Flying cars could hit the skies in 2019 after Volvo’s parent company Geely buys ‘street-legal plane’ startup Terrafugia

Geely announced this week that it has acquired Terrafugia’s operations and assets in their entirety.

Mr Li Shufu, founder and chairman of Geely, said: ‘The team at Terrafugia have been at the forefront of believing in and realizing the vision for a flying car and creating the ultimate mobility solution.

‘This is a tremendously exciting sector and we believe that Terrafugia is ideally positioned to change mobility as we currently understand it and herald the development of a new industry in doing so.

‘Our investment in the company reflects our shared belief in their vision and we are committed to extending our full support to Terrafugia, leveraging the synergies provided by our international operations and track record of innovation, to make the flying car a reality.’

Since it was formed in 2006, Terrafugia has been working on flying cars, and has since developed a number of working prototypes.

The firm aims to deliver its first flying car to the market in 2019, with the world’s first vertical take-off and landing (VTOL) flying car being made available by 2023.

Terrafugia’s Transition was recently granted an exemption by the FAA, allowing it to be classified as a ‘light-sport’ craft.

The aircraft has fold-out wings that weigh roughly 1,300 pounds, and have fixed landing gear.

They seat a maximum of two people, including the pilot.

To operate them, one must have a sport pilot certificate, which requires just 20 hours of training.

The craft reaches a cruise speed of 100 mph, and can achieve a range of 400 miles.

And, it can fly to a maximum altitude of 10,000 feet.

The firm’s newer design, the concept TF-X, has fold-out wings with twin electric motors attached to each end, and is expected to cost £183,000 ($261,000).

THE TF-X: KEY SPECIFICATIONS

The vehicle will have a cruising speed of 200 mph (322 km/h), along with a 500-mile (805 km) flight range.

TF-X will have fold-out wings with twin electric motors attached to each end.

These motors allow the TF-X to move from a vertical to a horizontal position, and will be powered by a 300 hp engine.

The planned four-person TF-X will be semi-autonmous and use computer-controlled so that passengers can simply type in a destination before taking off.

<iframe allowfullscreen frameborder=”0″ width=”698″ height=”573″ scrolling=”no” id=”molvideoplayer” title=”MailOnline Embed Player” src=”http://www.dailymail.co.uk/embed/video/1200861.html”></iframe>

TF-X vehicles will be capable of automatically avoiding other air traffic, bad weather, and restricted and tower-controlled airspace.

The vehicle will be able to recharge its batteries either from its engine or by plugging in to electric car charging stations.

It is expected to cost £183,000 ($261,000).

These motors allow the TF-X to move from a vertical to a horizontal position, and will be powered by a 300 horsepower engine.

Thrust will be provided by a ducted fan, and the vehicle will have a cruising speed of 200 mph (322 km/h), along with a 500-mile (805 km) flight range.

Chris Jaran, CEO of Terrafugia, said: ‘After working in the helicopter industry for over 30 years, and the aviation industry in China for 17 years, Terrafugia presents a unique opportunity to be at the forefront of a fledgling but enormously exciting industry.’

How To Free Up Disk Space In Windows 10 Using OneDrive Files On-Demand?

The Windows 10 Fall Creators Update arrived with many handy features. And one FCU feature can help you free up disk space on your hard drive using the power of the cloud. It’s known as OneDrive Files On-Demand.

What is OneDrive Files On-Demand?

If you’re running the Fall Creators Update on your Windows 10 PC, you can edit your files – stored in your OneDrive cloud storage – on your computer without downloading them permanently. It can be done using OneDrive Files On-Demand. This facility can help you free up disk space on your computer which you can use to store other things if you want.

The files on your OneDrive which you have marked “online-only” are downloaded when you want to edit them. For instance, when you want to make changes to your Powerpoint presentation. After you have done the editing, the version of the file on OneDrive is replaced with the new one.

How to use OneDrive Files On Demand?

You should set up OneDrive on your device in advance to turn on the feature. To sign-in, open the OneDrive app from the Start Menu and follow the setup.

onedrive setup screen

Next, follow the steps mentioned below to enable Files On-Demand on Windows 10 FCU:

  1. Right-click the OneDrive icon in the Notifications area.
  2. Go to Settings from the drop-down menu.
    turn on onedrive files on-demand windows 10
  3. Under the Settings tab, tick the checkbox that says “Save space and download files as you use them” to turn on the feature and free up disk space on your machine.
    open one drive settings
  4. Click Ok to save and continue.

After you enable the feature, you can see it working in File Explorer > OneDrive folder. A cloud status icon gets attached to the files and folders which are online-only. You can disable the on-demand feature by following the same steps.

To mark a file or folder as online-only, go the OneDrive folder, right-click the file and click “Free Up Space” in the context menu.

onedrive files on-demand free up space

 

The files you’ve created online or on other devices are online-only by default. If you want a file to be available offline on your current device, click “Always keep on this device” option.

onedrive files on-demand status

One thing to keep in mind is that turning on OneDrive Files On-Demand for one Windows 10 PC won’t enable it across all of your devices. These settings are tied individually to your devices.

Also, I won’t recommend you to use the Files on-demand feature if your internet bandwidth is limited as any change you make to the online-only files would cost you valuable data. As an alternative, you can check out Google’s Backup & Sync tool which automatically syncs the folders on your hard drive.

Google Deletes 300 Apps From Play Store That Powered Android DDoS Botnet “WireX”

 

Android Malware
Source: portal gda/flickr

Massive DDoS attacks on websites and company networks are mostly associated with IoT devices. These next-gen techs serve as an easy to source inventory for the hackers when creating gigantic botnets. But in the recent past, a more common breed of devices popularized by the name Android has become an apparently soft target.Google recently deleted around 300 apps from the official Play Store which were used to create what is being called one of the first Android botnets. Known by the name WireX, it included around 120,000 IP addresses across 100 different countries.

The first hints of WireX existing in the wild date back to August 2, 2017, but it drew significant attention after the attacks that happened on August 17.

According to a report published by the researchers, the apps were available in the form of storage managers, audio/video players, etc. The apps were tasked to make the Android device a part of the WireX. The user was unsuspicious about the apps’ activities, as they could work in the background and use system’s resources.

WireX could send to HTTP junk traffic, with a rate up to 20,000 requests per second, to the target website. Although it’s not something big in magnitude, at least, it could force a search engine to run its CPU horses for nothing.

wirex botnet Android DDos
Image: The Estimated growth of the botnet based on the count of unique IPs per hour observed participating in attacks.

The mushrooming botnet was put to an end by seven companies including Google, CloudFlare, Akamai, Flashpoint, Dyn, RiskIQ, and Team Cymru.

“We believe we identified this botnet and took action while it was still in the early stages of growing,” CloudFlare’s Justin Paine told Ars Technica. That’s one of the main reasons the botnet could be taken down without much difficulty and before the hacker could increase the size of the botnet.

You can protect your device from such malicious apps by enabling the Play Protect feature rolled out by Google recently. The researchers found that the feature was showing warnings for the apps they tested.

Android malware play protect

“Notably, it is no longer possible to install this application as Google’s PlayProtect feature now blocks this app from being installed. Google is also removing it from devices that already have it installed,” the researchers write in their report.

What Is A “Certified Android Device”? Here Is How To Check If You Have It

In the ecosystem of devices running Google’s mobile operating system, “Certified Android Device” is the new buzzword introduced by the company.

As an effort to build users’ trust on the manufacturers and their Android devices, the certification assures that the Android devices they’re purchasing are checked for compatibility and doesn’t include anything malicious.

At the center of the certified Android devices program is Play Protect launched earlier this year, which offers automatic app scanning and ‘Find My Device’ features.

Google says they make sure that Android phones and tablets from their certified device partners stick to Android’s security and permissions models. By running hundreds of tests, the company tries to eliminate the possibility of the devices carrying malware or some adulterated version of pre-installed Google apps.

How to check if you have a certified Android device?

To spot a certified Android at a retail store, according to an earlier blog post by Google, the certified devices would carry a Google Play Protect logo on the packaging.

If you already own an Android phone and want to check whether it’s a certified Android device, you can do so within the Google Play app. Go to Google Play > Settings. Scroll down to the bottom of the Settings screen to find the certification details under “Device Certification”.

certified android device how to check

Currently, there are 100+ partners who are making certified Android devices for their markets. The list includes the likes of Samsung, Motorola, HTC, LG, HMD, Xiaomi, etc. You can check the complete list here which includes other not-so-common brands.

The company has also set up a website that flaunts features of the certified Android devices.

ATM In Computer Networks: History And Basic Concepts

ATM, also known as Asynchronous Transfer Mode, is a telecommunication concept, developed for the data link layer, to carry all sorts of different kinds of data such as web traffic, voice, video, etc., while providing QoS (Quality of Service) at the same time.

History of ATM

Let’s have a look at why the concept of ATM was developed at first hand itself. In the 1990s, the mobile data carrier speed along with the internet speed saw a boom in the transfer rate. On the other hand, other internet technologies such as voice call and video calls had also started to come into the play. So, in a nutshell, it was not only the internet world but also the telephony world which were converging into each other. Thus networking QoS factors such as latency, jitter, data rate, real-time data delivery, etc., became more important.

Nonetheless, the underlying protocols were still the same across the most of the internet world including hardware, protocols, and software. On top of that, there was not any solid concept or technology which, on the telecommunication level, can address the then-lately arising issues at the same time. So, the ATM was born.

Basic ATM concepts

Here are some of the fundamental ATM concepts which are used most often:

Cells

The most basic data transfer units are called cells in the ATM technology. While on the data link layer the data transfer units are known as the frames, the data transfer unit for the ATM concepts was named cells. A cell size is 53 bytes, out of which 5 bytes will be header size and rest of the 48 bytes will be the payload. That means around 10% of the packet size is the header size.

For example, if we transfer 53 GB of data using the ATM technology out of 53 GB, 5 GB will be just the header. To process 5 GB per 53 GB, the processing technology has to be scalable and fast enough to do the job. Can you guess how does ATM address it? Otherwise, keep on reading…

Because of the fixed and smaller sizes (53 Bytes), it was easier to make simpler buffer hardware. But, there was a lot of overhead in sending small amounts of data. Moreover, there was segmentation and reassembly cost as well because of the higher share of the packet header and overhead in processing them.

ATM Layers

The whole ATM concept, just like the OSI system, was also divided into different layers. Each layer was assigned some work to do just like each layer of the OSI system did. We will describe the same later in the article.

Class of services

As discussed above, ATM was introduced to address the problem with the real-time data and data latency problem. A set of class of services was also introduced which were based on certain factors such as bit rate (whether constant or variable), timings (how strict the timing sync would be in between the source and destination) to facilitate users with different requirements, etc. The different class of services has also been mentioned ahead in the article.

Asynchronous Data Transfer

ATM uses Asynchronous data transfer while utilizing statistical multiplexing, unlike circuit-switched network where the bandwidth is wasted when there is no data transfer taking place.

Connection Type

However, it uses a connection-oriented network for data transfer mostly for the purpose of Quality of Services. ATM operates by setting up a connection with the destination using the first cell and the rest of the cells follow the first cell for the data delivery. That means, the order of the packets is guaranteed but not the delivery of the packets.

This connection is called virtual circuit. This means that from the source to the destination, a path has to be found first before the data transfer is initiated. Along the path, all the ATM switches (devices) allocate some resources for the connection based on the class of services which has been chosen by the user.

Transmission Medium

As mentioned before, the main purpose of introducing the ATM concept was to make all types of data transmission independent of a medium. That means, it could work on the telephony as well as on the internet working side as well. The transmission medium could be a CAT6 cable, a fiber cable, a WAN and even packaged inside payload of other carrier systems. With such flexibility of data transfer, ATM was supposed to give a quality service in the most of the cases.

Being independent of a medium also brought a lot of problems with the ATM technology, which were addressed at the convergence layer.

Some of the other interesting facts that arise out of the situations mentioned above are —

  • ATM can also work on CBR (Constant Bit Rate) as well as VBR (Variable bitrate) because it has flexible data transmission efficiency.

Quality of Service and Service categories in ATM:

Quality of Service in ATM technology is handled in different ways based on a certain number of criteria. Based upon it, different service categories have been introduced such as Available Bit rate, Unspecified Bit Rate, Constant Bit Rate, Variable Bit Rate, etc.

ATM Layers

Just like the OSI model, ATM protocol stack has also been divided into three layers with different assigned functionalities:

  • ATM Adaptation Layer (AAL)
    • Convergence Sublayer (CS) and,
    • Segmentation & Reassembly Sublayer (SAR)
  • ATM Layer and,
  • Physical Layer
    • Transmission Convergence Sublayer (TS) and,
    • Physical Medium Sublayer

ATM Adaptation Layer (AAL)

The main function of the adaptation layer is mapping apps to the ATM cells. If you are well aware of the different layer of the OSI system, then you can relate adaptation layer with the application layer of the OSI model.

Besides, the Adaptation layer is also responsible for segmentation of the data packets and reassembling them at the destination host.

Convergence sublayer

We have already seen that the ATM concept was introduced to handle different data types along with variable transmission rate. It is the convergence layer which is responsible for these features.

In easier terms, convergence layer is the layer on which different types of traffic such as voice, video, data, etc., converge.

Convergence layer offers different kinds of services to different applications such as voice, video, browsing, etc. Since different applications need different kinds of data transmission rate, convergence sublayer makes sure that these applications get what they need. A few examples of services offered by the convergence sublayer are here –

CBR (Constant Bit Rate)

CBR provides a guaranteed bandwidth and it is also suitable for real-time traffic. In the CBR mode, the user declares the required rate at the beginning of the connection set up. So, accordingly, the resources are set for the source at different hops or stations. Besides the declared required rate, the user is also guaranteed delay and delay variations.

ABR (Available Bit Rate)

Suitable for bursty traffic and getting feedback about the congestion. In ABR mode, the source relies very much on the network feedback. If bandwidth is available, then more data can be transferred. It helps in achieving maximum throughput with minimum loss.

UBR (Unspecified Bit Rate)

UBR is a cheaper and suitable solution for bursty traffic. In UBR transfer mode, the user does not specify the network about the kind of data and bitrate it is going to utilize.

Thus, the source sends the data packets whenever it wants. However, there are also certain disadvantages to it such as there is no feedback about the sent data packets. As a result, there is no guarantee that the packet will reach its destination. Also, if there is congestion in the network, then cells might be dropped as well.

VBR (Variable Bit Rate)

In the VBR mode, the user needs to declare the maximum and the average bit rate at the beginning. Also, VBR works in the real time as well as non-real time basis.

For example, VBR can be used for the real-time services such as video conferencing. On the other hand, it can also be used for the non-real time services as stored video buffering.

AAL Types & Services offered in details:

Here is a table of the services offered under different AAL types:

AAL Type,Traffic Characteristics
AAL 1,”Connection Oriented, Constant Bit Rate (Eg. Voice)”
AAL 2,”Connection Oriented, Variable Bit Rate (Eg. Packet Based Video)”
AAL 3 / AAL 4,”Connection Oriented, Variable Bit Rate (Eg. File Transfer), Connectionless Variable Bit Rate (LAN Data transfer applications such as frame relay)”
AAL 5,For Bursty Data with error control at the higher layer protocols

Segmentation and Reassembly Sublayer (SAR)

As the name suggests, SAR layer is responsible for segmenting higher layer data into 48 Bytes cells. At the receiving end, the same layer reassembles the data.

When ATM was created, it was envisioned that this technology will be scalable and would support very high speed. To achieve it, the cell size was kept of around 48 Bytes so that segmentation and reassembly could be done faster. Moreover, it also employes ASIC (Application Specific Integrated Circuit) chip in the ATM switch to achieve this.

ATM Layer

  • ATM layer is akin to the network layer of the OSI layer although it also has the data link properties.
  • To set up a connection, the ATM layer uses Globally Unique Address. ATM does not IP system.
  • Path and circuit identifiers are used once a connection has been established.

Why did ATM technology not survive?

You have had enough about ATM technology and the question “Why did ATM technology not survive then even if it was so efficient and advanced?” must have crossed your mind till now.

Even though the ATM addressed a lot of issues and offered a la carte solution to the users need, there were a lot of other things that could not let ATM technology compete for a longer time. Here are some of the reasons:

The speed of the device operation:

Much of the ATM devices operated at a different speed than what we see around. For example, OC3 operated at around 155 Mbps and OC12 operated at 622 Mbps.

Costly & complex Hardware

Because both the telephony and the internet industries were involved, the standardization of this technology took too long. With the time, it also grew too complex, resulting in the sophisticated hardware which was too costly compared to normal computer networks devices around. For example, ATM switches were more expensive as compared to Ethernet switches which work at layer 2.

Non-IP based addressing system

Making the situation worse, most of the networking software and hardware available in the market were based on the IP-based networks but not on the ATM-based networks. So, in the market, not much software was available for ATM. Also, no one wanted to move to ATM by investing a lot of money in buying new hardware.

Delay

Last but not the least, there was too much delay involved in the standardization of the protocols. Also, many leading computer networks companies tried to come up with their proprietaries to influence the market.

Bringing all the companies and working groups (including research and study groups) from telephony as well the internet world delayed the whole standardization process.

Gradually with the time, because of the major issues mentioned above and other minor issues, ATM phased out of the market.

15 Smart Ways To Re-Purpose Your Old Android Smartphone And Give It A New Life

As modern technology keeps evolving, gadgets and services keep overwhelming us with new and exciting features. On an average, people upgrade their smartphone once every two years. So, what to do with the old phone when you get a shiny new one?

Selling is an option, but people often go for cheaper or mid-range devices rather than buying a used one at a lower price. Don’t just throw away your old Android phone. There are so many uses for your spare Android device that you might not be aware of. Just find the right way to tap into their potential and give them a new life. Here are some ways which might help you to put your old Android phone to good use.

15 ways to re-purpose your old Android smartphone

1. Universal Remote Controller

One of the best ways to use an old Smartphone is to serve it as a smart remote for your home or office. Many handsets have an infrared “blaster,” which will let it connect to the TVs, air conditioners, and other devices that use a remote control. Smartphones with IR blaster can communicate with any devices that receive commands via IR beams. The iPhone does not have an IR blaster.

If your phone has an IR blaster, then set up an app like Sure (free) or AnyMote-Smart Remote (free) that will allow you to issue the IR commands to your electronic device. However, if the phone does not have an IR blaster, you can either add it up to the phone with a third-party accessory which will cost you a little amount or you could even DIY it for cheap.

2. Computer Mouse

Remote-Mouse-iPhone-old-phoneWhen it comes to office or home usage, you can turn your old phone into a mouse and keyboard controller for your PC. All that needed is an app like PC Remote (free) or Unified Remote (free/paid) that you need to install on your Android phone and its companion Mac/Windows/Linux server program.

With such apps installed, you gain the flexibility to control your PC from any corner of a room via Wifi or Bluetooth. Moreover, some apps let you control your PC from anywhere in the world over the internet. You can use your outdated Android device for such remote administration applications.

3. Use Old Phone As Alarm clock

One of the cool uses of your old Android smartphone might be a bedside clock. A smartphone is capable of producing an excellent alarm sound to wake you up in the morning.

There are all sorts of alarm clock apps that do everything from playing specific radio station to recording your sleep patterns. Get yourself an excellent clock app from the Google Play Store, such as Timely (free) or Alarm Clock Xtreme (free). Also, you can buy yourself a cheap smartphone dock, and you’ve got a customizable alarm clock to set beside your bed.

4. Digital Photo Frame

You can quickly turn your old Android phone to a digital photo frame that can display photos or slideshows. A digital photo frame is just an electronic display where images are stored. All you need is a phone dock and a photo streaming app.

Various apps and tools are available for this purpose, just install an app like Google Photos (free) or Photo Slides (Photo Frame)” (free) and convert your device into a powerful photo frame. However, if you want something more suited for photo slideshows to display in the background while you’re doing something else around the house, then there’s the Dayframe (free) app for Android.

5. Use Old phone a Desk calendar

If you like a simple addition to your living room or your office desk, then turn your old Smartphone into a desk calendar.

Google Calendar app can get the job done. Sync your calendar events from your tablet or existing phone and have them show on your new modified desk calendar. Another calendar app, such as Cal Calendar (free) is also ideally suited for this purpose.

6. As a mounted GPS for your car

Take your old Android handset and convert it into a permanent in-car GPS. All you need is to grab a car phone mount, a car charger, and fix your phone in place permanently.

Load up your phone with navigational apps like Google Maps (free), Waze (free) or any other preferable offline apps such as CoPilot GPS (free) or Sygic GPS Navigation & Maps (free). Your in-car GPS will be ready with your desired downloaded maps, and you are all set to go.

7. Monitoring through live video feed

You can consider turning your old device into a security camera to keep an eye on your home, office, or anywhere you desire. Just install a security camera app like IP webcam (free) from the Google Play Store. The IP webcam can broadcast both locally and over a service called ‘Ivideon’ so that you can view your stream live from anywhere.

You can also use the camera to monitor a baby, kitty-cam or use it in on your front door.

8. As an e-reader

One of the good things about Android is all of the choices for reading apps. If you want to give your old Smartphone a lightweight job while it sees out its retirement, you can turn it into a dedicated e-reader.

An e-book reader is an ideal companion for the modern book lovers. All you need to do is load up your device with only the apps you need for reading, such as Google Play Books (free), Amazon Kindle (free) or any other app that you prefer. Disable notification from all the other apps and use other battery saving tips to get maximum screen-on time and enjoy!

 

9. Media Centre

Your old Android device, once connected to your home network and loaded up with your favorite music and movies, can be considered as a media center to stream content around your home. Just load up your collection on the device and install any of the standard apps, such as Kodi (free), MX Player (free) or VLC (free). Also, you can fill it with apps like Netflix and Hulu, and you are good to go.

You can also connect your phone to the TV using an MHL or HDMI cable so that it can be left tethered to your TV.

10. Kid-Friendly learning tool

An excellent alternative use for an old Android device is turning it into a kid-friendly learning device and dedicating the phone primarily to your child’s education. Just add a restricted user profile to your Android device, fill it up with fun and educational apps and give it to your kid to unlock his potentials and get in pace with this fast-moving world.

If your device has Android 7.0 or higher, you can try “Google Family Link” program to get more robust control over the phone, including abilities to set screen-time limits and receive weekly activity reports.

 Additional Uses of your old smartphone:

  • Your device can be used as a Wifi repeater by using apps like Netshare.
  • If you are a developer, you can use your spare Android for testing purposes.
  • Use your device as a fitness tracker by loading it with fitness tracking apps.
  • You can turn it into an online radio for your bedside table with apps like TuneIn Radio.
  • If you use your old Android as a car navigation device, you can also use it as a dashcam by installing an app like Autoboy Dash Cam.

Hackers Can Use Your Antivirus Software To Spread Malware

How do you safeguard your computer from malicious stuff, by using an antivirus software? But what if the protector of your digital friend can’t be trusted?

A new exploit called AVGator is created by an Austra-based security consultant named Florian Bogner. Many AV software provide functionality to quarantine files, but the users can restore the quarantined files whenever they want.

Using AVGator to mishandle the ‘restore from quarantine’ feature can allow a local user to gain full control of a computer. In normal cases, a user without admin privileges can’t perform write operations in “C:\Program Files or C:\Windows folders.

AVGator exploit to hack antivirus

AVGator allows the users to do so by abusing a Windows NTFS directory junctions. Thus, a user can restore quarantined malicious files to a new location, even sensitive ones such as the Program Files folder, and infect the system.

However, there is one major downside associated with the attack which reduces its scope to a great extent. It can only be performed by a user having physical access to a target machine. So, you can set aside your thoughts of abandoning your antivirus software. Afterall, they are all we have got to keep bad things out from our machines. But always keep your antivirus software updated to prevent it from any unknown threats.

Bogner informed various antivirus vendors whose products could be compromised using the AVGator exploit. Some of the manufacturers have already released a fix including Trend Micro, Emsisoft, Kaspersky, Malwarebytes, Zonealarm, and Ikarus.

Beware Of Fake WhatsApp Apps On Play Store — Millions Have Already Downloaded Them

Android and iOS ecosystems, when it comes to security, is the level of scrutiny applications need to face before being listed on their online app stores. While Google continues to keep taking steps like Play Protect to improve in this department, the Play Store is brimmed with fake apps.

On Play Store, there are tons of apps that whose developers are employing foul practices to gain downloads. One particular app, named “Update WhatsApp,” mimicked WhatsApp to trick users by making them believe that they were updating an existing application.

ifferent users on Reddit and Twitter pointed out that instead of being a chat app, Update WhatsApp was an ad-scrapper app that aimed to earn clicks and fraudulent revenue.

Later, according to Motherboard, the app’s developer changed its name to “Dual Whatsweb Update” and changed its icon. Further down the line, the app was removed from Google Play, and the developer account was suspended for violating the policies.

It’s very easy to fall for the fake app. The only difference between the name of the developer of a real and fake app is some Unicode character. While on a PC the difference becomes obvious, but the Android users become easy targets.

While this particular one app might have been removed from Play Store, a number of other apps continue to exist (see picture at the top). So, users are advised to be more cautious while downloading apps.

How To Backup Data In Windows 10 Using File History?

hort Bytes: File History is a data backup feature for Microsoft Windows operating system. You can use it to automatically backup files to external, internal or network connected storage and restore them at a later stage. It’s visible as an option in the Control Panel. File History was intended to be the successor to the Windows Backup and Restore utility.

With the ever-increasing collection of photos, music, videos, and other types of files on our computers, most of us are in constant fear. Our data might fall prey into the hands of some power outage, hard drive failure or some other error.

If we talk about the Windows operating system, one possible way to backup data is to copy all the important files to an external hard drive on a daily basis. That’s what many people do. Another one, for the lazy humans, is to use some software that saves the files to the external storage media or a network-connected storage on its own.

What is Windows File History?

Earlier Windows versions had an inbuilt data backup utility known as Backup And Restore. Later, a more advanced Windows backup utility came with the arrival of Windows 8, and it has been carried forward to Windows 10 also.

Microsoft wanted to replace Backup and Restore with File History. They even removed the former in Windows 8.1, but it reappeared in Windows 10 as Backup and Restore (Windows 7).

Also Read: Top 15 Best Free Data Recovery Software Of 2017

How does File History work in Windows 10?

File History does the same job of backing up files, but it follows a technique called Continous Data Backup which means the system can backup files in real-time. Similar to its older counterpart, File History supports incremental backups where successive copies of data only contain what has been changed since the last backup.

It can also save multiple iterations of the same file, thus, replacing the Windows feature called Previous Versions. So, it’s possible to restore an earlier version of a file quickly using File History.

How To Backup Data in Windows 10 Using File History?

Saving your files and folders to an external media with the help of the File History is a relatively simple task which involves a couple of clicks. You can start with an empty USB drive if your data is less, or a hard disk if you have loads of photos and videos to backup. Make sure it’s formatted according to the NTFS file system.

Follow the steps mentioned below:

  1. Connect the external storage media to your computer.
  2. Go to Settings > Update & Security > Backup.
    1. FH1 Windows File History
    2. There you’ll find the option to turn on the file history feature.
    3. Click Add a drive. Select the media with which you want to use the File History feature.
      FH2 Windows File History
    4. Once you click the name of the storage media, File History will start saving data on your hard drive.
      FH3 Windows File History

    During the initial setup, it’ll take some time depending on the amount data to be copied. File History will continue to do its work until you manually turn it off (Don’t do it while it’s running for the first time). It’ll backup files and folders from predefined locations in Windows after the specified period.

    Another way to access File History, its standard Windows look, is by visiting Control Panel > File History. Click the Turn On button to start File History.

    FH4 Windows FIle History

    To choose a network location, click Select Drive from the left pane and click Add network location. File History can also work if you have a separate internal hard drive on your computer.

    What data is copied using File History?

    By default, Windows File History has been configured to automatically backup data from Desktop, Home Group Folders and Windows library folders like Downloads, Pictures, Documents, Videos, etc. If a folder is added by some other application like Virtual Box, it’ll also be backed up.

    You can click More Options to view the Backup Options screen where the folders eligible for backup are listed. You can add more folders if your want. To delete a folder from the list, click it and then click Remove.

    FH5 Windows File History

    On the top of the Backup options screen, you will find the option to set the backup frequency, and time limit after which the system should delete the backups. It also shows the size of the data backup created using File History.

    Scroll down to add excluded folders which you don’t want File History to copy to your storage media.

    If you want to use another storage media for File History, it would require you disconnect the existing File History drive. You can do the same by visiting the Backup options screen. Go to the bottom and click Stop using drive under Backup to a different drive.

    How to restore data in Windows 10 using File History?

    To get back the data from your File History Drive at a later stage, you will have to use the Control Panel-based version of File History. Once you’re there, click Restore personal files on the left-hand side and a new window will open containing all the backup folders. Select anyone of them and click the Restore button to save the files to their original location.

    FH6 Windows File History

    You can restore the contents of a folder to a different location. Select a folder, click the gear button in the top-right corner of the window and click Restore to. After this, you can select the desired location.

    Also, you can double-click a folder to see what it contains and restore individual files. Use the search bar in the File History window to find specific files from the backup. You can preview files before restoring them, double-click to open a file using its default app.

    How to Restore the Previous Versions of files and folders?

    You already know that File History can keep multiple versions of files. Use the arrow buttons to view a different version of files and folders backed by File History.

    You can delete them whenever you want if there is no need for those files to capture valuable storage. To delete previous data, click Advanced Settings > Clean up versions.

    FH6 Windows File History

    You can select the age of the previous versions you want to the system to delete. The default is to delete the versions which are older than one year.

    So, this was a brief walkthrough of the Windows 10 File History feature and how to backup and restore data in Windows using File History.

    In case we missed something, let us know in comments.

Bill Gates Is Creating His Own “Futuristic Smart City”

What would you do if you have like billions of dollars in your pocket? Probably, you might think of creating your own city of the future.

According to an Arizona-based investment firm Belmont Partners, one of Bill Gates’ investment firms has spent $80 million to buy a massive chunk of land spread across 25,000 acres. It’s situated 45 minutes west of downtown Pheonix off I-10 freeway near Tonopah.

The plan is to turn the land which is roughly the size of Tempe into a futuristic smart city called Belmont. It would be able to accommodate around 80,000 residential units after leaving 3,800 acres for commercial space and 470 acres for public schools.

Arizona Technology Council’s Executive Emeritus Ronald Schott said that Bill Gates is known for innovation and he has picked a “good spot.” The high-tech smart city would take advantage of the proposed I-11 freeway which will pass through Belmont and connect to Las Vegas.

Currently, there is no word on when the construction of the said Bill Gates’ city of future would commence. The ex-CEO of Microsoft recently slipped from the place of the world’s richest man, but still, his wealth is beyond the imagination of most of us.