Diberdayakan oleh Blogger.

Popular Posts Today

Aggression from video games studied

Written By Unknown on Selasa, 08 April 2014 | 23.43

7 April 2014 Last updated at 16:15 By Dave Lee Technology reporter, BBC News

Feelings of aggression after playing video games are more likely to be linked to gameplay mechanics rather than violent content, a study suggests.

Researchers carried out a range of tests, including making a non-violent version of popular game Half-Life 2.

Games modified to have counter-intuitive, frustrating controls - leading to feelings of incompetence - produced more aggressive reactions.

The team called for more sophisticated research into violent gaming.

"There's a need for researchers who are interested in these questions not just to pull two video games off the shelf from the high street," said Dr Andrew Przybylski from the Oxford Internet Institute, who carried out the research along with colleagues from the University of Rochester in the US.

"We need to have a more sophisticated approach so we're all reading from the same experimental methods."

The link between violence and video games is a heavily debated topic among psychologists.

One recent study suggested that playing violent video games for long periods of time can hold back the "moral maturity" of teenagers.

Problems arose with teenagers who spent more than three hours every day in front of a screen, continuously playing these violent games without any other real-life interaction.

Evaporating foes

The study from the University of Oxford, however, believed it was the first to look at the impact gameplay mechanics had on aggression.

The findings have been published in the Journal of Personality and Social Psychology.

Continue reading the main story

The aggression stems from feeling not in control or incompetent while playing"

End Quote Prof Richard Ryan University of Rochester

The research sought to establish whether it was violence in games which made players feel more aggressive, or a combination of other factors.

Six separate studies were carried out.

One of them involved modifying Half-Life 2 - a critically-acclaimed, but graphic, shooting title.

The researchers created a modified version in which rather than violently removing enemies, the player would instead "tag" foes who would then evaporate.

This version was tested alongside the normal, violent version.

However, only some of the gamers were given a tutorial before playing the game so they could familiarise themselves with the controls and game mechanics.

The researchers found that it was the players who had not had the tutorial who felt less competent and more aggressive, rather than people who had played the more violent version of the game.

Thwarted

"We focused on the motives of people who play electronic games and found players have a psychological need to come out on top when playing," said Dr Przybylski.

"If players feel thwarted by the controls or the design of the game, they can wind up feeling aggressive.

"This need to master the game was far more significant than whether the game contained violent material.

"Players of games without any violent content were still feeling pretty aggressive if they hadn't been able to master the controls or progress through the levels at the end of the session."

Further research is needed, Dr Przybylski said, into longer-term effects of video game violence beyond initial feelings of aggression.

Co-author Prof Richard Ryan, from the University of Rochester, said: "The study is not saying that violent content doesn't affect gamers, but our research suggests that people are not drawn to playing violent games in order to feel aggressive.

"Rather, the aggression stems from feeling not in control or incompetent while playing.

"If the structure of a game or the design of the controls thwarts enjoyment, it is this not the violent content that seems to drive feelings of aggression."

The chief executive of Tiga, a British video games trade body, said it was encouraging to read a study that took a more nuanced approach to the link between video games and aggression than some previous research into the topic.

"If developers can design more effective game-play processes then it could be possible to minimise a player's feelings of exasperation and irritation - admittedly something good developers will want to achieve in any case," said Richard Wilson.

"Indeed, creating a game that is challenging without feeling unfair or frustrating is often the mark of a great developer.

"It's also important to understand, as part of this debate, that most video games are not violent.

"Previous research published by Tanya Byron in her 2008 independent review 'Safer Children in a Digital World', found little evidence to suggest children who play video games become desensitised to violence."

Follow Dave Lee on Twitter @DaveLeeBBC


23.43 | 0 komentar | Read More

EU court rejects data retention law

8 April 2014 Last updated at 12:39

The EU's top court has declared "invalid" an EU law requiring telecoms firms to store citizens' communications data for up to two years.

The EU Data Retention Directive was adopted in 2006. The European Court of Justice says it violates two basic rights - respect for private life and protection of personal data.

The EU-wide ruling was prompted by Austrian and Irish complaints.

The 28-nation EU is currently drafting a new data protection law.

The ECJ ruling says the 2006 directive allows storage of data on a person's identity, the time of that person's communication, the place from which the communication took place and the frequency of that person's communications.

"By requiring the retention of those data and by allowing the competent national authorities to access those data, the directive interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data," the court in Luxembourg ruled.

The UK government says it is carefully considering the implications of the ruling, the BBC's Chris Morris reports.

Austrian and Irish courts had asked the ECJ to decide whether the directive complied with the EU Charter of Fundamental Rights.

Privacy v security debate

The judges acknowledged that data retention was justified in the fight against serious crime and to safeguard public security. But they argued that the directive was disproportionate.

They also said use of the data without an individual's knowledge "is likely to generate in the persons concerned a feeling that their private lives are the subject of constant surveillance".

The directive does not provide sufficient safeguards against possible abuse of personal data, the judges said.

And there was insufficient clarity concerning the basis for holding data for a minimum of six months or the maximum of two years, they argued.

Responding to the ruling, a British government spokesman said the retention of communications data was absolutely fundamental to allowing law enforcement authorities to investigate crime and ensure national security.

"We cannot be in a position where service providers are unable to retain this data," the spokesman said.

The European Commission says it too is assessing the ruling. It said there had to be a proper balance between security and fundamental rights.


23.43 | 0 komentar | Read More

Windows XP security deadline arrives

8 April 2014 Last updated at 00:00 By Mark Ward Technology correspondent, BBC News

Support for the venerable Windows XP operating system ends this Tuesday.

It means that there will be no more official security updates and bug fixes for the operating system from Microsoft.

Some governments have negotiated extended support contracts for the OS in a bid to keep users protected.

Security firms said anyone else using the 13-year-old software would be at increased risk of infection and compromise by cyber-thieves.

Windows XP

Please turn on JavaScript. Media requires JavaScript to play.

Old code

Statistics suggest 20-25% of all users have stuck with XP despite the fact that there have been three major releases of Windows since its debut in 2001.

Some of those existing XP users have struck deals to get security fixes from Microsoft while they complete their migration away from the ageing code.

The UK government has signed a £5.5m deal for extended support. Similarly the Dutch government has signed a "multi-million euro" deal to obtain help for the 40,000 PCs running XP used by the nation's civil servants.

Anyone currently running Windows XP already faced a disproportionate risk of falling victim to malware, said David Emm, a senior research analyst at security firm Kaspersky.

"Our data indicates that less than one fifth of our customers run Windows XP but more than a quarter of infections are Windows XP-based," he said.

That exposure ratio was only going to get worse after 8 April, he said, once the last security patch for Windows XP had been released.

That final patch will fix a series of bugs, one of which is rated as critical and is already being actively exploited despite only being discovered in late March.

"Effectively, every vulnerability discovered after 8 April will become a zero-day vulnerability - that is, one for which there is not and never will be, a patch," said Mr Emm.

Windows XP users topped the list of victims cyber-thieves targeted, said Maik Morgenstern and Andreas Marx from the German AV-Test group, which rates and ranks security software.

"Malware writers go for the low hanging fruits because it's a lot easier to infect systems running on an old Windows XP operating system compared to brand-new Windows 8.1, with all its built-in security features," they said.

"We think we will see a lot of attacks for Windows XP within the next few months, but attackers will also always add exploits for other Windows systems just to catch those systems as well."

Patch plan

Orla Cox, a senior manager at cyber-defence firm Symantec's security response unit, said criminals groups were likely to hoard the XP vulnerabilities they knew about rather than use them to bolster malware being spammed out to millions of people.

"The types of groups sitting on zero-days will tend to use them against high-end targets and for corporate espionage," she said. "Some organisations will have particular concerns because they find it so hard to move away from XP."

However, she added, any zero-day that did get used against a corporate target was likely to be re-used later on.

"Once it's out there it gets into the malware kits and then gets circulated and there will be no defence," she said.

Mark O'Neill, a spokesman for data management firm Axway, said organisations were getting better at coping with software that had hit its end-of-life.

"Beyond high-profile programs like XP there are a lot of products that have gone out of support because the company behind them has gone out of business or was acquired," he said.

In addition many other products were written in old programming languages that made them expensive to maintain and update.

As a result, many IT departments have put such ageing programs in the virtual equivalent of a "black box" and subsequently update the external code if security patches need to be applied.

"You can create a layer above the older application and that gives you a place to patch," Mr O'Neill said.

"Companies are not defenceless even with the things they cannot patch."


23.43 | 0 komentar | Read More

Major movie studios sue Megaupload

8 April 2014 Last updated at 07:35

Six of the biggest movie studios have sued Megaupload and its key operators, including founder Kim Dotcom.

They have alleged the site and its operators "facilitated, encouraged, and profited" from copyright infringement.

Megaupload was one of the largest file-sharing sites before it was shut by US regulators in 2012 who have accused it of costing copyright holders more than $500m (£320m) in lost revenue.

Mr Dotcom has denied those charges, saying the site was a storage service.

Continue reading the main story

Megaupload wasn't a cloud storage service at all, it was an unlawful hub for mass distribution"

End Quote Steven Fabrizio Motion Picture Association of America
'Paid users'

In a statement, Steven Fabrizio, global general counsel of the Motion Picture Association of America (MPAA), said: "When Megaupload.com was shut down in 2012 by US law enforcement, it was by all estimates the largest and most active infringing website targeting creative content in the world."

The MPAA alleged that Megaupload used to pay users for uploading popular content and as a result was not a storage service.

"Megaupload was built on an incentive system that rewarded users for uploading the most popular content to the site, which was almost always stolen movies, TV shows and other commercial entertainment content," said Mr Fabrizio.

"It paid users based on how many times the content was downloaded by others - and didn't pay at all until that infringing content was downloaded 10,000 times.

"Megaupload wasn't a cloud storage service at all, it was an unlawful hub for mass distribution," he added.

However, Mr Dotcom rejected those claims. He tweeted that files bigger than 100MB in size "did not earn rewards".

"Hollywood claims that we were paying users to upload pirated movies. Stupid."

Mr Dotcom has fought a long-running legal battle over the case in New Zealand where he lives.

He is fighting extradition to the US over charges of copyright infringement on a "massive scale".

Megaupload had about 150 million registered users before it was shut down. At one point it was estimated to be the 13th most frequently visited website.

In January 2013, a year after the closure of MegaUpload, Mr Dotcom set up Mega, which also allows users to host and share large files on the internet.


23.43 | 0 komentar | Read More

Scramble to fix huge security bug

8 April 2014 Last updated at 12:05

A bug in software used by millions of web servers could have exposed anyone visiting sites they hosted to spying and eavesdropping, say researchers.

The bug is in a software library used in servers, operating systems and email and instant messaging systems.

Called OpenSSL the software is supposed to protect sensitive data as it travels back and forth.

It is not clear how widespread exploitation of the bug has been because attacks leave no trace.

"If you need strong anonymity or privacy on the internet, you might want to stay away from the internet entirely for the next few days while things settle," said a blog entry about the bug published by the Tor Project which produces software that helps people avoid scrutiny of their browsing habits.

'Serious' vulnerability

A huge swathe of the web could be vulnerable because OpenSSL is used in the widely used Apache and Nginx server software. Statistics from net monitoring firm Netcraft suggest that about 500,000 of the web's secure servers are running versions of the vulnerable software.

"It's the biggest thing I've seen in security since the discovery of SQL injection," said Ken Munro, a security expert at Pen Test Partners. SQL injection is a way to extract information from the databases behind web sites and services using specially crafted queries.

Many firms were scrambling to apply patches to vulnerable programs and others had shut down services while fixes were being worked on, he said. Many were worried that with proof of concept code already being shared it would only be a matter of time before cyber thieves started exploiting the vulnerability.

The bug in OpenSSL was discovered by researchers working for Google and security firm Codenomicon.

In a blog entry about their findings the researchers said the "serious vulnerability" allowed anyone to read chunks of memory in servers supposedly protected with the flawed version of OpenSSL. Via this route, attackers could get at the secret keys used to scramble data as it passes between a server and its users.

"This allows attackers to eavesdrop [on] communications, steal data directly from the services and users and to impersonate services and users," wrote the team that discovered the vulnerability. They called it the "heartbleed" bug because it occurs in the heartbeat extension for OpenSSL.

The bug has been present in versions of OpenSSL that have been available for over two years. The latest version of OpenSSL released on 7 April is no longer vulnerable to the bug.

"Considering the long exposure, ease of exploitation and attacks leaving no trace this exposure should be taken seriously," wrote the researchers.

Installing an updated version of OpenSSL did not necessarily mean people were safe from attack, said the team. If attackers have already exploited it they could have stolen encryption keys, passwords or other credentials required to access a server, they said.

Full protection might require updating to the safer version of OpenSSL as well as getting new security certificates and generating new encryption keys. To help people check their systems some security researchers have produced tools that help people work out if they are running vulnerable versions of OpenSSL.


23.43 | 0 komentar | Read More

Tweeters react to Twitter redesign

8 April 2014 Last updated at 16:34

A new-look Twitter is being rolled out, with many commenting that it looks very similar to Facebook's profile pages.

The redesign will be available to a small group of users initially and will be made available across the whole site "in coming weeks".

Cover photos appear full-width along the top of the screen, with the main picture on the left-hand side.

Tweets that have received the most engagement will appear slightly larger and photos are given more prominence.

The changes were first tested in February.

The new design was outlined in a blog post that listed some of the other big changes, including:

  • Tweets that have received the most engagement will appear slightly larger to make an account's best content easy to find
  • Tweets can be pinned on the top of the page so that followers can "see what you're all about"
  • Users can select which timeline to view when checking out other profiles. Options are: tweets, tweets with photos/videos, or tweets and replies

The BBC took to Twitter to gauge reaction.

"Not sure this is going to go down well," said Michael H in response to a @BBCTech tweet asking about the redesign.

"Looks a bit much to me. I love the simplicity of Twitter, this is a huge departure," said Tom Barnett.

"Disgusting," tweeted Nick Turner. "Twitter is turning into Facebook and taking away everything that makes it good."


23.43 | 0 komentar | Read More

Samsung forecasts drop in profits

8 April 2014 Last updated at 03:34

Samsung Electronics, the world's biggest maker of TVs and mobile phones, has forecast a drop in profit for the second quarter in a row.

It expects to make an operating profit of 8.4 trillion won ($7.9bn; £4.8bn) for the January-to-March quarter, down 4% from the same period last year.

This follows a 6% decline in operating profit in the previous quarter.

The drop indicates the challenge faced by Samsung to boost its earnings amid falling prices of smartphones.

Young Park, an analyst with Hyundai Securities said that Samsung's profits were being hurt by falling margins for smartphones as well as a slowdown in the growth rate of the sector.

Cost cutting?
Continue reading the main story

In some sense, Samsung has no way to prevent a decline in its earnings without improving internal efficiencies"

End Quote Greg Roh HMC Investment and Securities.

The success of Samsung's Galaxy range of smartphones has been one of the biggest drivers of its growth in recent years.

But is has been facing rising competition as companies look to tap into the sector's growth.

Rivals Apple, HTC and Chinese manufacturers such as Lenovo, ZTE and Huawei have all been looking to boost their market share.

That has prompted vendors to reduce prices to attract more customers, putting pressure on their profit margins.

Earlier this year, Samsung had warned that it expects competition in the sector to "intensify" further.

One analyst said that as profit margins in the sector continue to fall, Samsung may need to cut costs to sustain its earnings growth.

"What Samsung needs to do this year for additional growth are things like cost reduction and reducing marketing costs," said Greg Roh, an analyst with HMC Investment and Securities.

"In some sense, Samsung has no way to prevent a decline in its earnings without improving internal efficiencies."


23.43 | 0 komentar | Read More

Facebook wipes soldiers rape page

8 April 2014 Last updated at 13:34 By Leo Kelion Technology desk editor

Facebook has removed a page entitled "Soldiers deserve to be raped and murdered" - but not because of its subject matter.

The page was created last year and had sparked objections from members of the armed forces and the public.

The site initially left it in place, saying it did not breach its rules.

However, Facebook removed the page shortly after being contacted by the BBC, saying a check had revealed the account holder's details to be fake.

Critics of the company have said the case highlights concerns about its review policies.

Community standards

The page was created last July and had called on visitors to "support the cause in weeding out and eliminating this worthless breed of cowardice".

Facebook's Community Standards state that it will remove content where it perceives there to be a "genuine risk of physical harm" and that members may not "credibly threaten others, or organise acts of real-world violence".

However, a spokesman for the social network indicated that the threat had not been specific enough for its complaints team to act on.

"Sometimes there is content on Facebook that expresses angry and unpleasant ideas but doesn't directly target anyone," he said.

"In such cases the page may be left up. However, we can compel people who post things like this to make their real names visible so they are publicly accountable for their views.

"On investigating this particular page administrator, we found they were using a fake account and we removed it."

Continue reading the main story

Clearly this page was taken down because it was offensive"

End Quote Dr Joss Wright Oxford Internet Institute

He confirmed that the fact the creator's details were false was only flagged after the site was contacted by the BBC's technology correspondent Rory Cellan-Jones, who had asked about the matter after it had been raised by a member of the audience.

'Show respect'

Among those to have previously complained about the posting were visitors to another page on Facebook set up to support members of the Royal Marine commandos.

Its administrator - who had previously served in the British Army - said that this was just one of several pages concerning the armed forces that they had complained about, and added that he believed Facebook needed to be more proactive about deleting such material despite concerns this might raise about free speech.

"You've got to show respect for the men and women who have fought and died for others to hold their own opinions," Stef Proietti told the BBC.

"It creates hatred and causes anger.

"I appreciate that a lot of these types of pages are set up by what you would call internet trolls looking to create a reaction.

"But, as we've seen in the past... it creates more tension, not just among the social network's community but it also spills out into real life."

By contrast, La Quadrature du Net (Squaring the Net) - a Paris-based group that campaigns for internet users' rights - said it was concerned that a company with as much influence as Facebook should be left to make such decisions.

"A judge may or may not have considered that this was a direct call to violence, and on that ground may or may not have asked Facebook to remove it - and this is how it should be," said the group's co-founder Jeremie Zimmermann.

"[Instead] Facebook has become a sort of parallel justice with its own rules that we cannot fully understand.

"This is a major problem for whoever believes their speech is protected on Facebook."

First Amendment rights

But one academic said it was no surprise that the company had acted the way it had.

"The principle of First Amendment freedom-of-speech rights is something that nobody wants to be seen to be violating in the US, particularly Silicon Valley-type companies for which it's buried very deeply into their ideology," said Dr Joss Wright, of the Oxford Internet Institute.

"Clearly this page was taken down because it was offensive, but it's very convenient for the firm to have an alternative justification - the use of fake credentials or, as we've seen in other examples, a violation of copyright.

"I think Facebook will stick to this kind of approach as long as it can. It doesn't want to be put in a position where it's expected it will police its content because that could then turn into a requirement that is forced upon it."


23.43 | 0 komentar | Read More

Police forces 'overusing' data power

8 April 2014 Last updated at 13:49 Gordon CoreraBy Gordon Corera Security correspondent, BBC News

Police may be overusing their power to gather people's communications data, the Commissioner for Interception says.

In 2013, there were 514,608 requests - such as who owns a phone and who have they called - which Sir Anthony May said "has the feel of being too many".

But he clears UK intelligence agency GCHQ of breaking the law or any rules - an accusation levelled by US whistleblower Edward Snowden.

The home secretary said his report showed agencies were acting lawfully.

Sir Anthony said there was a need to investigate whether the desire by police and law enforcement to access data was being prioritised over people's privacy.

The conclusions are contained in his first annual report in his new role, which looks at data requests made in England, Wales, Scotland and Northern Ireland.

Prime Minister David Cameron said it showed "that public authorities do not engage in indiscriminate random mass intrusion".

One strand is "interception", when a warrant is issued for the full content of someone's communications to be listened into.

In this case there were 2,760 warrants in 2013 - a drop of 13% from the previous year. This was carried out by nine different agencies and resulted in 57 errors.

Continue reading the main story

"Start Quote

It really does require to be investigated whether there may not be an institutional overemphasis in police forces on progressing their criminal investigations and an institutional underemphasis on the privacy side of it"

End Quote Sir Anthony May Commissioner for Interception

The second area is communications data - a much broader category.

This involves address and subscriber information relating to phone calls, such as what other numbers a phone was in contact with (but not what was said), who owns a phone and similar details about emails and computer IP addresses.

This is used much more broadly. In 2013, there were 514,608 requests (a drop from 2012, when there were 570,135). More than half were for subscriber information.

Police and other law enforcement bodies, such as the National Crime Agency, are the overwhelming consumers of this, accounting for 87.5% of requests.

A further 11.5% came from intelligence agencies (overwhelmingly from MI5, with 56,918 requests). Local authorities made up 0.3% and other bodies 0.5%.

Serious errors

In past years, there have been concerns over whether some bodies might be using these powers for areas not originally intended under the law - but the report says that less than half a per cent of requests were for purposes other than prevention and detection of crime or disorder, national security or preventing death or injury.

However, the commissioner does query whether there is too much reliance on this power, saying 514,608 requests is "a very large number".

He told the BBC: "It really does require to be investigated whether there may not be an institutional over-emphasis in police forces on progressing their criminal investigations and an institutional under-emphasis on the privacy side of it."

Continue reading the main story

"Start Quote

We are open to suggestions to strengthen the oversight framework even further"

End Quote William Hague Foreign Secretary

There were 970 errors - some of which were serious. For instance, when the police were trying to attend someone who might be attempting suicide or might be a victim of crime and went to the wrong address initially based on the communications data.

In two cases, warrants were executed at the homes of innocent people.

It is also clear that certain police forces use the power much more than others proportionate to their population.

Similarly, although the overall volume is much lower, there are wide variations in use by councils, with 121 not using it at all and others, such as Southampton, York and Birmingham city councils and the London boroughs of Bromley and Enfield, using it 80 or more times.

Foreign traffic

But on the issue of whether there is mass surveillance - a claim made on the basis of documents provided by US whistleblower Edward Snowden - the commissioner essentially gives Britain, and particularly GCHQ, a clean bill of health.

"I can assure anyone who is not associated with terrorists or serious criminals that the agencies have no interest whatever in examining their private communications and for practical purposes do not do so," he said.

Sir Anthony acknowledged there were legitimate concerns that need to addressed, but said he believed the current legal framework - the Regulation of Investigatory Powers Act 2000 - was broadly fit for purpose and being used correctly.

He found that even though so-called "general warrants" provide for large-scale collection of material, this was primarily focused on foreign traffic, and GCHQ could not indiscriminately trawl through it.

As a result, he said, there was no "sentient" intrusion into the private affairs of UK citizens - in others words, by a person rather than in automated fashion by a computer.

He also said he had found no evidence that GCHQ was circumventing the law by getting material from the US that it did not have the power to access itself.

Home Secretary Theresa May said the report "makes clear the intelligence agencies, law enforcement agencies and other public authorities operate lawfully, conscientiously and in the national interest".

Foreign Secretary William Hague, the minister responsible for GCHQ, said: "A senior and fully independent judge has looked in detail at whether the interception agencies 'misuse their powers to engage in random mass intrusion into the private affairs of law abiding UK citizens'.

"He has concluded that the answer is 'emphatically no'.

"We are open to suggestions to strengthen the oversight framework even further and make it as transparent as possible without putting security at risk."


23.43 | 0 komentar | Read More

Battery offers 30 second charging

8 April 2014 Last updated at 14:47

A battery that can charge in under 30 seconds has been shown off at a technology conference in Tel Aviv.

Israeli start-up StoreDot displayed the device - made of biological structures - at Microsoft's Think Next Conference.

A Samsung S4 smartphone went from a dead battery to full power in 26 seconds in the demonstration.

The battery is currently only a prototype and the firm predicts it will take three years to become a commercially viable product.

In the demonstration, a battery pack the size of a cigarette packet was attached to a smartphone.

"We think we can integrate a battery into a smartphone within a year and have a commercially ready device in three years," founder Dr Dorn Myersdorf told the BBC.

The bio-organic battery utilises tiny self-assembling nano-crystals that were first identified in research being done into Alzheimer's disease at Tel Aviv University 10 years ago.

The nano-dots are described by StoreDot as "stable, robust spheres" that are 2.1 nanometers in diameter and made up of peptide molecules.

The technology has a range of uses, founder Dr Myersdorf said.

"Batteries are just one of the industries we can disrupt with this new material. It is new physics, new chemistry, a new approach to devices," he said.

The team has also used the nano-crystals in memory chips which could write three times faster than traditional flash memory and as a non-toxic alternative to cadmium in screens.

Dr Myersdorf said that the batteries are likely to be 30 to 40% more expensive to manufacture compared to traditional ones and the final product will be twice as expensive than those on the market today.

But making them should be a relatively easy process.

"It is about letting nature take its course. We just need a facility that can do chemical processing," he said.


23.43 | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger