“What Now,” Rihanna’s Latest Video
Free PR Web Directory
The GOCE research satellite has ended its mission and has crashed on Earth at Pm. Sunday evening. The satellite ran out of fuel since its first launch in 2009. This 1 ton satellite has landed south of the Falkland Islands. The debris of the satellite did not cause any damage.
GOCE satellite’s purpose was to map the Earth’s gravity field, which would enable the oceans to be viewed as if they were only affected by gravity. The data gathered by GOCE includes perceptions of ocean circulation, sea level, the interior of Earth, wind speeds, and air density in Earth’s upper atmosphere.
The debris of GOCE is only a small fraction of the 150 tons of man made space objects that reenter Earth’s atmosphere every year. There has not been any human causalities from the debris reentering the atmosphere in 56 years. Scientists can predict where the crashes will occur and new information provided by GOCE’s reentry will help to enhance the calculation of the crashes.
For full story, click here.
T-Mobile added 648,000 new monthly subscribers this past quarter. Deutsche Telekom’s wireless carrier got the edge from is offers of zero-down financing on phones and a $10-a-month phone upgrade plan- a plan both Verizon Wireless and AT&T incorporated into their own subscription plans. T-Mobile also began sales of the iPhone this year, which contributed greatly to the rise in subscribers. For more on the story, click here
Microsoft issued a warning to users about a vulnerability that could be exploited by hackers. These attackers request users to preview or open a specially crafted email or web content.
While the recent versions of Microsoft Windows and Office are yet unaffected, Microsoft Vista, Windows Server 2008, Microsoft Office 2003 to 2010 and Microsoft Lync. all have the potential to fall prey to virtual attackers.
The attack comes disguised as an email requesting users to open specially crafted Word Documents. The flaw, says Microsoft, comes from the handling of Tagged Image File Format images, a file format used for storing images popular among graphic artists and web publishers. All varieties of the attacks require user interaction.
Once hackers have that interaction, however, it could mean big trouble for Microsoft users.
“An attacker who successfully exploited the vulnerability could gain the same user rights as the logged on user,” said Dustin Childs, a Microsoft Communications Manager. “”An attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website,”
Microsoft issued a statement saying they are aware of the attacks and are currently investigating. One next step could be updating security monthly release processes or providing an out-of-cycle security update.
For more information on this story, click here.
The top social internet marketing firm Twitter has recently been confronted with credibility problems following an ever-increasing trend of users purchasing fake followers. This has left the businesses and people exercising this type of marketing to be more careful or else they get their accounts terminated and fake followers removed.
So, is it definitely best if you purchase Twitter followers? If yes, how do we distinguish the difference among legitimate followers and the fake ones that end up damaging your credibility as a company or person? By reading this write-up, you’ll be able to distinguish between the genuine fanbaseand credible Twitter followers from the fake one.