Search This Blog

Sunday, December 27, 2009

Hack Google Page Rank

How to increase Google Page rank.

You can believe or not if Google love to read ‘title’ of your page. Combination of titles that you use, the keyword is also will stored and used later. Now you must decide to learn the blog title with the appropriate keywords that you target. If the keyword that you drill the more popular then it is likely to be the top position is also certainly the more serious. However, if the position of your keyword search is not yet so well, or are new words, I may be your only king in the keywords It is a good idea you do not make the title more than 6 words, more words if the word is left will be ignored and may be less useful as a result.

For example ‘ How to increase Google Page rank assistance with using the software ‘. If your article with the title, then stored only “ How to increase Google Page rank “and the rest will not be Permalink. From reading the Google blog here and you will affect your future position Search Engine Ranking Page. In a different case you will also find a significant effect the change, if you change the title of your blog’s title that already exists. If you change the title of a topic that already exists, then the automatic Permalink existing will also change. This will affect the links from other places that are already there.

Possible error will occur if the page is opened the link to the old place.To help use w. blogger try toedit your page. By using this facility, you can save Permalink existing, without affected by the bloggers themselves.Search engines such as Google and Yahoo is the right choice for you to get top ranking index your blog. Because Internet users in the world at this time using Google and many in the yahoo search engine. (the browser Firefox and Opera already have inside). Many bloggers think that a beginner blogger how they pitch in the search engine index. I have experience from a variety of ways such as using the right application for the SEO to blog where you occupy the top 10 search engines in the world. You need not lose heart, your blog will also keep one index by search engines in updating their server, but we often invincible in order ranking and index not as fast as we want, how man we should list on their site, if your blog is paying webmaster for indexing always happy with your blog for advanced bloggers they usually enter the tags in their HTML pages to search engines make it easy to read. You always post any posts are an easy way to get top ranking

Friday, December 25, 2009

HDD WD 1.0TB Green Power

WESTERN DIGITAL 1.0TB Green Power SATA II - 32MB CACHE - 7200RPM ( WD15EADS) : CALL ( BH 3 năm )




Box HDD 2.5" ATA
Giá: 135,000VND

Nguồn gốc:Made in China - new 100%,full box.
* Bảo hành siêu tốc: 3 tháng ! (Sau 3 tháng hết Bảo hành nếu có bất cứ trục trặc gì khách hàng được áp dụng điều kiện bảo hành có tính phí-khách hàng chỉ phải trả 50.000đ cho 1 sản phẩm đổi mới hoàn toàn không bao gồm vỏ)
Features
* Supports 2.5" IDE HDD UP TO 500GB(max)
* High-speed Transfer rate up to 480Mbps
* External Power supply: +5/12v 2A
* Aluminium material
* With logo place
Specifications
* Solution: Prolific 2571
* External Interface: USB2.0
* Internal Interface:ATA
* Indicator: Power & Data accessing indicators
* Material: ABS+Al
* Operatin Temperature: -20℃ to +60℃
* Storage Humidity: 20% RH to 80% RH
* Weight: 489g
* Dimensions: 201(L)×125(W)×37.5(H)mm
* Certification: CE+FCC+RoSH
* OS Supported:
Windows 98/ME/2000/XP/Vista
Macintosh OS 9.0 or Higher
Linux Kerndl 2.4.1 or Higher


Box HDD MRA602 Wingsonic
Giá: 810,000VND

Specifications:
- Fits all 3.5" Serial ATA hard disk
- Supports hot swap
- Supports Sata I/II( 3.0Gb/s)
- Housing Assembly: (w)133mm x (L)208mm x (H) 37mm
- Interface: Standard Sata
- Weight: 490g

Dáng chuẩn không cần phải bàn cãi


[CENTER]

















Wednesday, December 23, 2009

Using Facebook and Twitter safely

You and just about everyone else, it seems, are spending more and more time on Facebook and Twitter, updating statuses and checking friends' tweets. That's all well and good, of course, but the amount of personal information that all of you share in real time, and the level of trust implicit with the social networking sites, do pose particular security and privacy problems.

A recent study from Sophos found that Facebook users reveal a lot of personal information to new friends, including ones they really don't even know or have never met. Using fake profiles, Sophos sent out friend requests to 100 random Facebook users, and more than 40 percent blindly accepted, giving the company access to birth dates, e-mail addresses, phone number and addresses--private information strangers shouldn't have.

The openness of Twitter--anyone can follow anyone else, and posts are indexed in search engines--makes it a nirvana for spammers. Kaspersky says there are nearly 500,000 new unique URLs that appear in Twitter posts daily, and of those, anywhere between 100 and 1,000 are malware attacks.

Here's a look at some of the specific threats users of the sites face and what they can do about it.

FACEBOOK

A rogue app that appeared early in the year sent notifications to Facebook users reporting they were violating terms of service and offering a link that lead to an application called "facebook -- closing down!" which then spammed all the friends of affected users.

(Credit: Trend Micro)

Problems: Malware, account hijacking, phishing, and social engineering

The biggest malware risk is Koobface, (an anagram of Facebook), which is a worm that targets social networking sites and affects Windows-based computers. Once a computer is infected, it hijacks the Facebook account and sends messages to other friends of the victim, enticing them to click on a link. The link redirects to a Web site where they are prompted to download software ostensibly to watch a video. However, there is no video; only malware that infects the system, blocks access to security sites, and can be used to steal sensitive information from the computer, such as credit card numbers. Infected machines can then be used to spread the worm to others on Facebook, send spam and distribute fake antivirus alerts, said Rik Ferguson, a security researcher at Trend Micro. Koobface now can automatically create new profiles using infected machines, he said.

Facebook accounts can be hijacked in several ways. A brute-force attack can be used to guess passwords. Users can fall for phishing attacks by clicking on links in messages or e-mails purportedly coming from friends that redirect to a fake Facebook log-in page. Or malware such as Koobface can steal passwords.

Social engineering is a huge problem for social networks because the trust that users have for messages and posts from friends can be easily exploited by scammers. Hijacked accounts are used to send everything from spam touting weight loss plans to links that install malware and steal passwords to fake emergency messages saying a friend is stranded in another country and needs someone to send money. Scammers are also sending e-mails that look like they come from Facebook and include an attachment that contains a Trojan.

Solutions: Use antivirus and anti-malware software and keep it up-to-date. Install security updates for operating system and other software. Use software like AVG Linkscanner or McAfee Site Adviser to protect against phishing and malware attacks. Become a fan of the Facebook Security page, which has posts related to all sorts of security issues, tips, resources and other information. If you think you've been infected with Koobface or other malware you should reset your password and notify friends who may have been affected.

Use an up-to-date browser that features an antiphishing black list, such as Firefox 3.0.10 or Internet Explorer 8. Be aware of where you enter your password. Check to see that you are logging in from a legitimate Facebook page with the Facebook.com domain. Be wary of unusual stories or offers that are too good to be true. Verify information with sources directly. Be cautious of any message, post or link that looks suspicious, requires an additional log-in or asks you to download or upgrade software. If a link seems odd or lacks context, don't click on it. Don't click on links or open attachments in suspicious e-mails. You can add a security question from the "Account Settings" page if you would like an additional layer of protection.

Problem: Rogue applications

Facebook doesn't vet every app that appears on the site, which means there is a risk that some apps will have bugs in them or will violate Facebook's privacy policies. Facebook has proven diligent in removing rogue and problem apps quickly when it is notified, but unlike iPhone apps, pretty much anyone can write a Facebook app. "Because the code is not always of professional standard or hosted or audited by Facebook, we've seen innocent apps compromised externally and used to deliver malware, such as fake antivirus," Ferguson said. One rogue app that appeared early in the year sent notifications to Facebook users reporting them in violation of terms of service and offering a link that lead to an application called "facebook -- closing down!" which then spammed all the friends of affected users, according to Trend Micro.

Solution: See solutions above, and be cautious about adding applications. Research the developers and perform Web searches to see if anyone has complained about the app. And ask yourself, what value does the app provide? Do I really need to play zombie?

Problem: Privacy leaks due to user error

Because people control who they are friends with on Facebook it is easy for users to have a false sense of security about the privacy of their data and activities on the site. Social engineering attacks, lax security practices by users like using weak passwords and design or implementation problems with the site itself can undermine the privacy protections users rely on. Users who fall for phishing scams and get their accounts hijacked have everything in their account exposed to strangers who can then use the different types of data for identity fraud or to target the victim's friends with social engineering attacks.

Solution: See solutions above. Also, use unique logins and passwords for each Web site you access. Use strong passwords, change them often and don't share them with anyone.

These instructions explain how to keep most people from viewing your friends list on Facebook.

(Credit: CNET)

Problem: Privacy leaks due to design or implementation issues

Privacy advocates contend that Facebook's lenient apps approval process, privacy policies and confusing privacy settings put users at risk. Two weeks ago, Facebook asked users to configure their privacy settings. The options were confusing and many people were inclined to just keep the default settings, which are set to make the data visible to the Web rather than opting to use the old settings established by the user. Screenshots and descriptions are detailed on this photo gallery.

Many people have complained that it is difficult to figure out how to change the privacy settings, that they are not intuitive and that there doesn't seem to be one central place for that. And using Facebook Connect with outside apps, like the iPhone app Foursquare, can expose more information than a user expects to share. The new privacy changes at Facebook have prompted the Electronic Privacy Information Center to ask the Federal Trade Commission to investigate.

Facebook encourages people to share their full names, date of birth, home town and other information, all pieces of information that are commonly used in identity fraud. Scammers on underground sites even refer to Facebook as a "free date-of-birth look up service," according to Ferguson. People don't realize that their profile information can be accessed by total strangers who happen to be in the same groups or networks unless they specifically change the settings. People who don't trust random apps--which in general have access to profile information even if it isn't necessary to the function of the app--don't realize that the apps their friends are using also have access to their data. "Friends apps can access most of your profile, interests and groups. There is no way to prevent them from accessing your name, profile, photo, town and gender," said Joseph Bonneau, a PhD candidate in security at the University of Cambridge. In response to user feedback, Facebook made a change that allows users to hide their friend lists from everyone but their friends, a Facebook spokesman said.

Solution: CNET has a tutorial on how to hide your Facebook friends list by clicking on the pencil in the friends box on your profile. Detailed instructions and tips on dealing with Facebook privacy settings are available on the DotRights.org site and on the All Facebook blog. Facebook also has a blog post about the privacy changes.

Problem: Privacy leaks related to marketing

The relationship between the apps and advertisers can also cause problems. Adding an app allows the app to show ads inside the Facebook domain, and that can leak a user's profile information to the advertiser, said Peter Eckersley, a staff technologist at the Electronic Frontier Foundation. Meanwhile, cookies and other browsing tracking technology combined with data from social networks can be used by marketers to identify users for targeted advertising and other purposes, Eckersley said, providing details in a blog post on different ways data can be leaked from social networks to third-party tracking firms. Once marketers know a specific person's user name, they can use that identifier in the URL to get to a user's public profile page, according to Eckersley. "They can create a social graph of your date of birth, city, employment, relationship status, all uniquely codified in a way that can be automatically sucked into a database," he said.

Solution: Pick a good cookie policy for the browser, such as manually approving all cookies or only keeping cookies until the browser is closed. Disable Flash cookies. Use Firefox extensions such as RequestPolicy and NoScript to control when third-party sites can include content or run code in the browser page. Use the Targeted Advertising Cookie Opt-Out plugin or AdBlock Plus to block ads. To hide your IP address and other browser characteristics, use Tor via Torbutton.

Problem: Information used to suppress dissent and target political activists

As with e-mail, blog postings and other public expressions of dissent, Facebook and Twitter have been used by governments to target protesters. The Wall Street Journal reported earlier this month that family members of Iranian Americans had been arrested or questioned because of anti-Iranian government posts on Facebook by members outside the country. In other instances, Iranians living abroad were forced to log into their Facebook accounts or reveal passwords to government officials as they arrived at the Tehran airport and some even had their passports confiscated because of their political posts. In the U.S., the EFF says, officials have taken actions against U.S. citizens based on information discovered on their social networks; the group has sued the CIA and other agencies for allegedly refusing to release information about how they are using such sites in surveillance and investigations.

"Basically, every time you post something to Facebook you should assume that the whole world will know what you've posted, your family, employer, the government, people you don't trust," Eckersley said.

Solution: Think carefully about what information you want to share about yourself and consider only posting information you would want to let the general public see.

TWITTER

This screen shot shows a Koobface attack message on a Twitter page.

(Credit: Trend Micro)

Twitter has many of the same malware, phishing, hijacking and social engineering issues that Facebook has, and the solutions for those problems would be the same. Because users don't provide much personal information to Twitter, and can even create accounts using all fake information, and because anyone can follow anyone else, there aren't the same issues with privacy, either. But that makes life easy for spammers.

Security does seem to be a worrisome thing with Twitter. The site has had several serious problems from employee accounts getting compromised. In January, someone hacked into the Twitter internal network -- possibly by guessing the password -- and gained access to the Twitter accounts of President Obama, CNN anchor Rick Sanchez, and 31 other high-profile Twitterers. In May, someone broke into Twitter's network and gained access to 10 accounts, which appeared to include Britney Spears and Ashton Kutcher. In that breach, a hacker was able to gain access to a Twitter employee's Yahoo account through the password recovery system and from there get information from other sites, including access to the employee's Twitter account. And last week, the legitimate account of a Twitter employee was used to hijack the site and redirect visitors to an external page displaying a banner for the "Iranian Cyber Army."

Meanwhile, Twitter was crippled (and Facebook and other sites also affected) by a rare politically motivated denial-of-service attack targeting one user in August. However, that incident reflects more on Twitter's ability to keep the site up in the face of an attack and accessibility than it does about security risks to users.

Twitter users are susceptible to getting their accounts hijacked, and the site has been targeted by clickjacking pranks. In these social engineering attacks, users were encouraged to click on links that distributed the original tweet to all of the Twitter user's followers.

Users with large numbers of followers have an added responsibility to be careful, particularly when setting accounts to automatically post items from news feeds. A malicious post on an unmoderated news feed that venture capitalist Guy Kawasaki was re-tweeting distributed a Trojan to more than 139,000 followers in June.

Kaspersky offers a Krab Krawler tool that analyzes tweets as they get posted on Twitter and blocks any malware associated with them. Trend Micro has technology that monitors Twitter posts for malicious URLs, as well as looks for attack patterns in the posts, such as use of popular terms to indirectly lead people to malicious links. And Finjan offers a free browser plug-in dubbed SecureTweets that warns users when they encounter a malicious URL in Twitter, as well as Blogger, Gmail, Google and a host of other popular sites. To keep up with security issues on Twitter follow Twitter's Spam Watch account.

Social networks are also susceptible to other serious security problems that can hit any type of Web site. For instance, last week passwords of 32 million stored in plain text on the RockYou site were exposed by a SQL injection attack, according to security firm Imperva. Because the passwords are used on other affiliate sites to the social networking application maker, the breach jeopardized other accounts, like Gmail, Hotmail, and Yahoo.

Data Doctor Recovery - Sim Card 3.0.1.5

Thông thường nếu dữ liệu trên thẻ nhớ mất đi ta vẫn có thể phục hồi lại được không khó bằng các công cụ chuyên dụng dùng chung Recover trên PC; tuy nhiên nếu trên Sim Card thì sao: tuy có khó hơn – gian nan hơn nhưng điều đó vẫn có thể làm được với Data Doctor Recovery - Sim Card 3.0.1.5.

* Điều kiện:

- Chương trình Data Doctor Recovery - Sim Card 3.0.1.5 được cài đặt đúng cách trên hệ thống.

- Một đầu đọc sim Card giao tiếp bằng chuẩn USB hoặc chuẩn PC/SC: giữ nhiệm vụ sẽ quét sâu vào simcard và phát hiện mọi thông tin có thể khôi phục được (chú ý đầu đọc này khác các loại đầu đọc thẻ nhớ phổ biến trên thị trường, giá đầu đọc đơn dao động từ 50 à 150.000VNĐ tùy loại).

Opera 10.5 pre-alpha goes Chrome hunting

The latest Opera browser preview version may not be entirely stable, but it's definitely got its jetpack strapped on. Opera 10.5 pre-alpha, for Windows and Mac, is the first browser that's not powered by Webkit to approach JavaScript rendering speeds previously reached only by Chrome and Safari.

Opera 10.5 pre-alpha introduces Windows 7 support and a slight redesign, along with a rocketing new JavaScript engine.

(Credit: Screenshot by Seth Rosenblatt/CNET)

In empirical testing done on an HP desktop running an Intel Core 2 Q6600 at 2.66GHz with 4GB of RAM and Windows 7 32-bit, the pre-alpha scored 435.6 milliseconds in the SunSpider JavaScript benchmark. By contrast, Google Chrome 4.0.266.0, the most recent development build, notched 510.4 ms. The current stable build of Opera was more than 7.5 times slower, at 3284.4 ms.

Opera attributes this dramatic improvement to the new Carakan JavaScript engine, which they have designed from scratch to replace the Futhark engine in the stable build. Opera 10.5 also includes improvements to the Presto layout engine, and a new graphics library called Vega.

Other improvements noticeable in the pre-alpha include changing the URL address bar to include the same style of predictive smart search that Firefox and Chrome have, and the search and address bars now both remember searches, support deleting specific items, and have redesigned layouts.

The main browser interface has been redone, too. The tabs are now on top, the menu bar has been minimized behind a drop-down on the left nav, and the browser has better integration with Windows 7 and Snow Leopard. On Windows 7 there's Aero Peek and Jump List support to access Speed Dial and tabs from the Taskbar. For Macs, there's a unified toolbar, native buttons and scrollbars, multitouch gestures, and Growl support. Dialog boxes are now non-modal, which you means you can now switch tabs without a pop-up commanding your browser's focus, for example. This will affect verification and authentication pop-ups, and JavaScript alerts.

There are some known problems, including a lack of printer support in the Mac version and noticeably high memory usage. Users can expect these to get addressed before the stable build of Opera 10.50 is released. The Opera 10.50 official announcement and changes can be read here, while the current stable version of Opera 10.10 is for Windows, Mac, and Linux.

Monday, December 21, 2009

Note to Silicon Valley: How not to manage privacy

Editors' note: This is a guest column. See Larry Downes' bio below.

It's been a bad week for those, like me, who feel the debate over data privacy too often casts information businesses as evil Halloween monsters, determined to terrorize and humiliate their customers just for the fun of it.

On Monday, the Federal Trade Commission held the first of three conferences on privacy and technology, at which a parade of consumer advocates and legal scholars warned of an imminent data apocalypse.

Recent events seemed, alas, to support that view. Sprint, for example, reported that over the last 13 months, it has received more than 8 million requests for GPS data about customer location and movement from law enforcement agencies. (Sprint is now determining the number customers affected, estimated to be in the thousands.)

Verizon and Yahoo filed objections to a Freedom of Information Act request that asked how much the companies charge to comply with government surveillance orders, claiming that release of the information would "shock" and "confuse" customers.

Then, Google's notoriously private CEO, Eric Schmidt, brushed aside a CNBC's reporter's question about concerns that users are putting too much trust in his company, saying, "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."

Most disturbing at all is what happened over at Facebook, the social-networking behemoth that now hosts more than 350,000,000 members. Based in part on complaints by government agencies in Canada and Europe, the company announced in July that it had begun testing a more comprehensive and simplified set of privacy settings, promising to give users "even greater control over the information they share and the audiences with whom they share it."

After months of what looked like careful planning, Facebook implemented its new privacy policy and user tools this week.

The announcement landed flat on, well, flat on its face. A chorus of the usual suspects, including the Electronic Frontier Foundation and the American Civil Liberties Union of Northern California cried multiple fouls, objecting both to the nature of the changes and the way in which they were being imperiously foisted on users. "Under the banner of simplification," said Electronic Privacy Information's Center's Marc Rotenberg, "Facebook has pushed users to downgrade their privacy."

First, a word about the changes themselves. In a detailed exegesis published on Wednesday, EFF's Kevin Bankston divided the revisions into three categories: the good, the bad, and the ugly.

In the good column, Bankston noted that all Facebook users are being required to review their privacy settings and have been given new tools to simplify the process. For each individual post to their page, users can now limit who among their friends gets to see what. In the bad department, EFF doesn't like the recommended settings, which pretty much let everyone see everything.

The ugly, however, are genuinely ugly. The version of a user's Facebook page open to Facebook members and nonmembers alike will now show the user's name, profile picture, location, and gender, as well as a complete list of her friends. Most of that information can no longer be controlled other than by not providing it in the first place. (Facebook has already backtracked on the public availability of friends information.) And users can no longer opt out of letting Facebook and third-party applications, such as all those quizzes and tests my friends seem to spend most of the day filling out, access at least some information from their account and that of their friends.

Logic behind privacy policy changes
I understand why Facebook wants these changes. Given the sheer number of Facebook users, it's increasingly difficult to find friends when presented with a list of dozens of profiles with matching names and no other information.

As the company moves to find ways of making money from its network, moreover, open access to information about users is not just important--it's essential. Constraining the company's ability to publish and otherwise monetize that information limits the chances Facebook and other social-networking sites can continue to secure funding, compete in a wide-open market, and ultimately survive as a commercial enterprise.

That, at least, is the kind of reasonable explanation for the changes the company could have provided. Instead, it announced the new policy and implemented it at the same time, leaving no opportunity for user review or comment. According to EFF's Bankston, Facebook didn't disclose the creation of the new category of "publicly available information,"--that is, information about a user that cannot be controlled--until "the very day it is forcing the new changes on users." (Facebook did, in fact, allow a one-week comment period on a draft of the new policy, which is more than 5,000 words long, in early November.)

The company's reliance on good relations with its users makes the ham-fisted and tone-deaf nature of these changes both "shocking" and "confusing." After a minirevolt erupted earlier this year over changes to Facebook's terms of service, in which the company seemed to grant itself a more generous license for user data, a chastened CEO Mark Zuckerberg quickly reversed course.

More than that, Zuckerberg promised that future modifications would be developed in collaboration with users on an open-source model. "Our terms aren't just a document that protects our rights," Zuckerberg wrote on the company's blog, "it's the governing document for how the service is used by everyone across the world. Given its importance, we need to make sure the terms reflect the principles and values of the people using the service."

Exactly. So why didn't Facebook learn from its own painful lesson? While the company tested the new features with some users and solicited comments on the privacy policy over the last several months, Facebook reported in November that the number of comments it received on its draft proposal "did not reach the threshold to hold a vote." That's not a good thing.

Lessons not learned
Despite the high level of emotion, rightly or wrongly, that users attach to the topic of privacy, the new policy and tools simply arrived, providing some new protections even as existing controls were unceremoniously removed. Did the company think no one would notice? These and other recent privacy gaffes and missteps have unfortunate consequences.

Consumers, already uneasy about how increasingly intimate information is being handled online, will trust companies less, raising the potential for government regulations and new privacy agencies to fill a perceived void. That would be a dangerous result, and ultimately a counterproductive one.

Introducing new layers of regulatory bureaucracy will slow the pace of exciting innovations in information technology that have kept users engaged in the first place. And interjecting government oversight over any data raises the possibility of misuse of that information by other parts of the government, a problem made all too clear by continued revelations about secret surveillance under the wide umbrella of the Patriot Act and other antiterrorism measures.

The reality is that most information services do a good and responsible job of balancing user interests in controlling information access with value derived from transactional and other data that pay for much of what happens online.

Though often implicit, users today trade the use of information about their activities, purchases, and interests for innovative and often free services that analyze and aggregate that data. Such services help cell phone users locate their friends with Loopt, consumers simplify their search for products and services on Amazon and eBay, and connect with each other in the low transaction cost world of social-networking applications such as Facebook and Twitter.

The real problem: PR
The real problem here is not of policy but rather of public relations. Start-up companies increasingly invest early and often in legal counsel, in part to navigate the complex waters of intercompany relationships and in part to avoid potentially lethal litigation from patent trolls, unhappy competitors, and a global army of business regulators.

At the same time, marketing, as well as public and government relations, get little attention, as companies believe that enthusiastic users are now the best form of PR a young company can get and at a price that can't be beat.

Maybe so. But as information exchanges have moved from the purely pedestrian business-to-business networks of the 1980s to the everything-and-everybody sharing that characterizes our increasingly digital lives, companies who discount or dismiss the emotional and even irrational attachment consumers have to information about themselves do so at their peril.

It's not that Google, Facebook, and others need to change in any fundamental way how they do business. They must rather rethink the casual, careless, and often conceited way with which they communicate to users, business partners, regulators, and other stakeholders. When the lawyers lead, everyone loses.

For companies like Facebook today and everyone else tomorrow, users and the data they provide are not just the most valuable asset; they are the only asset. As consumers absorb that fact, they will increasingly use the tools of online communities--ironically, tools provided by social-networking sites themselves--to express their dissatisfaction with unequal exchanges of information for value. Better to collaborate with them now than to negotiate later, at the end of a gun.

Facebook, as Mark Zuckerberg correctly noted, is a kind of virtual nation, where terms of service and other policy documents serve as Constitution and governing law. As such, changes to both policy and practice require honest deliberation and engagement with the residents.

They can no longer be delivered as fait accompli. For one thing, it's pretty easy for virtual citizens to revolt against a government they don't like, or simply pack up and move somewhere less tyrannical. Easier than it is in the physical world, in any case. by news.cnet.com

Facebook group 1, Simon Cowell 0

It's an odd tradition. Well, it is Britain, where they have a talent for clutching traditions like Posh Spice clutches many things with a D&G logo.

The particular tradition that fascinates at this time of year consists of really caring about which song is the best seller at Christmas.

Once upon a time, some of the greatest music ever composed was Britain's Christmas No. 1. Yes, Slade's "Merry Christmas Everybody," Mud's "Lonely This Christmas," and the slightly less melodic "Another Brick In The Wall (Part 2)" by Pink Floyd.

In recent times, Simon Cowell, a man with more tentacles than T-shirts, has timed one of his reality talent shows to coincide with the Christmas period.

No sooner is the winner announced than he or she has a song that is then downloaded beyond distraction straight to the top of something that is still quaintly called the Singles Chart. (Recent examples include the stunning Leon Jackson and Alexandra Burke.)

This year, Londoners Jon and Tracy Morter decided that something must be done. So they created a Facebook group, Rage Against the Machine for Christmas No. 1.

Sentiment in the snowy English shires was clearly strong. Because around 1 million people declared their belief in the cause. And Sunday it was announced to huge acclaim that the Facebookers had got their way. The Rage Against the Machine song, so CNN tells us, "Killing in the Name," is the No. 1 Christmas single.

It is not easy to defeat the intentions of Cowell. He is the man who dominates "American Idol" rather beautifully and the man who brought Susan Boyle to the world's attention through yet another pulsating show called "Britain's Got Talent." He is also the man who created "The X-Factor," another talent show designed to create instant fodder for Christmas. (Oh, of course it's coming to the U.S., did you have to ask?)

The Morters claimed on the Facebook group's page that the campaign was not remotely personal. Some might think this not entirely true, as the Guardian tells us that when they launched the group they said: "Fed up of Simon Cowell's latest karaoke act being Christmas No. 1? Me too."

Cowell, for his part, told a press conference that the Facebook campaign was "stupid" and "cynical."

You might be wondering why the Morters chose Rage Against the Machine. Well, Jon Morter told NME.com: "It's been taken on by thousands in the group as a defiance to Simon Cowell's 'music machine'. Some certainly do see it as a direct response to him personally."

So one machine has defeated another in the place where they always tell us the Industrial Revolution began. It's a touching Christmas story, isn't it? by news.cnet.com

Microsoft sued over Bing name

There are those who believe that Microsoft came up with the name Bing for its refreshed search engine after staring at the word "Bingo" for several days and then removing the last letter.

However, a small entity in St. Louis has decided that the name Bing was, is and always should be, theirs.

According to Ars Technica, Bing Information Design! has designs on some compensation from Microsoft, as it has used the delightful term, followed by a slightly less delightful exclamation point, ala Yahoo, since 2000.

Even to the most bleary eyes, Bing Information Design's Web site does not immediately stir confusion with Bing the search engine. Bing Information Design is "dedicated to taking tough, hard-to-define concepts and boiling them down into simple, easy-to-understand ideas."

So perhaps there might be those who would prefer a few pictures that would engender easy-to-understand ideas that might explain one thing: how could anyone confuse a massively promoted search engine from Microsoft with a minimally known company whose two founders "have over 25 years of experience in design, illustration, branding, information architecture and publishing"?

Bing Information Design's lawsuit says that Microsoft's Bing "causes confusion with regard to the relationship between the plaintiff and the defendant, confuses the public with regard to the origin of the plaintiff's services and dilutes the value of the plaintiff's trademark."

The lawsuit also suggests that Microsoft knew of the St. Louis Bing and that therefore Bing deserves "actual and punitive damages, including having Microsoft pay for corrective advertising to remedy the confusion it caused."

I am sure that many an ad agency would leap at the opportunity to create a campaign that says "Bing. The Decision Engine Decisively Not from St. Louis. And Decisively Lacking an Exclamation Point."

A Microsoft spokesperson told Ars Technica: "We believe this suit to be without merit and we do not believe there is any confusion in the marketplace with regard to the complainant's offerings and Microsoft's Bing."

It will be interesting to see what proof of marketplace confusion Bing Information Design's lawyers might offer. Has there truly been consternation in Missouri? Have people walked into Bing Information Design's offices expecting to find Steve Ballmer chewing on some ideas?

It will be also interesting to hear whose fine decision it was to put that lovely exclamation point after the Bing in the St. Louis company's name.

One should always have sympathy with the small fish in the big sea. But is this a slightly gratuitous attempt by Bing Information Design to gain a little cha-ching? One awaits the full evidence with an exclamation point in one's heart. by news.cnet.com

Windows, Netbook. Android, smartbook? Hmm

As a German company defends the "Smartbook" trademark, its actions underscore what happens when companies gratuitously heap new category monikers on top of existing--and perfectly adequate--naming schemes.

Smartbook's Heaven Puro is, in fact, a Netbook.

Smartbook's Heaven Puro is, in fact, a Netbook.

(Credit: Smartbook)

Question: what do Netbooks and smartbooks have in common? Besides looking pretty much the same to consumers (small, lightweight clamshell laptops), both terms have been the object of legal wrangling by companies claiming trademark infringement.

First, the term Netbook came under attack from Psion Teklogix. That dispute with Intel was settled in June. Now Germany-based Smartbook is claiming that Qualcomm's use of the term smartbook infringes on the eponymous company's trademark. "Smartbook AG sets a high value on its protected trademarks, which are being used as company symbols and product marks for years," the company said in a statement sent to CNET.

The San Diego, Calif.-based cell phone chip giant had this to say in response: "Qualcomm is surprised by the claims being made by Smartbook AG...given that Qualcomm does not claim, and has never claimed, to own the term 'smartbook,' which it believes is a descriptive and generic term. The term is used by a number of companies, consumers, and industry commentators to describe a class of devices that combine attributes of smartphones and Netbooks that will be enabled by various technology companies, including Qualcomm."

Qualcomm has been promoting smartbooks for months on its Web site, and Freescale Semiconductor has been doing the same, though on a smaller scale. Both companies make, in effect, the silicon engines that power these devices.

And Qualcomm is now starting to crank up its promotion of the smartbook, as Lenovo prepares to roll out one of the first smartbooks at the Consumer Electronics Show in January.

So the question arises: why call them smartbooks at all? Qualcomm believes that the devices it is promoting are different enough--as described above--from Netbooks that the moniker is warranted. But the reality is that by the time smartbooks hit the market in force (if they indeed do), there will be little really to set them apart from Netbooks.

For proof, look no further than the local Verizon or AT&T store. Verizon now carries Windows-Intel-based Netbooks from Hewlett-Packard with 3G modems built in. The sales pitch: connect to the Internet anywhere at 3G speeds--similar to what Qualcomm is preaching for smartbooks. Yes, smartbooks will have a different operating system (Android/Linux), but to consumers, this won't mean that they are different. At a Verizon store, it's just another Netbook.

And the Smartbook case is a microcosm of this whole problem. The German company offers a line of laptops that, in the United States, are called Netbooks. The systems promoted on its Web site offer the usual fare of Intel Atom processors and Windows software--except that the company calls them Smartbooks.

Confused? Well, the confusion may go away on its own when everyone just keeps it simple, calling a spade a spade: a Netbook is a Netbook is a Netbook. by news.cnet.com

Report: O2 to buy VoIP start-up Jajah

O2, the mobile arm of Telefonica Europe, appears to be the winner of a bidding war for voice over IP start-up Jajah, according to a report on TheMarker that Reuters is citing.

O2 is expected to buy Jajah this week for $200 million, according to a report on the Hebrew language news site. Cisco Systems and Microsoft were rumored to have been competing for the VoIP start-up.

Jajah representatives did not immediately respond to requests for comment.

Jajah, which provides low-cost international calling to more than 25 million users, already has the ability to terminate calls or transfer calls from the Internet to the local telephone network in more than 122 countries around the world.

In September, the company launched a beta for a third-party offering that allows Twitter users to make voice calls directly to each other through the microblogging service. The company announced in June that it had connected its 1 billionth call.

The Internet phone company has raised more than $30 million in funding, including a $20 million round of investment lead by T-Online Venture Fund, the investment arm of Deutsche Telekom. Other investors include Intel Capital, Sequoia Capital, and Globespan Capital Partners.

by news.cnet.com

Intel launches redesigned Atom chip for Netbooks

Intel is launching the biggest makeover of the Atom processor since the seminal chip debuted in the spring of 2008, and consumers can expect a crush of new Netbooks to follow.

Dozens of Netbooks are now offered at this Fry's Electronics store in Southern California.

Dozens of Netbooks are now offered at this Fry's Electronics store in southern California

(Credit: Brooke Crothers)

As previously reported, Intel's latest N450 processor and NM10 Express chipset--technology that had been previously referred to as "Pine Trail"--will be used in a new raft of Netbooks that will debut at the Consumer Electronics Show in January. Hewlett-Packard, Acer, Dell, Asus, Toshiba, Lenovo and others are expected to either announce new systems before the show or exhibit new models there.

Intel said there will be more than 80 new Netbook designs on the way, with systems coming available by January 4.

The Pine Trail design squeezes the graphics function, previously on a separate chip, onto the central processing unit, or CPU, a first for Intel. The result--by decreasing the number of chips from three to two--is a reduction in the overall chip package size by 60 percent.

"This is the first monolithic processor with the graphics built in and the memory controller built in," said Anil Nanduri, director, Netbook Marketing at Intel, in an interview. The size of the accompanying NM10 "I/O" chipset has also been reduced, Nanduri said.

To the consumer this means better battery life and thinner designs. "We'll see sleeker designs coming into the market and longer battery life," said Nanduri, adding that average power consumption has dropped 20 percent over the previous generation of Atom technology.

"We got more than eight hours of battery life out of this system," said CNET Review's Dan Ackerman, after testing the new Asus Eee PC 1005PE Netbook, which is equipped with the updated Atom silicon.

Intel has integrated the graphics function onto the CPU, resulting in lower overall power consumption

Intel has integrated the graphics function onto the CPU, resulting in lower overall power consumption

(Credit: Intel)

Atom-based systems will be sold primarily with Windows 7 Starter or Home Basic. "These are the ones that hit the right price points," Nanduri said. "The kind of applications you load up as you go into Home Premium--with a much more richer experience--more performance is needed for that," Nanduri said, referring to higher-price Windows Home Premium.

Windows XP Home and Intel's Moblin Linux operating systems will also be supported. Moblin offers some benefits over Windows. "You will get a very snappy experience on Moblin and faster boot times because it's very purpose-built for this category," Nanduri said.

Intel expects robust growth ahead for Netbooks. Nanduri cited numbers from ABI Research that show Netbook annual shipments reaching 100 million units sometime in the next three years. Since introduction, Intel has shipped more than 40 million Atom chips for Netbooks to major PC makers.

Intel is also launching a new Atom processor with two processing cores, the D510, which it is targeted at entry-level desktops and replaces an existing dual-core Atom. Also, a new single-core D410 design is being introduced.

New Atom processors:

  • N450: 1.66GHz, 512KB cache, DDR2-667, TDP: 5.5W
  • D510: 1.66GHz, 1MB cache, DDR2-800/667, TDP: 13W (2 cores)
  • D410: 1.66GHz, 512KB cache, DDR2-800/667, TDP: 10W
(Note: the DDR2 number suffix refers to memory speed; TDP = Thermal Design Power; W = watt.)

Though radically redesigned, the gigahertz ratings and cache memory specifications of the new Atom chips have not changed from the previous generation. The N450 runs at the same 1.66GHz speed as the current N280 Atom and cache memory sizes are the same.

Nvidia claims consumers will need its Ion chipset coupled with the new Atom processor to get a mainstream laptop-like experience.

"We offer a 'premium' Windows experience, whereas with Pine Trail (the new Atom) you will only be able to get a 'Starter' (experience)," said David Ragones, product line manager at Nvidia, referring to the Windows Home Premium and Windows Starter editions, respectively. Ragones said that with the chipset, video sites like Hulu will run better, and Ion also allows more game playing.

Pricing and availability for the new Atom will be announced in January as systems become available from Netbook suppliers.

Updated at 11:30 p.m. PST throughout. by news.cnet.com

Phần mềm cung cấp cho người dùng đầy đủ các tính năng về bảo mật như diệt virus

Phần mềm cung cấp cho người dùng đầy đủ các tính năng về bảo mật như diệt virus

PC Tools Internet Security là gói phần mềm cung cấp cho người dùng đầy đủ các tính năng về bảo mật như diệt virus, spyware, malware, chống thư rác, tường lửa… Phiên bản dùng thử của chương trình mặc dù không giới hạn thời gian, nhưng lại hạn chế không cho phép người dùng xóa đi các virus và phần mềm độc hại tìm ra trong quá trình quét.


Một vài tính năng nổi bật:

- PC Tools Internet Security được tích hợp công cụ Spyware Doctor, một trong những công cụ nổi tiếng nhất thế giới về diệt Spyware. Ngoài ra còn có cả tính năng diệt virus với cơ sở dữ liệu được cập nhật thường xuyên, để đảm bảo diệt được những loại virus mới nhất.

- Gói phần mềm này còn bao gồm cả tính năng Firewall, quản lý các kết nối trên hệ thống để đảm bảo thông tin không bị gửi ra ngoài trái phép.

- Ngoài ra, PC Tools Internet Security còn có chức năng lọc thư rác, quản lý các tiến trình, quản lý trình duyệt và còn rất nhiều các tính năng bảo mật mạnh mẽ khác.

Địa chỉ down phần mềm tại đây

Theo download

Tận Hưởng Không Khí Noel Với Chương Trình Khuyến Mại Loa Altec Lansing






Loa Altec Lansing FX3021AA - Loa 2.1. (New) - Công suất 28 Watts

Giá : 2.554.000VNĐ ~ (129$)............Giảm Giá Còn 2.248.000vnd (115$)

Bảo hành: 1 năm.Điện áp 220V
Xem chi tiết
Vừa có hàng
Review Loa Altec Lansing FX3021

+ Thiết kế độc đáo - Kiểu dáng hiện đại - Thật sự là nhìn rất đẹp và ấn tượng

+ 2 Loa toàn dải 2"(50mm) công suất 4 watts mỗi loa

+ 1 Loa Subwoofer tạo âm trầm 5.25"(135mm) thiết kế down-firing (hướng xuống đất) công suất 20watts

+ Tổng công suất 28Watts


Loa Altec Lansing VS2621 - Loa 2.1 màu Đen.(New) -Công suất 28 Watts
Giá : 1.465.000VND ~ (74$ )------------->GIẢM GIÁ CÒN 1.329.000vnd(68$)
Bảo hành: 1 năm.Điện áp 220V
Xem chi tiết
Vừa có hàng

+ Hệ thống 3 Loa:
- Gồm 2 Loa vệ tinh , mỗi loa vệ tinh gồm 1 loa toàn dải 2"(50mm),công suất 7,5Watts mỗi loa.
- 1 Loa Subwoofer , gồm 1 loa bass kích thước 4" , công suất 13Watts.
+ Có lỗ cắm AUX



Loa Altec Lansing VS4121 - 2.1 - Màu đen cực đẹp và sang trọng

Giá : 1.742.000VNĐ (88$)-------------> GIẢN GIÁ CÒN 1.583.000vnd ( 81$ )
Bảo hành: 1 năm.Điện áp 220V
Xem chi tiết Đang có hàng

Altec Lansing VS4121 kết hợp giữa khả năng xử lý âm thanh tinh tế của hai loa vệ tinh nhỏ nhắn cùng subwoofer lớn cho tiếng bass mạnh mẽ.
Trước đây, phần lớn loa của Altec Lansing thường được đánh giá cao về khả năng xử lý âm thanh tinh tế, tuy nhiên độ lớn và tiếng bass chưa mạnh.
VS4121 vừa có mặt trên thị trường đã xử lý những nhược điểm đó khi mang đến bộ loa trầm lớn, tiếng bass khoẻ bên cạnh khả năng xử lý âm thanh tinh tế của loa vệ tinh.
Thiết kế của Altec Lansing độc đáo bởi subwoofer lớn, loa vệ tinh nhỏ nhẹ và hệ thống điều khiển khôn ngoan.
Giống như các hệ thống âm thanh khác của hãng, toàn bộ lớp vỏ ngoài của VS4121 bằng gỗ cứng màu đen khá lịch lãm. Màng bảo vệ loa được làm từ kim loại cho phép bảo vệ chắc chắn.
Gây ấn tượng đặc biệt ban đầu với người dùng chính là sự đối lập giữa loa lớn và hai loa nhỏ. Subwoofer cao, trong khi chiều rộng và chiều dài chỉ hơn nhau 5 cm, kích thước cụ thể của loa lớn là 20,3 x 25 x 34,5 cm. Mặt trước là màng loa, mặt sau là các cổng kết nối. Loa lớn không có nút vặn âm thanh như một số bộ sản phẩm khác, thiết kế này tạo điều kiện cho người dùng có thể “giấu” dưới gầm bàn mà không phải cúi xuống điều chỉnh.
Hai loa vệ tinh có thiết kế giống nhau với dáng nhỏ, cao 23,4 cm, đế rộng. Tuy nhiên, khi sử dụng người dùng sẽ nhận ra đế của thiết bị này cũng chính là loa với hướng đập thẳng xuống.
Loa vệ tinh phải còn tích hợp luôn cả hệ thống điều khiển với 4 nút tuỳ chỉnh cơ bản. Từ trên xuống là nút vặn tăng giảm âm thanh, điều khiển tiếng treble, bass và công tắc. Loa cũng hỗ trợ cổng ra tai nghe chuẩn 3,5 mm nằm cạnh phải loa nhỏ.
Altec Lansing VS4121 điều hoà giữa âm thanh tinh tế vốn có và khả năng xử lý âm thanh trầm của loa lớn.
Một số dòng loa trước đây của Altec Lansing như VS2421, BXR1121 hay FX6021 đều mạnh về khả năng tách bạch rõ lời và từng nốt nhạc. Đây là thế mạnh riêng của các sản phẩm loa của nhà sản xuất Mỹ. Tuy nhiên, âm lượng nhỏ chính là yếu điểm của các thiết bị phát nhạc Altec Lansing.
VS4121 tiếp tục đi theo xu hướng xử lý âm thanh tinh tế, tuy nhiên để cải thiện âm thanh bé và thiếu tiếng bass, hãng thiết kế subwoofer lớn và cao. So sánh với các dòng loa đi trước, VS4121 có âm thanh lớn và rộng hơn, ngoài ra tiếng bass trở nên mạnh mẽ.
Trong quá trình thử nghiệm loa, kết nối với máy tính hay TV cho thấy, VS4121 đặc biệt xuất sắc khi xem các bộ phim hành động. Nếu như âm thanh trầm tạo các hiệu ứng vang khi mô tả bước chân của nhân vật hoặc tiếng xì xào thì âm cao tinh tế khắc hoạ đầy đủ các cảnh đánh nhau hoặc rượt đuổi trên phim.
Trong khi đó, khi nghe nhạc VS2421 vẫn thể hiện tốt các bản guitar hoặc tiếng trống đan xen.
Loa trầm đặt dưới gầm bàn, loa vệ tinh với hai hướng phát cho âm thanh lan tỏa. Hệ thống điều khiển nằm đơn giản bên loa vệ tinh phải, người dùng dễ dàng tuỳ chỉnh để có âm thanh tốt nhất.

Chống nhiễu từ: có
Mức thanh áp: 97dB SPL
Công suất RMS: 31W
Giải tần số đáp ứng: 25 Hz – 15 KHz (-10dB)
Tỷ lệ tạp âm: > 73dB @ 1KHz input
Cấu hình loa: 2 loa trước: loa trầm trung, kích thước 3” và hai loa tần số cao 1” Loa siêu trầm: loa bass 6.5”
Ngõ vào tín hiệu:2 kênh stereo

Điện thoại mới của Nokia xuất hiện tháng 11 2009

Trước tiên là Nokia 3720 Classic là mẫu điện thoại "nồi đồng cối đá" có khả năng chống bụi bẩn, chống nước và chống sốc.
Thân máy của Nokia 3720 Classic được làm từ vật liệu thép không gỉ, phần vỏ được bịt kín để bảo vệ các bộ phận bên trong, đồng thời được tráng một lớp màng vân rất chắc chắn. Nắp máy phía sau được gắn bằng những chiếc đinh ốc kim loại, giúp chống lại sự xâm nhập của bụi bẩn và nước.

Nokia 3720 Classic được trang bị màn hình TFT rộng 2,2 inch, độ phân giải QVGA, có khả năng hiển thị 16 triệu màu. Ở mặt sau, máy sở hữu một camera có độ phân giải 2 megapixel cùng đèn flash LED, có thể dùng như một chiếc đèn pin khi đi trong bóng tối. 3720 Classic hỗ trợ kết nối Bluetooth 2.1, có khả năng bắt sóng radio FM, nghe nhạc qua giắc cắm tai nghe 2,5 mm và được trang bị cổng giao tiếp microUSB cũng như khe cắm thẻ nhớ microSD.
Đáng tiếc là chiếc máy này không hỗ trợ mạng 3G, vì vậy GPRS/EDGE chính là phương thức trao đổi dữ liệu duy nhất.
Nokia 3720 Classic dự kiến sẽ được bán ra thị trường trong mùa hè năm nay với giá bán trước thuế khoảng 125 Euro. Máy có hai màu vỏ là xám và vàng.

Nokia 5230 Về cơ bản, đây là chú dế dạng thanh trông thật thời trang với nhiều màu sắc trẻ trung thích mắt.

Di động cài cắm màn hình cảm ứng rộng 3.2 inch độ phân giải 640x360 pixel, hỗ trợ bàn phím QWERTY ảo đầy đủ và công nghệ nhận dạng chữ viết tay khá ư “hại điện” sẽ giúp teen mình cải thiện tốc độ nhập liệu đáng kể. Ngoài ra, màn hình Nokia 5230 còn được thiết kế để có thể vào nhanh các ứng dụng giải trí như chơi nhạc, xem ảnh, YouTube... Điện thoại cũng hướng đến các tính năng mạng xã hội như Facebook, MySpare và Twitter nhờ kết nối tốc độ cao HSDPA tích hợp.




Tự hào chuyên môn chơi nhạc khá ổn, Nokia 5230 cho phép người dùng truy cập trực tiếp tới cửa hàng Nokia Music Store để cài thêm ứng dụng, tải game, video, music... Hơn nữa, nguồn pin dung lượng 1320 mAh sẵn sàng đưa ấy vào trong không gian hát hò tối đa 33 giờ mệt nghỉ.
Một số chi tiết nổi bật khác mà Nokia 5230 sở hữu như camera độ phân giải chỉ 2 Megapixel, giắc cắm tai nghe chuẩn 3.5mm, khe cắm thẻ mở rộng microSD tối đa 16GB, Bluetooth 2.0, hệ điều hành Symbian S60 thế hệ thứ 5, trang bị a-GPS cùng phần mềm bản đồ Ovi Maps.
Nokia 5230 xếp lịch xuất hiện trên thị trường vào quý IV năm nay với giá 215 USD (khoảng 3,9 triệu đồng) chưa bao gồm thuế và trợ giá.

Là bản rút gọn nên N97 mini chỉ có bộ nhớ 8 GB song vẫn hỗ trợ đầy đủ tính năng như "đàn anh". Sản phẩm vừa được tung ra thị trường trong nước với giá 11,6 triệu đồng còn E72 là 8,5 triệu VND.
Nokia N97 mini được trang bị ống kính Carl Zeiss 5 megapixel với thấu kính và đèn flash kép cho chất lượng ảnh tốt. Chức năng nghe nhạc cũng tương đương với máy MP3 chuyên nghiệp.


Nokia N97 mini đã xuất hiện trên thị trường Việt Nam.
Bản mini của N97 có kích thước 113 x 52,5 x 14,2 mm và nặng 138 gram (N97 là 117,2 x 55,3 x 15,9 mm và 150 gram). Màn hình cảm ứng cũng được thu gọn còn 2,9 inch 640 x 360 pixel với khả năng tự động điều chỉnh độ sáng.
Các widget của Nokia N97 mini giúp người dùng dễ dàng cập nhật thông tin, kết nối mạng xã hội Facebook, Hi5, gửi và nhận e-mail, sắp xếp lịch làm việc...
Trước 3 sản phẩm này, Nokia E72 cũng vừa được giới thiệu. E72 đã thực sự tạo ra cơn sốt trên thị trường khi cung không đủ cầu.