Labyrinths of the World: Lost Island Collectors Edition


, , , , , , , ,

When dangerous cataclysmic events across the world coincide with your brother’s disappearance, you’re sent on the Seekers mission of a lifetime! Your investigation quickly turns dire when you find a dangerous criminal trying to destroy the worlds and your brother helping the enemy! Can you save your brother and the worlds in time? Find out in this exhilarating Hidden-Object Puzzle adventure!

Collectors Edition Features:

  • A nefarious trickster has busted out of a magical prison. Use your wits and intuition to track him down in the bonus game!
  • Replay your favorite HOPs and mini-games, and earn achievements!
  • Tons of articles, collectible cards, and tokens to find.
  • Enjoy the exclusive animal zoo, soundtrack, videos, and more!
  • Never get lost with the strategy guide!

Game System Requirements:
• OS: Windows XP, Vista, 7, 8, 10
• CPU: 2.0 GHz
• RAM: 1024 MB
• DirectX: 9.0
• Hard Drive: 1,44 Gb

 Watch a video here :

Labyrinths of the World: Lost Island Collectors Edition – девятая часть увлекательной серии “Labyrinths of the World” от Domini Games и Большой рыбы.
После исчезновения вашего брата в разных уголках света начали происходить катаклизмы. Вы начинаете расследование и вскоре понимаете, что опасный преступник хочет уничтожить жизнь на земле. И ваш брат с ним заодно. Сможете ли вы не дать брату совершить ужасную ошибку – и спасти свой мир?
Особенности Коллекционного издания:

  • Злодей вырвался из магической тюрьмы. Используйте свое остроумие и интуицию, чтобы отследить его в бонусной главе!;
  • Переиграйте свои любимые мини – игры и сцены поиска;
  • Тонны коллекционируемых карт и символов;
  • Насладитесь экслюзивным зоопарком, саундтреком, видео, и другим экстра контентом!;
  • Воспользуйтесь встроенным прохождением в трудную минуту.

Developer: Domini Games;
Language: English;
Size: 1,3 Gb

Download links :



File upload

Post on Jan/12/2019 by Santana Team Blogger USA 🇺🇸 for everyone 🌎

Enjoy the game ! ! 😉

Hello back to everyone how are you?










1. General. 

(a) The software (including Boot ROM code, embedded software and third party software), documentation, interfaces, content, system voices, fonts and any data accompanying this License (“iOS Beta Software”), as may be updated or replaced by software updates or system restore software provided by Apple (“iOS Beta Updates”), whether in read only memory, as a software download, on any other media or in any other form (the iOS Beta Software and iOS Beta Updates are collectively referred to as the “iOS Software”) are licensed, not sold, to you by Apple Inc. (“Apple”) for use only under the terms of this License. Apple and its licensors retain ownership of the iOS Software itself and reserve all rights not expressly granted to you. You agree that the terms of this License will apply to any Apple-branded app that may be built-in on your iOS Device, unless such app is accompanied by a separate license, in which case you agree that the terms of that license will govern your use of that app.

(b) Apple, at its discretion, may make available future iOS Beta Updates. The iOS Beta Updates, if any, may not necessarily include all existing software features or new features that Apple releases for newer or other models of iOS Devices.  The terms of this License will govern any iOS Beta Updates provided by Apple, unless such iOS Beta Update is accompanied by a separate license in which case the terms of that license will govern.

(c) If you use the express setup feature to set up a new iOS Device based on your existing iOS Device, you agree that the terms of this License will govern your use of the iOS Software on your new iOS Device, unless it is accompanied by a separate license, in which case you agree that the terms of that license will govern your use of that iOS Software. Your iOS Device will periodically check with Apple for iOS Software Updates. If an update is available, the update may automatically download and install onto your iOS Device and, if applicable, your peripheral devices. By using the Apple Software, you agree that Apple may download and install automatic iOS Software Updates onto your iOS Device and your peripheral devices. You can turn off automatic updates altogether at any time by changing the Automatic Updates settings found within Settings > General > Software Update.

2. Permitted License Uses and Restrictions. 

(a) Subject to the terms and conditions of this License, you are granted a limited non-exclusive license during the term of this License to use the iOS Software on a single Apple-branded iOS Device that you own or control for evaluation and development purposes only. Except as permitted in Section 2(b) below, and unless as provided in a separate agreement between you and Apple, this License does not allow the iOS Software to exist on more than one Apple-branded iOS Device at a time, and you may not distribute or make the iOS Software available over a network where it could be used by multiple devices at the same time. The iOS Software is not licensed for use in a commercial operating environment where it may be relied upon to perform in the same manner as a final-release commercial-grade product and should not be used with data that is not sufficiently and regularly backed up. This License does not grant you any rights to use Apple proprietary interfaces and other intellectual property in the design, development, manufacture, licensing or distribution of third party devices and accessories, or third party software applications, for use with iOS Devices. Some of those rights are available under separate licenses from Apple. For more information on developing third party devices and accessories for iOS Devices, please visit For more information on developing software applications for iOS Devices, please visit

(b) Subject to the terms and conditions of this License, you are granted a limited non-exclusive license to download iOS Beta Updates that may be made available by Apple for your model of the iOS Device to update or restore the software on any such iOS Device that you own or control. This License does not allow you to update or restore any iOS Device that you do not control or own, and you may not distribute or make the iOS Beta Updates available over a network where they could be used by multiple devices or multiple computers at the same time. If you download an iOS Beta Update to your computer, you may make one copy of the iOS Beta Updates stored on your computer in machine-readable form for backup purposes only, provided that the backup copy must include all copyright or other proprietary notices contained on the original. 

(c) To the extent that Apple has preinstalled Apple-branded apps from the App Store on your iOS Device at the time of purchase (“Preinstalled Apps”), you will need to log into the App Store and associate these Preinstalled Apps with your App Store account in order to use them on your iOS Device. When you associate a Preinstalled App with your App Store account, you will at the same time be automatically associating all other Preinstalled Apps on your iOS Device. By choosing to associate the Preinstalled Apps with your App Store account, you agree that Apple may transmit, collect, maintain, process and use both the Apple ID used by your App Store account and a unique hardware identifier collected from your iOS Device, as unique account identifiers for the purpose of verifying the eligibility of your request and providing you access to the Preinstalled Apps through the App Store. If you do not wish to use a Preinstalled App, you can delete it from your iOS Device at any time.

(d) You may not, and you agree not to or enable others to, copy (except as expressly permitted by this License), decompile, reverse engineer, disassemble, attempt to derive the source code of, decrypt, modify, or create derivative works of the iOS Software or any services provided by the iOS Software or any part thereof (except as and only to the extent any foregoing restriction is prohibited by applicable law or by licensing terms governing use of open-source components that may be included with the iOS Software), or incorporate into or compile in combination with your own programs, rent, lease, lend, trade, sublicense, sell, transfer or otherwise redistribute the iOS Software or services.

(e) The iOS Software may be used to reproduce materials so long as such use is limited to reproduction of non-copyrighted materials, materials in which you own the copyright, or materials you are authorized or legally permitted to reproduce. Title and intellectual property rights in and to any content displayed by, stored on or accessed through your iOS Device belong to the respective content owner. Such content may be protected by copyright or other intellectual property laws and treaties, and may be subject to terms of use of the third party providing such content. Except as otherwise provided herein, this License does not grant you any rights to use such content nor does it guarantee that such content will continue to be available to you. 

(f) Subject to the terms and conditions of this License, you may use the Animoji and Memoji characters included in or created with the iOS Software (“System Characters”) (i) while running the iOS Software and (ii) to create your own original content and projects for your personal, non-commercial use. No other use of the System Characters is permitted by this License, including but not limited to the use, reproduction, display, performance, recording, publishing or redistribution of any of the System Characters in a profit, non-profit, public sharing or commercial context.

(g) You agree to use the iOS Software and the Services (as defined in Section 5 below) in compliance with all applicable laws, including local laws of the country or region in which you reside or in which you download or use the iOS Software and Services. Features of the iOS Software and the Services may not be available in all languages or regions, some features may vary by region, and some may be restricted or unavailable from your service provider. A Wi-Fi or cellular data connection is required for some features of the iOS Software and Services.

(h) Use of the App Store requires a unique user name and password combination, known as an Apple ID. An Apple ID is also required to access app updates and certain features of the iOS Software and Services. 

(i) You acknowledge that many features, built-in apps, and Services of the iOS Software transmit data and could impact charges to your data plan, and that you are responsible for any such charges. You can view and control which applications are permitted to use cellular data and view an estimate of how much data such applications have consumed under Cellular Data Settings. In addition, Wi-Fi Assist will automatically switch to cellular when you have a poor Wi-Fi connection, which might result in more cellular data use and impact charges to your data plan. Wi-Fi Assist is on by default, but can be disabled under Settings. For more information, please consult the User Guide for your iOS Device.

(j) If you choose to allow automatic app updates, your iOS Device will periodically check with Apple for updates to the apps on your device and, if one is available, the update will automatically download and install onto your device. You can turn off the automatic app updates altogether at any time by going to Settings, tap iTunes & App Store, and under Automatic Downloads, turn off Updates.

3. Confidentiality. You agree that the pre-release iOS Software and services licensed hereunder and all information disclosed by Apple to you that relates to Apple’s products, designs, business plans, business opportunities, finances, research, development, know-how, personnel, or third-party confidential information disclosed to you by Apple, will be considered and referred to collectively as “Confidential Information”. Confidential Information, however, does not include: (a) information that is now or subsequently becomes generally available to the public through no fault or breach on your part in a manner that is lawful or authorized by Apple; (b) information that you can demonstrate to have had rightfully in your possession prior to disclosure to you by Apple; (c) information that is independently developed by you without the use of any Confidential Information; (d) information that you rightfully obtain from a third party who has been given the right to transfer or disclose it by Apple; or (e) any third party software and/or documentation provided by Apple and accompanied by licensing terms that do not impose confidentiality obligations on the use or disclosure of such software and/or documentation, for example, software governed by the GNU General Public License (“GPL”). You agree not to disclose, publish, or disseminate Confidential Information to anyone other than those of your employees and contractors with a demonstrable need to know who have binding, written, confidentiality obligations to you that protect such Confidential Information against unauthorized disclosure. You further agree to take reasonable precautions to prevent any unauthorized use, disclosure, publication, or dissemination of Confidential Information. You agree not to use Confidential Information otherwise for your own or any third party’s benefit without the prior written approval of an authorized representative of Apple in each instance.

4. Term of License. The term of this License shall commence upon your installation or use of the iOS Software and will terminate automatically without notice from Apple upon the commercial release of the iOS Software. Your rights under this License will also terminate automatically without notice from Apple if you fail to comply with any term(s) of this License. Upon the termination of this License, you shall cease all use of the iOS Software and destroy all copies, full or partial, of the iOS Software. Sections 2(d), 3, and 5 through 14 of this License shall survive any such termination.

5. No Support and Maintenance. Apple is not obligated to provide any maintenance, technical or other support for the iOS Software or services provided hereunder, or any updates to you for the iOS Software. You acknowledge that Apple has no express or implied obligation to announce or make available a commercial version of the iOS Software or services to anyone in the future. Should a commercial version be made available, it may have features or functionality that are different from those found in the iOS Software licensed or the services provided hereunder. 

6. Consent to Use of Data. 

(a) Diagnostic and Usage Data. Unless you opt out of diagnostic and usage collection, you agree that Apple and its subsidiaries and agents will collect, maintain, process and use diagnostic, technical, usage and related information (“Diagnostic and Usage Data”), including but not limited to unique system or hardware identifiers, information about your iOS Device, computer, system and application software, and peripherals, that is gathered periodically and automatically as part of the pre-release seeding process to test, provide and improve Apple’s products and services, facilitate the provision of software updates, product support and other services to you (if any) related to the iOS Software, and to verify compliance with the terms of this License. Apple may use this information, as long as it is collected in a form that does not personally identify you, for the purposes described above. If you have Location Services turned on, the location of your device may also be sent to help Apple analyze wireless or cellular performance issues (e.g. the strength or weakness of a cellular signal in a particular location). To enable Apple’s partners, third party developers and content providers to test, improve their software, hardware, courses, materials, and services designed for use with Apple products, Apple may also provide any such party with a subset of Diagnostic and Usage Data that is relevant to that party’s software, hardware, courses, materials and/or services, as long as the Diagnostic and Usage Data is in a form that does not personally identify you. 

(b) When you use your device, your phone number and certain unique identifiers for your iOS Device are sent to Apple in order to allow others to reach you by your phone number when using various communication features of the iOS Software, such as iMessage and FaceTime.  When you use iMessage, Apple may hold your messages in encrypted form for a limited period of time in order to ensure their delivery. You may turn off FaceTime or iMessage by going to the FaceTime or Messages settings on your iOS Device. Certain features like Analytics, Location Services, Siri, and Dictation may require information from your iOS Device to provide their respective functions. When you turn on or use these features, details will be provided regarding what information is sent to Apple and how the information may be used.  You can learn more by visiting At all times your information will be treated in accordance with Apple’s Privacy Policy, which can be viewed at:

7. Services and Third Party Materials. 

(a) The iOS Software may enable access to Apple’s iTunes Store, App Store, Apple Books, Game Center, iCloud, Maps and other Apple and third party services and web sites (collectively and individually, “Services”). Such Services may not be available in all languages or in all countries. Use of these Services requires Internet access and use of certain Services may require an Apple ID, may require you to accept additional terms and may be subject to additional fees. By using this software in connection with an Apple ID, or other Apple Service, you agree to the applicable terms of service for that Service, such as the latest Apple Media Services Terms and Conditions for the country in which you access such Services, which you may access and review at  

(b) If you sign up for iCloud, certain iCloud features like “iCloud Photos”, “My Photo Stream”, “Shared Albums”, “Back Up” and “Find My iPhone” may be accessed directly from the iOS Software.  You acknowledge and agree that your use of iCloud and these features is subject to the latest terms and conditions of the iCloud service, which you may access and review at:

(c) Maps. The maps service and features of the iOS Software (“Maps”), including map data coverage, may vary by region. When you use any location-based features within Maps, such as turn-by-turn navigation, traffic and local search, various location-related and usage information may be sent to Apple, including the real-time geographic location of your iOS Device, in order to process your request and help improve Maps. Such location and usage data is collected by Apple in a form that does not personally identify you. By using Maps, you agree and consent to Apple’s and its subsidiaries’ and agents’ transmission, collection, maintenance, processing, and use of this information, to provide and improve the Maps features and service, and other Apple products and services.  Apple may also provide such information, in either an aggregated or non personally identifiable form, to its partners and licensees to help improve their map and location-based products and services. You may disable the location-based functionality of Maps by going to the Location Services setting on your iOS Device and turning off the individual location setting for Maps. Certain Maps features will however be unavailable if you disable the Location Services setting, such as turn-by-turn navigation.

(d) You understand that by using any of the Services, you may encounter content that may be deemed offensive, indecent, or objectionable, which content may or may not be identified as having explicit language, and that the results of any search or entering of a particular URL may automatically and unintentionally generate links or references to objectionable material. Nevertheless, you agree to use the Services at your sole risk and that Apple, its affiliates, agents, principals, or licensors shall have no liability to you for content that may be found to be offensive, indecent, or objectionable. 

(e) Certain Services may display, include or make available content, data, information, applications or materials from third parties (“Third Party Materials”) or provide links to certain third party web sites. By using the Services, you acknowledge and agree that Apple is not responsible for examining or evaluating the content, accuracy, completeness, timeliness, validity, copyright compliance, legality, decency, quality or any other aspect of such Third Party Materials or web sites. Apple, its officers, affiliates and subsidiaries do not warrant or endorse and do not assume and will not have any liability or responsibility to you or any other person for any third-party Services, Third Party Materials or web sites, or for any other materials, products, or services of third parties. Third Party Materials and links to other web sites are provided solely as a convenience to you. 

(f) Neither Apple nor any of its content providers guarantees the availability, accuracy, completeness, reliability, or timeliness of stock information, location data or any other data displayed by any Services. Financial information displayed by any Services is for general informational purposes only and should not be relied upon as investment advice. Before executing any securities transaction based upon information obtained through the Services, you should consult with a financial or securities professional who is legally qualified to give financial or securities advice in your country or region. Location data provided by any Services, including the Apple Maps service, is provided for basic navigational and planning purposes only and is not intended to be relied upon in situations where precise location information is needed or where erroneous, inaccurate, time-delayed or incomplete location data may lead to death, personal injury, property or environmental damage. You agree that, the results you receive from the Maps service may vary from actual road or terrain conditions due to factors that can affect the accuracy of the Maps data, such as, but not limited to, weather, road and traffic conditions, and geopolitical events. For your safety when using the navigation feature, always pay attention to posted road signs and current road conditions. Follow safe driving practices and traffic regulations, and note that walking directions may not include sidewalks or pedestrian paths.

(g) To the extent that you upload any content through the use of the Services, you represent that you own all rights in, or have authorization or are otherwise legally permitted to upload, such content and that such content does not violate any terms of service applicable to the Services. You agree that the Services contain proprietary content, information and material that is owned by Apple, the site owner or their licensors, and is protected by applicable intellectual property and other laws, including but not limited to copyright. You agree that you will not use such proprietary content, information or materials other than for permitted use of the Services or in any manner that is inconsistent with the terms of this License or that infringes any intellectual property rights of a third party or Apple. No portion of the Services may be reproduced in any form or by any means. You agree not to modify, rent, lease, loan, sell, distribute, or create derivative works based on the Services, in any manner, and you shall not exploit the Services in any unauthorized way whatsoever, including but not limited to, using the Services to transmit any computer viruses, worms, trojan horses or other malware, or by trespass or burdening network capacity. You further agree not to use the Services in any manner to harass, abuse, stalk, threaten, defame or otherwise infringe or violate the rights of any other party, and that Apple is not in any way responsible for any such use by you, nor for any harassing, threatening, defamatory, offensive, infringing or illegal messages or transmissions that you may receive as a result of using any of the Services.

(h) In addition, Services and Third Party Materials that may be accessed, linked to or displayed on the iOS Device are not available in all languages or in all countries or regions. Apple makes no representation that such Services and Third Party Materials are appropriate or available for use in any particular location. To the extent you choose to use or access such Services and Third Party Materials, you do so at your own initiative and are responsible for compliance with any applicable laws, including but not limited to applicable local laws and privacy and data collection laws. Sharing or syncing photos through your iOS Device may cause metadata, including where and when the photo was taken, and depth information, to be transmitted with the photos. Use of Apple services (such as iCloud Photo Library) to share or sync such photos will involve Apple receiving and storing such metadata. Apple and its licensors reserve the right to change, suspend, remove, or disable access to any Services at any time without notice. In no event will Apple be liable for the removal of or disabling of access to any such Services. Apple may also impose limits on the use of or access to certain Services, in any case and without notice or liability. 

8. Disclaimer of Warranties. 

8.1 If you are a customer who is a consumer (someone who uses the iOS Software outside of your trade, business or profession), you may have legal rights in your country of residence which would prohibit the following limitations from applying to you, and where prohibited they will not apply to you. To find out more about rights, you should contact a local consumer advice organization.

8.2 The iOS Software and Services provided hereunder are pre-release versions that may be incomplete and may contain inaccuracies or errors that could cause failures or loss of data. 








11. Export Control. You may not use or otherwise export or re-export the iOS Software except as authorized by United States law and the laws of the jurisdiction(s) in which the iOS Software was obtained. In particular, but without limitation, the iOS Software may not be exported or re-exported (a) into any U.S. embargoed countries or (b) to anyone on the U.S. Treasury Department’s list of Specially Designated Nationals or the U.S. Department of Commerce Denied Person’s List or Entity List or any other restricted party lists. By using the iOS Software, you represent and warrant that you are not located in any such country or on any such list. You also agree that you will not use the iOS Software for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of missiles, nuclear, chemical or biological weapons. You certify that this pre-release iOS Software will only be used for evaluation and development purposes, and will not be rented, sold, leased, sublicensed, assigned, or otherwise transferred. Further, you certify that you will not transfer or export any product, process or service that is a direct product of this pre-release iOS Software.

12. Government End Users. The iOS Software and related documentation are “Commercial Items”, as that term is defined at 48 C.F.R. §2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation”, as such terms are used in 48 C.F.R. §12.212 or 48 C.F.R. §227.7202, as applicable. Consistent with 48 C.F.R. §12.212 or 48 C.F.R. §227.7202-1 through 227.7202-4, as applicable, the Commercial Computer Software and Commercial Computer Software Documentation are being licensed to U.S. Government end users (a) only as Commercial Items and (b) with only those rights as are granted to all other end users pursuant to the terms and conditions herein. Unpublished-rights reserved under the copyright laws of the United States.

13. Controlling Law and Severability. This License will be governed by and construed in accordance with the laws of the State of California, excluding its conflict of law principles. This License shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. If you are a consumer based in the United Kingdom, this License will be governed by the laws of the jurisdiction of your residence. If for any reason a court of competent jurisdiction finds any provision, or portion thereof, to be unenforceable, the remainder of this License shall continue in full force and effect. 

14. Complete Agreement. This License constitutes the entire agreement between you and Apple relating to the iOS Software and supersedes all prior or contemporaneous understandings regarding such subject matter. No amendment to or modification of this License will be binding unless in writing and signed by Apple. The parties hereto confirm that they have requested that this License and all related documents be drafted in English.

15. Third Party Acknowledgements. Portions of the iOS Software may utilize or include third party software and other copyrighted material. Acknowledgements, licensing terms and disclaimers for such material are contained in the electronic documentation for the iOS Software, and your use of such material is governed by their respective terms. Use of the Google Safe Browsing Service is subject to the Google Terms of Service ( and to Google’s Privacy Policy (

16. Use of MPEG-4; H.264/AVC Notice. 

(a) The iOS Software is licensed under the MPEG-4 Systems Patent Portfolio License for encoding in compliance with the MPEG-4 Systems Standard, except that an additional license and payment of royalties are necessary for encoding in connection with (i) data stored or replicated in physical media which is paid for on a title by title basis and/or (ii) data which is paid for on a title by title basis and is transmitted to an end user for permanent storage and/or use. Such additional license may be obtained from MPEG LA, LLC. See for additional details.

(b) The iOS Software contains MPEG-4 video encoding and/or decoding functionality. The iOS Software is licensed under the MPEG-4 Visual Patent Portfolio License for the personal and non-commercial use of a consumer for (i) encoding video in compliance with the MPEG-4 Visual Standard (“MPEG-4 Video”) and/or (ii) decoding MPEG-4 video that was encoded by a consumer engaged in a personal and non-commercial activity and/or was obtained from a video provider licensed by MPEG LA to provide MPEG-4 video. No license is granted or shall be implied for any other use. Additional information including that relating to promotional, internal and commercial uses and licensing may be obtained from MPEG LA, LLC. See 


17. Yahoo Search Service Restrictions. The Yahoo Search Service available through Safari is licensed for use only in the following countries and regions: Argentina, Aruba, Australia, Austria, Barbados, Belgium, Bermuda, Brazil, Bulgaria, Canada, Cayman Islands, Chile, China, Colombia, Cyprus, Czech Republic, Denmark, Dominican Republic, Ecuador, El Salvador, Finland, France, Germany, Greece, Grenada, Guatemala, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Italy, Jamaica, Japan, Latvia, Lithuania, Luxembourg, Malaysia, Malta, Mexico, Netherlands, New Zealand, Nicaragua, Norway, Panama, Peru, Philippines, Poland, Portugal, Puerto Rico, Romania, Singapore, Slovakia, Slovenia, South Korea, Spain, St. Lucia, St. Vincent, Sweden, Switzerland, Taiwan, Thailand, The Bahamas, Trinidad and Tobago, Turkey, UK, Uruguay, US and Venezuela.

18. Microsoft Exchange Notice. The Microsoft Exchange mail setting in the iOS Software is licensed only for over-the-air synchronization of information, such as email, contacts, calendar and tasks, between your iOS and Microsoft Exchange Server or other server software licensed by Microsoft to implement the Microsoft Exchange ActiveSync protocol.




Apple Pay Supplemental Terms and Conditions

These Apple Pay Supplemental Terms and Conditions (these “Supplemental Terms”) supplement the Software License Agreement for Apple Confidential iOS Beta Software (the “License”); both the terms of the License and these Supplemental Terms govern your use of the Apple Pay feature, which shall be deemed a “Service” under the License. Capitalized terms used in these Supplemental Terms have the meanings set forth in the License.

1. Overview and Use Restrictions

Apple Pay allows you to:

• store virtual representations of credit, debit, and prepaid cards, including store credit, debit, prepaid cards, and the Apple Pay Cash card, which are supported by the Apple Pay feature (“Supported Payment Cards”) and use supported iOS Devices to make contactless payments in select locations, or within apps or websites;

• use rewards and gift cards that are saved in Wallet (“Apple Pay-Enabled Cards”, and together with Supported Payment Cards, “Supported Cards”) to make contactless rewards and gift-card transactions in select stores as part of a contactless payment using Apple Pay; and

• send person to person payments to other Apple Pay users.

The Apple Pay features of the iOS Software may only be available in select regions, with select card issuers, financial institutions, and merchants. Features may vary by region, issuer, and merchant.

To use Apple Pay, you must have a Supported Card. Supported Cards may change from time to time. Additionally, in order to send or receive person to person payments, you must have an Apple Pay Cash card.

Supported Payment Cards and person to person payments are associated with the Apple ID you have signed into iCloud to use these features. Supported Cards are only available to individuals aged 13 years or older, and may be subject to additional age-based restrictions imposed by iCloud or the Supported Card which you are trying to provision. The Apple Pay Cash card and the ability to send and receive person to person payments are only available to individuals aged 18 years or older.

Apple Pay is intended for your personal use and you may only provision your own Supported Cards. If you are provisioning a supported corporate card, you represent that you are doing so with the authorization of your employer and you are authorized to bind your employer to these terms of use and all transactions effected by use of this feature. If you are sending or receiving a person to person payment, you represent that you are doing so for your own personal, non-commercial use.

You agree not to use Apple Pay for illegal or fraudulent purposes, or any other purposes which are prohibited by the License and these Supplemental Terms. You further agree to use Apple Pay in accordance with applicable laws and regulations. You agree not to interfere with or disrupt the Apple Pay service (including accessing the service through any automated means), or any servers or networks connected to the service, or any policies, requirements, or regulations of networks connected to the service (including any unauthorized access to, use, or monitoring of data or traffic thereon).

2. Apple’s Relationship With You

Apple Pay enables you to create a virtual representation of your Supported Cards on your supported iOS Device. However Apple does not process payments or other non-payment card transactions (such as reward accrual and redemption), receive, hold, or transfer your funds, or have any other control over payments, returns, refunds, rewards, value, discounts, or other commerce activity that may arise out of your use of this feature.

The terms of cardholder agreements you may have in place with your card issuer will continue to govern your use of your Supported Cards and their use in connection with Apple Pay. Similarly, your participation in any merchant rewards or gift card programs and your use of Apple Pay-Enabled Cards in connection with Apple Pay will be subject to such merchant’s terms and conditions.

The Apple Pay Cash card and the ability to send and receive person to person payments are only available in the United States, and are services provided by Green Dot Bank, member FDIC. When you enable these features within Apple Pay, you are opening an account with Green Dot Bank, and when you send or receive a person to person payment or load or withdraw money from your Apple Pay Cash card, Green Dot Bank will be responsible for receiving and sending your money to the intended recipient. The financial institution responsible for offering Apple Pay Cash and person to person payments within Apple Pay is subject to change, and your use of such features are subject to their terms and conditions.

Nothing in the License or these Supplemental Terms modifies the terms of any cardholder, user, or merchant agreement, and such terms will govern your use of the applicable Supported Card or the person to person payment feature of Apple Pay and their virtual representation on your iOS Device. You agree that Apple is not a party to your cardholder or merchant agreements, nor is Apple responsible for the: (a) content, accuracy or unavailability of any payment cards, rewards cards, gift cards, commerce activities, transactions, or purchases while using Apple Pay functionality; (b) issuance of credit or assessing eligibility for credit; (c) accrual or redemption of rewards or stored value under a merchant’s program; (d) funding or reloading of prepaid cards; (e) sending or receiving of person to person payments; or (f) loading, redeeming, or withdrawing money from your Apple Pay Cash card.

For all disputes or questions about payment cards, rewards cards, gift cards, or associated commerce activity, please contact your issuer or the applicable merchant. For questions regarding the Apple Pay Cash card or person to person payments, please contact Apple Support.

3. Privacy

Apple Pay requires some information from your iOS Device in order to offer the full experience. Additionally, when you use your Apple Pay Cash card or send or receive person to person payments, additional information about your transactions is collected and retained to service your account and fraud prevention and regulatory purposes. You can find more information on the data collected, used, or shared as part of your use of Apple Pay, the Apple Pay Cash card, or person to person payments with Apple Pay by reading About Apple Pay and Privacy (which can be accessed by going to Wallet & Apple Pay on your iOS Device, or within the Watch app on a paired iOS Device) or by visiting By using these features, you agree and consent to Apple’s and its subsidiaries’ and agents’ transmission, collection, maintenance, processing, and use of all of the foregoing information, to provide Apple Pay functionality.

4. Security; Lost or Disabled Devices

Apple Pay stores virtual representations of your Supported Cards and should be protected as you would protect cash or your physical credit, debit, prepaid, rewards, or gift cards. Providing your device passcode to a third party or allowing a third party to add their fingerprint to use Touch ID or enable Face ID may result in their ability to make payments, send, request, or receive person to person payments, withdraw money from your Apple Pay Cash card, or receive or redeem rewards or credit using Apple Pay on your device. You are solely responsible for maintaining the security of your device and of your passcode. You agree that Apple does not have any responsibility if you lose or share access to your device. You agree that Apple does not have any responsibility if you make unauthorized modifications to iOS (such as by way of a “jailbreak”).

You may need to enable additional security measures, such as two-factor authentication for your Apple ID, in order to access particular features of Apple Pay, including the Apple Pay Cash card and person to person payments with Apple Pay. If you subsequently remove those security features, you may not be able to continue to access particular features of Apple Pay.

If your device is lost or stolen and you have Find My iPhone enabled, you can use Find My iPhone to attempt to suspend the ability to pay with the virtual Supported Payment Cards or sending person to person payments on that device by putting it into Lost Mode. You can also erase your device, which will attempt to suspend the ability to pay with the virtual Supported Payment Cards or send person to person payments on the device and will also attempt to remove the Apple Pay-Enabled Cards. You should also contact the issuer of your Supported Payment Cards, the merchant who issued your Apple Pay-Enabled Cards, and Apple in the case of your Apple Pay Cash card in order to prevent unauthorized access to your Supported Cards.

If you report or Apple suspects fraudulent or abusive activity, you agree to cooperate with Apple in any investigation and to use any fraud prevention measures we prescribe.

5. Limitation of Liability




If Apple needs to contact you about your product or account, you consent to receive the notices by email. You agree that any such notices that we send you electronically will satisfy any legal communication requiremen

Today, Apple has released a new Beta of iOS 12.1.3 Beta 4 for more info visit See More on Apple

Posted on Jan/10/2019 by Santana Team Blogger USA 🇺🇸 for everyone 🌎 thanks for watching, thanks for visiting us, thanks for reading us ! !

$300 billion in electric vehicles, with more than 45 percent of that earmarked for China.


, , , , , ,

Global automakers are planning an unprecedented level of spending to develop and procure batteries and electric vehicles over the next five to 10 years, with a significant portion of their budgets targeted at China, according to a Reuters analysis of public data released by those companies.

Automakers’ plans to spend at least $300 billion on EVs are driven largely by environmental concerns and government policy, and supported by rapid technological advances that have improved battery cost, range and charging time. The accelerated rate of industry spending — much of it led by Germany’s Volkswagen — is greater than the economies of Egypt or Chile. 


In billions of dollars
























*U.S. includes Fiat Chrysler.

A significant portion of the global industry’s planned EV investment and procurement budget — more than $135 billion — will be spent in China, which is heavily promoting the production and sale of electric vehicles through a system of government-mandated quotas, credits and incentives. As a result, EV spending by major Chinese automakers from SAIC to Great Wall Motors could be matched or even exceeded by multinational joint-venture partners such Volkswagen, Daimler and General Motors.

An electric car charging station is seen at Chinese automaker Geely’s booth at the IEEV New Energy Vehicles Exhibition in October 2018.

Reuters analyzed investment and procurement budgets made public over the past two years by the automakers, which are based primarily in the United States, China, Japan, South Korea, India, Germany and France. The figures do not reflect planned investments and purchases that have not yet been publicized.

Actual spending by vehicle manufacturers on research and development, engineering, production tooling and procurement likely will be much higher. The analysis also does not include related spending by automotive suppliers, technology companies and large corporations in other industries, from energy and aerospace to electronics and telecommunications.

Source Reuters

Posted on Jan/10/2019 by Santana Team Blogger USA 🇺🇸 for everyone 🌎

Apple’s TV industry embrace was an inevitable surprise


, , , , , , , ,

The biggest surprise of CES this year came from Apple, a company that didn’t give a keynote speech, didn’t have a booth on the show floor, but nevertheless dominates the show year after year from afar. A bunch of TVs from Samsung, LG, Sony, and Vizio will support AirPlay 2. 

It was a surprise because none of the announcements leaked, sure, but it was also a surprise because it ran completely counter to the way things usually go at CES. It also ran counter to the way things usually go with Apple. But even though nobody seemed to see it coming, it was also — at least, in retrospect — inevitable.

Here’s how things usually go at CES: a ton of consumer electronics companies make hundreds of announcements, we sift through them all to find the most interesting stuff, and Apple sits it out. Except Apple usually finds a way to make its presence known. There have often been mysteriously timed leaks that have taken the attention away from Las Vegas, for example. This year, its presence was more overt: a giant billboard touting Apple’s privacy stance.

We all figured that would be it, but then Samsung announced that its TVs would have an iTunes app. The cognitive dissonance of the announcement was almost too much to bear. A tainted software brand that most people still associate with music instead of video (iTunes) coming to a fierce competitor’s (Samsung) TV, which runs an operating system (Tizen) that it would previously have been impossible to imagine Apple touching with a 50-foot pole.

That would have been wild enough, but then LG, Vizio, and Sony followed suit with AirPlay 2 and HomeKit support. Sony, in particular, felt weird both because Sony has historically loved doing its own thing instead of cooperating with others and also because its TVs run Android.

Reader: this is not how CES usually goes.

CES is the land where platform wars confuse consumers and hold back progress in the industry — especially the TV industry. VHS versus Betamax. HD DVD versus Blu-ray. HDR10 versus Dolby Vision. Instead, a ton of companies all agreed to support a single standard created by a competitor, with neither preamble nor drama.

Once we got over the initial shock, though, something else became very obvious: this is just a first step for Apple. There is a lot more industry cooperation coming. There has to be. As Peter Kafka noted earlier in the week, the math turns out to be relatively simple and relatively The Verge, video

But you know what would? The 27 million-plus Roku boxes that are currently in use. Or — just sit with this thought for a minute — the more than 30 million Fire TV devices currently plugged into televisions. Heck, there’s also Chromecast.

Apple making a TV app for any of those devices would certainly feel like a huge surprise. But that surprising possibility is beginning to also feel inevitable.

Posted on Jan/10/2019 by Santana Team Blogger USA 🇺🇸 for everyone 🌎

Qualcomm Claims 5G Leadership in New Phones Coming This Year


, , , , , ,

Chipmaker dominated mobile industry during past improvements

Qualcomm Inc., the largest maker of chips for smartphones, said it’s leading the charge to be the main supplier of technology for 5G phones coming this year and announced new products aimed at winning more orders in the automotive market.

The company’s chips will be in 30 devices with 5G connections coming to the market later in 2019, Qualcomm said Monday at the annual CES show in Las Vegas. It also announced three new chips for cars aimed at bringing digital dashboard technology to mass-market models.

Qualcomm’s technology dominated the mobile industry during the last two generational advancements, giving it market share leadership and huge profits. Almost a decade after the debut of 4G services, with overall consumer interest in smartphones slowing and a worldwide legal fight with Apple Inc., which is no longer a customer, the San Diego-based chipmaker’s earnings have suffered.

Leading the rush to get the new 5G phones in the hands of consumers this year will help Qualcomm profit from the widespread adoption of the technology in 2020, President Christiano Amon said. The new services use wider sets of airwaves that are more efficient at carrying data traffic, he said. That means the phone service providers will have an incentive to get their subscribers to upgrade and will devote marketing and subsidies to make sure that happens. That impetus will benefit companies that have already done the work to get their technology ready.

Qualcomm also said it will begin selling three new versions of its Snapdragon product designed to power driver displays in cars. The idea is to let automakers vary capabilities for different car models while using the same software and other tools. This will help spread the use of advanced instrument clusters to cheaper vehicles, according to Amon.

In another attempt to boost its automotive offerings, Qualcomm demonstrated technology that can deliver Inc.’s Alexa voice-activated assistant and other Amazon services in cars.

Post by Santana Team Blogger USA 🇺🇸 on Jan/07/2019 for everyone 🌎

Thanks for visiting us, thanks for watching us, thanks for reading ! !

Samsung Feels Apple’s Pain as Technology Slowdown Hits Sales


, , , , , ,

  • Trade tensions, China slowdown hit Samsung’s memory business

  • Samsung Electronics Co.’s quarterly profit and sales missed estimates, as demand for memory chips slumped in the last three months of 2018, the same quarter that Apple Inc. reported anemic sales in China.

    The South Korean company’s operating income fell to 10.8 trillion won ($9.65 billion) in the period that ended in December, according to preliminary results released Tuesday, falling short of the 13.8 trillion-won average of analysts’ estimates compiled by Bloomberg.

    Deteriorating relations between the U.S. and China — Samsung’s two biggest export destinations — has hit demand for memory used in everything from personal computers to mobile devices, raising the pressure on a company struggling to revitalize its smartphone business. Compounding that challenge is weakness at rival, and major customer of components, Apple, which shocked global markets last week when it cut its sales outlook for the first time in almost two decades.

    “It’s a shock,” said Song Myung-sup, an analyst at Hi Investment & Securities Co. “It’s not just Apple, but also smartphone, server and PC manufacturers that are not buying. While the U.S.-China trade war hangs over them, these customers just won’t accept current prices, and Samsung faces pressure to cut chip prices.”

    Sales for the fourth quarter fell to 59 trillion won, compared with the 63.6 trillion won average projection compiled by Bloomberg. Samsung didn’t provide net income, which it will do later this month when it releases final results.

    Samsung’s shares fell as much as 2.1 percent in early trading in Seoul. The stock dropped 24 percent last year.

    Memory chips account for the biggest portion of Samsung’s profit. Contract prices for 32-gigabyte DRAM server modules fell about 5 percent in the December quarter, according to InSpectrum Tech Inc. Prices for 128 gigabit MLC NAND flash memory chips fell about 3.4 percent.

    “The trajectory of the memory downturn is increasingly turning unwholesome,” Lee Seung-woo, an analyst at Eugene Investment & Securities Co., wrote in a Jan. 3 report. “The reality is that the semiconductor industry is still under a thick mist with no outlook clearly seen.”

    Apple’s surprise cut to its sales forecast last week suggested a worsening outlook for orders for Samsung. Apple receives memory chips and smartphone screens from Samsung and is the South Korean manufacturer’s biggest customer, according to data compiled by Bloomberg.

    Samsung said it expects earnings to remain subdued in the first three months of the year due to difficult conditions for memory business. Profitability will recover in the second half, the company predicted, on projected improvements in memory market, with rising adoption of new CPUs and launches of new smartphone products.

    While Samsung still leads the world in smartphone sales, it’s being squeezed by Chinese handset makers like Huawei Technologies Co. The South Korean company is pinning its hopes on a foldable-screen phone that it plans to ship this year, along with a flagship Galaxy S10 model that is said to feature an in-display fingerprint sensor and a near-zero bezel.

    While sales of its own devices have foundered, the company does get a benefit from the success of rivals as it supplies organic light-emitting diode screens for Apple and Huawei. In contrast, its liquid-crystal display televisions are facing increasing challenges from Chinese rivals that seek to crowd out South Korean products.

    China Rising

    Samsung loses ground in global phone market as Chinese rivals gain share

    Bloomberg on WhatsApp Bloomberg

    Post by Santana Team Blogger USA 🇺🇸 on Jan/07/2019

    Thanks for visiting us, thanks for watching, thanks for reading us ! !

    Hello back to everyone


    , , , , , , , , ,

    A few minutes ago Apple released the Beta of 12.1.3 Beta 3

    Download profile here for install

    ——–> Apple This is the official site. Enjoy iOS ! ! Thanks for visiting us, thanks for watching, thanks for reading us ! !

    Post by Santana Team Blogger USA 🇺🇸 on Jan/07/2019 for everyone 🌎

    LG’s groundbreaking roll-up TV is going on sale this year


    , , , , , ,

    Yes, a 4K TV that rolls up is going to be very expensive — but just get a look at this thing

    It’s been a year since we saw LG Display’s 65-inch rollable TV prototype at CES, and now LG Electronics is bringing it to market as the company’s flagship 4K OLED TV for 2019. The finished Signature OLED TV R that consumers will be able to buy sometime this spring — for an astronomical, premium price — is quite similar to that prototype, but LG has refined the base station and added a 100-watt Dolby Atmos speaker for powerful built-in audio.

    This is a TV that’s there when you want it and disappears when you don’t. Not everyone loves having a big, black rectangle as the focal point of their living room, and plenty of people don’t own a TV at all. TV makers are starting to realize that, for some, it comes down to aesthetics, so they’re designing products that blend better into the home. Samsung has The Frame, which can pass as a hanging piece of art on your wall when not in use. It switches between pieces by van Gogh and other museum-sourced content. Samsung also makes the Serif, which resembles a piece of furniture, thanks to its built-in shelving unit on top. But those are still very much TVs in that they’re always just kind of there — even if they look nicer.

    LG is going several steps further by making the TV go away completely whenever you’re not watching. It drops slowly and very steadily into the base and, with the push of a button, will rise back up in 10 seconds or so. It all happens rather quietly, too. You can’t see the actual “roll” when the TV is closed in, sadly; a transparent base would’ve been great for us nerds to see what’s happening inside the base as the TV comes in or unfurls, but the white is certainly a little more stylish. Functionally, LG tells me it hasn’t made many changes to the way the LG Display prototype worked aside from enhancing the base. I didn’t get to ask about durability testing — how many times the OLED TV R has been tested to go up and down, for example — but that’s something I’m hoping to get an answer to.

    There’s also a mode — LG calls it “Line Mode” — where the display will drop down so that only about one-fourth of the panel is showing. You’ll still have on-screen music controls and the option to control your smart home gadgets in this mode. LG also includes some mood-setters like a crackling fireplace or rain sounds. I’m not sure how much use those will get in the real world, but it’s a thing you can do with your futuristic rollable TV.

    Support for Alexa voice controls are being added this year in addition to the existing Google Assistant integration in LG’s webOS software; you just hold down the Prime Video button on the remote to bring up Alexa. And LG is also one of the companies that’s adding Apple’s AirPlay 2 for easy media playback or device mirroring. You can play music on the Atmos speaker system even when the TV is fully rolled up, which is great. Port selection is on par with other premium LG sets, and they’re all located at the back of the base. LG is making the move to HDMI 2.1 with its 2019 series, so that’s a big plus in terms of future proofing this very expensive TV.

    LG insists that customers don’t lose or sacrifice anything in terms of picture quality by picking a rollable display over one of the rigid, standard OLED sets; this is supposed to be up there with the company’s very best when it comes to brightness, contrast, and features the same second-generation Alpha 9 processing chip as LG’s other 2019 TVs. You get all of the OLED hallmarks like perfect blacks, great viewing angles, and a wide mix of vivid HDR color. But we’ll have to wait for a direct comparison to see if there are any slight performance trade-offs.

    But this TV has a secondary purpose beyond delivering a fantastic viewing experience: it can drop out of view whenever it’s not in use. The ugly black rectangle can be gone in seconds, leaving you to enjoy everything else about your living room. LG has been teasing bending, rollable displays for years at CES, but now it’s got a very real product that’s nearly ready for consumers.

    Remember that the company’s “wallpaper” OLED TV started at $8,000. This is significantly more impressive, so I’m expecting it will be significantly pricier than that. For now, LG is only saying that it will be priced at a premium level when it hits retail in the spring — probably around March. So it’ll be a few years before many people can afford a rollable 4K TV. But at least you’ll get to admire its engineering at your local Best Buy in the meantime.

    LG’s groundbreaking roll-up TV is going on sale this yearLG Video

    Post by Santana Team Blogger USA 🇺🇸 on Jan/07/2019 for everyone 🌎 thanks for watching, thanks for visiting us ! !

    Hackers claim to filter “the truth” of 9/11 if they do not receive a large sum of US $ in Bitcoins


    , , , , , , ,

    A group of cybernetic pirates called “The Dark Overlord” (the great Dark Lord) is publicly blackmailing insurance companies, airlines, the Ministry of Justice of the USA and even the FBI with publishing more than 18 thousand documents that claim to have answers to the questions of the attack of 11/09/2001.


    Twin Towers attack 9/11/2001

    The group of Hackers is called “The dark overlord” and has already managed to filter out a lot of important audiovisual material prior to the release date, such as the fifth season of Orange is the new Black and hacking medical centers and then publishing confidential data of the clients to force victims to pay for their removal.

    Register to Urgent Alerts24.

    The blackmail mechanism they are using for case 9-11 is as follows:

    According to the message of the hackers, published through the site Pastebin, (which was later removed) they have a total of 18,000 documents (or 10GB of data), allegedly stolen from insurers, lawyers and government agencies.

    The information is divided into 5 layers: from milder data to more profound data, dangerous for the US and revealers of “the truth”, which consists of testing negotiated or conspiracies of different agents that were involved in one or the other.

    If the name of someone who wants to delete it appears, you must also pay different amounts to the Hackers group. And for those who want to pay to know the truth and that all this data leaks the price is the same.

    As the hackers already obtained more than US $ 12 thousand, they made public 650 documents of the first layer, that is, the slightest. But it involves many insurance companies that lost the equivalent of US $ 45 billion with the attack on the Twin Towers, according to the Insurance Information Institute, and led to years of legal litigation over who should bear the costs by leaving families behind. today without being able to collect the money that corresponded to them.

    Post by Santana Team Hackers USA 🇺🇸 on Jan/07/2019 for everyone 🌎 Thanks for watching , Thanks for reading us ! !

    Apple’s Woes — Not Its Gadgets Overshadow Tech’s Big Trade Show


    , , , , , ,

  • Consumer electronics gathering starts amid U.S.-China tensions

  • Apple Inc. won’t be placing a giant booth at the big CES tech trade show starting Sunday in Las Vegas, but its recent sales warning — and the country it blamed for the shortfall — will undoubtedly be the talk of the show.

    Typically, Apple casts a shadow over CES due to anticipation for the iPhone maker’s next product, competitors racing to beat them to the market and hundreds of accessory makers looking to make a buck on the iPhone maker’s platform. This year, Apple’s reduced revenue forecast and whether the flagging Chinese economy will hamper other big electronics companies will vie for attendees’ attention.

    The consumer electronics trade show is partly known for being divorced from the real world. It’s a place where companies show off early prototypes that may never turn into commercial products. While some attend CES to see game-changing advances like the original Xbox in 2001, the Palm Pre phone in 2009, and 3-D and 4K TVs in more recent years, the real noise is made in backroom meetings among major companies and suppliers of the potentially next big thing.

    Many key suppliers are based in China and may have a harder time securing deals this year, as trade tensions flare and companies in the U.S. seek to avoid tariffs imposed by President Donald Trump’s administration or do business with partners viewed as a national security threat.

    “The health of the Chinese economy and the U.S. economy is an overhang for the show,” said Gary Shapiro, the president and chief executive officer of the Consumer Technology Association, which produces the annual trade show. Still, he said, “there will be discussions with Chinese companies on the buyer-and-seller relationship behind closed doors.” Some of the CTA’s members with business in China have already adjusted and moved manufacturing and sourcing out of the country, Shapiro added.

    The CTA has organized a panel dedicated to tariffs and the show floor will have a booth for U.S. attendees to contact the U.S. Trade Representative and the White House and explain how tariffs have affected their businesses.

    Apple on Wednesday cut its revenue outlook for the first time in almost two decades, citing weaker demand in China because of the country’s slowing economy and rising trade tensions with the U.S. A big question is how much of Apple’s problems can be blamed on China’s economy versus Chinese consumers’ preference for home-grown brands. The falloff in demand for iPhones is at least partly explained by its high price and the rise of cheaper, more comparable rival devices in the world’s largest market. The iPhone XS Max, the current top of the iPhone range, starts at 9,599 yuan ($1,400) in China. Flagship phones from Huawei Technologies Co. and Oppo cost from 4,000 to 5,000 yuan, around half that of an iPhone.

    “It’s going to be the elephant in the room at CES,” said Daniel Ives, an analyst at Wedbush Securities. “This has been dark days for Apple and for the tech industry. I think there’s a lot of questions in regards to the smartphone industry going forward, especially with what Apple said about with demand in China.”

    Huawei supplanted Apple as the world’s No. 2 smartphone brand in 2018 and remains the market leader in China, comprising 25 percent of smartphone shipments in the third quarter of 2018, according to data from research firm Canalys. Chinese smartphone makers Vivo, Oppo, and Xiaomi Corp. were right behind Huawei, with Apple in fifth place for share of shipments.

    Huawei in particular has become flashpoint in the U.S. trade dispute. The U.S. has said the company poses a national security threat due to its close ties to the Chinese government and that Huawei violated a trade embargo against Iran. Canadian officials, acting at the behest of the U.S., arrested Huawei’s CFO last month. The arrest contributed to Apple’s brand damage in China, with some Chinese companies reportedly subsidizing employees to buy Huawei devices. Huawei recently demoted and cut the pay of two employees for tweeting from the company’s official account with an iPhone.

    “As Trump has locked horns with China, there are social media campaigns on WeChat and Weibo asking people to boycott Apple’s products,” said Loup Ventures Managing Director Gene Munster. “They can be powerful.”

    More coverage of CES: Amazon and Google to Dominate Smart-Home Offerings

    At last year’s show, Huawei was set to reveal that it would bring a flagship smartphone to U.S. carriers including AT&T Inc. But the deal never happened. At the urging of the U.S. government, the carriers cut ties with Huawei due to national security concerns, hurting the phone maker’s ability to grow its business in the U.S.

    Richard Yu, chief executive officer of Huawei’s consumer products division, gave a keynote address at last year’s CES. He used some of his speech to lambaste U.S. carriers for deciding not to sell Huawei’s latest phones. This year, Huawei is an exhibitor at the conference and will be showcasing its new tablet and laptop for the U.S. market.

    Richard Yu at the 2018 CES

    Photographer: David Paul Morris/Bloomberg

    Apple will just send employees to monitor upstarts and potential future suppliers. Its main domestic rivals, Alphabet Inc.’s Google and Inc. will be present at CES, however, with plenty of accessory makers integrating their respective voice assistants. Microsoft Corp. will also be on hand to discuss how hardware makers can implement their latest software.

    Chinese companies will attend the gathering in force. The CTA said it has seen growth in the presence of large Chinese companies and the exhibit area for Chinese companies represents a similar amount of square footage space as last year, around 13 to 14 percent. There are more than 1,200 Chinese companies exhibiting at the show, and companies in attendance include Alibaba Group Holding Ltd., Tencent Holdings Ltd., Inc., car manufacturer BYTON Ltd., TCL Corp., and Hisense Co., according to the CES website.

    The trade show also reflects the importance of 5G, or fifth-generation wireless technology, in the worsening trade war. The coming faster networks will be a topic of conversations and panels at the trade show, with a slew of sessions dedicated to applications as both countries race to become a leader in the technology. While China is poised to have a strong variety of 5G devices on its networks across 2019, Apple won’t release a 5G phone until 2020, Bloomberg News has reported.

    Chetan Sharma, a consultant for the mobile industry who is scheduled to moderate a CES panel on 5G, said the rollout is marching ahead despite trade tensions. He said he’s heard “nervous chatter in the background” about the trade war, but doesn’t expect to see any direct impact at CES.

    “There’s a battle royale for 5G, and you can’t say 5G without Huawei in the same sentence,” Ives said. “It’s become more important for U.S. and Chinese executives to better understand the trends, dialogue, opportunities and challenges going forward.”

    Post by Santana Team Blogger USA
    🇺🇸 on Jan/6/2019 for everyone 🌎

    Apple says it could miss $9 billion in iPhone sales due to weak demand


    , , , , , , ,

    Apple CEO Tim Cook specifically cites weaker than expected sales in China and other developing markets

    Apple CEO Tim Cook published a letter to investors today warning of weaker than expected first-quarter earnings, citing “fewer iPhone upgrades than we had anticipated.” The weakened demand came primarily from China, although Cook notes that “in some developed markets, iPhone upgrades also were not as strong as we thought they would be.”

    In his letter, Cook offers several explanations for the lower earnings guidance: earlier launch timing of the iPhone XS and XS Max compared to the iPhone X, the strength of the US dollar, supply constraints due to the number of new products Apple released in the fall, and overall economic weakness in some markets. But the core issue remains simple: people just aren’t buying as many new iPhones as Apple hoped.

    Per Cook’s letter, “Lower than anticipated iPhone revenue, primarily in Greater China, accounts for all of our revenue shortfall to our guidance and for much more than our entire year-over-year revenue decline.” Cook notes that other divisions of Apple have actually risen by almost 19 percent year over year, but the truth remains that the iPhone has long been Apple’s core business, and if Apple can’t sell enough of them, the whole company struggles. 

    In an interview with CNBC, Cook elaborates on the shortfall, pointing out that “the trade tensions between the United States and China put additional pressure on their economy,” which resulted in fewer customers. But Cook also mentioned fewer carrier subsidiaries on new iPhones, as well as the dramatically lowered battery replacement price for older models (due to Apple’s iPhone slowdown drama from late 2017), as contributing factors. 

    All in all, Apple’s revised Q1 guidance forecast is dropping by up to $9 billion in revenue compared to its original estimate. Apple’s stock dropped by nearly 10 percent once trading resumed.

    Posted on Jan/02/2019 by Santana Team Blogger USA 🇺🇸 for everyone 🌎

    Happy New Year to everyone


    , , , , , ,

    We wish you a very Happy New Year to all of you. Thanks for visiting us ! !

    Posted on December/31/2018 by Santana Team Blogger, Santana Team Hack USA 🇺🇸 for everyone 🌎

    What is Ethical Hacking? Who is an Ethical Hacker? Would you like to be


    , , , , ,

    Everything such as ethical hacking is good and bad; it has its technology. But you can use it well, or it depends on you. There is nothing to be afraid to hear the word hacking in the title of the article. We are not going to discuss any illegal issues here. I’ve discussed in a post about hacking and different kinds of hackers, if you read that post, then you must know a bit about Ethical Hacking or Ethical Hacker. Ethical hackers are called white hat hackers, and their work heard by listening to their names.

    Many people think hacking is hacking, it’s bad or good, and hacking is illegal. Any hacker is considered a cyber criminal. Their idea is not exactly right. Today’s article is the primary objective of ethical hacking and why you will be an ethical hacker? Discuss those issues in detail. So let’s go ahead and start the narration without further introduction.

    Ethical Hacking

    Ethical hacking

    The word “Ethical” means “Moral” – it is moral or legitimate hacking, and those hacking those who have their policies do not do anything immoral. First, know what a hacker is doing or what he does? The hacker tries to find any system (computing/networking system) error and penetrates the security level of the system and enters the primary system and receives control. Now if someone tries to access the system without the permission from a system or software that is looking for security errors, then such hacker will be called malicious hacker or black hat hacker. Malicious hackers break system rules and safety and can damage the original system.

    So hacking means finding any system errors or shortcomings entering it. What is Ethical Hacking? – Ethical hacking is a hacker after getting permissions from a system admin or software company that starts checking the system error. If he breaks the system security, then he has full permission to do this, he does not work without the authorization of malicious hacker. An ethical hacker must respect any company or system’s privacy and must work with permission. After doing the job, after checking the system, if it finds an error, it will surely inform the company about the error and will help secure the system by providing security punch. If he finds any backdoors, then he will seal it so that the malicious hacker can enter it by not harming the system.

    Moreover, he uses various techniques on the system to attack the system, so that it can see in front of any system error. If he do not find the system error after running a hack attack, but it does not guarantee that the system is 100% Secure. Because it is not 100% Securus, it is necessary to check regular security.

    Ethical Hacker’s Demand

    Ethical Hacker's Demand

    In fact, the demand for ethical hackers or white hat hackers has increased in the last few years. The world is becoming more digital, and everything is going on in computing and networking. And with increasing security risks, the ethical hackers needed to reduce the chance. Forget about the advanced world, look at our country, starting from the education results in our country, job applications, ticket cutting, accepting salaries, etc. Now everything is becoming internet/website / or application dependent. Not just government, private companies are too serious about their business and security.

    There are many e-commerce sites in our country, whose security is extremely tight to keep alright. Now suppose a malicious hacker came and hacked the government database of the education or train ticket cutter system by online, thus making the booking of the ticket, thus damaging both the state and the country. Ethical hackers look at every system, and Malicious attacks the system as a hacker and fixes the problem if it finds a problem or informs the company or government about the problem so that it is possible to adjust as quickly as possible.

    Let’s take an example to understand the importance and needs of an ethical hacker on the whole subject. Suppose the king of a region built a royal palace, to live and complete all the work of the kingdom from there. Now he must need to secure the castle through various security arrangements. Because maybe the palace may be attacked at any time. There will be lots of resources in the palace, many papers which are critical. Now suppose the king made big walls to protect his castle, and many guards cleared them.

    Ethical Hacking

    The enemy can’t attack quickly because security is so tight. So what they will do? Trying to find the facade of the wall where the guard will be attempting to enter from somewhere less. Now it may be that the king wall has tangled heavily, but the king has forgotten the fact that there was a door in the old one direction, and the attack could come from that direction. So much so tight security will not be useful either. Now suppose that the king employed a person or group who would check the safety of the wall, like the enemy’s side would revolve around the mansion and try to find an old or weak wall, and if any watchman would keep watch over whether he was asleep or not. As soon as the problem found, its action will take, and the king will be informed.

    That will reduce the chance of attacking enemy forces and entering the Empire. So the particular person or group of this story is Ethical Hacker, and at that time, surely they understand their needs. It is also critical to check the system with a lot of security measures. A lot of good moral hackers from country to abroad, For them, the company could survive millions or billions of dollars. Malicious hackers also work to find system errors, but they start the work without informing the system admin or business, and if they find the error, they will start to harm.

    So IT companies are looking for a good white hat to escape from the black hats, they hired on a high pay scale, according to expertise. If you’re a Certified Ethical Hacker, you can be a Salary of your year up to 60 lakhs according to the company and your skills (Source: Infosecinstitute.Com).

    How to start a career in ethical hacking?

    Zero-Day Vulnerability

    The article has discussed the White Hat hacking and hackers, And finally, we knew it was completely valid, and it was possible to build a good career here. Now the question is, how to start? See those who are studying with Already IT or Computer Science, and it is a lot easier for them. If you are studying, then first complete the study and try to get a job in the IT sector. Even if it pay lesser salary, because of our have target and plan. Then, if you want you can work in cybersecurity or IT sector in police or military, this will significantly increase your job skills.

    In this, you can do different courses on networking and earn a separate certificate. Class support can make with network support and admin roles. Now you will need some security certificates, and you can get it again by completing some courses. After crossing all the steps above, you will have to join the International Council of Electronic Commerce Consultant Program, and by passing the test, you will become a Certified Ethical Hacker.

    Certified Ethical Hacker

    But if you have not studied with any computer science. It is also possible if you want to build your career in ethical hacking. You can make money as a freelance ethical hacker and make a good career. If you ask me, then I will say, “How much you experience is more important than the certificate.” If computing, security, networking is your passion, nobody will be able to stop you from being a real white hat hacker. Most of the readers are still studying, so I will recommend if you want to be a professional moral hacker and want to have high-quality careers, definitely computer engineering on design and particularly the emphasis on networking. Once you become a Certified Ethical Hacker, you will be able to separate your demand on the market. You can also make it as a permanent job, as well as freelance if you want to.

    Computing Knowledge

    Ethical hacking 2

    To become a hacker, you must well-versed in networking. You should be a good idea about all popular computer operating systems, with particular expertise in UNIX / Linux. With Linux’s different distro and their command is a good fit. As well as some programming languages such as C, Java, Perl, etc. Should know database such as must have good knowledge of SQL

    Another thing to remember that hacking is a technical issue and an expert on those, but not the only thing. In addition to having technical knowledge. You need to be smart, have the ability to create relationships with people easily. Have the capacity to solve problems faster and have the capacity to manipulate people. If you have the capacity to carry out, your work by talking to someone. Then think that you have become a 50% hacker. It is easy to deceive people who are sitting in the system instead of hacking. The system this hacking is called Social Engineering.

    But if you want to be an ethical hacker you must be honest. After finding faults never misuse like black hat hackers, should not abuse for money. Before entering any network, you must have the complete right to enter it. Getting involved in immoral activities or black hat thinking can ruin your career, so be very careful. In general, hacking is a common sight, so you must work 100% honestly. Even before the start of the carrier, you should not engage in any illegal activities. Before you hire Job, the company will check your background. So since you decide that you want to be an ethical hacker. Since then, you have to start an honest life.

    The last word

    You are sure to have a lot of high-quality carrier from ethical hacking, which is very reliable. If you are passionate about computing and help others, you can not do better than that. You can have a better career. By completing some related course, you can enjoy your work a lot. I will try to explain all the basics related to your ethical hacking by writing series one by one. I think the latest results of the basic of any work will be as high as the most recent results. After finishing the basic things, if you want, I will also discuss the topic of the subject. There is no money to learn anything here. But you have to do some work. This article can be share as long as people are interested in it. I will get all the new posts with ethical hacking.

    So are you interest in building a career in Ethical Hacking or learn Ethical Hacking? Please let me know your comments by commenting below. The better the response, the faster all the article! Subscribe iTechDA YouTube channel, and there will publish videos about ethical hacking and security soon.

    Post by Santana Team Hackers USA 🇺🇸 on December/30/2018 for everyone 🌎

    Hello again everyone


    , , , , , , ,

    For this end of the year, give yourself one of our cracked applications. We wish you a Very Good Beginning of the Year

    That they can fully enjoy with their family and friends, with their loved ones of this new year that is our greatest wish. Thank you very much for visiting us, you know how much we value that noble gesture. We also want to let you know that we will always be on His side. Thanks for reading us ! !

    Post by Santana Team Blogger, Santana Team Hacks and Santana Team Devs USA 🇺🇸 on December/27/2018 for everyone

    Hello again, to all the brothers of the world


    , , , , , ,

    My name is Ricardo Luis Santana, it is an honor for me and we are part of this blog to say hello and thank you for your support during this year, we are trying to improve, you motivate us to do it for that. Thank you very much brothers of the world, because we know what it means to invest your valuable time to visit us. Thank you and all of your families. A very warm greeting and all our respect, always. Very happy holidays ! !

    Post by Santana Team Blogger USA 🇺🇸 on December/23/2018 for everyone 🌎

    The best smartwatch to buy for iPhone and Android


    , , , , , , ,

    We’re roughly four years into the Great Modern Smartwatch Experiment, which means we’ve learned what smartwatches can be good for (fitness tracking, notifications) and what they are definitely not good for (replacing your smartphone entirely). If you’re in the market for a smartwatch, whether that’s because you’ve never owned one before and are curious about them or you’re looking to upgrade your older-generation model, you can expect today’s smartwatches to last a little bit longer between charges, be a little faster to accomplish things, and perhaps do a couple of new tricks you weren’t expecting.

    But the best smartwatch is still very much a slave to a smartphone, and even if you shell out for an LTE-connected model and pay a service plan fee for it, it’s not going to free you completely. For that reason, we don’t think LTE smartwatches are a good buy for most people — it’s far easier and cheaper to just keep your phone with you and use your watch as a sort of remote control for the phone in your pocket or bag.

    Which smartwatch you pick is going to be based entirely on what phone you own, so our picks are broken down into the best option for iPhone users and the best one for Android owners.

    For the iPhone: Apple Watch Series 4

    Photo by Vjeran Pavic / The Verge

    For iPhone owners, Apple’s Series 4 Watch is far and away the best option available. The Apple Watch has a large, bright screen; sleek, comfortable hardware; fast performance; very reliable battery life; and a whole host of fitness tracking and health-related features. The Apple Watch also has the strongest third-party ecosystem — there are countless straps, accessories, chargers, docks, apps, and watchface complications you can use with the Apple Watch.

    The Apple Watch excels at providing quick access to any notifications that come in to your phone, and it lets you reply to messages right from your wrist quickly and easily. You can use it as a speakerphone whenever you feel like emulating Dick Tracy, and it’s great for controlling music playing on your phone. It also has Apple Pay for buying things without a wallet or your phone, GPS and heart rate tracking for workouts, and even the ability to warn you if it detects certain heart problems.

    Battery life can vary depending on how much you use the Watch to track activities and how many notifications you receive, but in our testing, the Series 4 Watch never failed to last at least an entire day between charges, and often it could go for two days. It’s still something you need to charge rather regularly, but you don’t have to worry about it dying on your wrist halfway through the day if you’ve started with a full tank.

    Unlike virtually every other smartwatch on the market, the Apple Watch still doesn’t offer an always-on display, however, so it doesn’t actually tell you the time until you touch the screen or lift your wrist. It’s still extremely ironic that the thing the Apple Watch is the worst at is being an actual time-keeping device.

    But aside from that, there’s very little to complain about with the Apple Watch Series 4, and it’s easily the best option for iPhone users.

    8.5 Verge Score

    For Android Phones: Samsung Galaxy Watch

    Photo by James Bareham / The Verge

    If you’ve got an Android phone, the Apple Watch won’t work at all, and the best option here is Samsung’s Galaxy Watch. The Galaxy Watch does work with both iPhones and Android devices, but it’s best with an Android phone, and specifically, one made by Samsung.

    The Galaxy Watch has most all of the features you’d expect on a modern smartwatch: GPS, touchscreen, multi-day battery life, voice control, mobile payments, and heart rate monitoring. It has a circular face that’s easy to read indoors and out, and has a very useful always-on mode that makes it easy to see the time at a glance.

    The best part of the Galaxy Watch is its rotating bezel, which is a very natural and simple way to glide through the software interface. Like the Apple Watch Series 4, the Galaxy Watch has no trouble lasting an entire day between charges, and will sometimes stretch into multiple days depending on your use.

    Where the Galaxy Watch falls short is in its third-party app support and reliance on Samsung software and services. There just aren’t very many third-party apps available for it, and the third-party watchfaces, though plentiful, aren’t very good. If you use the Galaxy Watch with a phone that’s not made by Samsung, you’ll also have to install numerous apps on your phone to enable all of its features, which is annoying.

    But aside from those concerns, the Galaxy Watch is about as good as it gets for Android users.

    7 Verge Score

    Other options

    The rest of the smartwatch field is largely comprised of variations of Wear OS devices that run Google’s actual smartwatch platform. The problem with most of these devices is they feel at least a generation (or more) behind where Apple and Samsung are at with wearables. They have fewer features, worse battery life, and often thick, clumsy designs. Based on our experience, the Wear OS watches that fare the best are ones made by Fossil and its stable of brands (such as Skagen), which are available in a variety of styles and sizes.

    7 Verge Score

    6.5 Verge Score

    6.5 Verge Score

    6.5 Verge Score

    6 Verge Score

    6 Verge Score

    5.5 Verge Score

    5 Verge Score

    4.5 Verge Score

    4 Verge Score

    Post by Ricardo Luis Santana Team Blogger USA 🇺🇸 on December/21/2018 for everyone 🌎

    Hello back to everyone, Windows has released an update


    , , , , , , , , , ,

    Download Mega analyze this software here ——-> Virus 🦠 Total

    Post by Santana Team Blogger USA 🇺🇸 on December/21/2018 for everyone 🌎

    Exclusive: China Hacked HPE, IBM and Then Attacked Clients – Sources


    , , , , , , ,

    Signs for Hewlett Packard Enterprise Co. cover the facade of the New York Stock Exchange November 2, 2015.

    WASHINGTON/LONDON/SAN FRANCISCO (Reuters) – Hackers working on behalf of China’s Ministry of State Security breached the networks of Hewlett Packard Enterprise Co and IBM, then used the access to hack into their clients’ computers, according to five sources familiar with the attacks.

    The attacks were part of a Chinese campaign known as Cloudhopper, which the United States and Britain on Thursday said infected technology service providers in order to steal secrets from their clients.

    While cybersecurity firms and government agencies have issued multiple warnings about the Cloudhopper threat since 2017, they have not disclosed the identity of technology companies whose networks were compromised.

    International Business Machines Corp said it had no evidence that sensitive corporate data had been compromised. Hewlett Packard Enterprise (HPE) said it could not comment on the Cloudhopper campaign.

    Businesses and governments are increasingly looking to technology companies known as managed service providers (MSPs) to remotely manage their information technology operations, including servers, storage, networking and help-desk support.

    Cloudhopper targeted MSPs to access client networks and steal corporate secrets from companies around the globe, according to a U.S. federal indictment of two Chinese nationals unsealed on Thursday. Prosecutors did not identify any of the MSPs that were breached.

    Both IBM and HPE declined to comment on the specific claims made by the sources.

    “IBM has been aware of the reported attacks and already has taken extensive counter-measures worldwide as part of our continuous efforts to protect the company and our clients against constantly evolving threats,” the company said in a statement. “We take responsible stewardship of client data very seriously, and have no evidence that sensitive IBM or client data has been compromised by this threat.”

    HPE said in a statement that it had spun out a large managed-services business in a 2017 merger with Computer Sciences Corp that formed a new company, DXC Technology.

    “The security of HPE customer data is our top priority,” HPE said. “We are unable to comment on the specific details described in the indictment, but HPE’s managed services provider business moved to DXC Technology in connection with HPE’s divestiture of its Enterprise Services business in 2017.”

    DXC Technology declined to comment, saying in a statement that it does not comment on reports about specific cyber events and hacking groups.

    Reuters was unable to confirm the names of other breached technology firms or identify any affected clients.

    The sources, who were not authorized to comment on confidential information gleaned from investigations into the hacks, said that HPE and IBM were not the only prominent technology companies whose networks had been compromised by Cloudhopper.

    Cloudhopper, which has been targeting technology services providers for several years, infiltrated the networks of HPE and IBM multiple times in breaches that lasted for weeks and months, according to another of the sources with knowledge of the matter.

    IBM investigated an attack as recently as this summer, and HPE conducted a large breach investigation in early 2017, the source said.

    The attackers were persistent, making it difficult to ensure that networks were safe, said another source.

    IBM has dealt with some infections by installing new hard drives and fresh operating systems on infected computers, said the person familiar with the effort.

    Cloudhopper attacks date back to at least 2014, according the indictment.

    The indictment cited one case in which Cloudhopper compromised data of an MSP in New York state and clients in 12 countries including Brazil, Germany, India, Japan, the United Arab Emirates, Britain and the United States. They were from industries including finance, electronics, medical equipment, biotechnology, automotive, mining, and oil and gas exploration.

    One senior intelligence official, who declined to name any victims who were breached, said attacks on MSPs were a significant threat because they essentially turned technology companies into launchpads for hacks on clients.

    “By gaining access to an MSP, you can in many cases gain access to any one of their customers,” said the official. “Call it the Walmart approach: If I needed to get 30 different items for my shopping list, I could go to 15 different stores or I could go to the one that has everything.”

    Representatives with the FBI and Department of Homeland Security declined to comment. Officials with the U.S. Justice Department and the Chinese embassy in Washington could not be reached.

    A British government spokeswoman declined to comment on the identities of companies affected by the Cloudhopper campaign or the impact of those breaches.

    “A number of MSPs have been affected, and naming them would have potential commercial consequences for them, putting them at an unfair disadvantage to their competitors,” she said.

    (Reporting by Christopher Bing in Washington, Jack Stubbs in London, Joseph Menn in San Francisco; Editing by Jim Finkle and Jonathan Oatis)

    Post by Ricardo Luis Santana Team Hackers USA 🇺🇸 on December/20/2018 for everyone 🌎

    Apple seeds iOS 12.1.3 Beta 2 to developers


    , , , , , , , ,

    Apple has just seeded the second beta iteration of iOS 12.1.3 exclusively to registered developers. Here’s how you can download and install this update on your iPhone, iPad, and iPod without a developer account. 

    Table of Contents

    WHAT’S NEW IN IOS 12.1.3 BETA 2? 

    It comes with a build ID of 16D5032a and weighs around 300MB for all compatible models. 

    So far, there has been a lot of confusion surrounding its nomenclature. 

    Don’t let the name fool you – this beta is actually the second test build of iOS 12.1.2 firmware. The Beta 1 of iOS 12.1.2 firmware was the first beta build of iOS 12.1.3.

    Since Apple had to resolve a patent dispute with the hardware giant Qualcomm, they decided to push the iOS 12.1.2 update publicly.

    This name was burned by this unexpected release and Apple was forced to use a new name for the next beta update.

    iOS 12.1.3 firmware

    Just like the previous test builds, iOS 12.1.3 Beta 2 doesn’t come with any new features and focuses mainly on bug fixes and improvements.

    You can download this version straight from your Apple Developer Center dashboard. Alternatively, you can use the OTA profile given below, which works for users that don’t have a developer certificate. 

    IOS 12.1.3 BETA 2 DOWNLOAD 


    The “third beta” of iOS 12.1.3 doesn’t seem to introduce any new features that warrant an update.

    This is one of those beta updates that even the most ardent beta junkies can steer clear of…unless you are a fan of patent wars.

    Jailbreak aficionados, as always, should stay away from this update and hold tight on any version below iOS 12.1.1.   

    Post by Santana Team Blogger USA 🇺🇸 on December/19/2018 for everyone 🌎

    A few minutes ago Apple just released iOS 12.1.3 Beta 2


    , , , , , , , ,

    See more here

    We are also informing you that an update is available for the iPhone 6S and devices that work with Chip A 10. More information

    Post by Santana Team Developers USA 🇺🇸 on December/19/2018 for everyone 🌎

    Apple confirms some iPad Pros ship slightly bent, but says it’s normal


    , , , , , , , , , ,

    Apple has confirmed to The Vergethat some of its 2018 iPad Pros are shipping with a very slight bend in the aluminum chassis. But according to the company, this is a side effect of the device’s manufacturing process and shouldn’t worsen over time or negatively affect the flagship iPad’s performance in any practical way. Apple does not consider it to be a defect.

    The bend is the result of a cooling process involving the iPad Pro’s metal and plastic components during manufacturing, according to Apple. Both sizes of the new iPad Pro can exhibit it. The iPad Pro ranges in price from $799 for the base 11-inch model up to $1,899 for a fully-loaded 12.9-inch device with 1TB of storage and LTE connectivity. 

    The response comes after some customers on social media and several on the MacRumors forumshave claimed their iPad Pros developed a small curve or bend without any mistreatment or abnormal stress being exerted on the metal casing. There are posts from people who believe it happened gradually over the course of normal, everyday use — or after transporting the iPad Pro in a backpack. And I’ve seen others from folks who are insistent their iPad came that way out of the box. 

    Apple is now saying that in some cases, the latter is true. And I can personally vouch for that: my 11-inch iPad Pro showed a bit of a curve after two weeks. Apple asked if I would send it their way so the engineering team could take a look. But the replacement 11-inch iPad Pro I received at Apple’s Downtown Brooklyn store exhibited a very slight bend in the aluminum as soon as I took off the wrapper. 

    An 11-inch iPad Pro exhibited a very slight bend right out of the box.

    It’s an issue that seems to be more pronounced on the LTE model, as there’s a plastic strip that breaks up the iPad’s flat aluminum sides; it’s where the antenna line divides two sections of metal that some users have noticed a bend. Apple did not say the perceived flaw is strictly limited to the cellular iPad Pro, however, and some buyers of the Wi-Fi model also claim to have encountered it.

    Those who are annoyed by the bend shouldn’t have any trouble exchanging or returning their iPad Pro at the Apple Store or other retailers. I’ve asked Apple if it has communicated with stores about the issue, as I’ve read some accounts of employees telling people it’s accidental damage and warrants an AppleCare+ claim (and deductible) to replace. That shouldn’t be the case for a slight bend. Apple also says it has not seen a higher-than-normal return rate for the 2018 iPad Pro so far.

    This controversy arose after a viral video from JerryRigEverything saw the popular YouTuber fold the newest iPad Pro in half with seemingly very little effort. Some have criticized the video as a stunt for views and as biased against Apple. Most tablets — both from Apple and other companies — will bend if you intend on bending them. They’re thin devices with a lot of surface area. The 11-inch iPad Pro weighs barely over one pound. And two months in, I haven’t seen any reports of iPad Pros failing as a result of the manufacturing quirk or bending to anywhere near the same catastrophic degree as that video. Apple says that concerns over the iPad Pro’s structural rigidity are unfounded and that it stands by the product. 

    That confidence suggests that this is not a repeat of the “bendgate” controversy that surrounded the iPhone 6 Plus and prompted the company to conduct media tours of its product-testing facilities in 2014. Its next iPhone switched over to a sturdier aluminum. But flex in the iPhone 6 Plus’ chassis was likely a factor in the so-called “touch disease” that later led units to fail due to unresponsive touchscreens. Apple eventually launched a repair program over the issue. So it has every reason to assure consumers that this time, the fuss is over nothing. 

    Disclosure: The Verge agreed to provide Apple with an iPad Pro exhibiting the issue (purchased for full price at retail) so that the company’s engineering team could investigate. The 11-inch iPad Pro with a slight bend out of the box pictured above was a replacement for that original device.

    Post by Santana Team Blogger USA 🇺🇸 on December/19/2018 for everyone 🌎

    Gardenscapes MOD + Apk full update 3.0.2


    , , , , , , , ,

    Gardenscapes Description

    Gardenscapes using 3D horizontal version of the screen to show, shiny lush main colors will allow players to feel the embrace of nature. And the game for the manor of the drawing is also very good, it will be desolate and prosperous when the scene highlights a good out, this sense of contrast is easy to bring players a high sense of accomplishment, because it is because of your Construction to make this garden rejuvenated.

    Gardenscapes in the music of the performance of the same remarkable, idyllic BGM sounds very soothing leisure, which is also with the nature of the screen has a high degree of fit, and then with a crisp feeling of sound, for the players Bring a very good hearing to enjoy Oh.

    The story of Gardenscapes is to rebuild the garden under the guidance of the old housekeeper, Austin, and there are many interesting stories in the process. And the game comes with Simplified Chinese fonts, the quality of translation is also very good, for our heavenly players or more care.

    Gardenscapes is a fusion of the simulation business and eliminate the two games of the game, the game began the old housekeeper will have a barren manor for a long time entrusted to you, and then players need to follow the various tasks to step by step to renovate the work of the manor, With the completion of the task, you will meet a lot of old friends before, they either a neighbor or a professional and technical workers, or is the protagonist or uncle before the good friend. In their own renovation of the estate and old friends recalls the old, it feels really wonderful In the lower left corner of the screen, there is a special platform for you to communicate with your old friends, feeling like a circle of friends.

    Gardenscapes is an exquisite, easy to operate fun puzzle game, it will simulate the operation and three consumption of two different types of clever combination of play together for the players to provide a variety of games are played, while their own hands to rebuild their homes Allowing players to fully show their imagination. Interested players must not miss it.

    Download MEGA

    Report link crashes ! !

    Post by Santana Team Cracker USA 🇺🇸 on December/18/2018 for everyone 🌎

    Note: Download Mega

    How to Restore iPhone Firmware and Backup


    , , , , , , ,

    John is a long-time teacher and computer enthusiast who works with and troubleshoots a wide range of computing devices.

    iTunes or a jailbreak tool like Redsnow can be used to restore iPhone firmware. On the other hand, iPhone backup can be restored using iTunes or a third-party application like iTools.

    An iPhone 6 soon after firmware restore
    An iPhone 6 soon after firmware restore 

    iPhone restore is used to mean the reinstallation of firmware during an upgrade or downgrade. It can be done using iTunes or jailbreak tools like Redsnow.

    On the other hand, backup restore means reinstallation of iPhone data previously backed up in the computer or iCloud. This step is necessary following firmware restore or in the event of acquiring a new iPhone.

    Backup restore is done using iTunes but is also possible with third-party tools like iTools. iPhone firmware restore should not be confused with over the air (OTA) update which basically upgrades the IOS to the latest version via WiFi connection.

    It is important to always backup iPhone content to the computer or iCloud before restoring it.

    The important thing to note is that previously backed up data can only be restored to an iPhone whose firmware version is the same or higher. Backed up data cannot be restored to a downgraded firmware.


    iPhone firmware restore basically lets you wipe the iPhone clean and install a new operating system (IOS) from scratch. You must install and configure apps and settings afresh. 

    iPhone reset meanwhile takes the iPhone software and settings back to its original state. iPhone reset is necessary when troubleshooting bugs i.e. Network settings or when opting out of jailbreak status.

    How to Restore iPhone Firmware

    Restore of firmware and backup is done using iTunes or via OTA. Third party applications for both Windows and Mac permit the downgrade of IOS firmware using shsh blobs that are backed up in the computer or Cydia servers.

    How to restore iPhone firmware using Redsnow

    Make sure to download the right IPSW file to be restored if you choose to go down the manual road. Just in case you are not sure what IOS is right for you, download f0recast utility to guide you. F0recast will show your iPhone model and provide a link to download the correct firmware.

    F0recast also directs you to a site that will let you know the signed and unsigned state of IOS versions for your iPhone.

    Use genuine iPhone cables to prevent errors that crop up during the restore process.

    F0recast will show your iPhone model and direct you to the right IOS download site
    F0recast will show your iPhone model and direct you to the right IOS download site
    Follow the link below to find out which  IOS firmware for your iPhone are signed and which ones are not
    Follow the link below to find out which IOS firmware for your iPhone are signed and which ones are not | Source
    • Start iTunes. You may have to upgrade to the latest iTunes in case the restore process encounters errors.
    • Connect the iPhone to the computer.
    • You should see the iPhone Summary page. If it does not show up, click or tap the iPhone and then Summary tab on the top right corner.
    • iTunes will connect to Apple servers and prompt for iTunes or iPhone firmware update.
    • Click Restore to initiate OTA iPhone firmware restore.
    • Otherwise, press the Shift button while clicking the Restore button on the keyboard to initiate a manual restore.
    • iTunes will then ask you to Turn Off Find My iPhonebefore the restore initiates.
    • Head over to Settings>iCloudto turn it off.
    • When Find My iPhone is turned off, the restore process can be resumed.
    • Click Restore to initiate automatic iPhone restore.
    • In a manual restore you will have to point to the ipsw firmware you downloaded by browsing to its folder.
    • Setup will now initiate.
    • iPhone restore should complete in under five minutes.
    • Bad internet, cable and USB ports, as well as bad computer configuration can interfere with iPhone restore.
    • Refer to this Apple troubleshooting guide when you encounter errors during the restore process.

    Do you find iPhone restore to be rather hectic?

    Issues With Find My iPhone

    If you are restoring your iPhone because you forgot your passcode or your iPhone is disabled, you may want to try something else. You cannot turn off Find My iPhone in a passcode protected iPhone.

    First, you can disable your iPhone within your iCloud using a computer or other Apple device and restart iPhone.

    Second, you can use DFU mode to bypass Find My iPhone roadblock. DFU mode operates out of the realm of the home screen and thus bypasses the need to input commands within the iPhone.

    • To enter DFU mode, plug the iPhone cable into the computer and turn it off.
    • Now press and hold the Power button for 3 seconds. Without releasing the Power button also press and hold the Home button for 10 seconds. Release the Power button but keep holding the Home button for about 15 seconds.
    • A message will pop up in iTunes that it has detected an iPhone in recovery mode.
    • Click Ok and then Restore iPhone.

    How to enter DFU mode in details.

    When the iPhone restore completes the iPhone will restart and will display Slide to set up screen. Follow the instructions in order to set up your iPhone.

    How to Restore iPhone Data

    These notable iPhone content can be backed up using iTunes and iCloud:

    • Contacts and call history
    • Photos and albums
    • Apps
    • Calender
    • Notes
    • Bookmarks
    • Messages
    • Mail accounts and not emails
    • Voice memos

    However, the music collection that you synced with iTunes from your laptop is not saved during backup and cannot be restored. But you can use third party applications like iTools to save these to your computer before firmware restoration.

    You can use iTunes or even iTools to sync the music files back to the iPhone after it has been restored.

    iREB shows you how to enter DFU mode
    iREB shows you how to enter DFU mode

    iPhone Backup Restore Using iTunes

    Upon successful iPhone firmware restore, iTunes will prompt you to set it up for use.

    You will be asked to:

    • Set up as new iPhone
    • Restore from backup

    Set up as new iPhone is appropriate if you are using an iPhone for the first time or are preparing it for sale. You do not want to sell it with your content.

    If however you have a backup saved somewhere in the computer or iCloud, you should select Restore from backup in iTunes

    Point to a relevant iPhone backup if indicated in iTunes and let the restore initiate.

    Otherwise, use the backup options in the Summary tab of iTunes to initiate the restore.

    • Connect iPhone cable to the computer and head over to the Summary tab.
    • Select either iCloud or This computer to point to the location of your saved backup.

    Depending on the number of photos, apps, documents and other files, backup restore can take more than an hour to complete. It could take less time of course if your content is little.

    iPhone Backup Restore Using iTools

    You can also restore iPhone from backup using iTools. This may not be a necessary option but when you somehow mix up your backup files and iTunes fails to identify it, iTools may be just the tool for you.

    iPhone restore from backup is also possible using iTools
    iPhone restore from backup is also possible using iTools

    Posted on December/18/218 by Santana Team Blogger USA 🇺🇸 for everyone 🌎

    Tutorial. Use iTools to backup, restore and downgrade your applications


    , , , , , , , ,

    There are too many people asking if tweaks work with the new updates for other applications and to be honest, it’s pretty annoying IMO. Here’s a tutorial on how to back up your applications using an application that I like very much called iTools. You can pretty much do the same thing with iTunes, but iTunes takes so much time to load on my computer that I decided to use a less memory-intensive alternative.

    Step 1. Install iTools and plug in your deviceStep 2. Click on the Applications tab

    See the huge backup button right there?

    Step 3. Click on it and select Backup program.

    Now you can downgrade whenever you want. How?

    Step 4. Go to the Applications tab and click on Degrade.        It should downgrade your apps

    Post by Ricardo Luis Santana Contact us USA on December 18/2018 for everyone 🌎

    Trump Campaign Calls DNC’s Russia Hacking Suit Sour Grapes


    , , , , , , ,

  • DNC says the men engaged in a massive conspiracy with Moscow

  • President Donald Trump’s campaign organization told a judge that the Democratic National Committee made a specious attempt to “explain away” Hillary Clinton’s 2016 defeat by claiming in a lawsuit that there was a vast conspiracy with Russia and WikiLeaks to hack the DNC’s emails and tilt the election.

    The racketeering suit against dozens of individuals and entities, including Trump campaign officials and Russian intelligence, also risks colliding with investigations by congressional committees and Special Counsel Robert Mueller, raising the possibility that the case would need to be put on hold, the campaign said Friday in a court filing seeking dismissal of the suit.

    The Trump campaign argues the DNC’s conspiracy claim fails because the campaign is only accused of receiving advance notice of leaks, making political use of the revealed material and publicly encouraging more hacks.

    “The DNC does not claim the campaign had any role in hacking its systems and stealing the materials — it attributes that only to Russia,” according to the filing. “Nor does the DNC claim the campaign played any part in publishing the stolen materials — it attributes that only to Russia and WikiLeaks.”

    Some of the DNC’s claims reflect conclusions of U.S. intelligence agencies and come from legal filings by Mueller, who is investigating whether Russia colluded with Trump to help him win the election. Trump, who praised the release of the DNC’s emails and publicly called on Russia to hack into Clinton’s as well, calls the probe a “witch hunt” and denies any wrongdoing.

    Your Guide to Understanding the Trump-Russia Saga: QuickTake

    The campaign’s filing includes a fresh defense of the hack, saying the release of the organization’s emails by WikiLeaks “revealed important information about the DNC to the public,” including allegedly racist political tactics and internal claims of sexual harassment.

    The DNC said the motion “is straight from the president’s playbook: it ignores the facts because the facts aren’t good for them.” 

    “Russia attacked our country in 2016 and it found willing partners in Wikileaks and the Trump campaign,” Adrienne Watson, the DNC’s deputy communications director, said in an emailed statement. “In fact, even as this motion was being filed, we learned that one of the defendants in this case, Paul Manafort, is still lying about his communications with a suspected Russian intelligence agent.” 

    Several other defendants on Friday filed separate motions to dismiss the claims, including the president’s son-in-law and special adviser, Jared Kushner, and his longtime friend and confidante Roger Stone. They claim the DNC’s web of claims doesn’t meet the legal burden for proving a racketeering conspiracy or link them to the actually hacking by Russia.

    Stone, whose seemingly prescient tweets about leaks were cited in the complaint, said the posts related to a different hack of the personal email account of John Podesta, who was then chairman of Clinton’s election campaign — a defense he’s previously offered. The DNC is conflating the DNC and Podesta hacks to try to link Stone to Russia, he said.

    “Roger Stone is not alleged to have spoken to any Russians or hackers about the alleged theft of DNC data or its transfer to WikiLeaks,” Stone’s lawyer said in the filing.

    WikiLeaks, also a defendant, on Friday argued the suit should be tossed out on constitutional grounds, saying the case poses “an existential threat to the fundamental First Amendment right.” WikiLeaks founder Julian Assange is also named in the suit.

    Any finding of liability against WikiLeaks “would quickly drive independent and less financially secure media organizations — and ultimately even the titans — as well as individual journalists, at every level everywhere, from reporting and publishing altogether,” the website said.

    The DNC complaint relies heavily on details surrounding the June 2016 Trump Tower meeting at which campaign officials sought dirt on Clinton from people representing Russian interests. Kushner said his attendance at the meeting and his role as a decision-maker for the campaign’s data efforts aren’t enough to link him to a hacking conspiracy.

    Kushner was among those who represented the Trump campaign at the Trump Tower meeting, “which was arranged on the premise that the Kremlin was seeking to help Donald Trump by offering damaging information on the Democratic nominee,” DNC spokeswoman Adrienne Watson said in an email.

    Among others, the suit filed in April also names George Papadopoulos, a foreign-policy adviser to Trump’s campaign, and Rick Gates, an aide to onetime Trump campaign chairman Paul Manafort. Papadopoulos and Gates filed motions to toss the suit.

    Gates pleaded guilty to conspiracy and lying to federal agents, and testified as a prosecution witness in the successful tax fraud and money-laundering case against his former boss. Papadopoulos admitted lying to federal agents about his contacts with a U.K. college professor who claimed to have ties to Russians in possession of Clinton’s emails.

    (Adds comment from DNC starting in 7th paragraph.

    Post on December/117/2018 by Santana Team Hackers USA 🇺🇸 for everyone 🌎

    Google to Invest More Than $1 Billion to Establish NYC Campus


    , , , , ,

  • Investment comes as Amazon plans to unveil office in New York

  • Google will invest more than $1 billion to expand its New York City presence, the search giant said in a blog post Monday.

    The Alphabet Inc. division said it had reached lease agreements at 315 and 345 Hudson Street and signed a letter of intent at 550 Washington Street to make up the new 1.7 million square-foot campus, called Google Hudson Square.

    Photographer: Patrick T. Fallon/Bloomberg

    Google aims to move into the new Hudson buildings by 2020 and the Washington Street location by 2022, Alphabet Chief Financial Officer Ruth Porat said in the blog post. The move could allow the company to more than double the current 7,000 people it employs in the city over the next decade.

    The expansion by Google joins a flurry of other announcements from the U.S.’s largest tech companies, as they seek to show off investments in their home country. Inc. recently announced it had split its new second headquarters in half, between the Washington, D.C. suburbs and Long Island City, in the New York borough of Queens.

    Apple Inc. said last week it would invest $1 billion to expand its operations in Austin by constructing a new employee campus in the area, large enough to house 15,000 additional employees.

    Google’s Chief Executive Officer Sundar Pichai last week answered questions from Congress about the company’s controversial plans to expand in China. “As an American company, we cherish the values and freedoms that have allowed us to grow and serve so many users,” Pichai said in opening remarks.

    Google’s New York investment also follows other new offices and data centers opened this year outside of its California headquarters in locations including Detroit, Boulder, Tennessee and Alabama.

    Posted on December/17/2018 by Santana Team Blogger USA 🇺🇸 for everyone 🌎

    Thanks for everyone ! !


    , , , , , , ,

    It seems that your blog romanticismoaleman’s Blog is receiving more traffic than usual. 38 views per hour: 8 average views per hour

    Thanks to all of you this, it has been possible

    Post by Santana Team Blogger USA 🇺🇸 December/16/2018 for everyone 🌎

    Memoirs of Murder 2: Resorting to Revenge Collector’s Edition [FINAL]


    , , , , , ,

    Memoirs of Murder 2: Resorting to Revenge Collector's Edition [FINAL]

    Memoirs of Murder 2: Resorting to Revenge Collector’s Edition [FINAL]|630 mb
    brings you their latest sensational mystery in Memoirs of Murder: Resorting to Revenge!
    You and your spouse have won an all-inclusive vacation to Pinecone Hill! Your excitement on the train is short-lived when you and your new friends are stalked by a mysterious and dangerous man! Can you uncover his motives and stop his sinister plot before it’s too late?! Find out in this thrilling Hidden-Object Puzzle adventure!

    The Collector’s Edition features:
    • Rescue a local celebrity in the bonus game!
    • Replay your favorite HOPs and mini-games and earn achievements!
    • Tons of collectibles, morphing objects, and souvenirs to find!
    • Enjoy exclusive concept art, wallpapers, music, and videos!
    • Never get lost with the strategy guide!

    Razz recommends Ccleaner (free version) to clean your pc and make it like new again!
    you can get the free version here: (no need to buy just use the free stuff!) is Razz’ #1 preferred filehost!

    rapidgator is Razz’ #2 preferred filehost! 

    my referrals: register a free user account for max speed (
    try today !!
    just register your FREE user account here:

    Post by Santana Team Cracker USA 🇺🇸 on December/16/2018 for everyone 🌎

    iTools 4 for iOS latest version is here ! !


    , , , , , , ,

    Downloading iTools iOS

    If you have the iTools iOS on your computer, you are going to be able to do transformations on your iOS device. The article here will guide you on what is going to happen. The iTools is the best alternative of the official iTunes. If you want to use the iTools version in the best and proper way, you will have to use the latest version of the iTools. In the utility interface, you will get updates about the most recent releases. Without updating if you are using the iTools iOS, you will face crashes and bugs. Updates improve functionality. The iTools will help you in the progress of backing up what is there on your device, and it will also help you in the migration of data, desktop management and the handling of files.

    The iTools iOS brings all support to all the firmware and various devices to come up with modifications in your iOS device. This application is designed in a way that it supports all users and everyone’s needs. This application shares similar characteristics that appear in iTunes but those features have become advanced, and they provide its user’s comfort. iTools for iOS is the best that you could have an application to get on with modifications on your device. A person who will be having a look at the iTools iOS features will not look back once again at the iTunes application.

    Download iTools 4 FREE!

    Take the Latest Version of iTools

    Download iTools 4

    How Does The iTools iOS Help You?

    iTools iOS will help you with many features to organize your iOS device. Here are some of its incredible features. The application has a supportive backup and restores functionality. This feature here is going to help you with saving your existing data. You will never lose your data, and you will be delighted to have your valuable data with you. Data could also be exchanged within devices in different file formats. File management is another essential feature, and then there is also the support in battery management so you could track the status update of the battery. Some of the battery-related features that you could monitor include the actual capacity of the cell, the temperature of the battery, the SN value of the battery, and details of the charging cycle.

    The other incredible features include the ability to create ringtones by selecting your favorite song. In fact, there is a ringtone maker in this application. Next, you would come across an image tool that enables you to edit images and share the edited image with your friends. The available Airplayer also allows you the best screen experience and supports screen sharing. There is also an icon arranger that will enable you to arrange all icons on your screen.

    Video iTools 4 Official

    For you to get this application on your device, there is not a lot of system requirements needed. You could quickly get this application installed on your machine without much effort. The methods that you should use to handle this application is also not complicated because anyone could get used to the usage of this application. Downloading and installing this application on your device is just a simple process. Get the app downloaded on your device to enjoy all its latest features.

    Winding up of iTools iOS

    iTools iOS is the best alternative to iTunes, and all its features will marvel you. Get started from today onwards by downloading this application. It is a free application, and anyone could get it downloaded on their device. It is a great app ready to support you in everything that you want and need. Give a new look to your iOS device by using this application.



    About Us

    Contact Us

    Privacy Policy


    iTools iPad

    iTools English

    iTools Windows

    iTools Mac

    iTools iPhone

    iTools 2018

    iTools 64 bit

    iTools iOS


    Air Player


    iTools 4 AirPlayer

    Official site :

    Post by Ricardo Luis Santana Team USA 🇺🇸 on December/15/2018 for everyone 🌎

    With our best wishes, enjoy the new version of iTools. 👍 Thanks for visiting us ! ! You are welcome everyday. iTools, the best alternative to iTunes

    iTools iOS 越狱


    , , , , , , , ,



























    If you do not understand a word of this post, download this application.

    Google Chrome

    Post by Teng Shao Lu on December/15/2018 on for Santana Team Hackers USA 🇺🇸 and everyone 🌎 Thank you for choosing us ! 👍

    Hello back to everyone


    , , , , , , , ,

    Today, we have brought you software that is paid, we have cracked the software and we deliver it full, we hope you enjoy it! !

    It is a new version of Netflix


    Posted on December/15/2018 by Santana Team Cracker USA 🇺🇸 for everyone 🌎

    Memoirs of Murder 2: Resorting to Revenge Collector’s Edition {v.Final}


    , , , , , , ,

    Memoirs of Murder 2: Resorting to Revenge Collector's Edition {v.Final}
    Memoirs of Murder 2: Resorting to Revenge
    Collector’s Edition

    Eipix Entertainment brings you their latest sensational mystery in Memoirs of Murder: Resorting to Revenge! You and your spouse have won an all-inclusive vacation to Pinecone Hill! Your excitement on the train is short-lived when you and your new friends are stalked by a mysterious and dangerous man! Can you uncover his motives and stop his sinister plot before it’s too late?! Find out in this thrilling Hidden-Object Puzzle adventure!

    The Collector’s Edition Includes:
    • Rescue a local celebrity in the bonus game!
    • Replay your favourite HOPs and mini-games and earn achievements!
    • Tons of collectibles, morphing objects, and souvenirs to find!
    • Enjoy exclusive concept art, wallpapers, music, and videos!
    • Never get lost with the strategy guide!


    Memoirs of Murder 2: Resorting to Revenge Collector's Edition {v.Final}
    Memoirs of Murder 2: Resorting to Revenge
    Collector’s Edition

    Eipix Entertainment brings you their latest sensational mystery in Memoirs of Murder: Resorting to Revenge! You and your spouse have won an all-inclusive vacation to Pinecone Hill! Your excitement on the train is short-lived when you and your new friends are stalked by a mysterious and dangerous man! Can you uncover his motives and stop his sinister plot before it’s too late?! Find out in this thrilling Hidden-Object Puzzle adventure!

    The Collector’s Edition Includes:
    • Rescue a local celebrity in the bonus game!
    • Replay your favourite HOPs and mini-games and earn achievements!
    • Tons of collectibles, morphing objects, and souvenirs to find!
    • Enjoy exclusive concept art, wallpapers, music, and videos!
    • Never get lost with the strategy guide!


    Post by Santana Team Blogger USA 🇺🇸 on December/15/2018 for everyone 🌎
    Thanks for visiting us ! !

    The Christmas Spirit: Mother Goose’s Untold Tales CEn


    , , , , , ,

    Old King Cole was once a merry old soul, but now he rules the Fairytale Kingdom with a greedy iron fist. And now that Mother Goose has gone missing, he’s decided to cancel Christmas! This is the last straw for the King’s poor subjects, and they call on you to help find Mother Goose and restore the kingdom to peace and happiness.

    Team up with classic Mother Goose characters like Humpty Dumpty, the Three Blind Mice, and the Crooked Man to stop King Cole’s tyranny and bring Christmas to the Fairytale Kingdom in this charming hidden-object puzzle adventure game!


    Collectors Edition Features:

    • Restore the kingdom’s magical cornucopia in the bonus chapter!;

    • Lots of candy canes, Gingerbread men, and figurines to find!;

    • Unlock the special Extras Room for more fun!;

    • Enjoy exclusive wallpapers, art, music, videos, and more!;

    • Never get lost with the strategy guide!

      Game System Requirements:

    • OS: Windows XP, Vista, 7, 8, 10

    • CPU: 1.6 GHz

    • RAM: 1024 MB

    • DirectX: 9.0

    • Hard Drive: 1,92 Gb  

    The Christmas Spirit: Mother Goose’s Untold Tales CE – вторая часть красочной рождественской серии “The Christmas Spirit” от Domini Games и Большой рыбы.

    Старый король Коул был душевным человеком, но все изменилось, когда он начал управлять Сказочным Королевством. Теперь оно находится его под жадным железным кулаком. А, когда Матушка-гусыня пропала, он и вовсе решил отменить Рождество! Это стало последней каплей для бедных подданных Короля, и они обратились к Вам с просьбой помочь найти Матушку-гусыню и вернуть в Королевство мир и счастье. Объедините силы с классическими сказочными персонажами Матушки гусыни такими как Шалтай-болтай, Три слепых мышонка, и Горбуном, чтобы остановить тиранию короля Коула и вернуть Рождество в Сказочное Королевство в этой очаровательной hidden object игре!

      Особенности Коллекционного издания:

    • Восстановите королевский волшебный рог изобилия в бонусной главе!;

    • Множество леденцов, пряничных человечков и статуэток!;

    • Разблокируйте специальную комнату!;

    • Наслаждайтесь эксклюзивными обоями, концепт-артом, музыкой, видео, и другим экстра контентом!;

    • Воспользуйтесь встроенным прохождением в трудную минуту

    Developer: Domini Games;

    Language: English;

    Size: 1,77 Gb

      This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Link crashes, Contact us !

    Here——> Contact us 🇺🇸




    Post by Ricardo Luis Santana Team Cracker USA 🇺🇸 posted on December/15/2018 for everyone 🌎

    Netflix APK MOD Download 2018 Free Latest


    , , , , , , ,

    Today i will share netflix apk mod with you guys. 🙂 Yes it’s netflix mod and it’s available right now.

    I have been using netflix apk mod for 1 month as i test this it’s awesome and underated.  So i love to share this amazing app with you my friends.

    Read more :

    What’s netflix?

    Now if you guys don’t know what’s netflix it’s basically worlds must leading subscription base service for watching any movies , tv shows and episodes. Now you got the apk and now you can watch this from anywhere and anytime

    Do i need to pay For Netflix APK Mod?

    Now as this one is mod so you don’t need to subscribe or pay anything. This is Netflix app free where you dint need to use anything. Install the app then you guys are ready to watch the movie simple as it.

    Features of Netflix apk mod:

    • Chrome cast supported
    • Performance increased
    • Playback are well optimized
    • Widgets improved
    • High quality audio
    • Crash and bug Fixes
    • New UI
    • Pause and play+ resume supported

    How to install netflix apk mod?

    Actually it’s basic installation process which is easy to do.

    install netflix apk mod

    First thing is that you need to uninstall your old installed Netflix because we are about to install this modded Netflix so that you can watch Netflix without paying anything or subscription.

    Download OPENBOX apk NETFLIX Killer (Unfortunately NETFlix was take down by Netflix company one box HD is better than netflix mod 🙂

    Now make sure to download netflix apk mod from above in this post 🙂and install it on to your device.

    Note: Make sure to check unknown sources on your phone by going to setting as we are now to install third party app. 🙂


    Cool thing is that you don’t need to login to your account against to use Netflix.

    So now just install your netflix apk mod in your device then you are ready to wacth all netflix series movies and everything 

    Do i need external player ?

    Yes you might need external player called Yes player which you can download from play store for free.

    we need external player because Netflix mod doesn’t have it’s own player sorry about that but you need to use yes player. I found mx player is not well working so i recommend you guy to use yes player for this mod app.

    Do i need to pay For Netflix APK Mod?

    Now as this one is mod so you don’t need to subscribe or pay anything. This is Netflix app free where you dint need to use anything. Install the app then you guys are ready to watch the movie simple as it.

    Features of Netflix apk mod:

    • Chrome cast supported
    • Performance increased
    • Playback are well optimized
    • Widgets improved
    • High quality audio
    • Crash and bug Fixes
    • New UI
    • Pause and play+ resume supported

    How to install netflix apk mod?

    Actually it’s basic installation process which is easy to do.

    install netflix apk mod

    First thing is that you need to uninstall your old installed Netflix because we are about to install this modded Netflix so that you can watch Netflix without paying anything or subscription.

    Download OPENBOX apk NETFLIX Killer (Unfortunately NETFlix was take down by Netflix company one box HD is better than netflix mod 

    Now make sure to download netflix apk mod from above in this post and install it on to your device.

    Note: Make sure to check unknown sources on your phone by going to setting as we are now to install third party app. 

    Cool thing is that you don’t need to login to your account against to use Netflix.

    So now just install your netflix apk mod in your device then you are ready to wacth all netflix series movies and everything 

    Do i need external player ?

    Yes you might need external player called Yes player which you can download from play store for free.

    we need external player because Netflix mod doesn’t have it’s own player sorry about that but you need to use yes player. I found mx player is not well working so i recommend you guy to use yes player for this mod app.

    Posted on December/15/2018 by Santana Team Blogger USA 🇺🇸 for everyone 🌎

    4 Best Ways on How to Clear RAM on iOS 12 iPhone


    , , , , , , , ,

    iPhone running slow is the most common problem faced by iPhone users. You might have noticed that your iPhone gets stuck easily after using it for a long time. This happens because generally iPhone storage gets filled up with a large number of junk files. Since the storage space is majorly occupied by the junk files, there is no space to download other useful apps or even for an upgrade to the latest iOS. This article focuses on how to reset RAM on iOS 12 which has been running slow or getting stuck due to prolonged usage and mass accumulation of junk files and how to improve its performance.

    • Way 1: Manually Reset RAM On iOS 12

    • Way 2: Clean RAM On iOS 12 With Free Third-Party Tool

    • Way 3: Offload Unused Apps

    • Way 4: Clear Safari Caches

    Way 1: Manually reset RAM On iOS 12

    When your iPhone starts slowing down or when it starts lagging in its functions, it means it is time to reset RAM on iOS 12 iPhone. You can do this manually by either using the “Home” button or without using the “Home” button. Both the methods are discussed below.

    Reset RAM on iPhone with the help of Home Button

    Step 1: Press the Sleep/Wake button on your iPhone and hold it till “Slide To Power Off” appears on the iPhone screen.

    Step 2: Press and hold the Home button till the Home Screen appears.

    Step 3: Now, when you open the applications, you will notice that they would be reloading.

    Reset RAM on iPhone X without the help of Home Button

    Step 1: Tap on “Settings” icon.

    Step 2: Select “General” settings.

    Step 3: Click on “Accessibility”.

    Step 4: You can see “Assistive Touch”, turn that On.

    Step 5: From “Settings” choose the “Shut Down” device option.

    Step 6: Tap on “Assistive Touch” and press and hold the virtual Home button.

    The first method to clear iPhone RAM proves useful for iPhone 7/6/6s but this method cannot be used for iPhone X /8 due to the absence of Home button. That is when the second method comes into play.

    Way 2: Clean RAM On iOS 12 With Free Third-Party Tool

    You must be wondering about how to clear RAM on iPhone in a better and easier way. With the development of new third-party applications and tools, even this process is simplified further. One of the best third-party tools which prove handy in this case is Free iCareFone Cleaner. This ultimate cleaning tool clears up the cache and frees up memory space on your iPhone which was earlier filled with junk files and in turn, makes the phone run faster than before without any lag. You can use this tool by following the steps below.

    Free Download For Win 10/8.1/8/7/XP

    Secure Download

    Free Download For macOS 10.14 and below

    Secure Download

    Step 1: Start scanning the junk files by connecting your iOS 12 device to Tenorshare iCareFone Cleaner.

    Step 2: Five types of files will be shown on the screen namely: Junk Files, Temp Files, Photos, Large Files and Apps. Each type of file will be specified with the memory size which is to be released and a “Clean” button will also be present below each type of file.

    Step 3: Click on “Clean” to clean all the unwanted junk files.

    Your phone will instantly start performing better by running faster without any lag. Don’t miss this amazing software!

    Way 3: Offload Unused Apps

    If you want to know more about how to free up RAM on iOS 12, offloading unused apps is another way of doing so. The storage system of iOS 12 is revamped to work more efficiently. You can remove any application in your iPhone while preserving its documents and data in case you choose to reinstall it later. When your iPhone is running out of space it can automatically do this for unused applications. This iPhone feature can be used in two ways.

    Offload Unused Apps Automatically

    Step 1: Go to “Settings”.

    Step 2: Tap on “General”.

    Step 3: Select “iPhone Storage”.

    Step 4: Enable “Offload Unused Apps”.

    Or alternatively,

    Step 1: Go to “Settings”.

    Step 2: Tap on “iTunes & App Stores”.

    Step 3: Turn on “Offload Unused Apps”.

    Offload Unused Apps Manually

    Step 1: Go to “Settings”.

    Step 2: Select “General”.

    Step 3: Tap on “iPhone Storage”.

    Step 4: Select the apps to offload one by one and press on “Offload App”.

    Once an app is offloaded, the icon will still appear on the Home screen but with a download symbol. You can reinstall the app anytime when you require it again. These apps will be removed from the main settings list but you can still see it under the iPhone Storage section.

    Way 4: Clear Safari Caches

    Over time, unwanted files, memory hogs, and other junk clog your iPhone making it run slow and lowering the device’s performance. Another way to maintain the performance of your iPhone is by clearing the Safari cache. Below, you will find out how to clear iPhone RAM by clearing out the Safari cache.

    Step 1: Open “Settings” and select “Safari”.

    Step 2: Tap on “Clear History and Website Date”.

    Step 3: Tap on “Clear History and Data”.

    Once Safari cache has been cleared, you will be logged out of any website where you were previously logged in.


    So many unwanted applications and information are stored on your iPhone. Freeing the RAM from these unwanted junk files will make the usable memory available and with minimum information to process and filter, your iPhone would run much faster. You can easily reload any application back if in case you need it again. The applications will remain on the home screen just that it will need to be reinstalled. So, no information is deleted from your phone, the only change is that your device becomes considerably faster. You can use any of the methods mentioned in this article to help your iPhone get a boost and perform better for a longer time. We highly recommend using Tenorshare iCareFone Cleaner because it is free, easy to use, hassle-free and works very efficiently too!

    Tenorshare for Windows download

    Tenorshare for Mac download

    Post by Santana Team Blogger USA 🇺🇸 on December/14/2018 for everyone 🌎

    Thanks for visiting us, thanks for watching ! !

    AMP (Accelerated Mobile Pages) Help Wordpress


    , , , , , ,

    AMP (Accelerated Mobile Pages) is an open-source framework that allows browsers and apps to load your site’s blog posts quickly on mobile devices. Check out the AMP site for more details on how it works.

    For all sites, AMP is enabled by default. The main advantage to AMP is a fast-loading mobile experience. All of your site’s blog posts (front page, archives and pages aren’t currently supported) will have dynamically generated AMP-compatible versions. Your site’s results in Google will also be marked by the AMP badge on mobile-based searches.


    Turn AMP On or Off

    For most users, there’s no need to disable AMP; doing so will revert your site to show the theme’s responsive view to Google, and will remove the AMP badge in search results. Regular visits to your site from mobile will still show the regular non-AMP responsive theme; the AMP view is shown only from a mobile visit that originates from the Google search results.

    If you’d still prefer to show the non-AMP version of your site to Google (and potential visitors to your site), you can disable it using the AMP controller. Clicking on My Sites, and then choose Settings → Traffic.

    ↑ Table of Contents ↑

    Private/Hidden Sites

    AMP is only available to public sites that are not blocking crawlers; if the AMP box is not available, please check the Site Privacy setting and set it to Public.

    ↑ Table of Contents ↑


    You can click on Edit Design from the AMP module in your Settings page to alter the appearance of the AMP version of your posts. Because the AMP spec requires a minimal page design, you’ll see options to change the Header Text Color, Header Background and Link Color, and the background color scheme.

    Not quite what you’re looking for? 

    Get Help 

    Exclusive: T-Mobile, Sprint Consider Dropping Huawei, See U.S. Security Clearance for Deal – Sources


    , , , , , ,

    FILE PHOTO: People walk past a Huawei shop in Beijing, China,

    WASHINGTON/NEW YORK (Reuters) – T-Mobile US Inc and Sprint Corp expect their merger to be approved by a U.S. national security panel as early as next week, after their respective parent companies said they would consider curbing their use of equipment from China’s Huawei Technologies [HWT.UL], people familiar with the matter told Reuters.

    U.S. government officials have been pressuring T-Mobile’s German majority owner, Deutsche Telekom AG, to stop using Huawei equipment, the sources said, over concerns that Huawei is effectively controlled by the Chinese state and its network equipment may contain “back doors” that could enable cyber espionage, something which Huawei denies.

    That pressure is part of the national security review of T-Mobile’s $26 billion deal to buy U.S. rival Sprint, the sources said.

    The Committee on Foreign Investment in the United States (CFIUS) has been conducting a national security review of the Sprint deal, which was announced in April. Negotiations between the two companies and the U.S. government have not been finalized and any deal could still fall through, the sources cautioned.

    Sprint’s parent, SoftBank Group Corp, plans to replace 4G network equipment from Huawei with hardware from Nokia and Ericsson, Nikkei reported on Thursday, without citing sources.

    Deutsche Telekom, Europe’s largest telecoms company, on Friday said it was reviewing its vendor plans in Germany and other European markets where it operates, given the debate on the security of Chinese network gear.

    Huawei has said the security concerns are unfounded. Tensions have been heightened by the arrest of Huawei’s chief financial officer in Canada for possible extradition to the United States.

    Sprint, T-Mobile, Deutsche Telekom, SoftBank and CFIUS declined to comment.

    (Reporting by Greg Roumeliotis and Liana Baker in New York, Diane Bartz in Washington; Writing by Chris Sanders; Editing by Bill Rigby)

    Post by Santana Team Blogger USA 🇺🇸 on December/14/2018 for everyone 🌎

    Hello again everyone


    , , , , , ,

    We must make a reservation, regarding the post of the games, we are obliged to inform you that, the game FarmVille Country Scape 1 * is not updated and second, we will not work anymore in that game. For the Great respect that you deserve we comply in informing that crack is outdated.

    FarmVille Country Scape has many updates that, it would take time to continue with the development and the most interesting application cracks

    Thanks for reading us ! !

    Post by Santana Team Blogger USA 🇺🇸 on December/12/2018 for everyone 🌎

    Note: Ricardo Luis Santana and those who collaborate with me, we greet you very cordially

    Thanks for visiting us ! !👏👏👏👏👏👏👏 👍

    The executive spent the past two years working on features for Sony Pictures Entertainment.


    , , , , , ,

    Apple Taps Sony’s Tamara Hunter as Head of Casting

    The executive spent the past two years working on features for Sony Pictures Entertainment.

    Following an extensive search, Apple has recruited Sony’s Tamara Hunter to serve as its head of casting.

    Hunter, who spent the past two years as head of feature casting for Sony Pictures Entertainment, will serve in the same capacity and oversee film and TV projects for Apple. She will report to former Sony Pictures Television duo Zack Van Amburg and Jamie Erlicht.

    During her tenure at Sony, Hunter oversaw feature film casting for the studio and its Columbia, TriStar, Screen Gems and animation units. She has worked on blockbuster hits including Jumanji: Welcome to the Jungle, Venom, The Equalizer 2, Hotel Transylvania and the upcoming Charlie’s Angels, Men in Black, You Are My Friend and Miss Bala.

    Before moving to SPE in 2016, Hunter was vp casting at 20th Century Fox, where she worked on Deadpool, X-Men: Apocalypse and Hidden Figures.

    Hunter started her career at Sarah Finn Co., where she spent more than a decade and rose to casting director. While there, she worked on Iron Man, Thor, Captain America, The Avengers, Guardians of the Galaxy, Godzilla and The Fast and the Furious.

    Hunter, who has a bachelor’s from UCLA school of theater, film and TV, becomes the latest Sony exec to move to Apple and joins head of unscripted Kim Rozenfeld, among others.

    Hunter was one of several executives from both the film and TV side who had been rumored to be in the mix for the casting job at Apple. Her hiring helps solidify the types of talent that Apple plans on pursuing for its scripted originals. The iPhone maker, which has been aggressive in buying TV and, more recently, film projects, has turned heads with deals for big name creatives and stars. Apple has TV series in the works starring the likes of Reese Witherspoon, Jennifer Aniston, Steve Carell, Octavia Spencer, Chris Evans and Hailee Steinfeld. The company has yet to reveal how — and when — it plans to roll out its roster of originals, though it is rumored to be summer 2019 and distributed for free via its Apple TV app.

    Post by Santana USA 🇺🇸 Contact me on December/12/2018 for everyone 🌎

    Windows 10 – Release information


    , , , , , ,


    The URL for the release information page has changed – update your bookmark!

    Microsoft has updated its servicing model. The Semi-Annual Channel (SAC) offers twice-per-year feature updates that release around March and September, with an 18-month servicing period for each release. Starting with Windows 10, version 1809, feature updates for Windows 10 Enterprise and Education editions with a targeted release month of September will be serviced for 30 months from their release date (more information can be found here). 

    If you are not using Windows Update for Business today, “Semi-Annual Channel (Targeted)” (SAC-T) has no impact on your devices (more information can be found here), and we recommend you begin deployment of each Semi-Annual Channel release right away to devices selected for early adoption and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible. 

    If you are using Windows Update for Business today, refer to the table below to understand when your device will be updated, based on which deferral period you have configured, SAC -T or SAC. 

    Notice: November 13, 2018: All editions of Windows 10 October 2018 Update, version 1809, for Windows client and server have resumed. Customers currently running Windows 10, version 1809, will receive build 17763.134 as part of our regularly scheduled Update Tuesday servicing in November. If you update to the Window 10, version 1809, feature update you will receive build 17763.107. On the next automatic scan for updates, you’ll be taken to the latest cumulative update (build 17763.134 or higher). 

    November 13 marks the revised start of the servicing timeline for the Semi-Annual Channel (“Targeted”) and Long-Term Servicing Channel (LTSC) release for Windows 10, version 1809, Windows Server 2019, and Windows Server, version 1809.

    For information about the re-release and updates to the support lifecycle, refer to John Cable’s blog, Windows 10 Update History, and the Windows lifecycle fact sheet.

    Post by Santana Team Blogger USA 🇺🇸 on December/12/2018 for everyone 🌎

    Reflector Full with key, download


    , , , , ,

    Reflector is a slick cross platform tool that mirrors your iPad or iPhone screen to Mac or PC.

    Reflector wirelessly streams your iOS device screen to a Mac or PC. It uses similar technology to Apple TV and is easy to setup. Note that your iOS device must support AirPlay for reflector to work and you should check the compatible device list before purchasing.

    Reflector is particularly useful for those that watch web streams or play games on iOS that they want to play on a big screen instead.

    Reflector Full

    3. KEY


    More here: 3.Activation keY

    License Key: 34NPHJ-QDB8TW-56SBVJ-S2AF4A-J2EFFX-WA23WL (Not working for many users)

    Use Crack if key doesn’t work

    *Keys would be updated soon till then use Reflector 3 crack*

    Report link crashes. Thanks for watching ! !

    Post by Santana Team Cracker USA 🇺🇸 for everyone 🌎

    Apple Suppliers Are Considering Moving iPhone Output if Tariffs Hit 25%


    , , , , ,

    Higher levies may push Apple to reconsider China manufacturing

    Apple. Inc. ‘ s suppliers will consider shifting iPhone production away from China should tariffs on U.S. imports skyrocket, but the U.S. company plans to sit tight for now, people familiar with the company’s thinking said.

    The tech giant’s suppliers intend to stick with the existing model even if the U.S. levies a 10 percent import tariff on smartphones, the people said, asking not to be identified talking about a private matter. But it will have to reassess the situation should U.S. President Donald Trump decide on a more punitive 25 percent, the people said.

    iPhones — the majority of which are made by assembly partner Hon Hai Precision Industry Co. in China and shipped around the world — have so far been spared in a tit-for-tat trade war between the world’s two largest economies. But Trump told the Wall Street Journal last month that tariffs could be slapped on smartphones and laptops made in China, the world’s largest manufacturer of electronics.

    Apple has long used the world’s No. 2 economy as its production base for everything from its signature device to iPads and Macs. The company’s supply chain now spans hundreds of companies, culminating in assemblers such as Hon Hai and Pegatron Corp Apple wasn’t available for comment outside of U.S. business hours. Hon Hai and Pegatron declined to comment.

    Apple’s manufacturing partners are largely beholden to the U.S. company’s wishes. Migrating parts of the sprawling network they underpin will be difficult and the U.S. company seems to be in wait-and-see mode for now, one of the people said. An Apple partner has already suggested alternative locations for non-iPhone production, but the U.S. company has indicated there’s little need to make such a move for now, another person said.

    Read more: Apple Falls as Trump Hints IPhones Could Get Hit by Tariffs

    That may change if tariffs escalate, an outcome now in the balance as Washington and Beijing begin thorny negotiations on a trade deal that could scale back a series of tariffs implemented this year. Apple, already grappling with mounting evidence that its latest iPhone line-up has failed to excite consumers, can ill-afford a sharp hike in import taxes.

    A 10-percent tariff could result in an earnings-per-share decline of just $1 for Apple, should all its hardware sold in the U.S. be subject to the levy and the company absorbs the cost, RBC analyst Amit Daryanani wrote in a Nov. 28 researchers note . That compares with the average 2019 Apple-EPS estimate of $13.32, according to data compiled by Bloomberg.

    However, a more severe scenario of a 25 percent tariff — absorbed by Apple — could result in an EPS decline of about $2.50, he added.

    In his early years running Apple, Tim Cook would respond to questions about increasing manufacturing in the U.S. by saying the skill sets in China are more conducive to producing the company’s products. However, in recent months, he has modified that view, saying in an interview this year that “it’s not true that the iPhone is not made in the United States.” Some components, like the smartphone’s glass cover, are manufactured in the U.S. and shipped for assembly in China.

    Posted on December by Santana Team Blogger USA 🇺🇸 for everyone 🌎

    Canadian court grants bail to CFO of China’s Huawei


    , , , ,

    VANCOUVER/BEIJING (Reuters) – A Canadian court on Tuesday granted bail to a top executive of Huawei Technologies Co Ltd while she awaits a hearing for extradition to the United States, a move that could help placate Chinese officials angered by her arrest.

    Meng Wanzhou, 46, Huawei’s chief financial officer and the daughter of its founder, faces U.S. accusations that she misled multinational banks about Iran-linked transactions, putting the banks at risk of violating U.S. sanctions.

    Justice William Ehrcke at a court hearing in Vancouver, British Columbia, on Tuesday granted bail to Meng, subject to a guarantee of C$10 million (£5.9 million) and other conditions.

    China had threatened severe consequences unless Canada released Meng immediately.

    A Canadian citizen has been detained in China, Canada said on Tuesday. The Canadian government said it saw no explicit link to the Huawei case, but analysts had predicted retaliation from Beijing. Two sources told Reuters the person detained was former Canadian diplomat Michael Kovrig, who now works for a think tank.

    Guy Saint-Jacques, Canada’s former ambassador to China, asked by the Canadian Broadcasting Corp whether the Kovrig detention was a coincidence, said: “In China there are no coincidences … If they want to send you a message they will send you a message.”

    Meng was detained as part of a U.S. investigation on Dec. 1 as she was changing planes in Vancouver.

    (Reporting by Julie Gordon in Vancouver; writing by Nick Zieminski and Rosalba O’Brien; additional reporting by Ben Blanchard and Michael Martina in Beijing, John Ruwitch in Shanghai and David Ljunggren in Ottawa; editing by Cynthia Osterman and Bill Rigby)

    Post by Santana Team Blogger USA 🇺🇸 on December/11/2018 for everyone 🌎

    At least two dead, 11 wounded in French Christmas market shooting


    , , , , ,

    Police secure a street and the surrounding area after a shooting in Strasbourg, France, Dec. 11, 2018.

    STRASBOURG, France, Dec 11 (Reuters) – A lone gunman shot dead at least two people and wounded 11 others near a Christmas market in the city of Strasbourg on Tuesday evening before fleeing, police said.

    The motive was not immediately clear but, with France still on high alert after a wave of attacks commissioned or inspired by Islamic State militants since early 2015, the counter-terrorism prosecutor opened an investigation.

    Interior Minister Christophe Castaner said the gunman was known to security services, and the local prefecture said he had previously been identified as a danger to security.

    People in the city’s Neudorf area and Etoile park were told to stay where they were as officers hunted the shooter on the ground and from the air.

    The European Parliament, which is sitting in Strasbourg this week, was put into lockdown.

    “There were gunshots and people running everywhere,” one local shopkeeper told BFM TV. “It lasted about 10 minutes.”

    The Christmas market was being held amid tight security this year, with unauthorized vehicles excluded from surrounding streets during opening hours and checkpoints set up on bridges and access points to search pedestrians’ bags.

    A source at the prosecutor’s office said the motive for the shooting was not immediately clear.

    A Reuters reporter was among 30 to 40 people being held in the basement of a supermarket for their own safety in central Strasbourg, waiting for police to clear the area. Lights were switched off and bottles of water handed out.


    President Emmanuel Macron was informed of the shooting and was being updated as events unfurled, an Elysee Palace official said. Castaner was on his way to Strasbourg, which lies on the border with Germany.

    A spokesman for the European Parliament said the building had been shut down and staff ordered to stay inside.

    “My thoughts are with the victims of the Strasbourg shooting, which I condemn with the utmost firmness,” tweeted Jean-Claude Juncker, head of the European Commission, the EU executive. “Strasbourg is an excellent symbol of peace and European Democracy. Values that we will always defend.”

    European security agencies have feared for some time that Islamist militants who left Europe to fight for Islamic State in Syria and Iraq would return after the jihadist group’s defeat, with the skills and motivation to carry out attacks at home.

    In 2016, a truck plowed into a Bastille Day crowd in Nice, killing more than 80 people, while in November 2015, coordinated Islamist militant attacks on the Bataclan concert hall and other sites in Paris claimed about 130 lives. There have also been attacks in Paris on a policeman on the Champs-Elysees avenue, the satirical weekly Charlie Hebdo and a kosher store.

    Almost exactly two years ago, a Tunisian Islamist rammed a hijacked truck into a Christmas market in central Berlin, killing 11 people as well as the driver.

    Post by Santana Team Blogger USA 🇺🇸 on December/11/2018 for everyone 🌎

    Download iOS 12.1.2 Beta 1 for Free (IPSW Direct Download Links & Over the Air Profile)


    , , , , , ,

    Remember before installing iOS update download the profile from this page

    What’s a new on iOS 12.1.2 Beta 1?

    Profile iOS Beta Software

    Download iOS 12.1.2 Beta 1 for Free (IPSW Direct Download Links & Over the Air Profile)

    It’s Monday and Apple has just released a new beta version of iOS to developers. iOS 12.1.2 beta 1 has just been released to developers, which will contain mostly bug fixes and minor improvements over iOS 12.1.1. Anyone can download and install it right now by either downloading the IPSW file and installing it with iTunes or updating over the air on your device after installing the OTA profile below.

    iPhone Download Links: 

    iPad Download Links: 

    iPod touch Download Links:

    Over The Air Profile:

    For instructions on how to install iOS 12 beta on your iPhone, iPod touch or iPad without having a paid developer account or UDID activation click here.

    Check out the iOS 12 section of the website for more information about iOS 12.

    ALSO SEE: How to Install iOS 12.1.2 Beta for Free (No UDID Activation)

    Post by Santana Team Blogger, Team Devs USA 🇺🇸 now available around the world 🌎

    Apple Releases iOS 12.1.2 Beta [Download]


    , , , , , , ,

    Apple has released the first beta of iOS 12.1.2 to developers for testing. The build number is 16D5024a.

    No new features are listed yet for the beta; however, it likely contains bug fixes and improvements to iOS 12.1.1 which brought eSIM support for additional carriers, notification previews using haptic touch on the iPhone XR, Live Photo capture during FaceTime calls, and more.

    Developers can download the iOS Configuration Profile needed to install betas from the link belowDownload

    Post by Santana Team Blogger USA 🇺🇸 on December/10/2018 for everyone 🌎

    Expediting changes to Google+ by David Thacker


    , , , , ,

    In October, we announced that we’d be sunsetting the consumer version of Google+ and its APIs because of the significant challenges involved in maintaining a successful product that meets consumers’ expectations, as well as the platform’s low usage.

    We’ve recently determined that some users were impacted by a software update introduced in November that contained a bug affecting a Google+ API. We discovered this bug as part of our standard and ongoing testing procedures and fixed it within a week of it being introduced. No third party compromised our systems, and we have no evidence that the app developers that inadvertently had this access for six days were aware of it or misused it in any way.

    With the discovery of this new bug, we have decided to expedite the shut-down of all Google + API this will occur within the next 90 days. In addition, we have also decided to accelerate the sunsetting of consumer Google+ from August 2019 to April 2019. While we recognize there are implications for developers, we want to ensure the protection of our users.

    Details about the bug and our investigation

    Our testing revealed that a Google+ API was not operating as intended. We fixed the bug promptly and began an investigation into the issue.

    Our investigation into the impact of the bug is ongoing, but here is what we have learned so far:

    • We have confirmed that the bug impacted approximately 52.5 million users in connection with a Google+ API. With respect to this API, apps that requested permission to view profile information that a user had added to their Google+ profile—like their name, email address, occupation, age (full list here)—were granted permission to view profile information about that user even when set to not-public.
    • In addition, apps with access to a user’s Google+ profile data also had access to the profile data that had been shared with the consenting user by another Google+ user but that was not shared publicly.
    • The bug did not give developers access to information such as financial data, national identification numbers, passwords, or similar data typically used for fraud or identity theft.
    • No third party compromised our systems, and we have no evidence that the developers who inadvertently had this access for six days were aware of it or misused it in any way. 

    We have begun the process of notifying consumer users and enterprise customers that were impacted by this bug. Our investigation is ongoing as to any potential impact to other Google+ APIs.

    Next steps for Consumer Google+

    We will sunset all Google+ APIs in the next 90 days.  Developers can expect to hear more from us on this topic in the coming days, and can stay informed by continuing to check the Google+ Developer Page

    We have also decided to accelerate sunsetting consumer Google+, bringing it forward from August 2019 to April 2019.  We want to give users ample opportunity to transition off of consumer Google+, and over the coming months, we will continue to provide users with additional information, including ways they can safely and securely download and migrate their data.

    A note for our enterprise customers

    We are in the process of notifying any enterprise customers that were impacted by this bug. A list of impacted users in those domains is being sent to system administrators, and we will reach out again if any additional impacted users or issues are discovered.

    G Suite Administrador are always in Control of theirs users’ App This ensures that G Suite users can give access only to apps that have been vetted and are trusted by their organization. In addition, we want to reiterate that we will continue to invest in Google+ for enterprise. More details were announced in October.

    We understand that our ability to build reliable products that protect your data drives user trust. We have always taken this seriously, and we continue to invest in our privacy programs to refine internal privacy review processes, create powerful data controls, and engage with users, researchers, and policymakers to get their feedback and improve our programs. We will never stop our work to build privacy protections that work for everyone.

    Post by Santana Team Blogger USA 🇺🇸 on December/10/2018 for everyone

    How to Deauthorize iTunes On a Computer You No Longer Have


    , , , , , ,

    These are instructions on how to deauthorize iTunes on a computer you no longer have access to.

    Apple allows you to authorize iTunes on up to five desktop devices. Eventually you may hit this limit and need to deauthorize one of them.

    Unfortunately, you can’t deauthorize an individual computer if you no longer have access to it; however, you can deauthorize all the computers tied to your Apple ID and start fresh.

    Here’s how…

    Step One

    Launch iTunes from your Dock.

    Step Two

    If you are not already signed in, select Sign In… from the Account menu.

    Enter your Apple ID and password then click the Sign In button.

    Step Three

    Choose View My Account… from the Account menu.

    Step Four

    Click the Deauthorize All button under your Apple ID Summary.

    Choose Deauthorize All from the confirmation popup that appears.

    Step Five

    You’ll be notified once the deauthorizations are complete. Click the OK button.

    Step Six

    You may now want to authorize the desktop device you’re currently using. To do so, open the Account menu and choose Authorize This Computer… from the Authorizations submenu.

    Step Seven

    Enter your Apple ID and password the click the Authorize button.

    Step Eight

    Apple will inform you that your computer has been authorized successfully.

    Post by Santana Team Blogger, Tutorials 🇺🇸 on December/10/2018 for everyone 🌎 thanks for visiting us ! ! 👏 👏

    How a telescope forum feud ended with prison time


    , , , , , ,

    Even the victim says the sentence was too harsh

    When the FBI appeared at David Goodyear’s doorstep in August 2016, they started asking him about telescopes. The 42-year-old IT specialist and avid stargazer had frequented an astronomy forum called Cloudy Nights. Now, someone had taken the forum offline with a denial-of-service attack, and the evidence pointed to Goodyear.

    Goodyear swore innocence at first, but after increasingly pointed questioning, he confessed. One of his accounts had been banned a couple of weeks ago, he said. In a sudden rage, he’d spammed the site with pornography, then posted its address on a site called, asking for someone to attack it. “I was just, like, what the fuck am I being banned for? I was just pissed,” he told his visitors — one from the Federal Bureau of Investigation and another from the Los Angeles Police Department. “I just went up in, just the heat of the moment.”

    His visitors seemed mildly amused by the forum drama, and he chatted with them about his $100,000 telescope collection before they left. But one year later, Goodyear was arrested. In December 2018, he was sentenced to more than two years in prison for violating the Computer Fraud and Abuse Act.

    It’s a sentence that even Goodyear’s victims don’t want him to serve. A single forum post was enough to direct a temporarily devastating attack on a small business, while federal computer crime laws meant that same post could now come with life-changing consequences.

    Distributed denial of service (or DDoS) attacks are one of the simplest cyberattacks: they flood a site with huge amounts of traffic until it can no longer serve pages to real users. At a large scale, these attacks can be incredibly disruptive. The 2016 Mirai DDoS shut down large sections of the web, hijacking insecure smart devices to create an army of bots. Even at a smaller scale, they can cause real harm — like Goodyear’s request did to the owners of the Cloudy Nights forum.

    Cloudy Nights is run by Astronomics, an Oklahoma-based company that sells telescopes and other astronomy gear. Vice president Michael Bieler estimates that the forum has around 115,000 registered users swapping advice, space photos, and opinions about telescopes. Bieler describes Cloudy Night as generally “a nice peaceful edge of the internet” where moderators have handed out fewer than a dozen lifetime bans in over 15 years of operation. Politics are prohibited except on a board for discussing light pollution laws.

    ““Mods and admins can’t stop me!””

    On August 13th, someone named HawaiiAPUser posted a screenshot of a failed login attempt, indicating they’d been banned under another name. Below was a string of sexual insults and porn links. “Mods and admins can’t stop me!” the user wrote. “I think I will talk with my contacts and just D0S this site as well as A55stronomics,” an apparent reference to a denial-of-service attack.

    The next day, Cloudy Nights and Astronomics’ website started getting overloaded with traffic, making the forums unreliable and keeping almost completely offline. “We’re just a small family-owned business, and he shut us down essentially for two weeks,” Bieler tells The Verge. “I made zero income. It was almost nonexistent.”

    As the attack continued, Bieler called the local police and a lawyer who told him to contact the FBI. “I was like, ‘Well, they’re going to laugh at me when I tell them someone got mad on a forum and has decided to take down my website,’” he says now. But at the time, he was deadly serious. Bieler told the agency that he was afraid his company would go out of business if the attacks continued, and that his father — the company’s founder — had gone to the hospital with cardiac problems from the stress. “It is literally killing him,” he wrote in an email.

    Cloudy Nights’ moderators, meanwhile, had a good idea who was behind the attack. Goodyear had been a regular visitor until 2013 when he was banned for — as he put it — “mouthing off” to moderators. (Court documents paint a darker picture, saying he followed up with a threatening message “asking to fight” one of them.) He’d created several more accounts since then, and moderators kept banning them. HawaiiAPUser’s screenshot had a timestamp, so they checked which accounts had been active at that moment and whether other people had logged in from the same IP address. Goodyear’s old accounts came up.

    On August 31st, the FBI and LAPD visited Goodyear’s house in El Segundo, California. Goodyear professed bafflement about why they’d come, claiming that he wasn’t behind the post. “I kind of washed my hands of this website,” he said, suggesting that an employee or a hacker might have used his network.

    The agents threatened to start filing search warrants. “The FBI knows what they’re doing,” one warned ominously. “We caught Osama bin Laden, right? We can catch someone doing a DDoS.”

    The argument apparently convinced Goodyear. “I did post that crap about hitting them. I also put on a hack forum, saying, ‘Hey, can you take down this site?’” he admitted. “I think that maybe it went further than what it should have.” But he insisted that he had no hacking expertise and hadn’t paid anyone for the attack. When asked whether he could make the attacks stop, he said he “didn’t know [the HackForum members] well enough.”

    ““We caught Osama bin Laden, right? We can catch someone doing a DDoS.””

    It’s not totally clear how the DDoS campaign did end. According to a September 2016 screenshot of Goodyear’s account, the last time he logged in — at least under his original username — was August 29th. The last successful DDoS attempt was on August 30th, the day before Goodyear spoke to the FBI. The attackers may have stopped voluntarily after that, or they might have been stymied by Astronomics’ new defenses since Bieler had hired a cybersecurity expert to help.

    In a press release, the Justice Department emphasized “the importance of deterring sophisticated cybercrimes, which are difficult to trace and therefore particularly important to punish.” But the way Goodyear described his crime was almost ridiculously unsophisticated. In his FBI interview, he said he’d searched Google for ways to get back at Cloudy Night. “I was looking for other ways to see if I could take them out, if I could hack… get a botnet or something.” He found, said “screw it,” and signed up.

    Either way, a jury found Goodyear responsible for one count of “intentional damage to a protected computer.” A judge sentenced him to a $2,500 fine, $27,352 in restitution, and 26 months in prison.

    Bieler had assumed the case was closed until the FBI arrested Goodyear a year later and summoned Bieler to court. He was shocked when he learned about the length of the sentence. He never wanted Goodyear to be imprisoned at all, let alone for two years. “Honestly, I think it’s extreme, what happened,” he says. “We actually asked in our letter [to the court] that he not get prison time. We just wanted him to stop attacking our website.”

    The 34-year-old Computer Fraud and Abuse Act (CFAA), which tech policy expert Tim Wu has called “the worst law in technology,” is controversial for many reasons. One of the most common is its harsh sentencing rules.

    Judges base jail sentences on a range defined with the United States Sentencing Guideline rubric, which calculates a number representing a crime’s severity. The CFAA makes that number unusually easy to inflate. Prosecutors can bump up the estimated cost of a hack with loosely related expenses, or lowball it if a defendant cooperates. They can add extra penalties for using “sophisticated means” and “special skills,” even for fairly simple actions like running a script.

    “This, to me, is a disproportionately punitive sentence,” says attorney Tor Ekeland of Goodyear’s 26-month term. “Unfortunately, it’s kind of typical.” Ekeland has represented figures like security researcher Justin Shafer and journalist Matthew Keys in cybercrime cases, and he’s one of the CFAA’s most outspoken critics. He says there’s no cut-and-dried legal framework for convicting people of DDoS attacks since the crime is fairly new. But he thinks that prosecutors often bring even clearly weak cases to court, both because they’re relatively easy to argue and because there’s a “sexiness factor” to computer crimes.

    ““This was not a sophisticated computer crime.””

    The Justice Department has proven particularly adept at DDoS prosecutions under Trump, prosecuting the Mirai botnet’s creators and, more recently, the man behind several attacks on major gaming networks. These don’t always result in long sentences, but as the Justice Department press release suggests, courts punish some individual cybercrimes harshly as a deterrent since only a fraction of offenders are caught.

    Online crimes are hard to trace, and that’s a real problem for the people who are fighting online threats, swatting hoaxes, or ransomware operations. And far from overreacting to all internet crimes, law enforcement and courts can ignore or downplay online harassment, for example.

    Ekeland thinks that courts treat many “hacker” crimes as unduly threatening, however, compared to non-computer crimes that cause financial damage — or bad behavior by companies. The line about the DDoS attack’s sophistication is particularly “absurd,” he says. “This was not a sophisticated computer crime. And the fact that the court thought that highlights the problem with these types of cases.”

    The CFAA is only one facet of the American justice system’s problems, of course. Lots of offenses besides cybercrimes can result in disproportionate sentences. And the problem isn’t just overlong prison terms. It’s the inhumane conditions of American prisons, which affect millions of people who are far less privileged than Goodyear, some of whom haven’t even been convicted of a crime.

    Virtually everyone involved in catching Goodyear seemed a little bemused by the whole saga. “How are you guys getting banned from an astronomy site?” wondered the FBI agent who arrived to question him. “Is there a debate on a tenth planet or something?” And in Goodyear’s estimation, all he’d done was log into a forum, ask “Hey, can you guys hack this?” and go back to life as usual. He agreed that what he’d done was wrong, but he seemed surprised to hear that he could get in real trouble for it.

    Today, Bieler finds it “insane” that a man would nurse a three-year-long grudge against an astronomy forum so bitterly that he would effectively try to bankrupt a company in revenge. “If people could just step away from their keyboards for five seconds, a lot of this wouldn’t happen,” he says. But as the case reaches its end, he simply feels bad for everyone involved — including Goodyear.

    “Look, losing money sucks. Having my business down for a few weeks sucks. Not knowing what’s going to happen because you have no income coming in to pay people’s salaries sucks,” says Bieler. “Losing two years of your life because you did something dumb sucks worse.”

    Post by Santana Team Blogger, Santana Team Hack 🇺🇸 on December/10/2018 for everyone

    Download vShare


    , , , , , , ,

    Download vShare

    Team vShare

    vShare is a legal way of downloading “FREE” apps and games with plenty of modified content onto the iPhone or iPad.

    Packed with features, vShare  works on all iOS versions including older iOS 8 and upto latest 2018 version iOS 12 and on all Android versions . You can read more ( about ) vShare in the given link.

    How to Download vShare :

    vShare supports both iOS and Android platforms so pick the download method that matches your platform.

    Method 1: Easy Method

    *Directly Downloads vShare AppStore

    1 Tap the download button belowDownload AppStore

    2 As the page loads up , tap on the UP arrow as shown in the image below.

    3 After this , tap the option Add to HomeScreen.

    4 In the next screen , name the app as vShare and tap on Add option

    5 Launch vShare from your home screen and Proceed to Step 2 below.

    Method 2 : Expert Method

    *Requires Installing Configuration Profile

    Configuration Profile

    1 Open Safari browser and tap on the download button above.

    2 Tap the Install link on the vShare page that loads so the configuration profile may be downloaded

    3 Tap Install Profile when Settings opens and then input your passcode

    4 Tap Install vShare in Safari when it opens and then tap Install to confirm 

    5 Tap Install > Next and then Done when Settings opens and the app icon will show up on your home screen.

    6 Tap the icon to use vShare; if you don’t see it, repeat the steps.

    Method 3: vShare Android

    Android users have been given the opportunity to download free content without Rooting. It does require the manual download of the vShare .apk file but this is simple enough and you can find a full ( tutorial ) with guided setup . Use the download button below to directly install the apk file on your device.

    Android APK VShare for Android

    Method 4 : vShare Helper VShare Helper

    vShare Helper is a Windows Only .EXE program file used to assist users in downloading and installing the vShare app on your iOS or Android device. The full ( tutorial ) for download is given in the link. The EXE file could be downloaded from the link below.

    Method 5 : vShare PC VShare Windows PC

    This allows you to download the vShare app using your PC or Personal Computer running Windows OS or Mac OSX. Follow the step by step tutorial to download the vShare App using your Windows – Mac  desktop or laptop.

    vShare Windows PC

    vShare App Features :

    ◦ Easy download and installation

    ◦ Supports all devices on iOS 8 to iOS 12

    ◦ Works on Android devices too 

    ◦ Plenty of apps and games to choose from, along with themes, wallpapers, ringtones and more

    ◦ Lots of modified apps and games like Snapchat++, Instagram++, and Pokémon Go++

    ◦ Updated with new content regularly

    ◦ Safe to use

    ◦ Lots more features 

    vShare Alternatives :

    vShare is just one of many app installers we have, and, although it offers a lot of content, it may not be right for you.

    Check out our page of vShare Alternatives and see what other app installers there are.

    ◦ Apps Like vShare

    Other Useful Links : Apps Like vShare

    ◦ Is vShare Safe to Use ?

    ◦ Frequently Asked Questions

    ◦ vShare Errors Fix

    vShare has always been a popular choice for iOS users and remains that way today. Now Android users can get a taste of what’s on offer too so download it on either platform and enjoy unfettered, free access to tons of content.

    For more useful tips and developer updates, you can follow us on Facebook.

    *Please let us know if the Download LINKS on this page are NOT WORKING.

    Post by Santana Team Blogger on December/08/2018 for all the world 🌎