Tuesday, February 28, 2017

Cheap offers

Unfortunately, the other eBay offer did not offer this vital protection. Five of the seven prizewinners passed the test during the test more or less loudly into the power supply. And all of them did so clearly before reaching the printed maximum performance.


Chinabeller


After all, two noname power supplies announced their early death already by strong odor development. Thus, buyers with a sensitive nose could turn off in good time before the sudden power dissipation also rips other components of the computer.


Lean food


The two brands of the brands Chieftec and Sharkoon are completely different. Both delivered in the test reliably what is promised on the type plate. What proves once again: If the bar is low enough, you are already looking forward to something that should be self-evident. However, the fact that these initial models are not at the level of the noble-current donors of the last test should also be clear.


Smoke code


That a power supply for 7.99 euros with lush equipment shines, no one will expect. The austerity measures at our bargains from the online auction house sometimes go so far that self-sufficient contemporaries are put to a tough test. Ultracurze cables of just 30 cm in length and a poor supply of connections are the rule.


Except for the 750-watt power supply from MS-Tech, all the eBay bargains lack the PCIe plug needed for powerful graphics cards. On the basis of the experience gained, this is also to be welcomed since none of the low-budget power supplies from the "bay" would be recommended for the operation of a computer with a powerful graphics card. Correspondingly, the use of an adapter that converts two Molex connectors into a PCie connector is also discouraged.


Mager appears, just whether the often lush output at 3.3 and 5 volts, the range of Molex and SATA connectors. Here the offer is usually only for a rudimentary computer configuration.


The Sharkoon power supply is different: it spoils its owner with long cables and a sufficient amount of connections. The Chieftec, on the other hand, can not be sold by the eBay marketers in this discipline.


And in yet another discipline, only Sharkoon's power supply is on its own: it is the only device that offers at least a glimpse of what could be called a manual. In addition, the Sharkoon screws are a luxury that only MS-Tech and Rasbro offer.


Missing information about a power supply may be tainted, false or misleading information is annoying at best, but possibly even dangerous. Whether or not the stickers which are clearly labeled with too high a performance are justifiable or not, let us leave them alone. However, a seized food for prosecution attorneys should in any case be misleading CE signs.


A CE marking must bear any "electrical equipment" operating at a rated voltage of between 50 and 1000 volts alternating current (Directive 2006/95 / EC). PC power supplies do this undoubtedly. Correspondingly, CE markings are also found on all test pieces of our test.


However, if you look closely at the mark, you have to question in some candidates whether this is really the mark of the European Union. Rather, the suspicion is that one or the other provider has copied the almost identical, but completely meaningless, sign for "China Export" to its power supply. The only difference is the much smaller distance between the letters from the EU original.


Only the power supplies from Chieftec, Rasbro and Sharkoon are apparently provided with the correct EU-mark. For all others, the distance between the letters does not match the defaults.


Now it may be that the manufacturers in China have their properly certified product or the wrong logo out of ignorance. However, the high-level representation of some candidates leaves the suspicion that this is the case with the intention.


Download: Table

Forgot Password? Hack yourself

Passwords are the torment of the digital age. We are constantly dependent on them, but rarely manage to curb them. With the immense number of online accounts to secure with them, the choice of passwords either suffers from security or convenience. We’ll show you how to recover lost passwords.


Password forgetting option does not always help


According to a survey conducted by Bilendi GmbH on behalf of Web.de, 58.8 per cent of respondents report a single password for all their services. Birth dates and names are still in full swing, which makes hackers and account hijackers easy, of course. But even if no one takes it, forgetfulness suffices as a reason to stand in front of a closed door. 62.3 percent of the interviewees remember their passwords without storing them or at least writing them down and making them secure (Source: Web.de study).


The perfect password


While we are sure that our readers are not a majority of them, the tips are helpful - whether it is to help prevent bad luck or to show friends and family members how to properly manage passwords


Software Help


The helpful "I forgot my password" link is not always a good solution. If the online account is linked to an e-mail address that is no longer accessible, the link to reset the password will go blank.


In the Internet cache hidden


The still popular security query as a passport statement can even turn out to be a security risk. Questions such as "What is the name of your old elementary school?" Can be answered on the one hand with little research effort directly from the outside. On the other hand, it is easier to remember the answer than the exact spelling: "Was it Erich-Kästner-Grundschule 'or' Erich Kästner Grundschule? '"


It would be much easier to forget your password. If this is still long and complex enough and can be modulated for all applications - and, above all, easy to remember - you would not have to bother with it any more.


It takes only a little practice: Take a passphrase, for example the first sentence of your favorite book, and write down the initial letters. Then add some special characters. This is the cornerstone of your password. The more often you use passwords with this foundation, the more skilled you are to write the letter series.


However, in order for the password to be used simultaneously for different Internet services, you now have to append a term that you connect to the service (not the name of the service itself). A sample password could look like this: Nmiepjihuwlg§ $% likesmir (for Facebook)


To ensure you do not forget the various iterations for the respective services, you can use free password managers such as LastPass or Keepass.


LastPass manages all your passwords, encrypts them locally and synchronizes them on all PCs or mobile devices.


However, anyone who still uses imperfect passwords (or if they are not otherwise accessible) will find more complex software solutions. Be careful! The programs presented here are hacking tools, which may be blocked by your anti-virus software, as long as you do not add exceptions. In addition, you can only use these tools on your own documents, your own programs, and your own identities in online networks - you can make a criminal offense against third parties!


The Elcomsoft Internet Password Breaker cleverly sets up where the passwords leave their mark. Facebook and similar pages are still hidden on your system, even if they are not directly visible. Internet Password Breaker reads these resources and saves your passwords.


However, this may only work for web pages that you visit frequently, as the browser cache is periodically emptied. Offline, the program supports POP3 IMAP, SMTP, and NNTP passwords for many e-mail clients, including: Outlook.


Decrypt Office files


Rechenpower is necessary when it comes to long and complex passwords and the process should not take months. Distributed Password Recovery queries a database of dictionaries and simultaneously executes brute-force attacks, meaning systematic queries of all possible combinations of letters and special characters.


Advanced Office Password Recovery is also provided by Elcomsoft and helps you rescue Office documents. To do this, simply select the appropriate Word, Excel or Access file, and the rest will do the rest by itself. It will first read out temporary folders and then go over to password and brute force attacks like Password Recovery Code>



Suspended with Windows


If the password for Windows is no longer accessible, you do not have to reinstall the operating system from despair. Instead, you might prefer to crack your system with the free Ophcrack Live CD. A prerequisite for this is another PC.


Load the ISO file and burn it. Then place the DVD in the locked PC and restart it. In order for the computer to boot from the DVD, you must set this in the BIOS. Ophcrack scans the computer for Windows users and passwords and compiles a list.


Expensive Microsoft software have the most users in view and so in case of emergency the reinstallation is always an option. However, with other Noname software, the product key may be missing.


Software accesses from the registry


Lesetipp


With the Magical Jelly Bean Keyfinder, these keys can be found in most cases - but only as long as the unlocked program, which is to be installed again, still has on the computer. The Keyfinder reads the Windows registry for over 8,000 supported programs. The tool is not an illegal key generator because it only finds keys that were already used on the computer.

Anti-Spam Software: Wavebreaker

MailShield evaluates emails based on different spam criteria and assigns points. From a certain point and number of criteria, an email is considered spam and will be deleted. In the test, the anti-spam tool did not delete any of the desired e-mails, but still showed a high rate of spam detection. MailShield checks several email accounts and supports POP3, IMAP4 and MAPI as well as e-mail accounts with Hotmail and MSN. The program interface presents itself clearly and tidy. The user has various options for changing the detection and handling of spam. For the fine-tuning of the spam filter by means of point weighting, a detailed study of online help and longer testing is essential. The tool is German-language, the offered support on the web but only English.


Http://www.lyris.com

USB 3.1: Intel announces new details on the Type C connector

Thanks to USB 3.1 and its new type C connector, the alignment issues are finally to be completed: Intel has introduced the new USB standard along with the appropriate type C connector on the IDF 2017, with which it no longer plays a role and


Also interesting is


Up to now, Type A has been widely used for USB connections. In contrast, USB 3.1 is significantly more compact. With a width of approximately 8.3 millimeters and a height of 2.5 millimeters, the type C plug is only slightly larger than a USB 2.0 mini plug.


Lesetipp: Free tool protects against attacks via USB stick


In addition, the USB 3.1 cable not only fits into the connector in either plug-in direction but also has the same connector on both ends of the cable.


In contrast to Apple's Lightning cable, which offers a similar function, the type C plug as in the previous connections, the contacts inside are hidden. Inside the socket is a centrally placed tongue, on both the top and the bottom of which there are contact strips with 12 contacts per side.


In addition, the electromagnetic shielding for USB 3.1 has been improved. This advantage was achieved by recesses on the collar. Nevertheless, the type C plug should be plugged securely into the socket: Two springs on the side of the tongue snap into place when connecting. This security has been enhanced by a metal core which is designed to run along the entire width, as well as the shield.


There are also advances in the endurance compared to older models. For example, both the jacks and the plugs should be able to withstand at least 10,000 plug connections with the USB 3.1 standard - about seven times more than with the type A plug. The lifetime of the new connector should be around 15 years.


Furthermore, the components should be more stable against distortions. Optionally, a clamp can also be attached to the bushing to increase the resistance force.


However, the speed of the new standard is not necessarily at the USB 3.0 level. Manufacturers are allowed to develop USB 2.0 cables with Type C connectors, which then contain fewer wires. Thus, the mode called "Superspeed +", with which transfer rates of up to 10 gigabits per second are possible, is no duty. However, a certification program should provide clarity.

Windows 10: January update available as ISO download

Microsoft has released the announced January update of the Technical Preview on the ISO download. The Build 9926 has received many new features, presented at the recent Consumer Experience.


More on Windows 10


Among other things, the start menu has been reworked and is now much closer to the final version. The Cortana language control is also integrated, but it seems to work only in English.


In addition, the "Continuum" function can now be found in the new Windows 10 build. Thanks to Continuum, it is possible to switch between tablet and laptop mode seamlessly. In Tablet mode, the start menu is expanded to the start screen, where the Windows apps can be used across the entire display.


Other novelties include a pre-release version of the Xbox app, as well as photos, maps, and Windows Center applications. Also the charm bar, known from Windows 8, has been replaced by the new ActionCenter.


However, the new browser is not Spartan, which should be included in future builds. You are entitled to download the Windows-10-ISO as part of the Windows-10-Insider-Program. You can find more information about Build 9926 in the official Microsoft blog.

Timeline: THX milestones - 1982: THX founding father

1982: THX Founding Father


1982: THX Founding Father


George Lucas introduces the audio engineer Tomlinson Holman in 1982. This is to optimize the audio reproduction in the cinema, especially for the Star Wars films.

Part 7: Drawing programs: By line & path

At first sight, Zoner Draw appears inconspicuous. The wallflower, however, offers some of the functions that can not be found in one or the other of the “big ones”. With Zoner Draw, you create transparencies and soft shadows (!), Work with layers, or separate in CMYK when printing. However, it turned out that the “long” waiting time for the separated output of more than three minutes had its reason: the print file reached a size of 1.19 GB.


Jewelry colors are not supported by either the direct printing or the export process. Some functions, such as the color definition, are somewhat cumbersome. As an import filter, AI-4 files from Illustrator prove to be very reliable. Later AI formats provided partial misfires. Printed matter that can not be output and controlled on the domestic inkjet printer will fail quickly when transparencies come into play. The program provided e.g. In the cyan extract no crossbar (below between the two images with the crocus), although this consists only of cyan, though transparent. Here the favorable program can lead to high costs due to misprints and the savings can quickly be gone. For the home user, Zoner Draw 4 is worth a consideration for the purchase price of 99 euros.


Http://www.softline.de

Kim Dotcom: Legal slump in the dotcom delivery process

The penultimate round in the legal dispute around the extradition of the US had gone to the Megaupload founder Kim Dotcom. A New Zealand court had allowed Dotcom’s attorneys to require detailed file surveillance in the FBI files against Dotcom in order to prepare for the negotiations. This is not the case with the US.


Instead, the FBI had filed an appeal, which has now been granted by a court of appeal. This is the current round in the litigation to the US, and Dotcom’s delivery is again a little more likely. But this should not be the last word in this matter, as Dotcom’s lawyers are already considering calling the Supreme Court of New Zealand.


Dotcom aka Kim Schmitz is accused of having violated massively copyrights with the Internet portal Megaupload. The US figures the damage to half a billion dollars. US authorities had taken Megaupoad off the web in early 2012. Dotcom has now opened a new portal called "MEGA", which seeks to escape the copyright problem through encryption. However, the new portal will still have to deal with numerous technical problems.

Elac 301.2 / Sub 2030

With the 301.2 in conjunction with the SUB 2030, ELAC ventures into a price segment, which certainly does not bring the high number of units such as the 500 Euro price class. However, ELAC would not be ELAC, if the boxing specialist could not show what the state of affairs is. And this has its price.


Picture gallery


The set consists of five identical, almost 1.5-liter satellites, which form the prerequisite for a good uniform sound reinforcement all around. The Kiel developers have equipped the chic cube with an 87 mm x 108 mm aluminum sandwich membrane and a neodymium magnet system. In front of the low / mid-range woofer, a 20 mm small silk tweeter was positioned.


Deep bass extreme


Compared to the conventional arrangement, the almost coaxial positioning has the advantage that the sound of deep and high tones arises almost at one point and consequently radiates uniformly broadly without conspicuous interferences. In addition, the size of the woofer can be maximized, which contributes to the level of the fundamental sound.


The sturdy aluminum housing is closed and accommodates an electrical highpass for a clean connection to a suitable subwoofer. Wall brackets are included, while desktop and speaker stands are optional.


ELAC's SUB 2030 is the second smallest subwoofer from the bass range. But it is still a 25 centimeter large chassis in the diced, "closed" housing. While other manufacturers want to "squeal" the last few hertz out of the bassists thanks to bass reflex tuning, ELAC places more emphasis on a clean low bass.


In conjunction with its own limiter circuit, ELAC conjures rich bass without audible distortions from the small subwoofer. 300 watts are available to the chassis to ensure adequate sound pressure even in the deepest frequency regions.


From the first bar, the Kieler Edel set was convincing in almost all disciplines. A close-up of the satellites, the satellites with more basic sound fill, which makes the set sound even more adult. Thus positioned, ELACs impressed the system from the lowest to the highest octave of the listening area. So tonal was all right.


Class was the extensive, detached from the sound sources of an orchestra, even in the stereo mode. Patricia Barber's voice sounded open and the bass sound clean for tone.


In multi-channel operation and in explosions as in the movie password: Swordfish impressed the dynamic abilities and also the authentic reproduction of the respective acoustics. The draft was best with 22 Hertz lower limit frequency. All in all an excellent listening pleasure - but not a cheap.

AC WLAN extension from Trendnet in test

Speed ​​up the home network with Trendnet.


Conclusion


Trendnet's quadratic access point extends the 2.4 GHz home network with 5 GHz AC WLAN. The device has an edge length of 6.5 cm and consumes only 1.6 watts. Since the set-up tool on DVD did not work, we made the connection to the Trendnet AP directly via the WPS button. From the host address http: // tew-820ap, the set-up assistant will start in the browser.


Trendnet TEW-820AP: details


Very nice: Trendnet now also offers a detailed help in the user interface. Really helpful is however only the English version. Despite the 433 Mbit / s radio chip, we determined a maximum of 94 Mbit / s net transfer. The reason: The LAN port of the access point corresponds to the Fast Ethernet standard with ebendieser transfer rate. A wall can easily reduce the transfer rate of the single-antenna 5 GHz AP by a third. The TEW-820AP also has a client mode and then connects to APs above channel 48.


For the streaming use in the same room, the cheap, energy-saving 5 GHz access point is quite suitable, especially since the device can also be used as a 5 GHz WLAN client.


Video DVD Maker Free Download

With Video DVD Maker Free, you can transfer your video files to a movie DVD without additional conversion software. Egel whether holiday video clips or video clips from the Internet – more relaxed than on the computer screen, the film can be viewed on a DVD player on the TV. If it is only about bringing the source videos to the correct format on a DVD, you get with the video DVD Maker Free an effective tool. Video DVD Maker Free also processes video files directly from a connected source such as a video camera or TV card from the hard disk in the formats AVI, DIVX, XVID, MP4, MPG, WMV, ASF, MOV and FLV. Video DVD Maker Free converts the video data into a DVD-compatible format and burns the created data on film DVD. You can also back-up copies of movie DVD on the hard disk (Video_TS) with a video DVD Maker Free.

Ray Dolby has died at the age of 80 years

Earlier in his career, Ray Dolby helped Ampex Corporation develop the first VCR. In 1965 he founded his own company, the Dolby Laboratories. Through his noise suppression system, he has decisively shaped the era of the compact cassette, and he has also stamped on modern cinema and home cinema.


Thanks to the multi-channel technology and the installation of several loudspeakers, the cinema experience, as we know it today, was only possible. The current sound format in the cinema is Dolby Atmos. Modern AV home theater systems also carry the Dolby seal.


Ray Dolby and Dolby Laboratories were honored with ten Oscars and 13 Emmys for their technologies. The venue of the Oscar ceremony was renamed Dolby Theater in 2012.


As Dolby Laboratories announced, Ray Dolby died on September 12, 2013 after a long illness in his home in San Francisco. He was 80 years old. "We lost a friend, a mentor, and a real visionary today," said Dolby Laboratories CEO Kevin Yeaman. Dolby's son, Tom Dolby, emphasizes that the technological achievements of his father have a special love for music and art.

Photoshop Elements vs. Paintshop Pro: The test duel

Photoshop Elements from Adobe or Paintshop Pro from Corel – what should it be? Both manufacturers send their programs as an all-rounder for photo processing into the race, but with different focus: in Photoshop Elements 13 archive management and image processing are two separate programs, between which is switched. Three processing modes are available for polishing the photos: Fast, Assistant and Expert. Depending on the user, the menu settings are either reduced or fully displayed. This also makes it easier for less experienced users to enter through a customizable user interface.


Import and Export


PaintShop Pro X8 has a different concept. Here, the image organization is integrated into the main program together with the editing features (submenus: administration, customization and editing), so that everything can be done there. This Ultimate version also includes other programs, such as the AfterShot 2 raw converter, the PerfectEffects 9.5.0 and PerfectlyClear effects programs, and the extensive Corel CreativeCollection.


Lesetipp


The additional programs work together either as a plug-in or by linking to the main program, without having to export or import images. All menus and tools are always available in PaintShop Pro X8.


Manage images


Many photographers prefer the raw format today. Each camera manufacturer, however, cooks his own soup, which must be recognized by the image processing software. We chose two RAW files from common camera types of the manufacturers Canon, Nikon, Panasonic, Samsung and Sony. Photoshop Elements opened our raw files via CameraRaw, which provides only very rudimentary image processing tools compared to Photoshop's full version, within 13 seconds. PaintShop Pro itself needed only slightly less.


Image processing


The Raw Converter AfterShot 2, which is included with PaintShop Pro, is much brighter. Within 2 seconds (without delay) all RAW files are now available. The comprehensive


Tool Palette from AfterShot 2 leaves the rather meager RAW setting functions of Photoshop Elements in the shade and the extent of the import formats is with PaintShop Pro opulent and reaches as a result of the decades-long market presence back to the Amiga time


PaintShop Pro X8 also scores with a batch processing. This proves to be very useful to apply effects fully automatically to large photo archives or to overwrite many files in one fell swoop. Even HDR recordings can be automatically calculated by batch. Special highlight for professional users: Scripting functions are integrated into PaintShop Pro X8 for automation.


Photoshop Elements 13 provides only limited actions for automation. It can not create it itself, but from the large Photoshop take over and play, as far as the functions itself has integrated itself. Thus, the PaintShop rushes hairless past the small Photoshop.


Both programs offer essentially identical features in the photo archive, such as face detection, evaluation functions including EXIF, GPS data and much more. Also, the sharing is supported on the usual online platforms as well as the output as a photo book, CD cover and the like. Here, the output options on Photoshop Elements are a little more generous, and there is a direct upload capability to Cewe's online image service.


Smart: The organizer of the small Photoshop allows the automatic creation of a simple slideshow as MP4 video in HD including title creation and sounding. PaintShop Pro has a practical add-on feature, a well-adjustable tool for screen photos. However, Photoshop Elements is just ahead of the PaintShop Pro.


Actually there would be equality, at least as far as the basic functions are concerned. White balance, color and exposure, gradation curves, HDR photos, levels, vector graphics, sharpening, soft focus, and more are available in both programs. The selection tools such as lasso, magic wand and retouching tools such as red-eye correction, clone stamps and plane effects are also available. Using Photomerge Compose in Photoshop, you can cut out parts of a picture and insert them into another.


Lesetipp: The worst Photoshop mishaps


In PaintShop Pro X8, the similar function Magic Move is called, here you can move image parts within a photo. For both programs, precision is required when cutting, otherwise there are unsightly pictures. In addition, the seamless insertion is also motive-dependent. The scope of the included filters and effects is significantly greater in PaintShop Pro X8 Ultimate. The Perfect Effects 9.5.0 from On1, the Corel Creative Collection and the Athlete's PerfectlyClear plug-in give PaintShop a clear advantage.


Operation and Performance


Keep it simple is the American motto for Photoshop Elements 13. Everything is simple, everything is self-explanatory and easy to learn. The simplification is, of course, accompanied by the fact that the functions are restricted to the rudimentary. While it is important to have an important part in the process, an assistant will lead through many prefabricated areas, but there are too many adjustment possibilities.


Lesetipp: Photoshop: 10 helpful tutorials for beginners


Conclusion


In comparison, the PaintShop Pro X8 Ultimate is bursting with many professional filters and setting options, which are also largely self-explanatory - and intuitively learnable. The included effects bring a great space for creative image design, which is also appreciated by dedicated photographers. The performance feels about the same in both program packages. But the great Raw converter AfterShot 2 has the nose with PaintShop Pro in front of the tempo. And as a whole, the PaintShop Pro X8.


Two image processing programs - and two different worlds that could not be more different: Adobe Photoshop Elements 13 is an ideal entry-level program with cool features. You can quickly get good results without having to get into the subject too deeply - but you can go deeply, because the expert mode of the image processing is well hidden in the complicated technique.


However, if you want to get the most out of your photos, PaintShop Pro X8 Ultimate has the better counterpart. The included tools, filters and functions are very comprehensive. Particularly convincing is the Raw Converter AfterShot 2 with professional setting and display options. AfterShot 2 is already worth the money.


Test review: Adobe Photoshop Elements 13


Test Review: Corel PaintShop Pro X8 Ultimate

Google Cardboard: Instructions, buying and app tips

When Google presented on its developer conference I / O 2017 cardboard, the professional world still thought that the VR headset would be especially a funny side hit on the rival Facebook. After all, the company of Mark Zuckerberg had just taken the Oculus VR startup for 2 billion US dollars, which works with Oculus Rift on a Hitech VR headset. And Google now showed with Cardboard that only one cardboard box, two lenses and a smartphone are enough to experience virtual reality. Is cardboard only a gag?


Cardboard as a free bonus


A year and an I / O later, the question can be answered with "No". Google is continuing to develop Cardboard and is now offering a revised design that is compatible with smartphones up to 6 inches in size. And also iPhone owners can use Cardboard now - so far it was reserved for Android smartphones. In addition, Google announced that it intends to use the entry-level VR headsets in the education sector in the future and equip cardboards with cardboard in the USA.


What do I need to use Google Cardboard?


No wonder that more and more developers are interested in Google Cardboard. The range of apps and content for the VR headset is constantly growing. In addition, VR-suited YouTube movies allow for a 360-degree view.


How do I install and configure Google Cardboard?


So why wait? In the following, we will answer the most frequently asked questions about Google Cardboard and recommend at the end of the article Apps for first steps in the virtual world.


Does Google Cardboard work with glasses?


You can also receive Cardboard as a bonus as part of a mini-subscription from PC Magazin or connect. You can find all the information under the following links


First, you need a cardboard viewer. You can do this with the cardboard building instruction provided by Google free of charge, or you can buy a prefabricated kit. There are now many independent vendors, some of which Google lists on its cardboard page. However, the cardboard kits are now also available at Amazon. The prices range between 10 and 25 euros. In any case, make sure that it is a model with the new Cardboard 2.0 design. NFC and a magnetic button are not required.


Second, you need a compatible smartphone. This includes now all smartphones with Android 4.1 or higher as well as the iPhone from the 5th generation. In general, the higher the display resolution, the better the image. You install the Google Cardboard app, manage settings, and list compatible apps


Install the Google Cardboard app (links above) on your smartphone. When you first start it, you will be able to scan a QR code to automatically configure to match the Cardboard Viewer. A corresponding code is attached to most sold viewers. "Settings" allows you to re-run this configuration at any time.


If you are building a cardboard viewer or bought a model without a QR code, Google offers the Viewer Profile Generator. You need the exact dimensions and lens data of your card.


Generally yes. However, you should make sure that the viewer you select has enough space. Especially with wider spectacles it can be tight. If necessary, it can help to fit the scissors and cut slots in the viewer at the appropriate locations.


If everything is configured and installed, it is about exploring the virtual reality. The official Google cardboard app offers a few options - the cardboard demos. You can also use the "Get more Cardboard apps" button to open an appropriate view in the Play Store that lists compatible apps. There and for iPhone users on the App Store also help search with terms like "Google Cardboard" or "VR."


Google also now offers 360-degree video on YouTube. Here the Channel # 360Video offers a good overview of trends and novelties. To view them in VR, simply open one of the videos in the YouTube app on your smartphone and tap the cardboard icon that appears.


For the launch, we have compiled some cardboard apps as tips for you. Have fun trying out


All done - how do I get apps and videos for Google Cardboard?


Picture gallery

Record streams with OBS instructions

© Pablo Eder / shutterstock.com


Simple or flexible recording solution?


Gone are the days when the weekly television program has worked hard to highlight interesting films and TV series, which you should not want to miss. Also video recorders, have long been served. Nowadays each user is his own program director and decides for himself when he wants to see what, video streaming services like Amazon Prime Video, Netflix and Maxdome


Open Broadcaster Software


Such services cover a broad spectrum of films and TV series, including more and more own productions. These are not very expensive and can be "not only" received on PCs, but also on smartphones and tablets as well as modern Smart TVs, but the basic requirement is a fast Internet connection, so you will not be able to get away during a transatlantic flight Of the first season of Games of Thrones or another top TV series, as on a long drive.


The same also applies to holiday resorts, where no WLAN is available. In such situations it is an advantage if you have your films and TV series with you. We will show you the possibilities to record video streams and explain how well the Open Broadcaster software tool works.


The recording, streamed videos is not particularly complicated. In addition, there are now a number of more or less useful tools that help you. The range of tools ranges from simple solutions like Any Video Recorder, which simply film the complete screen and save it as a file, to programs such as streaming video recorders, which not only allow you to set the area to be recorded, but also Also to determine the video quality.


Open Broadcaster software is a special feature. With this program, you can not only record the entire contents of your screen, a specific program window or an external display and save it locally, in the MP4 or FLV format. You can also transfer the screen space to the Internet in real time.


This is something that plays a role when a user plays a PC game and wants to present the gameplay live on the popular platforms Twitch, YouTube and DailyMotion. However, we will not go into these features, because they have nothing to do with streaming videos.


To be able to record streamed videos with the clever Open Broadcaster Software (OBS) program, you first need to configure the tool. By default, OBS is optimized for the live Internet transmission of your own screen.


Prima: You only have to adjust these settings once. Start the software, click the Settings button, and select Broadcast Settings in the left column. Open the pop-up menu next to Mode: and select File Output Only to save the recordings locally to the hard drive. Set the storage folder in the same dialog. Click the Browse button on the File menu, and then navigate to the directory you want. Make sure that there is enough free space on the selected drive.


Important: In order for the streams to be saved in the correct format, select MP4 File (* .mp4) as the file type in the Save As dialog. As file name, type record_ $ T. $ T acts as a placeholder, which instructs the tool to expand the name Record_ by the current date and the exact time. Save the changed settings by clicking on Apply.


It is advisable to save the changes in a separate profile. In the settings on the left, click General and overwrite the entry Untitled with a profile name of your choice, for example, streaming recording. Click Add and Apply.


It can not hurt to set keyboard shortcuts for starting and stopping a record. You can do this in the settings by clicking on Hotkeys. Click with the mouse in the input field next to; Start recording :, and press the desired key combination, such as [Alt] + [F11]. Then set the hotkey for recording; stop: fixed, for example, play [Alt] + [F12]


Finally, save the changed settings with OK. Then the tool is ready to stream streams. You can find out how to do this in the mini workshop below.


Tip: If the picture quality of the recordings is not satisfactory, you must experiment with the maximum bit rate, which is 1000 kbit / s in the basic setting. In the settings, select Encoding and increase the value to approximately 4000 or 5000. The higher the maximum bit rate is, the better the quality. At the same time increases, but also the file size. In addition, older, less powerful, high-performance PCs may cause slight jerks.

Fritzbox-Hack & first firmware updates: BSI advises to urgent action

Update 3 (13.02.2014): After the Fritzbox hack and the first available firmware updates for AVM router, the BSI strongly advises the users to install a possibly provided patch. According to reports, so far only one in five has done so far.


The BSI (Federal Office for Information Security) emphasizes that hackers can reach the router via remote security vulnerabilities (HTTPS port 443). Then the path to the connected computers and network hard disks would hardly be a significant hurdle for cybercriminals.


If passwords are filed on the Fritzbox, then these are found just as quickly as they are captured. Look at the configuration interface of your Fritzbox (in the browser "fritz.box" enter) under the menu point System, if an update is available. Then follow the steps and warnings that are displayed.


Update 2 (10.02.2014): The Fritzbox hacks have an end soon. The Fritz box manufacturer AVM has apparently solved the security gap in the remote access port 443 and now offers patches and firmware updates for the first devices for download.


AVM had told users after the hacker attack on the Fritzboxes first, to renounce the remote access and change as fast as possible all access data. After a busy weekend, AVM now provides updated firmware updates for 19 nationally and 12 internationally deployed models, and advises all affected parties to implement updates as soon as possible.


AVM is also planning to update the 6320, 6340 and 6360 models used in cable networks.


Update 1 (07.02.2014): The Fritzbox-Hack continues to plague users, manufacturers and providers. The preliminary solution, to avoid horrendous telephone bills and data theft, assumes further dimensions. If it was first enough to change all relevant safety data, users are currently completely to forego remote access. This informs AVM in a further message after the first security warning. So far, only users who have activated remote access (HTTPS port 443), for example via the MyFritz! Service, have been affected.


By default, the service is disabled. Corresponding users will find instructions on the manufacturer's website to disable remote access. AVM says that this is necessary since it is unknown how the unknown hackers have come to all the necessary data. AVM works together with the authorities to create clarity quickly. Read all details in the original message.


Original message: Fritzbox owners who have a HTTPS remote access (Port 443) or the "MyFritz!" Service in their router activated, should quickly change all access data. Unknown hackers are currently providing isolated access to Fritzboxes, set up virtual IP phones and phone calls at user costs. According to reports, this is not a question of personal individual telephone calls, but rather a large number of expensive individual connections abroad.


In concrete terms, countless connections with a duration of one second each were built up in the Falkland Islands. The evil awakening in the individual case: up to 4,200 euros on the telephone bill. In that case, the said amount had come within half an hour. It is unknown who is behind this phone riot. It is assumed that the perpetrators on the basis of commission on the established telephone connections.


AVM - manufacturer of Fritzbox devices - announces in a recent announcement that currently "a few dozen" cases have become known. The incidents can not be limited to individual providers. Both customers of 1 & 1 as well as Unitymedia are affected - distributed over the entire federal territory as reported by Spiegel Online. In most cases, the supplier reports behave in a culpable manner. So check if you have a Fritzbox, immediately the list of the guided phone calls on your Fritzbox surface. If possible, please contact your provider immediately.


Lesetipp: VPN client on Fritzbox for more security and comfort


Currently, the affected parties - both users and vendors and manufacturers - are at a loss as to how such attacks could occur. The perpetrators need not only the access code to the router, but also the connection data, passwords and identifiers for remote access. A link with the recently announced list of 16 million compromised email addresses is suspected. However, individual data subjects did not find their data in the BSI safety test. In addition, a combination of e-mail address and password is not sufficient in normal circumstances to provide access to a router as well as a customized remote access.


Download tips: The best Fritzbox apps


Until the pathway is known and a permanent solution exists, you should take the following advice. Change all relevant data in your Fritzbox, if necessary also the accesses with ports with used DDNS offerers - think of different passwords. In addition, you can set up a call barring for calls abroad, according to the AVM message.


The following domestic models can be updated: 3272, 3370, 3390, 6810, 6840, 6842, 7240, 7270 (v2 + v3), 7272, 7312, 7320, 7330 SL, 7330 SL, 7360 SL, 7360, 7362 SL, 7390 and 7490. For the international models: 3270, 3272, 3370, 3390, 7270 (v2 + v3), 7272, 7330, 7340, 7360, 7390 and 7490.

14-inch ultrabooks in test

When it comes to Intel, the Ultrabook segment is not only confined to compact travel companions, but should also include devices that can even serve as a desktop replacement. They are, of course, somewhat heavier and they can be up to 21 millimeters thick.


Picture gallery


A low-voltage core processor, a long battery life and the fast system start are also the XL Ultrabooks specifications, which must be adhered to by the manufacturers so that the mobile computers may call Ultrabook. We've tested seven major ultrabooks from Acer, Dell, HP, Lenovo, Samsung, Toshiba and Wortmann.


Test methods Ultrabooks


Mobility is crucial


Conclusion


Ultrabooks are mainly mobile devices for the road. Therefore, the battery charging time, the charging time and the weight of the devices are included in the evaluation with a total of 30 percent. We calculate the runtime under full load and the charging time with BatteryEater, the MobileMark 2007 simulates the work with different office and image processing programs. WLAN and Bluetooth are disabled, screen brightness is reduced to 60 percent.


Extensive performance measurements


For the performance measurements we use the Futuremark 3DMark Vantage in performance mode on an external monitor. We determine the system performance of the Ultrabooks with the PCMark Vantage, which performs an application mix, which also plays a role in 3D performance and disk performance. The Cinebench R11.5 rendering benchmark provides information about CPU performance. HD-Tune 2.61 is used to measure the transfer rate and access time of the hard disk.


The test winner is the sleek and elegant Samsung 900X4C. It delivers balanced performance, a very good battery life, and a good 15-inch panel. If you want to play with an Ultrabook, the Dell XPS 14 is well served. If size and weight do not matter, then the Acer Aspire M5 is the right choice. It delivers the best 3D performance and battery life, but also weighs 2.3 kg.


Download: Table

Release, demo, cover and more: FIFA 16 - All infos

This year too, EA Sports is launching a soccer simulation on the market. The release of FIFA 16 has not yet been officially announced, but this month the publisher wants an official Facebook entry to provide new information about the game.


FIFA 16 is expected to appear in the previous year for PS4, Xbox One and PC. Whether the Last Gen consoles Playstation 3 and Xbox 360 are considered, is still unknown. Just before release, as usual, a demo on the market will be available, which will be available for download on the respective platforms.


Also the question, which football star the cover of FIFA 16 will decorate, is still unclear. Over the past three years Lionel Messi has been reprinted, so the continuation of the partnership is likely. In the course of the recent FIFA corruption scandal and the accusations against FIFA President Sepp Blatter, fans are already creating their own versions of the cover, which are not printed on the sales version.


On the E3 2017, new information about the upcoming offshoot could be published. There are also the first playable versions of FIFA 16 with new features to be shown - due to a job call at EA Sports it is speculated that the simulation will be extended by a story mode

Part 3: DSL router: Practical DSL acrobats

The Barricade is a robust and well-equipped device. One highlight is the integrated print server.


The Barricade 7404 BRB is available for 180 euros. The manufacturer offers a 60-month warranty on the device. In addition to the Netgear router, the Barricade offers the most powerful firewall of all counterparties. The configuration is done via the web browser and is not easy because both the manual and the setup menu are available in English only. A setup wizard and the Advanced Setup are available once to the configuration menu start page. Using the wizard (wizard), the basic settings, such as the access data of the DSL provider, can be easily made. The firewall, on the other hand, can only be configured manually via the Advanced Setup. As an added bonus, the router provides an integrated print server, via which any printer with a parallel port can be integrated into the network. Unfortunately, the Barricade does not have Dynamic DNS.


Http://www.smc-europe.com

Autofocus, exposure and image quality

For automatic focusing, both Powershots use a contrast AF with 31 fields, configurable as a single-frame AF or as a continuous autofocus. Also possible are single-field AF (variable measuring field size) or spot AF, and – thanks to the touch-sensitive monitor – touch autofocus / trigger. The MF Peaking feature supports manual focus. A “five-axis image stabilizer” keeps the image pleasantly quiet.


Autofocus and exposure


The autofocus operates reliably and at the G5 X very fast: 0.20 s at 300 lux and 0.27 s at 30 lux are top values. The G9 X can only keep up with good light (0.24 s), while the 309 lux is up to 0.43 s.


Lesetipp


The two 3-inch touch displays have 346 667 RGB pixels, are crisp sharp and convincing with very good color reproduction. Fonts and symbols are well represented, but are somewhat small and sometimes difficult to recognize. The display brightness is adjustable in five steps. The graduation is clear and consequently also practical in practice. The display of the G5 X can also be swiveled and swiveled, thus allowing unusual shooting positions. Also Selfies are better to control - the G9 X, on the other hand, you have to estimate the image cut when you look at the camera from the front.


Lesetipp


The G5 X has an OLED viewfinder with 786 887 RGB pixels and a 100% effective image size. It is 0.39 inches in size, not very generously dimensioned, but the good quality of the picture should even reconcile spectacle wearers. On the left side of the viewfinder, the dial for diopter adjustment is well positioned and poorly adjustable. But in this case, this is even useful, so it can not be unintentionally twisted.


Image quality


The viewfinder is turned on and off by an approximation sensor. As soon as the eye approaches the viewfinder, the sensor turns off the display and the viewfinder. If the eye removes itself from the viewfinder, the other person passes by. Like the brightness of the display, the brightness can also be adjusted in five steps. However, the brightness levels are not very different.


The ISO range is from 125 to 12 800 with manual adjustment and from 125 to 3200 with Auto ISO, the shutter speeds range from 30 s (long-term exposure) to a short 1/2000 s. An ND filter that reduces the incident light quantity by 3 The G5 X: this camera can be played with the aperture even in daylight thanks to the high aperture aperture. (G9 X: 7.0 B / s) in JPEG format, and RAWs with 0.8 B / s (G9 X: 0.7 B / s), the G5 X makes the G5 X at 6.9 B / s. The software Digital Photo Professional for developing the RAW images is included in both models.


The 1-inch sensor is a back-lit CMOS with an effective 20.2 megapixel resolution (5472 x 3648 pixels), a current Digic-6 processor processes the images fast. Using WLAN and NFC, both cameras can be controlled or transferred to a mobile device. You can find suitable apps in the app stores of Apple and Google.


Basically, both cameras provide very similar images with comparable resolution and coordination. The G5 X's more powerful lens gives this model a slight lead. Compared to other cameras with a 1-inch sensor, the resolution is absolutely competitive in both test devices and the ISO-100 image is convincing. Only the edge sharpening could be somewhat more reserved. It can provide double contours for unfavorable subjects. If you do not like this, you can shoot with both cameras in RAW mode as well.


The noise characteristics largely independent of the optical equipment are almost identical for both models and increase linearly from ISO level to ISO level. In the case of ISO 400, the noise is already clearly visible in monochrome surfaces. In addition, ISO 400's fine-tuning is a bit too strong for a camera with a 1-inch sensor - some competitors are getting better. From ISO 800, artifacts are also visible in pictorial structures. In this case, the sensor size reaches its limit - larger sensors are also necessary for better image quality. The dynamic range is good for both cameras with 11 f-stops at ISO 100 and more than 9 f-stops up to ISO 1600.


If you like a compact camera forever, you should take a look at the two new Powershots. While the G9 X looks and looks very similar to the RX100 models from Sony, Canon's G5 X has its own unique way of design and operation. Thanks to many operating elements and a well-thought-out function concept, it can be perfectly adapted to your own needs. This makes them a tip for photo-individualists. The processing is high-quality, and the equipment with WiFi, NFC, light-heavy 4x zoom and a high-quality electronic viewfinder up to date - that should be at the price of almost 800 euros but also self-evident. The image quality is in the range of the 1-inch standard: good at ISO 100 and fast-decreasing. Above all, air is still at the top of ISO 400.


Conclusion

Game Releases 2017 - These Games Come In August - Gears of War: Ultimate Edition (Xbox One)

The Ultimate Edition of Gears of War, which will be available exclusively for Xbox One from August 25, 2017, includes, in addition to the first part of the Spielereihe, the PC-exclusive bonus campaign.


Gears of War: Ultimate Edition (Xbox One)

Panasonic HC-X929 in the test

Three times captured, three times best quality, one could claim the three chips of the Panasonic camcorder. Because the three basic colors red, green and blue (RGB) are recorded separately, the picture quality increases, especially in situations where there is very little light. This means that the HC-929 makes a very good figure especially at Lowlight and brings the film motifs still bright and with details on the screen.


Manual intervention


In the laboratory, we filmed our test set-up at a brightness of 10 lux, which corresponds approximately to candlelight at a distance of 20 centimeters. The composition was still sharp and the colors were clearly recognizable. But it is not only in low light that the 3-chip technology is a good choice.


If you love crisp colors and tadellose sharpness, the Panasonic camcorder quickly befriends. The 3MOS apparatus has clearly been able to convince particularly with bright sunlight, as is often the case on the beach or in the mountains during the summer.


Another advantage is the pixel-shift technology, where the green MOS sensor is displaced exactly half a pixel vertically and horizontally against the blue and red MOS sensors, produces a high pixel density, which is four times the full HD resolution


The BSI sensors ensure low-noise recording even in low light. Recorded on SDXC card with a resolution of 1,920 x 1,080 pixels with 50 images per second - even in progressive mode. The photo function of the camcorder brings a resolution of 6,016 x 3,384 pixels to the memory card.


The HC-X929 also allows manual operations such as white balance, focus, exposure, etc. The outstanding artificial horizon helps you align.

"Hired hackers" as an underestimated danger

The survey, conducted by the market research firm OnePoll on behalf of Samsung, surveyed 4,500 office workers in seven European countries – including 1,000 in the United States – and investigated how the employees of the balancing act between professional and private life succeeded. Thus, employees often use one and the same mobile device for work and private.


Mobile freedom with borders


This allows employees to become "hired hackers," self-employed, technologically-minded employees who use the technologies and applications of their choice to do their work as efficiently as possible without sticking to their company's compliance requirements


Ignorance creates dangers


One in five, for example, bypasses security guidelines and uses its own apps, such as file sharing services such as Dropbox, which are locked to service handy. However, the European respondents are still more cautious in comparison with the European average (26%).


Also interesting is


"The study shows that users want to use their mobile devices for private and professional purposes as work and personal life grow together," explains Dr. Dimitrios Tsivrikos, consumer and business psychologist at University College London.


Work and private life in upheaval


Another result of the study shows that many employees are unaware of the security requirements for their mobile devices. The surveyed American employees are no exception here. Fortunately, however, they are more aware of the regulations than the European neighbors


22 percent of Germans use their private devices to work. For example, they send business mail from their private tablet without knowing if they are allowed to do so at all. The European average is 29 percent. The Spanish (39 percent) are the front-runners in the professional use of private mobile devices.


47 percent of American employees do not know at all whether their employer has regulations on mobile security, do not know their content or ignore the regulations. Despite this frightening figure, the United States is still below the European average (55%).


"The more private and professional life, the more companies need solutions that help them secure their use of personal and business data on their mobile devices. For this reason, tools such as Samsung KNOX are so important "Said Sascha Lekic, Director of Sales B2B, Samsung Electronics, the United States.


According to the study, 68 per cent of employees do private work during their working hours, while 77 per cent work in their spare time. 42 percent of respondents said they are more productive and can do more tasks at the same time.


Moreover, more than one-third have the feeling of being able to handle their tasks more effectively.34 percent feel even less stressed. Mobile devices play a key role here. American employees have an average of eleven personal apps such as Facebook, WhatsApp or CandyCrush and nine enterprise apps like Microsoft Outlook or Lync installed on their service smartphones. 37 percent of the surveyed employees use their private smartphone for work, while 29 percent use their business mobile phone for private purposes.


Further results at a glance


The full study report is available at www.samsungatwork.com

Windows 10: Slim First Patch Day 2017, Outlook for Creators Update

Users of Windows systems receive the first Windows updates in the new year.


News about the Creators Update


Computers will receive the downloads of the first patch day 2017 by Windows Update. There are only four security bulletins, which fix security gaps in a total of five programs. That would be Windows itself, Edge, Office and Internet Explorer or its integrated Adobe Flash player. For this, Windows Insider with the Windows 10 Build 15002 already get the first version of the Creators Update, which provides some interesting new features.


Microsoft categorizes one of the four security bulletins as critical. This would be the Flash Player integrated in Windows and Internet Explorer, whose current security gap allows the introduction and execution of malicious code. The other updates classify Microsoft as important.


This would be on the one hand the update for Microsoft Office, which also opens the door for malicious code. For this, the user has to open a correspondingly prepared Office file for one of the included programs. Users should be alert when e-mail attachments of suspicious senders end up in the mailbox, or sites offer questionable downloads.


On the other hand, users in Edge can be victims of attacks where attackers can change the rights of standard accounts. For this the user has to call only a prepared website. Finally, there is an update for the Local Security Authority Subsystem service, which prevents attackers from launching a Denial of Service (DoS) attack, which forces the computer to reboot. More information on the first patch day can be found in Microsoft's Technet.


The few updates are quickly installed and a reboot is run without lengthy configuration. Windows Update starts up automatically, if necessary, call it up in the system control or in the PC settings under "Update and Security"


Participants in the Insider program are given a new build for Windows 10. Version 15002 allows Edge to automatically block Flash content. The browser now works more stable and faster. Users of Windows 10 versions excluding the Home version can postpone Windows updates up to 35 days. In addition, there are easy, optical revisions for the menus, folders for start menu tiles and small changes to Cortana. There is no longer a BSOD (Blue Screen of Death). If you think you're safe from crashing, you're wrong. Microsoft just introduces a new color - green. In the future, this will help to sort and solve problems more quickly.


Lesetipp: Windows Update deletes programs - you can do this


Microsoft also announces improvements to privacy settings. The new Privacy Dashboard allows better control over your own data. You can also delete the recorded information there. More information about this is available at the Windows Blog.

Devil System 8 THX Ultra 2

But I do not want to mess with the living room. “This is the unanimous opinion when it comes to surround sound in the living room, but for adequate home cinema sound, five plus speakers are to be distributed in the room But it is also known that THX boxes, licensed under the Ultra-2 standard, can not be hidden any more, but why THX?


THX license Ultra 2


THX is a reliable quality mark that was originally developed for the cinema. At the time, George Lucas wanted to make sure his Star Wars films sounded the same in every movie theater as his sound engineers had mixed them. For the sound was and is an integral part of the cinematic concept.


A real novelty


And if the film is to be understood as the director meant, then not only should the picture fit, the sound must also go under the skin.


Nobility committed


This also applies to the home cinema. Because at the latest since the DVD age with 5.1 sound can be synonymous in the domestic living room a cinema-like sound reinforcement. And also the must vote. Speakers bearing the THX seal today were previously purchased from THX Ltd. Tested on Her (t) z and kidneys.


Conclusion


They have to prove that they fulfill certain radiation criteria, create predetermined maximum levels and can oscillate in a minimum bandwidth. After the test run, they get - depending on the potential - one of the coveted THX certificates.


While the Select variant is sufficient for small to medium sized homes, it should be the ultra-2 license for really big home cinema. Even residential areas with an area of ​​up to 150 square meters can be soaked with a mark.


The Berlin boxing professional Teufel is the manufacturer with the most THX-certified boxes in the program. Recently, the home cinema specialists have launched their System 8 THX Ultra 2, the legitimate successor to Theater 8 THX Ultra 2. The amazing result is that the 3.500-euro package has become smaller on the one hand, and on the other, more powerful Br>


Example Subwoofer: The S 8000 SW has shrunk by two-thirds and still meets the strict requirements of the American test laboratory. Or the satellites: their dimensions could be reduced by 40 percent, although the sound quality was improved again.


Thanks to computer-based chassis optimization, the developers have succeeded in minimizing chassis distortions. Typical for THX speakers is the chassis arrangement of the S 800 FCR: The mid / treble unit is arranged vertically with the woofers on the side. This has the advantage that the loudspeaker shows a very similar frequency response both on the axis and on the side. This guarantees an even sound: so every listener can enjoy the good sound.


The flat diaphragms in the three identical front boxes are striking. While their partial oscillation behavior is not so easy to handle, the radiation performance and the linearity of the transmission function are improved when the developer succeeds.


As tweeters, the Berliners use a tissue cap that ensures good resonance behavior. So-called dipole emitters are used for the back room. Their special radiation characteristics are supposed to emulate the countless loudspeakers used in the cinema. That is, mounted on the side of the wall, you only hear the reflected and reflected sound radiated backwards and forwards.


This "disappears" the actual loudspeaker, and you get the impression that you are surrounded by a sound cloud - just like in the cinema.


But the real novelty is in the subwoofer. While at least two 30s chassis had been required to meet the stringent requirements for draft and maximum levels, the Teufel was the first to achieve a 30-inch bass diaphragm.


The extreme Langhuber also has a very high efficiency, which reduces the amplifier power required. If the subwoofer of the Theater 8 set was still 1000 watts, the S 8000 SW would be reduced to 500 watts.


The bass works according to the downfire principle. This means: The chassis radiates towards the floor. This arrangement achieves inter alia a slightly improved efficiency and thus a higher maximum level. A rear bass reflex opening also supports the chassis at the lower transmission end.


Via the remote control, the phase can be switched to 180 degrees, the volume can be varied or the subwoofer amplifier can be optimally controlled with a THX button, as well as the bass mute.


Even the predecessor set, the Theater 8 THX Ultra 2, received reference status in countless tests of its product life. All the more exciting we were, what the system 8 THX Ultra 2 has to offer. Especially since the subwoofer has already proved in video HomeVision 03/2010 (page 71), what is in it - since then it has led the best list of active subwoofers. But before the frills comes the obligation: the setting up and leveling.


Care should be taken to ensure that the three front satellites are on the ear or at least with their main beam axis at ear level. The vertical distribution of the front speakers S 800 FCR is not as uniform as horizontal. In the case of the dipoles, the placement at the height is not so critical, for the best diffuse perception they should hang exactly on the side of the wall.


Now for the frills: Also in connection with the system 8-satellite played the subwoofer again very powerful and precise. The transition to the satellites was "unbroken", so also the Oberbass came with the necessary kick. At first the jazz singer Carol Kidd was able to explore the stereophonic qualities.


The acoustic bass tinted cleanly contoured, while she breathed her ballads into the microphone well. The rather darkly timed recording did not lack any openness. You could literally "see" the lips.


This was followed by the live concert of the singer-songwriter Allan Taylor in all-round sound. Again the voice was precise, but this time it had a little bit of a chest tone. In the rather intimate premises the applause was phenomenally realistic. Conclusion: great localization at tonal tendenziell fresh coordination.


Now to the home cinema in the truest sense. John Travolta's monologue at the beginning of the action film "Password: Swordfish" fascinated the jury immediately. Fine sub-noises such as the hissing of the lighter when lighting his cigar, or supposedly background noise, soon led to the event.


And that is exactly what makes good home cinema. When the tone fits, one is emotionally more involved. The following explosions digested the playback chain without grumbling and the chase later in the movie leaves no doubt in the impressive quality of the set.


In short, the Teufel set is one of the best three home cinema sound systems in the category 5.1 compact sets at Video-HomeVision - at an unbeatable price.


The sober, offensive style may not appeal to every music lover. The Teufel-Quintett has all the necessary characteristics for top-notch home cinema, such as dynamic potential, language intelligibility and enormous bass capability. Bravo!

Adobe Lightroom 5: Use the radial filter correctly

Click the desired image in Lightroom 5 and change to the development module. There you switch on the new radial filter in the toolbar on the right. Right under the tools, double-click on the word “Effect” to set all controls to neutral. At the bottom of the panel, turn “Invert Mask” to change the main motif within the selection, not the outside.


Step 1: Activate Tool


Tip: Photoshop CC (2013) provides the same tool with the same options: Open your capture in Photoshop CC and select "Filter, Camera Raw Filter". At the top of the dialog, turn on the radial filter. Click the plus sign to the right of "Contrast" once to raise the contrast and neutralize all other controls. At the bottom right, use the Inside option, so Photoshop changes the selection inside.


Step 2: Select


Let's go to Lightroom 5: Click in the middle of the main motif and drag outwards to display an initial selection. Refine the outline by pulling at the touch points. Hold the mouse pointer close to the selection and then drag to rotate the selection. You can also move the selection as a whole in the image.


Step 3: Levels Correction


Tip: At any time, hide the oval selection line by pressing the H key and then on again. Or use the "View work points" menu under the image. If you do not see it, press the T button to display it.


Step 4: Further selection


Drag the Exposure slider to +0.80, so you'll see the main slider light up. Drag the depth control to +30 to bring more drawing into dark areas, especially in hair and jacket. With the controls "clarity" and "sharpness" you emphasize the contours. The rest is fine-tuning: increase the contrast and drag the temperature control a bit to the right in the direction of yellow, so the main motif appears warmer.


Tip: Would you like to see the original in Lightroom 5 again? The switch at the lower left of the control panel switches the radial filter off and on again. Alternative: Press the Y key to display a before-and-after comparison and then return to the single image.


Create any number of selections. We create another selection for the background. Click "New" in the upper-right corner of the panel, then click the middle of the main motif again and drag a selection to refine it with the touch points. The "Invert Mask" option turns off, so Lightroom only changes image zones outside the oval. To dampen the background, reduce the values ​​for clarity, saturation, and sharpness. Depending on the subject, you can also change the exposure or contrast.


Tip: To duplicate a selection in Lightroom 5, hold down the Ctrl and Alt keys at the center of the edit (on the Mac, use Cmd and Alt keys on the Mac). Then you can change all controls for the new area, and you can also change the interior-exterior effect.


Guide: Operate Adobe Lightroom correctly


Submit correction in Lightroom 5 to see more similar pictures. Select more subjects at the bottom of the filmstrip. Lightroom 5 shows the "Automatically synchronize" button at the bottom right. To the left of this button, click the small button so that the button is called "Synchronize" only. Click this button and then, in the "Synchronize settings" dialog, name all the changes you want to transfer - in any case, the radial filter. You can then refine the newly edited photos.


Tip: Corrections are now only saved in the Lightroom database, but not in the photos themselves. For all selected images, use Ctrl-S. In this case, the original pixels remain completely preserved, but Lightroom now writes "the mathematics" of the corrections directly into the individual photo files.


Step 5: Transfer Correction

Success in sales through personality

An excellent seller must be convinced of himself, identify with his product and his company and with passion and heart blood for what he wants to sell. It is also an advantage if he has a broad repertoire of sales skills. The ability to receive listening is the basic prerequisite to embrace the customer’s imagination.


You must like people


Only silent and listening, then talking, and authentic and thus credible: with a top seller, there is no contradiction between what he is doing and what he says. Because of its authentic approach at every stage of the customer conversation, it is possible to build a trustworthy customer relationship.


Change behavior and settings


This incomplete list could certainly be added. And to each of the abovementioned competences there is a multitude of training measures, all of which have their own right to exist. But the most important factor, which, according to the seller's experience, decides to a large extent about whether someone remains an average seller or has the stuff to a top seller is still missing. And that is the personality of the people who are able to do above-average sales.


Growing personality


Either a salesperson has personality - or he does not have it. If it were so, the talent for sale would be an innate gift, which then needs to be "only" updated. Of course, there is a personality kernel, which is fixed by the genes and can not be changed. It is, however, also uncontroversial that education, environmental influences and the human will to change lead to the fact that we can work on the concrete training of our personality traits. Each salesperson can influence his or her personality in such a way that it is easier for him to get involved in the world of the imagination of other people, namely the customer.


Immerse in the customer world


However, there are limits to this: a misanthropic man-of-the-man will hardly succeed in gaining the trust of the customer - because he really does not want it because he has no interest in it.



Whoever wants to score points with a personality must above all be one: He must like people. For those who like humans, the aim is to be useful to them. By the way, this is true for sales managers and salespeople, for leadership and customer contact: anyone who likes people is potentially able to develop into a co-worker-oriented executive or a customer-oriented salesperson.


Personality is not essentially changeable - from an introverted and condensed rationalist can not be made an extroverted feeling person who listens to his gut feeling. If you do not like people, you should not work in the sales department, who opposes people as a matter of principle, do not take the sellership. If a seller is out of place, it is the responsibility of a sales manager to make it clear to him.


Is salespersonality so lucky? To a certain extent, the development of personality can already be influenced. We possess the power and the ability to self-reflect, we can question and change our perceptions, beliefs, judgments and attitudes. A seller can work on his customer-oriented behaviors and his attitude, he can make changes to his attitude towards the client, his activity, and his product.


Selling is a behavioral tragedy, and a top seller differs from the more average colleague less by the number of sales techniques he masters, but rather by his attitude toward his profession, which is his calling. This is why it is important to make sure that the trainer not only practices methods, but also allows long-term changes in behavior and attitudes


Somewhat provocatively expressed: top sellers do not need trainings, but personality. They know that while they have an invariable personality core, they can, at least in certain situations, think and act differently than they have done so far.


It is therefore about personality development, personality growth, personality development - while at the same time maintaining integrity: the personality core is to be preserved. For example, according to the findings of brain research, human decisions, including purchasing decisions, are largely emotional.


What does not cause emotions is worthless and irrelevant to our brains. It is important to know which of the four limbic emotional systems prevails in a person


For the seller, this means two things: First, he determines which emotion system dominates him. On the other hand, he is trained to assess the customer's emotional system to apply customer-specific sales strategies: he is able to grab every customer with the emotional "horns" and to address the dominant emotion system in his argument.



Conclusion


What he should not do: bend, deny his own dominant emotions - and thus his personality. What he can do: take back himself, make clear that the other person has a different perception filter than himself, and evaluates and makes decisions on the basis of an emotion system that does not match his own.


As a result, the seller increases his perceptual antenna, he learns to accept other perspectives and go into them. It expands its horizon and personality - and then it is possible that the enthusiastically innovative salesman will withdraw something in the conversation with the security-oriented balance-keeper-customer and in his argument less of visions, but with numbers-data- Charts


Another example: the dominant seller, who likes to control and control the sales talk, is ready to learn active listening.


A salesperson who knows about his preferred emotion system and can appreciate his personality is more likely to dive into the customer's world. It creates consistency by addressing the values ​​that are relevant to the particular customer.


For Dominance customers, these are freedom, pride, expansion, courage, and victory. In the case of the stimulant customer, the world of values ​​revolves around individuality, curiosity, innovation and fun. The Balance Supporter customers are the values ​​of trust, loyalty and security important to the balance-keeper-customer discipline, precision, thrift and justice.


In addition, the vendor argues strictly customer-oriented by showing negotiation strength with the dominance system customer and explaining to him how he achieves a clearly defined desired state with his help. In the case of the stimulant system customer, he raises his vision and the long-term goals and awakens the imagination with lively and exciting pictures and stories. The balance-keeper type is convincing by the structured presentation, as well as guaranteed guarantees and a right of rescission, whereas the balance-supporter-type would like to acknowledge his apprehensions and reservations.


Top-sellers like people and are able to assess their own and the personality of their customers and to make customer-oriented attitudes and behavior changes based on their personality core.

Marketing: Use Reputation Management correctly

The Internet forgets almost nothing. Once pronounced, information spreads there in wind ropes and are then neither to be stopped nor deleted.


The influence of ratings


For this reason, not only owners of shops, products or brands should worry about their reputation. In the end, it can hit everyone.


Certainly the interest is only small when images of a bachelor party are shown on the Internet, in which the participants are running through the city. However, if they are mentioned on a public Facebook page, the names of the racers, and one of them is just looking for a new job, then this may well lead to direct disadvantages.


Observe and Options


The damage caused by a bad online reputation ranges from personal reputation damage to enormous financial losses if unsatisfied customers omit a faulty product.


Reviews on the track


This has already happened to many larger companies, even Apple was not spared it and had to suffer on the iPhone 4 a wave of complaints about itself. Some users complained about receiving problems when the device is touched at the same time while in the phone.


The information spread rapidly on the Internet and could finally be eliminated only by an offensive communication of Steve Jobs and a free shock absorber from Apple. In this case, it becomes clear how important it is to monitor the Internet and how quickly you need to react in order to maintain your reputation.


Of course, "Online Reputation Management" is particularly important for those who sell products or represent a company. In a search engine journal article by Murray Newlands, a number of interesting key figures have been identified that highlight the importance of Internet assessments. Most of the statistics mentioned here are already somewhat older, but have gained in importance in the last few years rather than lost.


It is not surprising, for example, that Opinion Research Corporation is aware of the impact of ratings from other customers: 83% of potential buyers can be influenced by recommendations from the Internet.


You have certainly observed this behavior in yourself: when you buy individual products, you are most likely to be the first to be evaluated by Google or various online merchants.


Articles, which get at Amazon less than three stars, are often not further respected. In April 2010, consultant McKinsey also assessed the importance of oral propaganda on the purchase of products with 20 to 50 percent. A similar result was obtained from a study from Harvard Business in 2011, which evaluates the meaning of the stars based on the American appraisal portal Yelp.com


Per star, which is gained or lost, the interest of potential customers increases or decreases by 5 to 9 per cent. Based on these statistics it becomes clear that a company - no matter what size - can not afford negative ratings if it wants to be successful in the online as well as in the offline world.



For this reason, it is essential to always have a keen eye on the reviews on the Internet and the comments of the customers. These observations do not necessarily require professional support.


On the following pages, we will show you how to use free tools to monitor the Internet and the most important social networks, and to actively use critical voices.


View of Tweets


In most cases it is possible to comment negative reviews at least. You should also make use of this possibility, take the critical comments aside and attack the critics.


Often they also provide helpful suggestions for improving a service or product. Of course you do not have to accept anything.


Almost every evaluation portal, as well as platforms such as Amazon, have clear rules on how a rating should look and under which constellations a provider can get the comment.


You should read these rules carefully and, if you are negative, make sure that they are true to the rules of the platform.


The entry into the Online Reputation Management (ORM) can be very simple. Nobody has more information about a product or person than a search engine.


Search in blogs


Search with special focus


Autocomplete simulate


Monitoring feeds


Image search


There is no special recommendation on which search engine you should use. Before starting such an analysis, you should log out of all the entries, which allow the search engine to assign to a user account. Otherwise, the corresponding service provides pre-filtered results based on the data available to the user.


For example, if you're using Google as a search engine and logged in through your Google Account on Google+ or Gmail. After this initial analysis, you get a first rough overview of how the brand or the product gets to the Internet community.


For a search for "Singapore Airlines" and "Rating", Google provides links to the websites of airline reviews, Flightcheckers, So-warmeme-Flug.de or Dooyoo as a hit on the first page.



Of the first ten hits, there were nine websites, on which customers of the airline can express their opinion. Of course, this approach is not very convenient and efficient because you need to perform a variety of queries manually for each analysis and evaluate the results appropriately.


A certain level of automation is achieved with the Google service Alerts. This requires a Google account and sends a notification via e-mail to a specific search string for each update.


The service also allows the configuration of several search queries, which are managed via the web interface. You will be automatically notified when Google has found new sites to the search.


If you are particularly interested in the analysis of tweets, then look at the service TweetBeep. The service describes itself as "Google Alerts for Twitter". You can use TweetBeep to set different search terms, as well as exclusion criteria that should not occur within the tweet.


TweetBeep offers several types of searches: "KeywordSearch" for searching the terms within the complete tweets, "hash tag" for the indexing analysis, and "mentions Twitter usernames" for analyzing the reference to the given user name



There are several payment models of the service. These differ in the number of search queries as well as the response times. They cost between $ 5 and $ 20 per month, with the most expensive version offering 15 minutes as the shortest update interval.


No less important is an analysis in blogs. However, this is not quite as simple, since, in addition to the large installations in the cloud like WordPress.com or Blogger.com, there are also many decentrally installed blogs.


At this point, however, the Google search engine again performs well and restricts the search results with these special hits. In a similar direction goes the search engine SocialMention, which searched various blogs, microblogs but also mainly offerers such as Youtube or Google News. You can filter the possible result sets either from the start or from the beginning.


Depending on the environment in which you are moving or talking about your products, there are different services that offer an overarching search in this market environment.


With these, you are often quicker to the desired insights than with a classic search engine such as Google. An example would be Technorati, a real-time search engine for English-language blogs.


The range of websites analyzed is reflected in the top 100 most important blogs. These are available in a comprehensive overview of all topics as well as in a theme-specific version.


The search engine is oriented in its analysis to the keywords, which the blogger has assigned for an article, and takes up accordingly. However, there is no automatic notification for new contributions to your supervised topics or a daily list of all current blogs. You only have the option to start the analysis manually.


Almost everyone knows the Autocomplete feature of Google and other search engines. Although it does not appear to be at first glance, there is a link between the issue of reputation and the search engine suggestion.


This may be quite significant, as the search for the keyword "Bettina Wulff" shows: This had announced in May this year to go against Google, since after the input of her name as suggested values ​​terms like "escort service" or "prostitutes Artemis ".


This is still happening today, but you only have to enter one or two letters. The service "Übersuggest" takes this task away from you and shows you the most frequently requested combinations after entering a term


The language and the type of documents are also available as additional parameters. In the top 10 results of this service, after entering "Bettina Wulff", there is nothing more to say about the alleged escort service - but it still appears in many places.


Of the 292 frequently asked combinations, about 20 of them still revolve around the theme. Even with a complaint against the search engines, the topic is unfortunately no longer manageable.


The IFTTT tool ("if this than that") provides another interesting approach. This will set a condition that triggers a follow-up action when it occurs.


Identity theft


Combined Search


Commercial Service Provider


The right reaction


When setting a condition, the service provides a link between some 500 different web services and social networks. For example, it is possible to receive an email when someone has tagged your face on a photo within Facebook



Another option is to monitor RSS feeds: If an update is detected in a previously defined feed, it can also trigger an event.


If you are already working with feeds to monitor specific topics, you have a free workflow that automatically provides you with the latest changes.


Of course there are not only texts and statements that can damage your personal reputation or that of your company or your product. Images may also be the basis for negative actions, depending on the context in which they occur.


A possible example of such an action was provided by the British Prince Harry last year when he was on the road in the United States and played billiards at some point. Private photos of this game found their way to the Internet.


An early warning system would have brought little Harry Prince, because his degree of recognition is simply too high. However, for normal mortals, it is also worthwhile to analyze images and track the results.


A service that takes care of you is Image Raider: you upload an image or give one or more image sources. Based on the search for pictures by Google, the service analyzes the Internet and as a result results all the results for this image.


The basis for the billing is the number of analysis runs - a "credit" is payable for each run, which is worth about 0.5 cents. The first 300 credits are available free of charge when creating the account.


On the Internet there are very few possibilities to prove their own identity. For most services - except for the registration of domains - almost no prerequisites are necessary and no authenticity check takes place.


As a rule, a valid e-mail address that is created in a few seconds is enough. For this reason, it can be very helpful to check if someone is on your way. If this is a product or brand name, this may even be illegal.


Since there are currently too many services that should be checked, you can either limit yourself to the most important ones, or leave this work to a commercial solution such as knowem, a short form of the English "know them"


You enter a name or string as a search criterion, and the service scans numerous offers and determines whether the name has already been assigned. If so, a more detailed analysis is worth looking at here to see who publishes content on your behalf.


This could, for example, be just a fan of products that has created a well-made information base for others.


The above searches are very specific and either represent only a few specific hits or at least group them accordingly. It is different if you want to search for different information sources and group the results by relevance.


Also at this point there are some very interesting projects and search engines, which have developed their own results or at least optimized the access to existing data accordingly. One of them is the search engine Topsy, which provides both free and paid services.


Within the free variant, you can search for different sources and filter the results according to your wishes. There are various link networks in the sources, as well as Twitter or various video providers such as Youtube.


In addition to the sources, the service provides filters, such as for the time constraint or relevance. This gives you a good first overview. It is also interesting to compare up to three search terms. The number of hits is graphically displayed on a time axis and you can see at a glance which topics were discussed at the appropriate time and frequency


Another search engine that targets the services of Facebook, Google+ and Twitter is "Social Searcher". You enter a search term for the website and then get the best results from the three social networks.


In doing so, it is possible to limit the various searches not only by means of the terms, but also by means of further criteria. For example, at the top level, you determine whether the language or the country from which the post comes originates.


In the case of the Twitter contributions, it is possible to use the site as the top filter. In advanced settings, you can specify your search more precisely and set different filters to the search location.


An important criterion at this point is also the parameters for the popularity of a post: if it does not receive a certain amount of Likes at Facebook, it is not displayed in the hit list.


Most services that offer combined searches and a reasonable hit analysis can be found in the commercial area. As a rule, you do not need to consider one or two data sources, as you have seen in the large number of the above analysis options.


Another reason is the different views on the topics: depending on your analysis, for example, official news services may be more important than private blogs. However, all of this should be automatically taken into account when performing a comprehensive analysis.


This is quite costly and represents the business base of numerous providers. The services in this environment are essentially divided into two areas: Firstly, there are offers that provide comprehensive analysis and evaluation on specific topics or points of interest using online analysis platforms.


A corresponding search for such a service by search engine provides a variety of results. The query "online reputation management service" brought about 36 million hits, "online reputation management tools" still 15 million hits.


Among them are numerous German-language offers in different price and performance categories. Most platforms, however, offer a free test account. With this, you can check which service provider offers you the best analysis and analysis.


The second component is the active consultancy service in which agencies provide different services based on the analysis results. Existing deficits and potentials are analyzed and appropriate counter-measures are formulated.


Therefore, you should consider exactly what services you need: Do you want to proactively do something for your good reputation and keep it at the desired level in the online world? Do you currently have problems with your online reputation or feedback on specific products or services?


Reasons for online reputation management are very different, and for this reason, it is important to have the right partner on board.


Of course, not only the knowledge about the prevailing opinion on the Internet is important, but above all the corresponding response. Depending on the nature of the problem, different approaches are appropriate.


After the first hassle about a supposedly unjustified criticism, you should look at the analysis of the facts. Especially if you are selling products or services, you should get to the bottom of the matter. In the first step, you should deal with the trigger of the bad rating or the critical comment.


What were the circumstances? Is it the critic himself, or has he heard of it? In the second case, you should try to find out more about the problem and find the person who was the first person to be dissatisfied with the product. "


In the next step, you should be a little more specific to the critic: Is he from the community and is an active product user? What is his position within the community and what does he hope for by his behavior? Is there more than one complaint with personal experiences or is it a single event?


In any case, try to get in touch with the critic, to understand the problem more closely, and to work together to achieve a mutually satisfactory solution. This is certainly not possible in all cases, but a well documented and customer-friendly solution can lead to a positive feedback within the community and beyond.


Of course, the environment in which you are moving is also significant for your response. If you already have a lot of complaints about your product, then you should officially respond with your marketing department or the sales team and, together with your customers, decide on a meaningful solution that goes beyond a single case solution



This can, for example, be a product recall, a credit note or a product add-on which significantly reduces or eliminates the problem. If someone has apparently officially communicated on the Internet under your name and tries to compromise your reputation, depending on the nature and severity of the case, however, it is only a matter of helping the lawyer and clarifying the law.



This closes the circle again: information on the Internet can not be controlled. As a person concerned, one can observe the situation closely and act as early as possible.


The appropriate measures depend, of course, on the event that has occurred. For commercial products or brands, you may also need a PR specialist, in addition to the company's internal departments, to help you deal with the problems and appropriate follow-up.


However, there will never be any deletion by mouse click - the Internet does not forget anything. Many people and companies have already felt this on their own.