Monthly Archives: October 2016

Useful Features of new Windows 10

Windows_10_build_14393_(Redstone)

Useful Features of Windows 10

You have Windows 10 but you are wondering what benefits you get with this particular version. When you have some free time and feel like playing with your Windows 10 in order to explore some of their great new features, the following overview should help you choose ones you might be interested in.

To begin with, Windows 10 is safer and more secure than previous versions.

Windows Hello is the password free sign in giving you the fastest and most secure way of unlocking your Windows devices. So how exactly do I sign in, you might ask? Well, Windows 10 will grant you access by recognizing your face, fingerprint or companion device.

The new Windows is also the most secure Windows ever built, delivering comprehensive protection which includes antivirus, firewall, Defender and anti-phishing technologies. Increased built-in security features and ongoing updates safeguard you against any current and future threats.

You can now definitely increase your productivity with more innovative tools helping you to stay organized and do things online so that you could quickly get your work done.

Windows 10 uses Microsoft Edge browser which is more personal and responsive. What can you achieve with it? You are able to write directly on webpages and read articles streamlined for cleaner and more responsive reading. Your one-click access to your favorites, downloads, reading list and others allows you to search faster. By writing and typing directly on your web page with Web Note, you can share your mark-ups with others. Finally, you sweep distracting content out of your way with Reading View while browsing so you can only read what you want.

Windows 10 also offers the quickest way to set ideas in motion with Windows Ink which allows you to capture ideas and notes at the speed of thought without being logged in.

You can also do great things faster as Windows is loaded with multitasking tools such as a custom start menu, live tiles, snap assist, task view and virtual desktops.

If you have a laptop, Tablet Mode lets you use it as a tablet such that you can easily and smoothly navigate between apps.

You now get to enjoy Cortana, a more personal digital assistant. What does Cortana do for you? Well, it helps you find things, complete tasks, set reminders and work across your devices more productively. Action Center gives you quick access to things like notifications from Cortana and other apps.

You can also play new Xbox games on Windows 10, staying connected to your gaming community with the Xbox app and playing wherever you might want with in-home streaming.

There are even more features that you might really be interested in.

The new emoji keyboard features a new font and categories of expressive and playful emoji and is available for 25 languages. Windows dark mode allows you to work in low-light conditions such as at night or on a plane. You can now continue playing your music even after locking your screen.

Windows 10 can be used on devices such as 2-in-1 tablets that can replace laptops and phones that can be used like a PC.

The final feature we will discuss is Windows Store. This one allows you to easily download apps, games, music, movies and TV shows.

Darius Romanek

Mission Repair Centre Team 🙂

macOS Sierra – The new Mac OS

apple-air pic 2

What Can You Expect From macOS Sierra?

You are currently using Mac OS X but as Apple has recently rebranded its desktop and laptop OS, you can now upgrade your operating system to macOS Sierra (also known as macOS 10.12).

So what can you expect from it?

Let us start by summarizing the design of this new operating system. Design-wise, macOS Sierra is almost identical to its predecessor El Capitan. The ‘flattened’ visuals still exist. However, there are some exceptions. User interface differs a little bit. You can now use tabs in a wide range of first- and third-party apps rather than just Safari and other web browsers.

First-party apps that support tabs from launch include Maps, Mail, Text Edit and all three iWork apps. Third-party apps need to support multiple windows.

You can now enjoy a new picture-in-picture viewing mode. Picture-in-picture allows a video from Safari or iTunes to float in a window over your desktop as you work. You can pin this video mini-window to one corner of your screen, where it will stay even if you switch spaces. What does it mean to switch spaces, you might ask? Space feature (introduced with Mac OS X 10.5 Leopard in 2007) allowed a user to create multiple virtual desktops which act as individual workspaces. So switching spaces is essentially switching tasks. When you switch tasks, you simply move from one workspace (like Calendar) to another (like Word).

How about the new features of macOS Sierra? There are 6 of them.

One of the top features is Siri on Mac. This one is significant as you can now speak to your Mac using the Siri voice-recognition engine from the iPad, iPhone, Apple Watch and Apple TV. A particularly useful application of this is that you are now able to verbally search through documents using Siri. Another useful feature is Apple Pay on Mac. Unfortunately, as Mac does not come equipped with a fingerprint scanner, you will need to tap your iPhone or iPad in order to verify your identity. Apple Pay icons will now be visible on the buy pages of certain merchants. You will just need to verify your purchases with Touch ID on your iPhone or using your Apple Watch.

In addition, you are now able to Auto Unlock your Mac with your Apple Watch. How could I do that, you might ask? Well, within a certain distance, your Mac will detect your approach and unlock if you are wearing an unlocked Apple Watch.

MacOS Sierra now also gives you the ability to share your entire desktop (and Documents folder) with other devices such as your iPad or iPhone’s iCloud Drive, another Mac’s desktop or Documents folder or PC’s iCloud for Windows app.

Optimized storage removes certain duplicate files for you such as caches, logs and so on, automatically storing seldom used items in iCloud.

More emphasis is now placed on Messages’ emoji and visual effects. Photos have a new Memories feature which recognizes and understands people, places and events. Finally, Apple Music has been redesigned visually.

With all the benefits and upgrades of the new macOS Sierra, its operating system is more demanding than El Capitan so it won’t work on every Mac. Following Macs enable you to install the macOS Sierra upgrade: MacBook (Late 2009 or later), MacBook Air (2010 or later), MacBook Pro (2010 or later), Mac mini (2010 or later), Mac Pro (2010 or later) and iMac (Late 2009 or later).

As early impressions of macOS Sierra are good, Mission Repair Centre recommends that you make the upgrade as soon as you can.

Darius Romanek

Mission Repair Centre Team 🙂

Reduce your iPhone Internet Data Usage if you use Facebook and Twitter Extensively

iphone5 pic 1

How Could You Reduce Your iPhone Internet Data Usage if You Use Facebook and Twitter Extensively?

 David’s girlfriend Anna also uses her iPhone extensively like David does. However, her main focus is on Facebook and Twitter. Just like David, Anna has already figured out that she can save on her cellular data usage by turning certain phone functions off, ones that she does not need or use very much.

Now she also needs to find out how her use of Facebook and Twitter affects her data usage. In order to do that she decides to talk to some experienced individuals as well as to do some research. Let us see what Anna has found out in due course.

She was relieved to know that both Facebook and Twitter provide you with an option to enable auto-play videos on Wi-Fi network only.

How can you find out how much of your cellular data is being consumed by Facebook and Twitter apps? Well, there are three essential steps. You begin by launching the Settings app, navigating to Cellular and scrolling down to the ‘Use Cellular Data For’ section. When Anna did that, she was shocked to see how much cellular data she was using for Facebook and Twitter. Hopefully, you will not be as shocked as Anna was.

So how do you disable auto-play videos in the Facebook app when on a cellular network? Well, there are several steps that you should follow and if you are like Anna, you will follow them carefully.

First, you should launch the Facebook app. Then you tap on More in the Tab bar at the bottom and scroll down to tap on Settings. A menu will pop up where you must tap on Account Settings. When in Account Settings, tap Videos and Photos. In Videos and Photos menu, you should tap Auto-play. Here Anna is faced with a choice. If she wants the auto-play feature to work only while connected to a Wi-Fi network, she should tap on ‘On Wi-Fi Connections Only’. Otherwise, she should tap Never Auto-play videos, if she doesn’t want the feature. As we already know, Anna was happy when she realized that both Facebook and Twitter allow you to enable auto-play videos on Wi-Fi network. Obviously then, she is going to choose that option.

Disabling procedure for auto-play videos in the Twitter app when on a cellular network is as follows.

Again, you launch the Twitter app and tap on the Me tab in the tab bar at the bottom. What you see is your profile popping up. Next to your profile pic, you see a little icon in shape of a gear. You should tap on it. As before, a menu will pop up where you must tap on Settings. Tap Video auto-play. Here you have two options: ‘Use Wi-Fi only’ and ‘Never play videos automatically’. Certainly, we already know what Anna will choose.

If you are a heavy Facebook and Twitter user like Anna, Mission Repair Centre recommends that you follow these simple procedures in order to save on your cellular data usage.

Darius Romanek

Mission Repair Centre Team 🙂

How Could You Reduce Your iPhone Internet Data Usage?

iPhone_6_pic 2

How Could You Reduce Your iPhone Internet Data Usage?

 

David is using his iPhone extensively as a result of which he ends up exceeding his monthly limit. Naturally, David is wondering what he could do in order to reduce internet data usage on his iPhone and thus reduce his monthly usage costs.

There are several different things that could be done. At the end you need to list them in order of importance. It might not be possible to implement all of them as some of your phone’s functions really matter to you whereas others do not matter as much.

Of course, things that matter to David may not matter to you and vice versa. Nevertheless, David’s example will show you the path towards reduction of your internet data usage.

One of the things you might do is disable or turn off Cellular Data Usage for iCloud. However David doesn’t want to do that. Why? Well, he uses iCloud extensively to transfer files or documents from his phone.

The second thing you might want to do is disable Automatic Downloads on Cellular Data and this is what David has decided to do. He did it as he very well knows that App downloads are some of the biggest files on his device. He will make sure that he is first connected to Wi-Fi before he starts downloading and updating his apps.

David knows that he should disable Wi-Fi Assist as Wi-Fi Assist uses Cellular Data while trying to supplement a weak Wi-Fi signal. David does not see the need for that. He will simply not use Wi-Fi if the signal is too weak.

Next remedy you might want to consider is monitoring or disabling data hungry apps. David knows that he may need some of those apps so he decides to find out how many of them (if not all) even need access to cellular data. He does this by checking the amount of cellular data used by his apps for the period since he has reset them.

A wise thing to do also is to use Per-App Options as different apps include their own options for controlling when cellular data is used which is what David does.

David also thinks that it is wise to disable Background App Refresh (usually disabled to save on battery life but you should check it anyways) as apps updating in the background consume data. He is aware of the fact that disabling them will not really affect his interaction with his phone.

David really likes listening to the music but he also knows that streaming high quality music consumes cellular data. The higher the quality, the larger the file. He decides to stream over Wi-Fi only.

David also wants to disable Autoplay Videos on Cellular Network as he is aware that more people are sharing videos on Facebook and Twitter at the cost of his cellular data.

David has also disabled Mail, Contacts and Calendar Sync options because he wants to get new emails and other data manually without having to use his cellular data. He has reduced Web Browser Data Usage by using a browser with a built-in data compression proxy. He also cached some of his favorite music, video, maps and article files in order to use them offline.

It is the recommendation of Mission Repair Centre that once you have reached your monthly limit and do not wish to exceed it you should avoid using cellular data completely. Nice feature of non-Wi-Fi applications such as ESPN is that they will not even load without cellular data being turned off so you can always use them if you have reached your data usage limit for the given month.

Darius Romanek

Mission Repair Centre Team 🙂

Save your Valuable Data from Online Hackers and Phishers

smoke from laptop

How Could You Keep Your Data Safe From Online Hackers and Phishers  ?

 

Did you ever wonder what might be the difference between hacking and phishing? Well, hacking is an extremely high tech attack which requires you to take certain precautions whereas phishing is a low tech attack requiring just a dose of common sense to thwart.

So what does the hacker do? Essentially, he or she gains unauthorized access to your computer once he or she knows the address of your computer (your IP Address). You can think of an experienced hacker same as you can think of an experienced hunter in the forest full of game of different sorts. Just like a hunter will spot and target an animal in the forest, hacker will target your computer once he locates you in the ‘internet forest’ of network computers.

How then could you protect yourself from hackers? The best method is to use or install a so called “firewall”. So what exactly is a firewall? Well, it is a piece of hardware or software or both designed to make your computer “invisible” on the Internet. How does a firewall work? In essence, it blocks the ports of entry to your computer.

Some other anti-hacking operations include making your passwords harder to hack (by including upper and lower case letters, numbers and special characters as well as by increasing their length and complexity), changing your passwords regularly (and perhaps using password management services like Dashlane or PasswordBox to help you keep track of hard passwords), clearing your browser history, avoiding to use free Wi-Fi (unless really needed), using HTTPS (hyper-text transfer protocol secure) to add an extra layer of security and encryption while online as well as to authenticate websites, never opening unknown email attachments (which may contain viruses), trying not to use public computers (the more users the greater the likelihood of viral infection), using anti-virus protection and using thumb or flash drives carefully (as they can also spread viruses easily across computers and networks).

In addition, do not link accounts, keep sensitive data off the cloud and ignore alarmist webpages announcing that there are “critical errors” on your computer as these messages come from scammers.

How about phishers, you might ask? These are part of the latest identity theft scam using fake email messages. Therefore, phishers are like fishermen trying to use bait which reminds fish of its food, whatever it might be. Just like fish bait, these email scams are meant to look real to you. So what are these phishers ‘fishing’ for? They may want you to give up some sensitive personal information such as your credit card, bank or some other sensitive financial and personal information. Once they have it, they steal your identity and can potentially incur thousands of dollars’ worth of debt in your name. Hence, don’t take the bait.

So what could you do about phishing attacks? First, do not reply to any email asking for your personal information, no matter how legitimate it looks! If they include a telephone number for you to call, don’t.

Phishers also like to use scare tactics, threatening to disable an account or delay services until you update certain information. Don’t fall for it! Reading a commercial website’s privacy policy to check whether or not it will sell its mailing list to another company may help you reconsider whether or not you will want to sign up to the site thus stopping some of the spam you are receiving daily. You should also watch out for generic looking requests for information as fraudulent emails are often not personalized. What are some examples of generic looking requests? Some examples are phishing emails beginning with “Dear Sir/Madam” or coming from a bank with which you don’t even have an account.

Some other things you might want to do in order to prevent a phishing attack are never submitting confidential information via forms embedded within email messages or using links in an email to connect to a website of which authenticity you are not certain as well as maintaining effective software to combat phishing such as Webroot Internet Security (which automatically detects and blocks fake websites and authenticates major banking and shopping sites).

Darius Romanek

Mission Repair Centre Team 🙂

The Power of Proper Diagnostics of your Computers, Laptops, Cell Phones, Tablets and Gaming Consoles

Doctor determines the main board problem. Isolated.

Why Is Having Us Running The Diagnostics on Your Device Beneficial For You

Imagine if you were a person with a serious health problem. Will you go to the doctor who will just treat the symptoms of your disease or will you try to find one who will address the root causes?

What can a bad doctor who only treats the symptoms of your disease be compared to? Those Reactive IT Management Businesses (Computer, Cell Phone, IPhone, Gaming Console, Tablet, Repair, etc.) who either charge the client on a Per Hour Basis or give client a quote without diagnosing the issue. Why are these particular approaches not very good for you?

If you are charged on a Per Hour Basis, these charges contain the labour price and might or might not contain the price of an additional hardware that may need to be installed. The key expression here is ‘might or might not’. It suggests the symptomatic approach to the solution of the problem at hand.

If you are provided with a large quote without proper diagnosis of the root cause, you may end up paying more than necessary.

At Mission Repair Centre we are just like good doctors who would never prescribe you any medication without first getting the proper diagnosis of any health issues you might be facing. Just like a good doctor would run all the necessary tests in order to find the exact root cause of your condition to prescribe all the medication you need, we always run thorough diagnostics on your technical device to find the root cause of the problem. Once the root cause is found, we call you and tell you exactly what kind of work needs to be done to bring your device back to life or make it work like a brand new device. This method is transparent and saves you money.

At Mission Repair, this thorough diagnosis usually takes anywhere between 4 and 28 hours (depending on the condition of your device and its hardware peripherals). For example, high end gaming computer’s hardware peripherals and software will take more time to get diagnosed than a mobile/cell phone.

How is the diagnosis process transparent? Well, once we complete the diagnosis we call you (the client), tell you exactly what the root cause is and give you the exact quote to fix/repair your device. We keep our clients posted every step of the way and once the repair is done we sit with you (just like good doctors would do) and suggest/discuss any future preventative measures as we want to keep your problems from reoccurring. Keeping the problems from reoccurring is really the difference between the symptomatic approach and the treatment of the root cause which aims at complete resolution of your problems.

Just like you would go to the doctor who treats the causes of your disease rather than to the one who only addresses its symptoms, you will also not try to treat the problem yourself, perhaps attempting to self-medicate or something of similar nature.

Therefore at Mission Repair Centre we do not advise our potential clients to self-diagnose the issues after reading online articles and/or going on YouTube. From our experience, clients who self-diagnose end up making things worse with their devices rather than better. If they do, it might cost them more money to repair it in the future once they take it to any certified tech shop.

Hence we ask that you please take your device to the certified tech for proper diagnosis of the problems you are having with your technical devices such as computers, cell phones, tablets, gaming consoles, etc.

Amit Bhasin

Mission Repair Centre Team 🙂

Ransomware : How can You protect yourself ?

virus 1

Ransomware: How Can You Protect Yourself

Ransomware is a type of computer malware that installs covertly on your computer to execute so called crypto virology attack which adversely affects your machine and demands payment to decrypt it. It is a denial-of-access attack preventing computer users from accessing files since you cannot decrypt them without the decryption key. These types of attacks range from less to more serious.
Simple attacks may just lock the system in a way which may not be difficult to reverse if you are knowledgeable enough, displaying a message requesting payment to unlock it. In a more serious case, your files become encrypted and inaccessible and ransom payment is demanded to decrypt them. In the worst case scenario, the ransomware may even encrypt the computer’s Master File Table (MFT) or the entire hard drive.
Between 2012 and 2014, 5 major ransomware Trojans were released. Their names are Reveton, CryptoLocker, CryptoLocker.F, TorrentLocker and CryptoWall, variants of most of which continue to be a threat.
Currently, there are 10 major existing ransomware threats infecting different computers throughout the world and these are: Tescrypt.E, Tescrypt.D, Locky.A, Locky, Crowti.A, Exxroute.A, Win32/Cerber.A, FakeBsod.A, HTML/Cerber.A and Brolo.C.
The question is then how can you, as a user, mitigate the threat of ransomware attacking your computer and even when it does what measures can you take against it.
Unfortunately, as is the case with other types of malware, security software may not always detect ransomware. Data damages and/or losses can be stopped or greatly reduced if an attack is suspected or detected in its early stages as it takes time for encryption to take place.
The best recipe is of course prevention. As security software cannot always block at least some of this malware or more from launching and infecting your computer, it is advisable to keep backups of your stored data in locations inaccessible to the targeted area or space such as on external storage drives. It is also important that you keep your computer operating system and application software up to date. Another preventative measure constitutes never opening potentially infected spam emails or emails from unknown senders, never downloading attachments from any suspicious emails and never clicking links in spam. Having a traffic-filtering solution can provide proactive anti-ransomware protection.
If your files have been locked by ransomware, at least partial data recovery may be possible with the recovery of the encryption key (a process which may take several days). If the same encryption key is used, decryption tools use files for which there are both uncorrupted backups and encrypted copies.
New software tools intended specifically to deceive, divert and eventually stop ransomware prior to it encrypting files on your computer have recently been developed. These new software tools are specialized applications of deception technology recently available in the summer of 2016.
So at this stage you might ask: what are the best antivirus programs to protect against ransomware and the best ransomware protection currently available? Well, the best antivirus programs that provide ransomware detection and removal offer On Demand Malware Scan, Behavior Based Detection and Malicious URL Blocking.
Some of the most reputable antivirus solutions you may wish to consider are McAfee, Norton and Kaspersky software. Zone Alarm’s Threat Emulation software detects harmful content before you click (solid offense is at times the best defense against ransomware).

Darius Romanek

Mission Repair Centre Team 🙂

IPTV: Why a Wise Choice

tv-627876

IPTV: Why a Wise Choice

The first question is: why do we want to have IPTV? The answer is that it can be viewed anywhere, at any time and on any device. It consists of digitally switched architecture and is not channel based.

With IPTV, you are able to stream the media in smaller batches directly from the source. This means that you can start playing your data (such as a favorite movie, show or the song you really like) long before the entire file has been transmitted.

What can you expect? Services such as Live Television, Time-shifted Television and Video on Demand (VOD).

An interactive programme guide allows you to search for content by title or actor’s name. Picture-in-picture functionality permits you to “channel surf” without leaving the programme you are watching. Other controls are available such as adjusting camera angle, accessing photos or music from the PC on the television set, using a wireless phone to schedule a recording of a show or adjusting controls for a child to watch a desired programme while parents are away.

Unfortunately, your IPTV can experience delays if the streamed data is unreliable. It has strict minimum speed requirements for delivery of moving pictures. Due to the limited connection speed and bandwidth available for a large IPTV customer base, service quality delivered can be reduced.

Streaming IPTV across wireless links within your home might prove troublesome due to issues with multipath and reflections of the RF signal carrying the IP data packets. Packets must arrive at the right time and in the right order. Improvements in wireless technology are starting to alleviate the problem by providing new and improved equipment. As the wireless area continues to mature, some IPTV service providers today may opt to use wired home networking technologies instead of wireless technologies.

You might ask: what is the bandwidth requirement for your IPTV service? Well, there is no absolute answer for this because the amount of bandwidth you need depends on the number of devices inside your household. In general, the more devices you have at home the greater your requirement for bandwidth will be.

If you are a residential user, your IPTV is often provided in conjunction with video on demand (VOD). At times, IPTV comes bundled together with VoIP and Internet access. If you are a commercial user this bundling is sometimes referred to as triple play service. If cellular service is added to this, it is called quadruple play.

Hybrid IPTV networks combining IPTV with conventional satellite TV deliver the highest levels of performance and reliability.

Hybrid IPTV’s popularity has increased with the emergence of online video sites such as YouTube and Vimeo and the service providers’ desire to offer analogue and digital terrestrial services in recent years.

Hybrid IPTV allows users to access a range of advanced interactive services such as VOD, video telephony, surveillance, gaming, shopping and e-government.

What does Video on Demand (VOD) do for you? It permits you to browse an online programme or film catalogue, to watch trailers and to then select a selected recording. You can then start playing the selected item nearly instantaneously on your TV or PC.

Encrypted VOD content allows you to avoid content piracy. You only have some time to play a chosen film following payment, after which it becomes unavailable.

Last but not least let us talk a little bit about IPTV Broadcast Technologies. One is Ethernet which is the dominant LAN technology. The other one is called ATM (or Asynchronous Transfer Mode). ATM solution fits all (WAN/MAN/LAN) and offers higher QOS (Quality of Service). Unfortunately, the drawback of ATM is that it is a complex technology that needs higher installation times and is more costly. Therefore if cost and time are really big issues for you, you should choose Ethernet as a broadcast technology for IPTV.

Darius Romanek

Mission Repair Centre Team 🙂

 

X96 Android Box: Why should you get one?

Android-6-0-Smart-TV-Box-Amlogic-S905X-Quad-Core-X96-1G-8G-2G-16G-Kodi16

Android 6.0 Boxes X96: Why Should You Get One?

Android 6.0 Box X96, also referred to as X96 Smart Box allows you to place your photos, music and videos on your TV Set. With X96 you get to enjoy 4000 pixel (horizontal) by 2000 pixel (vertical) 60Hz Resolution output, 32 audio channel, 1536 KHz audio sampling, dual video stream and audio and video dynamic-sync.

Each X96 Smart Box comes equipped with 9 input/output ports. These are: DC Power, Optical, High definition (HD) video, Ethernet, Audiovisual (AV) out, External Image Retention (IR), and TransFlash (TF) Card along with 2 USB ports.

What are some of the benefits of the X96 Smart Box? One is its small size of just 9cm by 9cm by 2cm which means that it is actually smaller than your hand. Its small size also allows you to save on transport costs, it saves you space and is easy to carry.

The remote for audiovisual output can be placed anywhere and at any angle. Your X96 Smart Box can be attached to the wall, TV or any piece of furniture in your house that is in close proximity to your TV Set. To facilitate this, your X96 comes equipped with a magic tape and is pothook designed in order to make attachments easy. It is also Dual Image Retention (IR) designed in order to make remote control easy.

Android 6.0 Marshmallow System consists of Amlogic S905X Quad Core ARM Cortex A53 CPU operating at 2GHz and Penta-core Mali-450MP GPU operating at 750MHz. It also has DDR3 Memory of 1GB, eMMC Flash of 8GB and WiFi of the type IEEE 802.11 b/g/n.

X96’s Amlogic Video Engine (AVE) is equipped with dedicated hardware decoders and encoders. It supports multiple “secured” video decoding sessions with simultaneous decoding and encoding.

X96’s AVE supports following file formats: mkv, mpg, wmv, mpeg, dat, avi, mov, iso, mp4, rm and jpg.

Video/Picture Encoding uses independent JPEG image and H.264 video encoder with configurable performance/bit rate.

Audio consists of low power Media CPU with DSP (which stands for digital signal processing) audio processing. It supports MP3, AAC (Advanced Audio Coding), WMA (Windows Media Audio), RM (RealMedia), FLAC (Free Lossless Audio Codec) as well as Ogg and is programmable with 7.1/5.1 down mixing. It contains built-in stereo audio DAC (digital to analog conversion) as well as built-in SPDIF (Sony/Philips Digital Interface Format)/IEC (Interexchange Carrier) 958 and PCM (Pulse Code Modulation) serial digital audio input/output. It also supports concurrent dual audio stereo channel output with combination of analog+PCMo or I2S (Integrated Interchip Sound)+PCM.

What can you do with X96? Well, X96 Smart Box permits you to browse all video websites, support Netflix, Hulu, Flixster, YouTube and others. You can use local media playback, U Disk and SD (Secure Digital)/MMC (Multi Media) cards. You can likewise support HDD (high definition display), SKYPE video call, MSN, facebook, twitter, QQ and others. Wireless mouse and keyboard are also supported.

What do you get as part of a package? A single X96 TV Box, one power adapter, a remote control, HDMI (High Definition Multimedia Interface) Cable and one User Manual.

Darius Romanek

Mission Repair Centre Team 🙂