Informatyka
149 views | +0 today
 
Rescooped by Szymon Mantey from IT Support and Hardware for Clinics
onto Informatyka
Scoop.it!

How NSA Hacked North Korean Hackers

How NSA Hacked North Korean Hackers | Informatyka | Scoop.it

The U.S. government's attribution of the Sony Pictures Entertainment hack attack to North Korea stems, in part, from the U.S. National Security Agency having infected a significant number of North Korean PCs with malware, which the intelligence agency has been using to monitor the country's hacking force.

 

So says The New York Times, which bases its report, in part, on interviews with unnamed former U.S. and foreign officials, as well as a newly leaked NSA document. The document, published Jan. 17 by German newsmagazine Der Spiegel - and obtained via former NSA contractor Edward Snowden - details how the NSA worked with South Korea - and other allies - to infiltrate North Korea. The agency reportedly infiltrated at least some of these computers by first exploiting systems in China and Malaysia that help manage and administer North Korea's connection to the Internet.

According to the Times report, the hacked computers have given the NSA an "early warning radar" against attacks launched by the Pyongyang-based government of North Korea. Related intelligence gathered by the NSA also reportedly helped convince President Obama that North Korea was behind the Sony Pictures hack.

North Korea's Reconnaissance General Bureau intelligence service, as well as its Bureau 121 hacking unit, control the vast majority of the country's 6,000-strong hacking force, some of which operates from China, according to news reports.

Fourth Party Collection

Some of the evidence of the NSA's ability to monitor North Korean systems comes from a leaked NSA document, which appears to be a transcript of an internal NSA question-and-answer discussion that's marked "top secret" and is restricted to the U.S. and its Five Eyes spying program partners: Australia, Canada, New Zealand and the United Kingdom. The document refers to the NSA's practice of "fourth party collection," which involves hacking into someone else's hack, according to a Der Spiegel report.

The document relays an episode that involves North Korea: "We found a few instances where there were NK [North Korea] officials with SK [South Korea] implants [malware] on their boxes, so we got on the exfil [data exfiltration] points, and sucked back the data," the document reads.

Der Spiegel reports that this practice, which is employed by the NSA's Tailored Access Operations team, has been used extensively to undermine many hack attacks emanating from Russia and China and has allowed the NSA to obtain the source code for some Chinese malware tools.

But some attacks against U.S. systems did succeed, and one leaked NSA document says that as of several years ago, 30,000 separate attacks had been detected against U.S. Defense Department systems, 1,600 systems had been hacked, and related "damage assessment and network repair" costs had exceeded $100 million.

The NSA document also discloses that South Korea in recent years has begun attempting to hack into some U.S. government systems.

The FBI has previously said that its attribution of the Sony Pictures hack was based in part on intelligence shared by the NSA, although that attribution did not single out the North Korean government, thus leaving open the possibility that pro-Pyongyang hackers or even mercenaries may have also been involved.

The Role of Botnets

On the attribution front, meanwhile, documents newly published by Der Spiegel - and leaked by Snowden - have detailed an NSA program, code-named "Defiantwarrior," which involves the NSA using infected nodes - or zombies - in a botnet. When such nodes are traced to U.S. computers, the FBI reportedly uses the information to help shut down those parts of the botnet. But when nodes are discovered on computers in countries outside the Five Eyes program, the NSA - according to the leaked documents - may use these to launch attacks against targets. While such attacks might be traced back to the botnet node, this practice reportedly helps the agency launch attacks that are difficult - if not impossible - to attribute back to the NSA.

Did NSA Keep Quiet?

The report that the NSA had hacked into many of the systems employed by the North Korean military, and was monitoring them, has prompted information security experts to question whether the agency knew about the Sony Pictures hack and failed to stop it.

"If the NSA were secretly spying so comprehensively on the networks used by North Korea's hackers, how come they didn't warn Sony Pictures?" asks independent security expert Graham Cluley in a blog post.

If the NSA did detect signs of the Sony hack planning, reconnaissance and actual attack unfolding, however, then it might have declined to warn the television and movie studio to avoid compromising that monitoring ability, says Europol cybersecurity adviser Alan Woodward, who's a visiting computing professor at the University of Surrey in England. Similar questions have been raised in the past, for example, over the World War II bombing of Coventry, England, by the Germans, and why - if the British had cracked the Nazis' secret Enigma codes - the U.K. government didn't evacuate the city.

Another outstanding question is the extent to which the leadership of North Korea suspected - or knew - that their computer systems may have been infiltrated by foreign intelligence services. "Presumably, the cat is now out of the bag," Cluley says. "These news stories may take some of the heat off the [United] States from some of those in the IT security world who were skeptical about the claims of North Korean involvement, but it also tips off North Korea that it may want to be a little more careful about its own computer security."

 


Via Technical Dr. Inc.
Szymon Mantey's insight:

Poradnik w jak łatwy sposób zostac shakowanym przez skośnookich  w ktorym to kradną nasze dane osobowe a NSA nie ejst wstanie nic z tym zrobić...

more...
No comment yet.
Your new post is loading...
Your new post is loading...
Scooped by Szymon Mantey
Scoop.it!

Google's Translate App Can Now Use Your Camera to Translate the World in Real Time

Google's Translate App Can Now Use Your Camera to Translate the World in Real Time | Informatyka | Scoop.it
If you're ever in a situation in which you need to understand some text in a foreign language, getting a translation is now as free and easy as loading up
Szymon Mantey's insight:

jestes zagrqanica i nie umiesz rpzetłumaczyc znaku drogowego?_ google służy pomocą!  na takie aplikacje nie szkoda miejsca w smartfonach!

more...
No comment yet.
Rescooped by Szymon Mantey from Apk Android
Scoop.it!

Image Blender Instafusion v2.0.9 build 20 Apk

Image Blender Instafusion v2.0.9 build 20 Apk | Informatyka | Scoop.it

Image Blender Instafusion v2.0.9 build 20 Apk http://comegamez.com/image-blender-instafusion-v2-0-9-build-20-apk/ Image Blender Instafusion v2.0.9 build 20 is an amazing application for Android users. It is..


Via TimurSarp Yalçın
Szymon Mantey's insight:

uważam iż aplikacja  na tablety,smartfony do tworzenia przedmiotów w 3d jest malo praktyczne z paru wzgledów... mały ekran, , za wiele opcji modyfikacji w programie oraz brak mozliwosci chocaiżby konwertowania plików. nie mowiac o procesie renderingu oraz tworzeniu animacji..

more...
No comment yet.
Rescooped by Szymon Mantey from whats next for music format
Scoop.it!

NeoFinder - USB HD CD Cataloger

NeoFinder - USB  HD  CD Cataloger | Informatyka | Scoop.it
CDFinder is a powerful and very fast disk cataloging tool, reading metadata like EXIF, IPTC, JPG, TIFF, MP3, AAC (iTunes)

System requirements:
Mac OS X 10.5, 10.6, 10.7, or 10.8 (Mountain Lion)
Intel- or PowerPC-Macs

Product Technical Details:

Catalog: any hard disk, data folder, CD-ROM, DVD-ROM, Blu-ray, HD-DVD, iPod, Server Volume, Audio-CD, USB-Stick, FTP-Server, and morePower: Handle really large amounts of dataNetworkable: Share your NeoFinder database in your entire workgroup (requires a Business License)Cross-platform: with abeMeda (NeoFinder for Windows), you can use one database for both worlds!


Via David Anders, Skydamire
Szymon Mantey's insight:

bardzo fajny  programik ulatwiający sortowanie oraz  uporżadkuwujący dane na USB1 polecam!

more...
No comment yet.
Rescooped by Szymon Mantey from Car Video reviews
Scoop.it!

BOSS Audio BV8972 In-Dash Single-Din 7-inch Motorized Detachable Touchscreen DVD/CD/USB/SD/MP4/MP3 Player Receiver with Remote

BOSS Audio BV8972 In-Dash Single-Din 7-inch Motorized Detachable Touchscreen DVD/CD/USB/SD/MP4/MP3 Player Receiver with Remote | Informatyka | Scoop.it

Product Details | Shipping & Delivery | Special Offers View larger GENERAL FEATURES 1. 7” MonitorA 7 inch widescreen TOUCHSCREEN digital TFT monitor is built into the faceplate for your viewing pleasure. 2. Switchable US & Europe Tuner FrequenciesIf you happen to take the BV8972 o... http://airconditionerstips.com/boss-audio-bv8972-in-dash-single-din-7-inch-motorized-detachable-touchscreen-dvdcdusbsdmp4mp3-player-receiver-with-remote-2/


Via linwood sullivan
Szymon Mantey's insight:

co z tego że ze boss stawia na nową technologie skoro jakościowo jest 100lat za murzynami  pomijajac iz jako firma jest słąbo rozpoznawalna wsód spolecznych fanatyków dobrego sprzętu grającego

more...
No comment yet.
Rescooped by Szymon Mantey from technologies
Scoop.it!

SmileTemplates - Free PowerPoint Templates & Backgrounds

SmileTemplates - Free PowerPoint Templates & Backgrounds | Informatyka | Scoop.it
SmileTemplates.com - free PowerPoint templates and backgrounds. We have the best collection for PowerPoint presentations ready for download.

Via John Dalziel
Szymon Mantey's insight:

ulalala szykuje nam się darwmowy powerpoint nowej firmy ktora wproawdza swoj produkt... sweet!

more...
John Dalziel's curator insight, January 19, 2015 4:40 AM

Try something new with professional graphics and high-quality free PowerPoint templates from SmileTemplates.
Categories include...
   - Abstract
   - Business
   - Education
   - Finance
   - Food & Drink
   - Health & Recreation
   - Industry & Production
   - Legal
   - Medical
   - Military
   - Nature
   - People
   - Real Estate
   - Religion & Holidays
   - Science
   - Sports
   - Technology
   - Transportation
The PowerPoint templates provided are easy to use.
Just select a free or an inexpensive design of your choice, and you'll be guided through the easy process of downloading and saving it to your computer.

Scooped by Szymon Mantey
Scoop.it!

Kurs C#, czym jest platforma .NET, czym jest język programowania C#? - YouTube

Pierwsze lekcja video kursu C#. Dowiadujemy się czym jest język programowania c#, czym jest kompilator oraz czym jest platforma .NET. Zaznajamiamy się ze śro...
Szymon Mantey's insight:

Wyjaśniona lerkcja na chłopski rozum  jak przebiega programowanie w C# przyda sie nam!

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

Najciekawsze premiery gier w 2015 roku - YouTube

Szymon Mantey's insight:

Dzięki polskim programistom doczekaliśmy się odsłony gry Dying light mysle ze robi ogromne wrazenie i gra jest bardzo rozbudowana zaś jestem ciekaw czy będzie równie nurzaca co jej poprzednik Dead Island

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

Recenzja gry Saints Row: Gat Out of Hell - Święci w piekle

Recenzja gry Saints Row: Gat Out of Hell - Święci w piekle | Informatyka | Scoop.it
Johnny Gat i Kinzie wracają, by znów narobić totalnego rabanu, tym razem w piekielnej przestrzeni. Dobra zabawa jest gwarantowana, choć nie da się ukryć, że wszystko to już widzieliśmy wcześniej.
Szymon Mantey's insight:

I wszystko w temacie..  Saint Row wział sie za porazke Producentów Rockstar i stworzą szybicej Saint Row dzieki czemu odbije sie to na zarobkach GTAV.. i pytanie na co tutaj teraz oszczędzać... ;d

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

The 15 function-key strokes everyone should know to zip around Microsoft Office

The 15 function-key strokes everyone should know to zip around Microsoft Office | Informatyka | Scoop.it
Master these key combos and shave hours off your projects.
Szymon Mantey's insight:

ciekawy poradnik, lecz jak to wygląda gdy mamy niestandardowe klawiatury,  typu niemieckie ?

more...
No comment yet.
Rescooped by Szymon Mantey from Technology in Business Today
Scoop.it!

Google Glass Sales halted Amid Reshuffle

Google Glass Sales halted Amid Reshuffle | Informatyka | Scoop.it
Smartglass device has been widely criticised as a threat to privacy

Via TechinBiz
Szymon Mantey's insight:

wszyscy cieszą się wynalazkiem google glas... zaś ja uwazam iż gdy wprowadza okulary na rynek to.. bedziemy otoczeni na okragło reklamami  które będa sie wyswietlac na tym że okienku. zaś rozwiązanie  google polegające na głosniku ktory wibruje przezkość czaszkową do aparatu słuchowego naprawde mną zaintrygowało..

more...
No comment yet.
Rescooped by Szymon Mantey from Technology in Business Today
Scoop.it!

Robots roam hallways of SF's newest hospital, lending a helping Hand

Robots roam hallways of SF's newest hospital, lending a helping Hand | Informatyka | Scoop.it
A fleet of 25 new workers rolls through the hallways of UCSF Medical Center at Mission Bay, delivering meals and medicine, among other tasks formerly completed by humans.

Via TechinBiz
Szymon Mantey's insight:

Lodówka robot, która pomaga pielęgniarkom w spzitalu, bądz w hotelu? Zaczynam się bąc w teorie iż roboty zastapią nas w pracy, a sami zostaniemy bezROBOTNI.. dosłownie...

more...
Matthew Becker's curator insight, January 19, 2015 9:41 PM

A very short but interesting article. The picture and title catches the readers eye. I feel as if the whole premiss of the article is interesting and feel as if robot technology could be very helpful for humans as time goes on.

Scooped by Szymon Mantey
Scoop.it!

Using PowerPoint 2010 - A Complete Tutorial of Most Features - YouTube

The tutorial covers: - Getting started with PowerPoint and General Concepts - Applying a theme or design to a presentation - Inserting multimedia and SmartAr...
Szymon Mantey's insight:

w szybki i ciekawy sposób dowiemy się  o najnlepszych i najbardziej efektownych trikach jakie możemy zrobić w PowerPoint firmy Microsoft Office

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

iPhone 6s. Pierwsze plotki w sieci. Co szykuje Apple? | iPhone 6s

iPhone 6s. Pierwsze plotki w sieci. Co szykuje Apple? | iPhone 6s | Informatyka | Scoop.it
Od premiery iPhone'ów 6 upłynęło dopiero kilka miesięcy, a tymczasem w sieci robi się głośno o iPhonie 6s!
Szymon Mantey's insight:

IPhone 6  już niebawem bd mieli możliwość sprawdzenia jego najnowyszych technologii takich np jak"  odczyt siłu nacisku palca"" sprawdzenie lini papilarnych" czy temperature

more...
No comment yet.
Rescooped by Szymon Mantey from IT Books Free Share
Scoop.it!

Blender Compositing and Post Processing - PDF Free Download - Fox eBook

Blender Compositing and Post Processing - PDF Free Download - Fox eBook | Informatyka | Scoop.it
Blender Compositing and Post Processing PDF Free Download, Reviews, Read Online, ISBN: 1782161120, By Mythravarun Vepakomma

Via Fox eBook
Szymon Mantey's insight:

Bardzo łątwy i szybki poradnik który ma najbardizej potrzebne insturkcje i lekcje do stworzenia swojej pierwszej animacji w blenderze!

more...
Fox eBook's curator insight, April 8, 2014 9:43 PM

Chapter 1: Blender Compositing – Overview
Chapter 2: Working with Blender Compositor
Chapter 3: Working with Input and Output Nodes
Chapter 4: Image Manipulation Techniques
Chapter 5: Beyond Grading
Chapter 6: Alpha Sports

Rescooped by Szymon Mantey from Machinimania
Scoop.it!

Anarkik3D: Design for 3D printing can be accessible for all | 3D News from 3D Focus

Anarkik3D: Design for 3D printing can be accessible for all | 3D News from 3D Focus | Informatyka | Scoop.it
Anarkik3D tells 3D Focus that their Cloud9 software could be the DTP software equivalent of 3D design for 3D printing as it requires no CAD knowledge (RT @build3dprinter: Anarkik3D: Design for 3D printing can be accessible for all

Via Henrik Safegaard - Cloneartist
Szymon Mantey's insight:

mysle ze i tak Blender wyprzedza konkurencje o jakeis 5 lat..  zew zgleu na łątwość obsługi oraz tworzenie druku 3D!

more...
No comment yet.
Rescooped by Szymon Mantey from Next Generation
Scoop.it!

The smallest USB Arduino : Digispark DIY

The smallest USB Arduino : Digispark DIY | Informatyka | Scoop.it

Digispark is an ATtiny85 based microcontroller development board come with USB interface. Coding is similar to Arduino, and it use the familiar Arduino IDE for development.


Via Axel, Yaron Amir
Szymon Mantey's insight:

jeśli chodzi o USB to akurat ten powinien byc standardowych rozmairów, praktyczne zastosowanie tak małych usb nie wchdozi wgre ze wzgledu an to iż bd mozna go baardzo łątwo zgubic!

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

Nadchodzi zupełnie nowe USB – symetryczne i prawdziwie uniwersalne! | nowe gniazdo USB 3.1 w 2014 roku - nowa symetryczna wtyczka i gniazdo USB

Nadchodzi zupełnie nowe USB – symetryczne i prawdziwie uniwersalne! | nowe gniazdo USB 3.1 w 2014 roku - nowa symetryczna wtyczka i gniazdo USB | Informatyka | Scoop.it
Ruszyły prace nad nowym standardem popularnego złącza USB. Nie znamy jeszcze wszystkich szczegółów, jednak już wiadomo, że czeka nas rewolucja.
Szymon Mantey's insight:

dobry pomysł ans towrzenie usb  ktore pasuje   obojętnie jak go włozymy.. tylko czy oplaca sie zmeinaic teraz wszystkie wejścia w komputerach,telefonach etc. dzieki temu kablowi? 

more...
No comment yet.
Rescooped by Szymon Mantey from IT Support and Hardware for Clinics
Scoop.it!

How NSA Hacked North Korean Hackers

How NSA Hacked North Korean Hackers | Informatyka | Scoop.it

The U.S. government's attribution of the Sony Pictures Entertainment hack attack to North Korea stems, in part, from the U.S. National Security Agency having infected a significant number of North Korean PCs with malware, which the intelligence agency has been using to monitor the country's hacking force.

 

So says The New York Times, which bases its report, in part, on interviews with unnamed former U.S. and foreign officials, as well as a newly leaked NSA document. The document, published Jan. 17 by German newsmagazine Der Spiegel - and obtained via former NSA contractor Edward Snowden - details how the NSA worked with South Korea - and other allies - to infiltrate North Korea. The agency reportedly infiltrated at least some of these computers by first exploiting systems in China and Malaysia that help manage and administer North Korea's connection to the Internet.

According to the Times report, the hacked computers have given the NSA an "early warning radar" against attacks launched by the Pyongyang-based government of North Korea. Related intelligence gathered by the NSA also reportedly helped convince President Obama that North Korea was behind the Sony Pictures hack.

North Korea's Reconnaissance General Bureau intelligence service, as well as its Bureau 121 hacking unit, control the vast majority of the country's 6,000-strong hacking force, some of which operates from China, according to news reports.

Fourth Party Collection

Some of the evidence of the NSA's ability to monitor North Korean systems comes from a leaked NSA document, which appears to be a transcript of an internal NSA question-and-answer discussion that's marked "top secret" and is restricted to the U.S. and its Five Eyes spying program partners: Australia, Canada, New Zealand and the United Kingdom. The document refers to the NSA's practice of "fourth party collection," which involves hacking into someone else's hack, according to a Der Spiegel report.

The document relays an episode that involves North Korea: "We found a few instances where there were NK [North Korea] officials with SK [South Korea] implants [malware] on their boxes, so we got on the exfil [data exfiltration] points, and sucked back the data," the document reads.

Der Spiegel reports that this practice, which is employed by the NSA's Tailored Access Operations team, has been used extensively to undermine many hack attacks emanating from Russia and China and has allowed the NSA to obtain the source code for some Chinese malware tools.

But some attacks against U.S. systems did succeed, and one leaked NSA document says that as of several years ago, 30,000 separate attacks had been detected against U.S. Defense Department systems, 1,600 systems had been hacked, and related "damage assessment and network repair" costs had exceeded $100 million.

The NSA document also discloses that South Korea in recent years has begun attempting to hack into some U.S. government systems.

The FBI has previously said that its attribution of the Sony Pictures hack was based in part on intelligence shared by the NSA, although that attribution did not single out the North Korean government, thus leaving open the possibility that pro-Pyongyang hackers or even mercenaries may have also been involved.

The Role of Botnets

On the attribution front, meanwhile, documents newly published by Der Spiegel - and leaked by Snowden - have detailed an NSA program, code-named "Defiantwarrior," which involves the NSA using infected nodes - or zombies - in a botnet. When such nodes are traced to U.S. computers, the FBI reportedly uses the information to help shut down those parts of the botnet. But when nodes are discovered on computers in countries outside the Five Eyes program, the NSA - according to the leaked documents - may use these to launch attacks against targets. While such attacks might be traced back to the botnet node, this practice reportedly helps the agency launch attacks that are difficult - if not impossible - to attribute back to the NSA.

Did NSA Keep Quiet?

The report that the NSA had hacked into many of the systems employed by the North Korean military, and was monitoring them, has prompted information security experts to question whether the agency knew about the Sony Pictures hack and failed to stop it.

"If the NSA were secretly spying so comprehensively on the networks used by North Korea's hackers, how come they didn't warn Sony Pictures?" asks independent security expert Graham Cluley in a blog post.

If the NSA did detect signs of the Sony hack planning, reconnaissance and actual attack unfolding, however, then it might have declined to warn the television and movie studio to avoid compromising that monitoring ability, says Europol cybersecurity adviser Alan Woodward, who's a visiting computing professor at the University of Surrey in England. Similar questions have been raised in the past, for example, over the World War II bombing of Coventry, England, by the Germans, and why - if the British had cracked the Nazis' secret Enigma codes - the U.K. government didn't evacuate the city.

Another outstanding question is the extent to which the leadership of North Korea suspected - or knew - that their computer systems may have been infiltrated by foreign intelligence services. "Presumably, the cat is now out of the bag," Cluley says. "These news stories may take some of the heat off the [United] States from some of those in the IT security world who were skeptical about the claims of North Korean involvement, but it also tips off North Korea that it may want to be a little more careful about its own computer security."

 


Via Technical Dr. Inc.
Szymon Mantey's insight:

Poradnik w jak łatwy sposób zostac shakowanym przez skośnookich  w ktorym to kradną nasze dane osobowe a NSA nie ejst wstanie nic z tym zrobić...

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

C# - Programowanie « Programowanie « Książki - Wydawnictwo Helion, księgarnia helion.pl

C# - Programowanie « Programowanie « Książki - Wydawnictwo Helion, księgarnia helion.pl | Informatyka | Scoop.it
Kategoria C# zawiera szereg publikacji omawiających język programowania C#, który łączy w sobie najlepsze cechy Javy i języka C++, a obecnie uważany jest za podstawowe narzędzie programistyczne dla platformy .NET.
Z podręczników tych poznacie składnię samego języka i komponenty platformy .NET oraz techniki komunikacji z bazami danych, korzystając z technologii ADO.NET i języka LINQ. Dowiecie się czym są instrukcje warunkowe, pętle, dziedziczenie lub hermetyzacja obiektów. Znajdziecie przydatne informacje jak przeprowadzić analizę ruchu w sieci oraz czym jest programowanie obiektowe a także przeczytacie jak sprawnie korzystać z protokołów sieciowych ICMP, HTTP i FTP.
Szymon Mantey's insight:

każdy studenciak informatyki powinien znać przynajmniej te poodstawowe tytuły literatur jakie można zakupić w tym serwicie..

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

Windows 7 exits mainstream support: What you need to know

Windows 7 exits mainstream support: What you need to know | Informatyka | Scoop.it
Don't panic! Windows 7 exiting mainstream support on January 13, 2015, shouldn't have a major effect on day-to-day use.
Szymon Mantey's insight:

Uwazam ze jelsi chdozi o system Windows 7 to i tak jest jak narazie najbardziej zoptyamlizowanym systemem patrzac na wczenisejsze czy też pozniejsze(Windows 8) SYSTEM, Fakt windows 8  jest latwy w obsłudze zaś  najlepsze zastosowanie ma w smartfonach i tabletach w PC  mysle ze jednak bardizej rpaktyczniejszy jest win 7

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

Tutorial - Excel 2010 - 10 Things you must know - YouTube

Tutorial explaining 10 of the most common must-know features in Microsoft Excel 2010, Excel is used world-wide and this tutorial shows slightly beyond the ba...
Szymon Mantey's insight:

kazdy o tych technikach musi  pamiętac jesli chce szybko i sprawnie pracowąc w środowisku excela

 

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

Blender Tutorial: Wood Chipping Text Animation - YouTube

http://www.LittleWebHut.com This Blender video demonstrates how to make an animation of text that appears to be carved by chipping away a block of wood. Blen...
Szymon Mantey's insight:

bardoz fajny toturial poświęcony tworzeniu graifki Trójwymiarowej dizeki czemu jak w tym wypadku dowiemy się jak tworzyc Wstep np do filmu, lub zrobienie animiacji czy logo np firmy

 

more...
No comment yet.
Rescooped by Szymon Mantey from Technology in Business Today
Scoop.it!

Army Recruits Reserves with Virtual Reality

Army Recruits Reserves with Virtual Reality | Informatyka | Scoop.it
The UK Army is using technology to transform the way it recruits so people can "step straight into" the world of volunteering.

Via TechinBiz
Szymon Mantey's insight:

Miałem to cacko w rękach  i razem zkolega je tostowałem, powiem szczerze iż w zastosowaniu przydaje się, jest niesamowita frajda, zaś  jest poki co mało gier, filmów dzieki którym moglibyśmy korzystać z tych okularów, mysle ze w najbliższych latach czeka nas rewolucja  jesli chodzi o działą gier komputerowych  dzieki tym okularom.. o ile popracują nad  optymalizacja obrazu poniewąz po 30min graniu oczy bolą zewzgledu na to iż rozdzielczośc jest w okularach zaledwie w 640 zaś taki rozmiar tak blisko oczu  wywołuje ich zmęczenie

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

RC Quadcopter with 5MP Camera

RC Quadcopter with 5MP Camera | Informatyka | Scoop.it
RC Quadcopter with 5 MP Camera This latest RC Quadcopter model from JJRC the H12C is likely to set the standard for Low Priced Camera Drones in 2015. Equipped with a High Definition 5 Mega Pixel Ca...
Szymon Mantey's insight:

Uważam, że i tak Dron firmy GoPRo oraz kamerka goPro 4 jest zdecydowanie lepszym i tańszym rozwiązaniem. ponieważ  5mpx na wysokosci 100m nie zadowoli nawet najwiekszego lajka filmów wideo.

more...
No comment yet.
Scooped by Szymon Mantey
Scoop.it!

Jak otwierać dane? Animacja “wydatki biur poselskich” - rozmowa z Fundacją ePaństwo

Jak otwierać dane? Animacja “wydatki biur poselskich” - rozmowa z Fundacją ePaństwo | Informatyka | Scoop.it
W zeszłym tygodniu Fundacja ePaństwo opublikowała animację pokazującą
wydatki biur poselskich w 2013 roku wraz z rankingiem, który pozwala
sortować informacje według typu wydatków, klubów parlamen
Szymon Mantey's insight:

Chcesz sie dowiedzieć  na temat nowych programów lub technik ich tworzenia lub ich najnowyszych rozwiązaniach?  na tej stornie  znajdziesz cos dla siebie. Polecam!

 

 

more...
No comment yet.