (هنا)، ومن متجر آب ستور من الرابط (هنا)

الاثنين، 25 نوفمبر 2013

What's New in Windows 8.1

What's New in Windows 8.1


We built Windows 8 to bring a modern computing experience to businesses and to help professionals stay connected to their colleagues and clients from anywhere, anytime. Windows 8.1 advances this vision and introduces new manageability, mobility, security, user experience and networking capabilities–with the goal of offering customers the best business tablets and versatile modern business PCs driven by the most powerful operating system designed for today’s modern businesses.

Below is a list of some of the new and updated features in Windows 8.1 with regard to Bring Your Own Device (BYOD)scenarios, mobilitysecurity, and the modern user interface.

Bring Your Own Device (BYOD) Enhancements

Workplace Join
A Windows 8 PC was either domain joined or not.  If it was a member of the domain, the user could access corporate resources (if permissioned) and IT could control the PC through group policy and other mechanisms.  This feature allows a middle ground between all or nothing access, allowing a user to work on the device of their choice and still have access to corporate resources With Workplace Join, IT administrators now have the ability to offer finer-grained control to corporate resources.  If a user registers their device, IT can grant some access while still enforcing some governance parameters on the device.
Work Folders
Work Folders allows a user to sync data to their device from their user folder located in the corporation’s data center. Files created locally sync back to the file server in the corporate environment. This syncing is natively integrated into the file system.  Note, this all happens outside the firewall client sync support. Previously, Windows 8 devices needed to be domain joined (or required domain credentials) for access to file shares.  Syncing could be done with third-party folder replication apps. With Work Folders, Users can keep local copies of their work files on their devices, with automatic synchronization to your data center, and for access from other devices. IT can enforce Dynamic Access Control policies on the Work Folder Sync Share (including automated Rights Management) and require Workplace Join to be in place.
Open MDM
While many organizations have investments with System Center and will continue to leverage these investments we also know that many organizations want to manage certain classes of devices, like tablets and BYOD devices, as mobile devices. With Windows 8.1, you can use an OMA-DM API agent to allow management of Windows 8.1 devices with mobile device management products, like Mobile Iron or Air Watch.
Mobile Device Management
When a user enrolls their device, they are joining the device to the Windows Intune management service.  They get access to the Company Portal which provides a consistent experience for access to their applications, data and to manage their own devices.  This allows a deeper management experience with existing tools like Windows Intune. IT administrators now have deeper policy management for Windows RT devices, and can manage Windows 8.1 PCs as mobile devices without having deploy a full management client.
Web Application Proxy
The Web Application Proxy is a new role service in the Windows Server Remote Access role. It provides the ability to publish access to corporate resources, and enforce multi-factor authentication as well as apply conditional access policies to verify both the user’s identity and the device they are using resources, and enforce multi-factor authentication as well as verify the device being used before access is granted.
RDS Enhancements
Enhanced Virtual Desktop Infrastructure (VDI) in Windows Server 2012 R2 with improvements in management, value, and user experience. Session Shadowing allows administrators to view and remotely control active user sessions in an RDSH server. Disk deduplication and storage tiering allow for lower cost storage options. User experience for RemoteApps, network connectivity and multiple displays has been improved. Administrators can now easily support users with session desktops to provide helpdesk style support. Administrators now have even more flexible storage options to support a VDI environment without expensive SAN investments. End users find RemoteApp behavior is more like local apps, and the experience in low-bandwidth is better, with faster reconnects and improved compression, and support for multiple monitors.
NFC Tap-to-pair Printing
Tap your Windows 8.1 device against an enterprise NFC-enabled printer and you’re all set to print. No more hunting on your network for the correct printer and no need to buy a special printer to take advantage of this functionality. Simply attach an NFC tag to your existing printers to enable this functionality.
Wi-Fi Direct Printing
Connect to Wi-Fi Direct printers without adding additional drivers or software on your Windows 8.1 device, forming a peer-to-peer network between your device and the printer.
Native Miracast Wireless Display
Present your work wirelessly with no connection cords needed; just pair with a Miracast-enabled display and Miracast will use Wi-Fi to let you project wire-free.

Mobility Enhancements

VPN
We have added support for a wider range of VPN clients in both Windows and Windows RT devices. We have also added the ability to have an app automatically trigger VPN connections. 
Auto-triggered VPN
When you select an app or resource that needs access through the inbox VPN – like a company’s intranet site – Windows 8.1 automatically prompts you to sign in with one click. This feature is be available with Microsoft and third-party inbox VPN clients.
Mobile Broadband
At Windows 8 launch, the devices had embedded radios that were separate components within the devices.  Windows 8.1 supports embedded wireless radio, which gives you increased power savings, longer battery life, also enables thinner form factors and lower cost devices. 
Windows To Go
With Windows To Go in Windows 8.1, the Windows Store is now enabled by default. Windows To Go users may roam to any number of machines and access the Windows Store and use Windows Store apps. 
Broadband Tethering
Turn your Windows 8.1 mobile broadband-enabled PC or tablet into a personal Wi-Fi hotspot, allowing other devices to connect and access the internet.

Security Enhancements

Remote Business Data Removal
Corporations now have more control over corporate content which can be marked as corporate, encrypted, and then be wiped when the relationship between the corporation and user has ended. Corporate data can now be identified as corporate vs. user, encrypted, and wiped on command using EAS or EAS + OMA-DM protocol. This capability is requires implementation in the client application and in the server application (Mail + Exchange Server). The client application determines if the wipe simply makes the data inaccessible or actually deletes it. 
Improved Biometrics
All versions of Windows 8.1 include end to end biometric capabilities that enable authenticating with your biometric identity anywhere in Windows (Windows sign-in, remote access, User Account Control, etc.). Windows 8.1 is optimized for fingerprint based biometrics and includes a common fingerprint enrollment experience that works with a variety of readers (touch, swipe). Modern readers are touch-based rather than swipe-based and include liveliness detection that prevents spoofing (e.g.: silicon emulated fingerprints). Access to Windows Store Apps, functions within them, and certificate release can be controlled based on verification of a user’s biometric identity.
Pervasive Device Encryption
Device encryption previously found on Windows RT and Windows Phone 8 is now available in all editions of Windows. It is enabled out of the box and can be configured with additional BitLocker protection and management capability on Windodws 8.1 Pro and Windows 8.1 Enterprise. Consumer devices are automatically encrypted and protected when using a Microsoft account. Data on any Windows connected standby device is automatically protected (encrypted) with device encryption. Organizations that need to manage encryption can easily take add additional BitLocker protection options and manageability to these devices.  
Improved Internet Explorer
Internet Explorer 11 improvements include faster page load times, side-by-side browsing of your sites, enhanced pinned site notifications, and app settings like favorites, tabs and settings sync across all your Windows 8.1 PCs. Internet Explorer 11 now includes capability that enables an antimalware solution to scan the input for a binary extension before it’s passed onto the extension for execution
Malware Resistance
Windows Defender, Microsoft’s free antivirus solution in Windows 8, now includes network behavior monitoring to help detect and stop the execution of known and unknown malware. Internet Explorer scans binary extensions (e.g. ActiveX) using the antimalware solution before potentially harmful code is executed.
Device Lockdown
With Assigned Access, a new feature offered in Windows 8.1 RT, Windows 8.1 Pro, and Windows 8.1 Enterprise, you can enable a single Windows Store application experience on the device. This can be things like a learning application for kids in an educational setting or a customer service application at a boutique, Assigned Access can ensure the device is delivering the intended experience. In the Windows Embedded 8.1 industry product, we deliver additional lockdown capabilities to meet the needs of industry devices like point of sale systems, ATMs, and digital signs.

Modern UI Experience

Variable, Continuous Size of Snap Views
You have more ways to see multiple apps on the screen at once. When displaying multiple apps at once, you can easily resize the width of the app window to suit your needs. Depending on screen size and resolution, you can even share the screen with three, or four apps on each monitor.
Boot to Desktop
You can now configure Windows 8.1 to boot directly to the desktop after logon.
Desktop and Start Screen
Improvements have been made to better support users who prefer a mouse and keyboard experience to access applications.

These are just some of the key features available in Windows 8.1 We encourage you to test out and try these features when you evaluate Windows 8.1 for use both in your work environment as well as at home in your personal life. Please note that Windows Server 2012 R2 may be required in order for some of these features to be available.

source ::

احذر زر أعجبني على الفيس بوك


يعتقد الكثيرون أن زر ''أعجبني'' في موقع التواصل الاجتماعي فيس بوك، والموجود أيضاً في مواقع أخرى مثل جوجل بلس وتويتر، مجرد زر يُبدي المستخدم من خلاله إعجابه بمحتوى المنشور المعني. 

ولكن الحقيقة، أن هذا الزر والمنتشر على العديد من صفحات الإنترنت، يقوم بوظائف استطلاعية لصالح ناشره، فبمجرد فتح صفحة إنترنت تحتوي على هذا الزر، يتمكن عارض هذا الزر من معرفة هذه الزيارة. وإذا كان هذا الزر منتشراً في أكثر من صفحة، فيمكن لمقدم الخدمة حينئذ تحليل سلوكيات التصفح للمستخدم المعني ومعرفة اهتماماته واستغلالها في إرسال إعلانات موجهة إليه.

تويتر يزيد صعوبة التجسس على مستخدميه


أعلنت شركة تويتر أنها طبقت تكنولوجيا أمنية تزيد من صعوبة التجسس على مستخدمي تويتر ودعت شركات الإنترنت الأخرى إلى أن تحذو حذوها في الوقت الذي تتطلع فيه شركات الإنترنت إلى إحباط عمليات التجسس التي تقوم بها وكالة المخابرات الحكومية. 

وقالت تويتر التي بدأت باستخدام التشفير التقليدي إتش تي تي بي إس منذ 2011، إنها أضافت طبقة حماية متقدمة لنفس التشفير تعرف باسم "السرية المتقدمة". 

وقالت الشركة في تدوينة "قبل عام ونصف طرح تويتر لأول مرة بشكل كامل على إتش تي تي بي إس، ومنذ ذلك الوقت اتضح بشكل أكبر مدى أهمية تلك الخطوة في حماية خصوصية مستخدمينا".

مكافي: 700 ألف عينة برمجيات خبـيثة جديدة تستهدف أندرويد

 نشرت شركة «مكافي» McAfee تقريرها الأمني عن الربع الثالث من العام الجاري، الذي تطرق إلى نمو التهديدات الأمنية على أصعدة متعددة، مثل: البرمجيات الخبيثة لنظام «أندرويد»، والبريد المزعج Spam، وغيرها. 

واكتشفت «مكافي» نحو 700 ألف عينة جديدة من «البرمجيات الخبيثة» التي تستهدف منصة «أندرويد»، أي بزيادة مقدارها 30%. 

ويشير هذا الارتفاع، بحسب الخبراء، إلى أن مجرمي الفضاء الإلكتروني أصبحوا يركزون جهودهم على إصابة الهواتف الذكية بدلاً من أجهزة الكمبيوتر الشخصية، نظراً لأن المستخدمين أصبحوا يستخدمون هواتفهم على نحو أكثر من ذي قبل، لاسيما عندما يتعلق الأمر بالنشاطات التقليدية التي كانوا يقومون بها عبر أجهزة الكمبيوتر الشخصية، مثل الصيرفة عبر الإنترنت.

deskhop لمشاركة الشاشة في فيس بوك

توفر العديد من البرامج مثل «سكايب»، «Google Hangouts» أو «تيم فيور»، إمكانية مشــــاركة الشاشــة بين المستخدمين لشرح موضوع معيّن أو حتى القيام ببعض العمليات بشكل مشترك. 

إلا أن المستخدم يمكنه القيام بهذه العملية مباشرة من موقع «فيس بوك» عن طريق تطبيق «deskhop» المتوافر في مركز تطبيقات «فيس بوك». 

بعد الدخول إلى التطبيق والضغط على «Go to App» تظهر قائمة بالأصـــــــدقاء الموجــودين في «فيس بوك»، ويحدد المستخدم الأشخاص الذين يرغب في مشاركة شاشته معهم، ومن ثم يختار مشاركة الشاشة أو متابعة شاشتهم، وأخيراً يثبت الملفات المطلوبة لبدء العملية.

جوجل تسجل براءة اختراع نظام ردود تلقائية

 منح مكتب براءات الاختراع والعلامات التجارية الأميركي، شركة «جوجل» براءة اختراع لنظام بإمكانه اقتراح ردود تلقائية على مشاركات مستخدمي الشبكات ومواقع التواصل الاجتماعية. 

وأوضحت «جوجل» أن النظام قادر على اقتراح ردود على المشاركات في الشبكات الاجتماعية عبر تحليل محادثات سابقة بين صاحب المشاركة والمتلقي، أو الوصول إلى معلومات حديثة كتبها المتلقي عبر بريده الإلكتروني، أو في مدونة تابعة له، أو عبر حساب له على موقع تواصل اجتماعي أخر. 

ويتكون النظام من وحدات جمع وتحليل للمعلومات والردود في منصات البريد الإلكتروني أو التدوين المصغر أو الشبكات الاجتماعية، وذلك لتكوين شجرة من الاقتراحات، وهي الردود التي يمكن استخدامها بشكل تلقائي من دون تدخل المستخدم.

الأمن القومي الأميركية تملك أبواباً خلفية في 50 ألف شبكة كمبـيوتر


 كشفت وثائق جديدة، مسربة عن الأميركي، إدوارد سنودن، عن إنشاء وكالة الأمن القومي الأميركي أبواباً خلفية في عشرات الآلاف من شبكات الكمبيوتر حول العالم. 

وأشارت الوثائق، التي كشفت عن محتواها صحيفة NRC Handelsblad الهولندية، إلى أن الوكالة الاستخباراتية استخدمت برمجيات خبيثة لإصابة 50 ألف شبكة كمبيوتر في مناطق متعددة من العالم، وفتح أبواب خلفية بها لاختراقها في أي وقت. 

وتعمل الأبواب الخلفية التي فتحتها الوكالة في شبكات الكمبيوتر على شكل خلايا تجسس نائمة يتم التحكم فيها عن بعد وتفعل بضغة زر، إذ تستخدمها الوكالة في أي وقت لأغراض التجسس والحصول على المعلومات. واخترقت الوكالة عدداً من شبكات الكمبيوتر ذات الأهمية الاستراتيجية في بعض من دول العالم، ومنها دول عربية مثل مصر، والسعودية، وليبيا، والعراق. منقول

WAP Challenges ::

WAP Challenges

Course Description

We will be hosting interesting web application security challenges in this section for our students to try out. Challenges will be categorized into Beginner, Intermediate and Advanced Levels. We will either allow you to download Virtual Machines or point you to hosted sites which we have put up. 


In case you are new to web application security, please note that we have already started posting the videos of our Web Application Security Course. However, this section is independent of that course.

Course Videos
Select a Video


بحث هذه المدونة الإلكترونية