January 2016 | German Technology

Friday, January 29, 2016

Land of friendship, we do not know the distance from one place to another; nothing is almost nothing is far: the friend, though absent, is always present to the friend by the imagination. If the distance between their body, mind meets their souls



Land of friendship, we do not know the distance from one place to another; nothing is almost nothing is far: the friend, though absent, is always present to the friend by the imagination. If the distance between their body, mind meets their souls



                                                            Land-of-friendship




Land of friendship, we do not know the distance from one place to another; nothing is almost nothing is far: the friend, though absent, is always present to the friend by the imagination. If the distance between their body, mind meets their souls
Land of friendship

Thursday, January 28, 2016

The new rewards program to encourage independent security researchers to work in order to improve Google security. Empowering Users and Administrators to Improve Security and Compliance 16 ... control company data, but via cloud-based tools and dashboards. Rather than only using .... malware and phishing, and offer rewards for finding security bugs ,google recaptcha,google captcha

Google Security Team

The new rewards program to encourage independent security researchers to work in order to improve Google security.
The new rewards program to encourage independent security researchers to work in order to improve Google security.

Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. We've seen a sustained increase in the number of high quality reports from researchers, and their combined efforts are contributing to a more secure Chromium browser for millions of users.

Today, Google US company launched its service through the cloud storage "Google Drive" a new rewards program to encourage independent security researchers to work in order to improve the security of their data cloud.

In the spirit of the original Chromium blog post, we have some information about the new program in a question and answer format below:

Q) What applications are in scope?
A) Any Google web properties which display or manage highly sensitive authenticated user data or accounts may be in scope. Some examples could include:
*.google.com
*.youtube.com
*.blogger.com
*.orkut.com
For now, Google's client applications (e.g. Android, Picasa, Google Desktop, etc) are not in scope. We may expand the program in the future.

UPDATE: We also recommend reading our additional thoughts about these guidelines to help clarify what types of applications and bugs are eligible for this program.

Google Security Team

Google Security Team
Q) What classes of bug are in scope? 
A) It's difficult to provide a definitive list of vulnerabilities that will be rewarded; however, any serious bug which directly affects the confidentiality or integrity of user data may be in scope. We anticipate most rewards will be in bug categories such as:
XSS
XSRF / CSRF
XSSI (cross-site script inclusion)
Bypassing authorization controls (e.g. User A can access User B's private data)
Server side code execution or command injection
Out of concern for the availability of our services to all users, we ask you to refrain from using automated testing tools.

These categories of bugs are definitively excluded:
attacks against Google’s corporate infrastructure
social engineering and physical attacks
denial of service bugs
non-web application vulnerabilities, including vulnerabilities in client applications
SEO blackhat techniques
vulnerabilities in Google-branded websites hosted by third parties
bugs in technologies recently acquired by Google
Q) How far should I go to demonstrate a vulnerability?
A) Please, only ever target your own account or a test account. Never attempt to access anyone else's data. Do not engage in any activity that bombards Google services with large numbers of requests or large volumes of data.

Q) I've found a vulnerability — how do I report it?
A) Contact details are listed here. Please only use the email address given for actual vulnerabilities in Google products. Non-security bugs and queries about problems with your account should should instead be directed to the Google Help Centers.

Q) What reward might I get?
A) The base reward for qualifying bugs is $500. If the rewards panel finds a particular bug to be severe or unusually clever, rewards of up to $3,133.7 may be issued. The panel may also decide a single report actually constitutes multiple bugs requiring reward, or that multiple reports constitute only a single reward.

We understand that some researchers aren’t interested in the money, so we’d also like to give you the option to donate your reward to charity. If you do, we'll match it — subject to our discretion.

Regardless of whether you're rewarded monetarily or not, all vulnerability reporters who interact with us in a respectful, productive manner will be credited on a new vulnerability reporter page. If we file a bug internally, you'll be credited.

Superstar performers will continue to be acknowledged under the "We Thank You" section of this page.

Q) How do I find out if my bug qualified for a reward?
A) You will receive a comment to this effect in an emailed response from the Google Security Team.

Q) What if someone else also found the same bug?
A) Only the first report of a given issue that we had not yet identified is eligible. In the event of a duplicate submission, only the earliest received report is considered.

Q) Will bugs disclosed without giving Google developers an opportunity to fix them first still qualify?
A) We believe handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release.

Q) Do I still qualify if I disclose the problem publicly once fixed?
A) Yes, absolutely! We encourage open collaboration. We will also make sure to credit you on our new vulnerability reporter page.

Q) Who determines whether a given bug is eligible?
A) Several members of the Google Security Team including Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski.

Q) Are you going to list my name on a public web page?
A) Only if you want us to. If selected as the recipient of a reward, and you accept, we will need your contact details in order to pay you. However, at your discretion, you can choose not to be listed on any credit page.

Q) No doubt you wanted to make some legal points?
A) Sure. We encourage broad participation. However, we are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. This program is also not open to minors. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law.

This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time, and the decision as to whether or not to pay a reward has to be entirely at our discretion.

Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.

Thank you for helping us to make Google's products more secure. We look forward to issuing our first reward in this new program.

Wednesday, January 27, 2016

Google offers rewards to improve data security , Security and Compliance on the Google Cloud Platform , New rewards program to encourage the improvement of the security of their data cloud Google Drive


Google offers rewards to improve data security
Google offers rewards to improve data security

Google US company launched its service through the cloud storage "Google Drive" a new rewards program to encourage independent security researchers to work in order to improve the security of their data cloud.
He said, "Google Drive" product manager Kevin Nelson This program is a way of contributing to the gung independent researchers in the Google data protection, noting that the company will launch the program next year, and will devote a million dollars to finance more rewards independent security research.
Security and Compliance on the Google Cloud Platform
Security and Compliance on the Google Cloud Platform
Google will continue to provide up to twenty thousand dollars to anyone who can create and submit a detailed report about any problem, thus contributing to make the save data more secure for users.



Tuesday, January 26, 2016

Snapchat to take on Messenger and FaceTime: Leaks reveal redesigned chat interface will include video calls and allow users to add stickers , Snapchat facing Facebook Messenger next update



Snapchat to take on Messenger and FaceTime: Leaks reveal redesigned chat interface will include video calls and allow users to add stickers
Snapchat facing Facebook Messenger next update
                     
Snapchat to take on Messenger and FaceTime: Leaks reveal redesigned chat interface will include video calls and allow users to add stickers

And snapchat is the application of social networking has a unique feature, which allows users to take pictures and record video and sent to the recipient with a set length of time that can be to him, during which the review of those pictures or video, currently range from that period between the second and ten seconds, after which the company says are deleted Article sent from its servers once and for all, without being able to save them to the receiver of his phone.

- Snapchat is working on a completely revamped version of chat, ‘ChatV2'
- Interface will be similar to Facebook Messenger
- Bar above the text box allows users to initiate the call, either audio or video
- More competitive with apps and engage in new revenue streams



Snapchat facing Facebook Messenger next updateSnapchat facing Facebook Messenger next update

Chrome PC shipments in 2015 on pace to grow compared to 2014, Chromebook computers are growing at the expense of Windows


Chromebook computers are growing at the expense of Windows
Chromebook computers are growing at the expense of Windows
Market Research Company (IDC) announced that the computers "Chromebook" laptop working shipments operating "Chrome OS" system developed by Google rose on desktop and laptop computers operating system Windows account, at a time when PC sales in general from recession suffer large an unprecedented since 2008.

Chrome PC shipments in 2015 on pace to grow compared to 2014
Chrome PC shipments in 2015 on pace to grow compared to 2014

The Chromebook computers attract students and educational institutions in particular, because of the low prices compared to Windows computers, although it is primarily directed to the Web.
According to research firm that Chromebook shipments accounting for 2.8% of all computers that were shipped to all over the world during the first three quarters of 2015, compared to 1.9% achieved by those computers shipments during the whole of 2014


Google has promoted Chromebook as a low-cost replacement to Windows PCs, especially with more people using Web applications. Google also promised regular OS updates and the ability to use applications offline when the computer isn't connected to the Internet.

Monday, January 25, 2016

Critical gap threatens 66% of Android devices , New security flaw threatens more than 66% of Android devices and ... Android devices and millions of computers operating system Linux




Critical gap threatens 66% of Android devices

Critical gap threatens 66% of Android devices


Announced that researchers at the company,  "perception point company "  in the field of protection the discovery of a loophole system Linux open source were not remarkable for four years and can be exploited in personal computers and servers operating this system, as they also affect all devices that work with any version of the latest version of Android 4.1 (Jelly Bean).

According to the company, this gap bearing the name "cve-2016-0728" existed since the 3.8 version of the Linux kernel, which was issued in 2012, the researchers were able to review how to exploit that gap by replacing one of the codes system ones have been implemented through the nucleus like the original code.

The gap allows the hackers who have actually access to Linux servers to obtain the powers of the device manager, or allow some Android suspicious applications the ability to modify the basic functions of the operating system and control without restrictions.

Fortunately for users, as the company confirmed that it has not yet monitored any exploitation of a loophole in public, but nevertheless, the devices will remain vulnerable to exploitation at any time unless it is tinkering nucleus Linux, which will be probably early next week.

Critical gap threatens 66% of Android devices

New security flaw threatens more than 66% of Android devices and ... Android devices and millions of computers operating system Linux

Friday, January 22, 2016

Network "Facebook" social unveiled a new generation of technologies developed to overcome the obstacles to broadcast and share video clips VR Virtual Reality rotation angle of 360 degrees.


 Network "Facebook" social unveiled a new generation of technologies developed to overcome the obstacles to broadcast and share video clips VR Virtual Reality rotation angle of 360 degrees.

Network "Facebook" social unveiled a new generation of technologies developed to overcome the obstacles to broadcast and share video clips VR Virtual Reality rotation angle of 360 degrees.
Network "Facebook" social unveiled a new generation of technologies developed to overcome the obstacles to broadcast and share video clips VR Virtual Reality rotation angle of 360 degrees.
She explained, "Facebook" the biggest challenge was to provide experience distinctive use while browsing the latest news, especially with the increasing prevalence of video clips angle of 360 degrees, so the focus was to get rid of the problems that exist because of "symmetric-dimensional cylindrical representation" equirectangular in sections 360 degrees.

Samsung Electronics, the world's top smartphone maker . Samsung plans initial production of ‘five million Galaxy S7 phones’


Samsung plans initial production of ‘five million Galaxy S7 phones’
 Samsung Electronics, the world's top smartphone maker

Samsung Electronics, the world's top smartphone maker, plans an initial production run of about 5 million of its upcoming Galaxy S7 smartphones, South Korea's Electronic Times reported on Monday, citing unnamed sources.

The paper said Samsung is planning to launch two different versions of its new flagship smartphone: a 5.2-inch flat-screen version, and a 5.5-inch, curved-screen version that will be called the 'Galaxy S7 edge'.

Samsung plans to initially make 3.3 million of the flat-screen devices and around 1.6 million of the curved-screen version, the report said, with plans to launch the handset in February.

Launch of the first solid state disk with a capacity of 13 terabytes


Launch of the first solid state disk with a capacity of 13 terabytes
Launch of the first solid state disk with a capacity of 13 terabytes

Usually it is a trend towards the use of state drive Solid "SS de" -alta offers performance far exceeds traditional hard drives "HD DVD" - at the expense of storage capacity, where the first lacks tablets large capacities, but this has changed drastically with the Japanese Vixtarz company which revealed the store "SS de" Tirabaata disk with a capacity of 13, making it the first tablet of its kind with such enormous capacity.
It holds the disc, who comes compared 2.5-inch Almaaara- name "SSD-13000M" while carrying his younger brother that comes with a capacity of ten terabytes name "SSD-10000M."
The company is not new in the field of Solid-state drives with large storage capacity, where it was introduced last year discs with a capacity of six terabytes.
And operate the new drive technology, control of design Vixtarz, which rely on memory "mother of VLC Nand" (MLC NAND), which uses a multi-layer cells, manufactured technology, 15 nanometers.
The company says that reading in a row for these drives speed of 580 Migabaata per second, and writing speed of 540 Migabaata in the second, as it claims that these speeds will maintain its stability through the input and long O operations, and that the energy consumption is less than three watts in sleep state and up to 6.5 watts when pressed.
As is the case when the company put enormous disk storage capacity, the new disk is not prompt for home user, especially since the price of 13 thousand US dollars.

Thursday, January 21, 2016

10 Tips to capture the best images on your phone


10 Tips to capture the best images on your phone
10 Tips to capture the best images on your phone
Featuring smart phones these days cameras high quality hardly compete with a lot of digital-type "towards the cameras and images." Despite the limited capabilities of cameras, smart phones, it is possible to capture the distinctive images, and offered the following tips will help .
1. Learn the automatic mode
Knowing how to work in auto-imaging phone pattern very helps to take good pictures. Learn when to use this rate "ISO" high style, and when to use a long shutter speed, and therefore you could edit How do you take photos.
2. override the default settings
Not be the default settings set by the phone always appropriate, requiring overcome ..
 3. Choose a good position for imaging, or use a tripod
The degree of stability during imaging plays a major role in the quality of the image, so that any movement no matter how simple the picture may lose its unity
Although the idea of ​​movement tri-holder for the installation of the phone when shooting may not suit you, but this method is proven to get great pictures.
4. took advantage of filming "High Dynamic Range" pattern (HDR)
And capping the extent of the intensity of light that the camera can capture in one while retaining detail, despite the fact that this pattern remains a weak point in the cameras, smart phones, it is useful in many cases.
5. Use the full sensor
Be the default mode for shooting in most smart phones 16: 9.
6. dealt image
They may be picked up what you think it is the best possible picture of the scene with a camera phone smart, but the picture with it were not so rich color or intensity or the beauty that I wanted. And here we enter in the "post-treatment" of the image which is made using a image processing software on a personal computer such as "Lightroom" or stage can even use one of the many phone applications to achieve the same purpose, and in the end you might get a picture to fascinate who sees it.
7. lose App Store
Not necessarily be used for the application of the default camera in your smartphone,  applications "Google Play", and "App Store," and "Windows Phone Store" includes many good imaging applications, such as the application of "Zoom FX camera" for Android phones, and " Camera + "and" Pro camera "phones to iPhone, and" Nokia camera "for Windows phones.
8. Do not resort to rounding never
Enjoyed most of the cameras Smart possibility of rounding phones, but since the vast majority of smart phones do not have the possibility of optical zoom (optical zoom) they use digital zoom, meaning they are simply enlarges pixels image before captured, resulting in data loss and reduce the quality of the image without the possibility of retreat about it.
9. closeup photographs
Characterized smartphones wide-angle lenses, which means that it is difficult to get those misty background images in mid-range digital cameras such as single-lens reflex (SLR DVD) but nevertheless can get those required Blur to approach more of the body to be filmed.
10. Lighting
Good lighting is the key to success for beautiful images, and smartphones have small sensors sufficient capacity to deal with poor lighting, for this is important to ensure that the body is the subject holds a sufficient lighting.

Facebook launches new service for sports fans , Facebook launches new hub for sports fans , The new service


Facebook launches new service for sports fans
Facebook launches new service for sports fans
Facebook Inc. on Thursday launched a new service named "Sports Stadium Facebook" chirp text with Twitter and described it as a place dedicated to lovers of sports competitions with friends and the world in real time.
The company explained that the presence of more than 650 million sports fans, Facebook is the largest stadium in the world, as people already turn to Facebook for the celebration and sympathy and talk with their friends and other fans.
The company, which owns more than 1.55 billion monthly active users and the girl said she reserved a place for sport so that users from feeling as if they were able to watch sports competitions with their friends if they are not present in the same place.
And it supports a service that became available beginning in the day competitions of American football at the moment, but it will include soon other games such as basketball and football, as it is only for phones iPhone in the United States are available, and with a plan for expansion to other platforms in the coming weeks.

Tuesday, January 19, 2016

Disclosure of the worst passwords of 2015

Disclosure of the worst passwords of 2015
Disclosure of the worst passwords of 2015
Security company "SplashData" revealed as usual every year arranged for the worst passwords scattered among Web users, and this arrangement shows how a large percentage of users disregard the protection of its security informational chosen words easy and bad traffic.
And it seems that Aalktheron phenomenon words bad mystery still exist and spread strongly among Internet users, where SplashData company accustomed to the order of the worst passwords scattered on an annual basis, and in the order of 2015 is still the word "123456" passage is dominant and has maintained its position in the fore since last year and finished second password "password" in third place with "12345678" and IV "qwerty".


Disclosure of the worst passwords of 2015
Disclosure of the worst passwords of 2015
The list of the worst passwords of the year 2015 saw the emergence of new words as well as for the first time in the ranking and login as a welcom addition to the star wars movie famous science fiction.
And always keen on information security experts advise users to choose a long and difficult passage is difficult to predict the blades or decoding words.



Sunday, January 17, 2016

An application that allows friends to communicate virtual world



An application that allows friends to communicate virtual world
An application that allows friends to communicate virtual world

The British company software  launched the application name "in Time" or the default time, and shows the film introduced by the company on its website a recording by default to put friends in a mass telephony through the application works on smart phones..
The company says that "four users of the application can meet in a three-dimensional virtual world through their smart phones reached a private speakers are placed on the head can form a placebo human interaction depending on the track the lips and head movements.
Interlocutors application shows they are in a relaxed state in a fictional virtual environments, whether on the beach or in the palaces
The company launched the application name "in Time" or the default time, and shows the film introduced by the company on its website a recording by default to put friends in a mass telephony.
The company says that "four users of the application can meet in a three-dimensional virtual world through their smart phones reached a private speakers are placed on the head can form a placebo human interaction depending on the track the lips and head movements.
Interlocutors application shows they are in a relaxed state in a fictional virtual environments, whether on the beach or in the palaces or in space.

Thursday, January 14, 2016

Microsoft to end support for Internet Explorer . This announcement is an important news for developers who are forced to target older browsers internet explorer



Microsoft to end support for Internet Explorer
Microsoft to end support for Internet Explorer


US software company Microsoft announced on Wednesday that it will end on January 12 this support for the Internet Explorer browser, the famous eighth, ninth and tenth versions, note that version 11 is the latest versions of the browser, which was succeeded by the new browser "EDGE".
It will last update posed by the company for Internet Explorer-whichever will carry the name "KB3123303" - to promote Windows 7 and Windows Server 2008 R2 users, who are using older browsers, to upgrade to a newer browsers company.

Microsoft to end support for Internet Explorer

Microsoft to end support for Internet Explorer
Microsoft to end support for Internet Explorer
Microsoft to end support for Internet Explorer




The move to end the support by the end of Microsoft's security to those versions of the browser, then users will not have any security updates or technical support from the company, which makes those who use it more prone to piracy and security gaps.
And Microsoft was announced in August / August 2014 about the end of support for older versions of the browser, approaches, and confirmed that it will not issue security updates for those copies later, which means leaving millions of users without security updates.

Microsoft to end support for Internet Explorer
Microsoft to end support for Internet Explorer

This Declaration is an important news for developers who are forced to target older browsers, and worry about whether the modern programming style works on those browsers are good or not.

Tuesday, January 12, 2016

Plane Paper Unique and innovative with The latest technology without a pilot.



Plane Paper Unique and innovative with The latest technology without a pilot.
Plane Paper Unique and innovative with The latest technology without a pilot.

Ceremony International Consumer Electronics Show, which ended a few days ago in the US city of Las Vegas, many of the unique and innovative technologies, including kite but it's not like the rest of the paper planes, aircraft are equipped with the latest technology aircraft without a pilot.
According to the company, "Bauer father Toys" emerging -almroth aircraft in cooperation with the French-Barrot, the company plane is the first kite march with a camera broadcast video rotation are fully and with a wide field of vision.
And broadcast video camera directly to the user, who can also control the plane using a pair of virtual reality glasses such as Google Cardbord which has a price a few dollars telephone.
The executive director of the company Goten tea "We're trying to have access to the maximum of what people remember about my favorite paper planes from the days of childhood." "When we were smaller we were inspired to invent and try and play, and we come techniques today to where it all began .. kites."
He explained that the aircraft has a twin-engine, allowing the user to go up and down the plane and direction of the Yemeni and left, and can be controlled through the application via the wireless technology "Wi-Fi" the extent of up to two hundred meters.
The plane made of cardboard and the length of the rod passes at the center, and connects the penis engine in the plane's nose payment system in the rear. And come with designs that can be followed to build a new plane in case the original is damaged.
And it owns the plane nose bullets to keep them from shock, which can fly for about ten minutes before continuing need to replace the batteries, and will go on sale this year at a price of $ 199 with virtual reality glasses and is priced at $ 149 without the glasses.
believe that the consumer will find it fascinating. A user does Butti and installation of the plane by himself and then follow the instructions to install power generator and a computer system and a system of payment system "Wi-Fi" and several other navigational techniques.
In the end, the user will find within the reach of his hands aircraft weighing paper about sixty grams turned into a drone can be controlled through the phone or glasses and virtual reality, as it allows for the last user to control the plane by moving his head left and right and above and below.

Source: Reuters

Leaks: Nokia tested three Android phones



It seems that the Finnish company Nokia on its way to fulfill its promise to return to the manufacture and sale of smart phones in 2016, where leaks indicate that the company has already begun testing the three smart phones Android system.


Leaks: Nokia tested three Android phones
Leaks: Nokia tested three Android phones

According to informed sources within the smart phone industry that the new phones will be similar in design and shape of the tablet computer hand "that one" put forward by Nokia in January 2015 and built by the Taiwanese company Foxconn, which may make those phones as well.

Monday, January 11, 2016

Nokia reportedly plans a return to smartphones in 2016



Nokia is planning to make a comeback and return to making phones in 2016. That's according to personnel familiar with company plans, who reveal that releasing Android tablets under the brand simply isn't enough.

Nokia reportedly plans a return to smartphones in 2016
Nokia reportedly plans a return to smartphones in 2016 
Nokia reportedly plans a return to smartphones in 2016
Nokia reportedly plans a return to smartphones in 2016 

With the introduction of the Nokia 2016 has become a company with freedom, where officially ended item that was part of Microsoft's takeover deal, which prevents the company from the competition in the mobile phone market and the issuance of phones under the brand Nokia the day before 12.31.2015.

Nokia reportedly plans a return to smartphones in 2016
Nokia reportedly plans a return to smartphones in 2016 
On the ground for the return of Nokia phones market was waiting and leaks that began to appear in the days abound and the days to come naturally to one of the most prestigious companies in the mobile industry.
Nokia follows Samsung and Motorola with the launch of its first ever Android phones - and there are THREE of them
Nokia reportedly plans a return to smartphones in 2016 
Today featured pictures of a new Nokia phones where the source indicates that Nokia plans to reveal three phones at different times during this year may be of varying sizes, specifications and prices.

The Nokia has issued a tablet N1 Android system last year and which has been wonderful to receive in the Chinese market is also expected to receive the same reception the company's phones because of the great reputation and longing to own a Nokia phone again so to speak.

Friday, January 8, 2016

10 exotic locales must be had in Tunisia ,Top 10 Places to Visit in Tunisia .The 10 Most Beautiful Towns in Tunisia ,Best places to visit in Tunisia: discover the Top destinations of Tunisia



Pictures: 10 exotic locales must be had in Tunisia



1- Ras raisins -bnzert:
It is a coastal area located near the city of Metline and this region and is characterized by its beautiful scenery overlooking the Mediterranean Sea.


10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia

2- Beja accuracy :
 city of relics and archaeological site recorded accurately on the World Heritage List since 1997.



10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia



3- Galite Islands :
Galite Islands island off the northern coast of Tunisia and is located 81 km to the city of Bizerte and 64 kilometers east of the city of Tabarka and is a nature reserve has a landscaped charming.

10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia


4-Ain Draham - Jendouba:
located Ain Draham in Jendouba the north-west region,. Located in the north-west of Tunisia and is the third most important tourist site in the state after the coastal town of Tabarka.


10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia


5- Tabarka - Jendouba:
Tabarka city in the state of Jendouba is located tourist city characterized by its greenery and ruins on the sea, very cold climate, also characterized coastal areas with mountains. areas are Tall high mountains with sea.
10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia



6- Kelibia - Nabeul:
Kélibia city located in the state of Nabeul and the city is one of the most important fishing ports in Tunisia as port 15,000 tons production up. Embraces kelibia fort that dates back to the era.


10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia


10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia

7- Haouaria - Nabeul:
Haouaria in the city of Nabeul located, Haouaria nicknamed the old name "Akilria" Falcon or the country's abundant caves and caves dating back to the Carthaginian period. Home to the city annually, "falconry" Festival.

10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia

8 - Matmata - Gabes :
Located in the state of Gabes typical structures of the village are built through digging a large hole in the ground. And around the perimeter of this crater there are caves dug to be used as rooms, as well as there are some houses that include multiple holes and connecting them trench or underground passage.

10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia

9- Palace Gillan - Medenine:
Palace Gillan area is an oasis located in the state of me and is one of the gates of the desert . ancient castle dating back to the Roman era.


10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia

10- Kerkennah Islands - Sfax:
Kerkennah archipelago is just about 32 km to the city of Sfax and is administratively follow the mandate of Sfax and this archipelago stretches from the southwest to the northeast at a distance of 40 km, and currently exceeds 5 km, and scans 150 square kilometers. Kerkennah archipelago consists of two main islands.


10 exotic locales must be had in Tunisia
10 exotic locales must be had in Tunisia



Thursday, January 7, 2016

Volkswagen unveiled officially for technical Budd-e test future through their participation at CES Technologies in Los Angeles in the United States.





Volkswagen unveiled officially for technical  Budd-e test future through their participation at CES Technologies in Los Angeles in the United States.

The German company said that this vehicle is a (small bus) for the twenty-first century, has LED lights Front exciting with clasped ventilation revolutionary lighting LED also a great tires measuring 21 inches, and side doors open to behind by just moving the hand, while the door of the rear luggage compartment can open it by moving the bottom of the foot.

This vehicle is rich and modern advanced technology which enables the driver to control all functions through a wristwatch and a wonderful display screens inside the cabin distributed in several sizes, it can also be controlled from the house through linked by a special system.

As for the transmission system with Budd-e it is fully plugged into the electric battery which is strongly 101 watts, which can walk for a distance of 600 km.

Friday, January 1, 2016

Christmas a very merry



I would like to wish everyone that celebrates Christmas a very merry Christmas, for those of my friends that don't, Happy Holidays. Peace be with you and your families.



Christmas a very merry
Christmas a very merry