Sateira Software

CD / DVD burning software

Bitcoin exceeds $ 5 mil mark for the first time

The value of bitcoin surpassed the $ 5,000 barrier for the first time on Thursday and set its new record high, according to the Financial Times.

At 12:05 AM, the digital currency was worth US $ 5,345.38 (equivalent to R $ 16,909.04), an increase of 10.73% during the day, according to data from the Bitstamp page.

The price of bitcoin in dollars rose more than 750% last year. Some experts warn that the digital currency is immersed in a bubble that can explode at any time, while others consider that it is still possible to increase this value.

Recent weeks have shown episodes of volatility in the price of bitcoin. In mid-September, the value dropped to about $ 3,000, after China announced an investigation into local companies working with the currency.

Despite the warnings about a possible bubble, the use of bitcoin has continued to expand in many areas. In September, London real estate The Collective announced that it will allow tenants to pay rent on bitcoins, while Japan has taken various measures to regulate its use.

Bitcoin is based on a technology created by an engineer known by the pseudonym Satoshi Nakamoto, whose real identity is unknown. The system, global and decentralized, allows direct transactions between users, without intermediaries, that are registered in a public database.

Delete browsing history? And EVERYWHERE can see her!

Anonymity on the web for most people is limited to clearing the history of web pages viewed from the web browser. It turns out, however, that there is still a way for others to see your browsing history.

Image result for Delete browsing history

The entire history of your browsing, even pages you visit in incognito mode, can be recovered by third parties. Two security experts in the network Svea Eckert and Andreas Dewes managed to gather data on the network from 3 million Germans, and they used only their own knowledge.

Eckert and Dewes also managed to get into the private history of public figures such as judges and politicians. About their way of using data “Clickstream” they spoke at the Def Con industry event in Las Vegas.

“Clickstream” is a virtual trace that leaves every user on the Internet. It records all activity on the web, including every page, subpage you visit and the time it spent on it, as well as accurate information about what the user clicked on. These data should be anonymous, which would exclude the possibility of their being deciphered by an unauthorized person.

Eckert and Dewes said they managed to bypass security and get to the vast amounts of sensitive data millions of Internet users have. According to experts, this was achieved through 10 popular browser extensions. The two “hackers” identified users by means of links in the Clickstream data that were posted by specific people on Twitter or other social media.

Image result for Delete browsing history

This allowed them to accurately identify people whose data is stored in Clickstream. German politicians whose interest in pornography and other habits have revealed their interest in the subject matter. This knowledge would be ideal for later blackmailing them.

Asked about the government’s plans to collect and secure these data, Eckert and Dewes said that firstly, it is important to consider how long the data will be stored.

“If someone is strong on the subject of data protection, then they should not be allowed at all, but for security reasons, such data may be kept for some time,” she said in an interview with BBC Eckert.

Charging the mobile in seconds is possible

Use your phone whenever you want thanks to the electrode developed by a group of researchers

At present we can not live without our mobile phone. However, the short battery life of smartphones is a problem for all those who need to be connected at all times.

For years, numerous technological investigations have focused their studies on obtaining batteries more durable and efficient. A group of researchers from the University of Drexel College of Engineering in Pennsylvania (USA) has developed a new type of electrode that charges the battery in just seconds:

Do not run out of battery

The electrode developed by this group of researchers uses MXene, a highly conductive material of electricity that allows the speed of the load to increase vertiginously. Thus, our smartphone’s battery, composed of a positive charge electrode and a negative charge electrode, stores energy during charging and then releases it to power the devices.

“This paves the way for the development of ultra-powerful power storage devices that can be loaded and unloaded in seconds, but storing much more energy than conventional supercapacitors,” said study director Yury Gogotsi.

Eight antivirus to protect your Android smartphone

The threat of viruses also affects our smartphones, which makes it imperative to protect them

There are bad times for internet security. We do not stop to know cases of massive attacks where the protagonist is usually a malware whose name we rarely hear when we are going to buy bread.On May 12, Wanna cry was the one that put in check nothing more and nothing less than companies from 166 countries; At the beginning of this month that has taken the headlines is Fireball, a malware created in China that has affected 250 million computers worldwide and is present in one of every five business networks.

Most troubling of all this is that no one can promise us that next week, or within a month or three, for example, no further attack will occur. As of April this year, 247 cybercrime-related incidents have been detected in Spain, or more than half of all incidents that occurred on the Web last year, according to data provided by the Secretary of State for Security, José Antonio Nieto, during the II Congress of Security and Telecommunications held in Toledo.

It is clear that these attacks are unpredictable and that is why we must be prepared because the next time maybe we can be affected – if, at the moment, we have been lucky to get rid of. Precisely to put all possible obstacles to cybercriminals and try to prevent any malware from leaking into our devices, one of the experts’ recommendations is to use a good antivirus.

It is not a matter of downloading three antiviruses, we will not be more protected that way – we will simply occupy space in our device -, it is to install a program that works for us, that we are going to use and that will serve us for it That we really need it.

And, of course, just as we usually use antivirus on our laptop or desktop computer, it is essential to install an antivirus on our mobile, because it can also be affected by malware. Here are eight options with which you can protect your Android terminal from any danger. Surely one suits you.

Virus Cleaner Antivirus

Virus Cleaner Antivirus is an application developed with the support of McAfee, one of the best-known antivirus brands. As promised by its creators, the ‘app’ protects your Android phone from any attack by viruses, wifi spies or anyone who tries to invade your privacy.

Among its most outstanding options is the ability to protect all the applications that you have in the device with a PIN code, pattern or fingerprint so that nobody can open them and view their contents, as well as being able to block unwanted calls and delete the history of Navigation and the clipboard. In addition, this antivirus protects your security when you are connected to an insecure public Wi-Fi.

360 Security Antivirus

360 Security is, perhaps, one of the most complete. In addition to protecting your terminal from viruses and threats, it also cleans the device by identifying junk files and freeing up space for better performance ; Has an anti-theft service that locates and locks the device remotely when a user has lost or stolen it (this option can be activated from its website); You can block applications so that no one executes them without your permission and also has an unwanted call blocker and SMS.

Avira Antivirus free

Avira Antivirus is for any ones of the best antivirus that exists – also for computers. It offers you not only protection against any type of virus or malicious software, but also analysis of the system, the storage of your phone and your microSD card; Be able to find your phone or tablet in case you have lost or stolen it; Protection of private data such as photographs or SMS in case of theft; Can block access to applications installed on the device and also helps you to save battery power a.

One of the highlights of this application with respect to the rest is that it is also able to prevent the manipulation of your email address or that of your contacts, coming to warn if it happens.

Panda Antivirus

Like Avira, Panda Antivirus is one of the few that scans your microSD card for malware. Protect your mobile phone from viruses, malware or spyware, block applications that access your confidential data without permission, find the thief who stole your phone with the anti-theft feature and can also be downloaded for Android Wear.

Panda Mobile Security also promises to optimize the battery and performance of your mobile or tablet by analyzing in real time the consumption of the applications you are using, as well as improve the speed, performance and memory usage of the terminal.

If you pay for the premium version the application offers you to take photos of the thief, which will be sent to your email, an application blocker, a motion alert in case someone picks up your phone without your permission and, for example, a remote alarm that Will ring in your device from your smartwatch in case of theft or loss.

ESET Mobile Security & Antivirus

ESET Mobile Security & Antivirus has a trial version of 30 days and during that time offers you features such as blocking calls and SMS, sending the last location before the battery runs out and, in case of theft, photos of Thieves made with the back and front camera.

If after 30 days you stay with the free version you will keep some functions like the anti-theft service that allows you to locate the phone, remotely lock it and delete its content, but others will lose.


It is one of the best-known antiviruses. Avast! Was born as a protection for laptops and computers, but for years has its version for mobile devices. Like most, it offers an anti-theft service that blocks the device from a distance, allows applications to be blocked by a PIN so that nobody can access them without your permission, analyzes the Wi-Fi for safe browsing, blocks unwanted calls, has A junk file cleaner and allows you to do tests of wifi speed.

Kaspersky Antivirus & Security

Another option available on the market is the Kaspersky Antivirus & Security application. What stands out from this antivirus is its protection of financial data while you browse the internet and make purchases online, in addition to filtering links and dangerous sites to protect your phone or tablet.

And like other options we have seen, it analyzes your device for malware, spyware, and Trojans, protects your personal data and privacy (calls, SMS, contacts), find your Android device in case of loss or theft, block calls and Unwanted SMS and can be controlled with Android Wear by voice commands.

AVG antivirus

The last antivirus on the list is AVG Antivirus. According to its developers, if you download this antivirus you will get an effective antivirus and antimalware protection and easy to use, in addition to a phone locator, a task eliminator, an application blocker, a call blocker, an analyzer and Wi-Fi connections and an image store to help protect you from threats to your privacy. This is another old acquaintance in the world of antivirus, so probably many of you already know it.

Google’s Top 8 Failures

Google is that multimillionaire company with a worldwide presence that everyone is aware of. When it presents a new service, it improves an existing one or it goes awry and something disappears, the alarms are turned on and put in the mouth of the whole sector, the public and the specialized press.

 Speaking of failures, there have been few cases of Alphabet services that have gone missing over the years that the company has been standing. Some of them have passed without pain or glory; Others, on the other hand, were well received at the time, and some even continued to use them until one day they found that they could not do it anymore. And not counting those who have not seen them from the outside. Because it is clear that such an innovative company, will try and experiment with new formulas continuously, and it is natural that not all of them figure. To succeed, the most normal thing in the world is to need several attempts.

Then a little tour of the years to bring to light some of those projects that Google brought to light and, later, buried in the drawer of forgotten things. Surely you were a user of more than one.

Google Spaces

Google Spaces was a social network that, unfortunately, was doomed to failure by its objective: to create groups with whom to initiate a conversation and to share content. The competition in this sector is fierce, but it is that within the ecosystem of the company had competitors , such as Google Allo, Google+ or YouTube chat, posts to choose.

The application did not have much acceptance by the users (and let’s face it, Google did not do much of its part in what concerns promotion) and social software is already very rooted: few people will try new things And it will leave Facebook, Instagram, WhatsApp or YouTube aside if nothing new and extraordinary is offered. Google Spaces was closed on April 17, 2017.

Google Reader

Google Reader has been one of the closures most touted by the number of users it affected . It was an RSS reader to organize and quickly and efficiently access the news pages added on it.

The Google move was clear: the company took advantage of the drop in users to explain the low profitability of the service, close it and boost the social network in which it was putting all its efforts, Google +. The tool disappeared on July 1, 2013.


IGoogle, originally referred to as Google Personaliced Homepage – we know whose idea it was to use rival Apple’s terminology – had a very simple yet striking feature: it was a home page that could be fully customized and modified, adding All types of extensions or ‘gadgets’ of the company (time, YouTube, mail, news, etc.) and ordering them to the taste of the consumer.

In spite of being so interesting and to have a good reception, Google gradually took away options to refer them to other services or to make them more exclusive. It lasted from 2005 to 2013.


Surely Picasa is one of the services that you remember most, as it was quite useful and something that many have used in our day to day. It blocks an application to manage the photos from the desktop of your computer, allowing options such as creating albums, editing photos or a function to share them.

Most of the features it integrates have ended up being part of Google Photos, so not everything is lost in this case. Picasa disappeared in 2016.

Google Answers

We all have in mind Yahoo! Answers when we have some doubt (in general, simple and / or absurd) that we want to solve. Well, those in Mountain View also had their own answering service called Google Answers. In it, people could earn money : a user asked a question and offered a reward; If someone answered coherently and formulated a good argument could be carried from 2 to 200 dollars.

The service had its end in 2006 and although we will always be the one of Yahoo !, the truth is that is missed enough.

Google Labs

Google Labs was one of those services that have not gone unnoticed by the technology sector, either by the company itself (and by the competition) or by users of different Google tools.

It was a platform where the company aired its projects in development , most of them rare as well as flashy. In this way, the company put them as a kind of phase “beta”: users could try them and Google had a referent of their reaction, supposed reception, etc.

The project ended up closing in 2011 to focus on more things on a large scale, although many of its projects have ended up reaching the public, such as Google Reader, Google Maps, Google Calendar or Google Docs.

Google Wave

Google Wave passed without pain or glory for its short life of two years. It was a different e-mail service, as it brought together in a single space the traditional email with other more booming services, such as instant messaging, a forum and document collaboration between people, as well as serving as a social network.

This whole innovative project had a clear problem: people were getting out of their minds . It was not well known how to use it effectively, so as time went by it was left aside. Google Wave existed between 2010 and 2012.

Google Health

Google Health was one of the most curious Google applications with more social future prospects. The service, focused on health as indicated by its name, allowed users to record their medical history to receive certain information in exchange, such as possible contraindications between medications and allergies, a detailed record of health at hand and a long etcetera Of options.

The service was involved in controversies from the first minute because of aspects such as the possible violation of the privacy of users or because it “encouraged” people not to go to the doctor and just trust their data. Finally, Google decided to close the service in 2013 arguing a low number of interested users.

This is how you should clean your computer inside

Dust and lint accumulate everywhere, you just have to look around. At home, however clean you are, this type of dirt is constantly flowing, it is inevitable, but you have to be very careful with electronic devices , especially with computers .

Many people think that cleaning a PC is simply keeping your junk files away from your storage and software or wiping it occasionally to the screen , but the rest of the peripherals and especially the inside of the computer itself suffer greatly with The accumulation of dust – and you with it if you are allergic.

As time passes, any laptop or desktop PC tends to suffer small (and not so small) problems from the accumulation of dust. Although you may not notice it with the naked eye, it is true that the heat sinks or fans are working worse because the dust from the grids prevents it, causing the temperatures of the appliance to rise and its performance goes down. Dust filters on casings, housings, or components help to reduce that accumulation, but it is not enough to prevent components from wearing down unnecessarily.

In terms of peripherals, screens, keyboards, mice or loudspeakers , the dust is more noticeable because you have it in front and annoying to the eye, so it is usually cleaned more. Even so, if only a superficial cleaning is performed is not enough; It is necessary to clean it in detail so that the lint does not remain in the corners or in the most inaccessible spaces.

Since dusting is vital for your computer and its components to be maintained as the first day, here are a number of tips to be carried out each periodically to avoid possible problems.

The screens

Cleaning the computer screen, whether portable or desktop, is a real art. Here it is necessary to remove dirt and dust, yes, but also bacteria and disinfect the monitor because we tend to touch it more with dirty hands than we think.

All in all, a dry or slightly damp cloth should be used to clean the dust ; To remove the bacteria you have to clean the screen with alcohol and some distilled water .

Keyboards and mouse

As with screens, the keyboard and mouse are not only exposed to dust and lint, but also to the fat and bacteria we accumulate in our hands or around us.

How to clean your computer
Eating in front of the computer can fill the keyboard with grease. Getty Images

As a general rule, both aspects need to be cleaned here. The idea is to use a slightly damp cloth to remove surface dust and, later and very carefully, a suede with some alcohol before passing a dry cloth to remove any residual water or disinfectant that remain on the surface.

In the case of desktop computer keyboards, these are larger and often have more nooks and crannies between the keys by which the dust is constantly being shed. Ideally, if you can, remove the keys to clean them one by one along with the inside , but as we know that this does not usually happen, there are a couple of extra tricks to get hold of.

First of all, with a ‘post-it’ you can easily and inexpensively remove dirt, although it is tedious in time and resources (you will have to use several); Take one and use the sticky part to go past the keys until you remove all lint. The second option is to use a bottle of compressed air: this bottle comes with a head the size of a straw that expels cold air under pressure , so that the dust comes out of the last corner of the keyboard with ease – yes, beware of the cold ; Do not keep the button pressed all the time, just a few seconds, and move the bottle assiduously so as not to have problems -.

The inside of the computer

The interior of a computer is the most complicated part of the list, but not for that something impossible or only suitable for experts. Of course, if you think that you are not going to get well or are afraid, do not hesitate to take your computer to a specialized center to do the cleaning: they will charge you what corresponds, but leave it in the hands of professionals. If you do it at home, remember to do it with the computer off and unplugged from the power (on a desktop PC turn off the power switch as well).

How to clean your computer
It is easier to clean a desktop computer inside than a laptop. Getty Images

What does it take to clean a computer inside? A fine, medium-soft hair brush that can be inserted in any recess, and a vacuum cleaner with a tube head to make it easier to handle. If you want to get a little more punctilious or detailed, the bottle of compressed air, having the head so small and expel the air under pressure , can help you very well to reach corners where the rest of the utensils have not just arrived very well.

On a laptop the subject is slightly more difficult to perform. What you have to do is turn it around and remove the screws on the back cover to open it – some computers lose the warranty with this action; Take a look at yours first -. Once opened, very carefully (the components are smaller and many come soldered) removes the surface dust and help the brush to try to clean as much of the zones as possible between the components (the bottle in this case is very useful , But use it at a certain distance and without keeping the air long at the same point, with short pulsations). When you finish, screw it again to make it look like new.

On a desktop computer you have to start by unscrewing the side cover of the device to access its interior. If you look capable, it is best to remove all the heat sinks, fans and graphics card to clean the dust that is there embedded conscientiously; If you do not know how or if you dare, use the vacuum cleaner and the brush to go little by little, cleaning very well the fan blades, dust filters and grooves you are encountering. When you finish, put the lid back in place.

Also, do not forget that slots for memory cards, floppy disks or USBs also accumulate dust, as do the connections you have outdoors and do not use. Also clean these corners to be as effective as possible to remove accumulated dirt.

Sateira CD&DVD Burner

 is a full-featured package for audio and data CD / DVD burning. With this program, you can create and burn audio and data CD / DVD, CUE / ISO images, multisession and bootable CD / DVD, extract session from the multisession disc and more…

Sateira CD&DVD Burner is a very powerful burning package with small size and low resource usage. This is the optimal solution for notebooks and laptops. Program records: CDR/W, DVD-R/W, DVD+R/W, DVDRAM. It has a very flexible interface and all required functions for recording. This is one of the best solutions for beginners and professionals.

Features and Benefits:

    • Supports CD-R / CD-RW / DVD-R / DVD-RW / DVD+R / DVD+RW / DVD-RAM


  • Tested with SCSI, IDE / EIDE, USB CD / DVD recorders
  • On the fly burning. No need to build ISO image first. No temporary files
  • Small package size, fast work, and easy-to-use interface
  • Supports long filenames (max 127 characters) and folder names (max 107 characters)
  • Burn up to 100000 files and 15000 folders
  • Create multisession CD / DVD. Import any of the available previous session
  • Doesn’t use any DLLs or OC xs. Built-in ASPI layer
  • Professional disc layout editor
  • Displays necessary information about recorder and disc
  • Fast ISO image building speed
  • Supports ISO9660 / Joliet files systems, burning simulation, OPC, BURNProof


Download Now

Recordius (DataCD/DVD)

is an advanced and easy to use CD / DVD burning software.  With this program, you can easily make bootable discs and ISO-images, multisession discs, burn ISO-images and CUE-images to disc directly, erase rewritable discs and more…


Features and Benefits:

  • Supports CD-R / CD-RW / DVD-R / DVD-RW / DVD+R / DVD+RW / DVD-RAM


  • Tested with SCSI, IDE / EIDE, USB CD / DVD recorders
  • On the fly burning. No need to build ISO image first. No temporary files
  • Small package size, fast work, and easy-to-use interface
  • Supports long filenames (max 127 characters) and folder names (max 107 characters)
  • Burn up to 100000 files and 15000 folders
  • Create multisession CD / DVD. Import any of the available previous session
  • Doesn’t use any DLLs or OC xs. Built-in ASPI layer
  • Advanced disc layout editor
  • Fast ISO image building speed
  • Supports ISO9660 / Joliet files systems, burning simulation, OPC, BURNProof



Download Now

DropToCD (DataCD)

DropToCD (DataCD)

is easy to use tool to create data CD / DVD. It supports multisession and bootable CD, DVD and ISO images (Joliet, ISO9660) and can also erase your CD / DVD / RW discs. The program offers a unique drop icon that floats on your desktop and allows you to quickly add multiple files and folders from different locations by simply dragging them onto the icon. The icon immediately calculates and displays the total size of your added data, so you know how much space you have left on your media.

Features and Benefits:

  • Supports CD-R / CD-RW / DVD-R / DVD-RW / DVD+R / DVD+RW / DVD-RAM


  • Tested with SCSI, IDE / EIDE, USB CD / DVD recorders
  • On the fly burning. No need to build ISO image first. No temporary files
  • Small package size, fast work, and easy-to-use interface
  • Supports long filenames (max 127 characters) and folder names (max 107 characters)
  • Burn up to 100000 files and 15000 folders
  • Create multisession CD / DVD. Import any of the available previous session
  • Doesn’t use any DLLs or OC xs. Built-in ASPI layer
  • Fast ISO image building speed
  • Supports ISO9660 / Joliet files systems, burning simulation, OPC, BURNProof