Friday 26 July 2013

How To Use a Console Controller on Your PC

How To Use a Console Controller on Your PC
Though it's a platform that began with the joystick as the dominant control method, over the past twenty years the keyboard and mouse overtook it to become the only way to play most games on the PC. Which is a shame, because there are a lot of them that play better with a control pad.
This has become especially true over the past 3-4 years, as the PC has started to get a lot more ports of console titles, thanks to both the relative ease of bringing code over and the increasing popularity of Steam leading to a bigger market.
While the keyboard and mouse remain the best means of controlling many titles, especially PC staples like FPS and strategy, there are plenty of other options - from Dark Souls to Remember Me to DMC to Dirt 2 - that are really crying out for a pad.
You could go and buy a custom PC control pad, but that would be stupid. Chances are you already own a control pad you can use on the PC: the ones that came with your Xbox 360, PS3 or Nintendo console.

Xbox 360

Most of you will probably be aware of this, but just in case you're not: you can use Xbox 360 control pads on a PC. With a little help.
Standard wireless pads won't automatically connect to a PC, since your computer won't be able to read the controller's proprietary wireless tech. Microsoft do, however, offer a dongle you can buy, which plugs into a USB port on your PC. They run about $20 officially, though you can of course get third-party alternatives for less (though your performance results may vary). If you want to go down this path, Microsoft has a handy guide on configuring your controller here.
How To Use A Console Controller On Your PC
The better option, though, is to spend the cash on a custom "Xbox 360 Controller For Windows". It's a wired controller with the same 360 design that's custom-made for the PC (though it also works on your Xbox 360 if you feel like disconnecting it and moving it around). I bought one when they first came out and it instantly became my primary controller, even on console, because occasionally having to move it between platforms was worth never again having to deal with 360 pad's woeful battery life.
With one of these, all you need to do is plug it in and you're set. Many games are even coded these days to automatically switch your control method from keyboard+mouse to control pad the instant the PC detects you plugging the pad in.

PS3

Let's say you prefer the PS3's DualShock 3, though. Or don't already own an Xbox 360. The good news is you can get it running on a PC as well. The bad news is it's a little more complicated.
The DualShock 3 communicates via Bluetooth, which your PC will be able to understand, but only if it's got some means of Bluetooth connectivity. Laptops will probably have this already, but if you've got a desktop, you'll need to go get a Bluetooth dongle (you can get decent USB ones for around $10-20).
Once your PC has a means of talking to the DualShock 3, you'll need the software to get things actually running. That software is called Better DS3, and if you've never messed around with this kind of stuff, before, it can seem a tiny bit complicated.
Download Better DS3 from here.
After you've downloaded Better DS3, you've got some setting up to do. This video by wiltshire12345 is probably the best available showing you every step you need to follow.
When that's done, you should be good to go!

Wii U

This isn't exactly an ideal option, but if you've only got a Wii U, you can get the big Wii U controller working on a PC using a download that one of our readers, Chris, put together a few months back.
You can download the files necessary here.
A better option for Wii U owners, though, at least if you've got one, is to use the Wii U Pro Controller. TeHaxor69 made a good one earlier in the year that you can download here, while Screptilez's tutorial video below should guide you through the process.
I've left the Wii off because the Wii Remote's usefulness for the kinds of games you'd be playing on PC is limited, but if you absolutely must try it out, Instructables has a good tutorial here.
If you own more than one console, you've got a choice to make. It should be an easy one, as the Xbox 360 controller has emerged as almost the default option for the PC; most games that support pads, for example, will show button prompts for Microsoft's controller.

Tuesday 16 July 2013

Intel isn’t in your phone, but it wants to be in your smartpants

smartpants header
Intel wants its chips to power your smartphone, but it’s not having much luck. Though it’s the dominant maker of desktop and laptop processors, it’s a bit player in mobile
 phones. Rivals like Qualcomm, Nvidia, MediaTek, and others control 95 percent of the smartphone chip market, and Intel is struggling to make any meaningful progress to turn that around. Intel missed the smartphone boat. But, there’s another boat coming along soon, and Intel already has its tickets booked.
Intel missed the smartphone boat. But, there’s another boat coming along soon, and Intel already has its tickets booked.
Instead of smartphones, Intel looks to be targeting what could be the next big thing in tech – wearables, but rather than dedicate itself to the market, we could see it use wearable tech as a way to come at the mobile industry from another direction. Sort of like becoming best mates with the sibling of the person you’re trying to date. As it’s still early days for wearable tech, Intel has the opportunity to be in at the start, and not face such a gargantuan task of playing catchup like it has been forced to do in the mobile industry.
Wearables may look like Intel’s new favorite, but it’s still hard at work on mobile chips – concentrating not on America or the UK, but China, Asia, Africa and the Middle East – and Tizen, its somewhat stalled mobile OS project. Intel’s mobile strategy looks like a tech trifecta, and the bets are on for wearables to come in first, Atom processors to cross the line second, and at the moment, Tizen bringing up the rear in third. However, does Intel want wearables to lead the race until the last corner, before letting Atom through to win the race?

Google Glass might soon be serviced by Play Store

Like any other mobile device, the success of Google Glass is largely dependent on the app ecosystem. In a bid to attract developers and to make the lives of consumers easier, Google might soon manage the headset through their established Play Store. Although the California-based company has yet to formally announce this decision, they have offered up a major hint: Glass owners who have linked the device to their Google account are now seeing the wearable tech listed as a “compatible device” for many of the apps.
According to The Verge, owners must currently manage the device through an entirely separate interface. Glass also doesn't support any APK files, which is considered to be the standard format for all Android apps. Instead, early Glass programs have been extremely basic in nature and are non-transferable across other Android devices.
A secondary advantage of integrating Glass with the Play Store is that users will also be able to install apps directly from the headset, a privilege already given to smartphone and tablet owners. In fact, a recent screenshot from Android and Me appears to be early proof that this functionality is on the way. The message reads, “You have not opened the Google Play Store app recently on this device. Please open it and try again.”
Although there is plenty of optimism surrounding the Glass headset, it also seems unwise to have traditional Android apps running on the platform. The problem is that Android currently employs a one-app strategy, which means that a single application is compatible on all Google-based smartphones and tablets. The only difference is that the picture must be resized to properly fit the screen. Unfortunately, Glass had a tiny display and the screen itself isn’t actually touch-operated; therefore, traditional apps are essentially useless.
As a result, it is doubtful that we will see a single app running across all three devices. That being said, it would still be convenient to manage Glass through the familiar Google Play Store, a  portal that is quickly becoming a one-stop shop for games, books and music.

Facebook loses key talent as Gowalla co-founder, Instagram designer say goodbye

Facebook will be losing some key talent this week as Josh Williams and Tim Van Damme are both leaving the social network. Williams was the co-founder of Gowalla, a location-based check-in startup that Facebook acquired for their talent pool in 2011.
Upon joining the social network, he was put to work as a product manager for Pages, Locations and Events and most recently worked to help revamp the mobile Pages product.
Facebook confirmed Williams’ departure in a statement to PCMag, noting that he has been a valuable member of the Facebook team and wishing him the best of luck with future endeavors. No official word yet on where Williams is headed although sources close to the situation told All Things D that he is planning to stay in the San Francisco area and start working at a new company.
Tim Van Damme is a former Gowalla designer, although he departed the company and joined Instagram before both outfits were acquired by Facebook. In a blog post on the subject, he said the past 18 months were some of the best of his life, both personally and professionally.
Van Damme said he had the opportunity to work with some of the brightest minds in the business but moving forward, he highlighted the desire to solve a different set of problems. As such, he will be joining Dropbox early next month after taking a short break to spend time with his family. He will be in good company as he joins two other former Facebook employees that jumped ship during the past year.

Leaked specs, pics of Sony's upcoming Xperia i1 smartphone surface

A Taiwanese website has leaked what they claim are photos and specifications for Sony’s upcoming flagship smartphone, the Xperia i1. According to rumors, the handset – codenamed Honami – will be powered by Qualcomm’s Snapdragon 800 processor operating at a blazing 2.2GHz alongside 2GB of RAM and 16GB of flash storage.
The Android-based smartphone will ship with a 5-inch, 1080p display but perhaps the most interesting feature of the i1 is the rear camera. It allegedly consists of a high-end 20.7-megapixel ExmorRS sensor that uses Sony’s Bionz image processing technology.

There’s also the mention of something called Sony Lens G which is said to incorporate unique optical design technology and quality control for exceptional optical performance on par with the best lenses in the industry.
A handset of this caliber would be a monster, or at least it is on paper. Truth is, Sony hasn’t even confirmed they are working on such a device but it’s worth pointing out that these specs match those that surfaced back in April and May. I for one would be interested in comparing the camera on the i1 with the one in Nokia’s new Lumia 1020which boasts a 41-megapixel shooter.
Most expect the Xperia i1 to officially surface at this year’s IFA Expo in Berlin which starts on September 6 and runs through September 11. As always, however, it’s advisable to take this rumor with a healthy dose of salt.

How to password-protect a PDF before e-mailing in OS X

The print-to-PDF feature in OS X is convenient for quickly preserving a document's layout in the PDF format, so it can be viewed on most computers and tablets. If you would like to send someone a formatted document that contains sensitive information, you may want to add the step of protecting it with a password.

To do this, you can use a container format such as a ZIP file or an encrypted disk image (using the Disk Utility program in OS X); however, these may be a bit cumbersome to manage, both for the sender and recipient.
An alternative is to send the PDF as an encrypted PDF file with a password that must be entered by the recipient before the PDF can be read.

Encrypting PDFs in PreviewThere isn't a specific option to print a document to an encrypted PDF format in OS X, but the procedure is simple enough:
  1. Use the PDF menu in the print dialog box and choose "Open PDF in Preview."
  2. Press Command-S to save the PDF.
  3. In the save dialog box, click the "Encrypt" check box and provide a password for the PDF, and then save it to your desktop (or similar location).
  4. Now click the Sharing toolbar button in preview and choose the Email option.
This action will create the encrypted PDF and offers a relatively easy way to attach it to a new e-mail message. However, if you use this feature regularly then you may want a slightly more streamlined approach.
Luckily, OS X supports an option for custom print plug-in workflows that you can use to encrypt a PDF directly from the PDF menu in the print dialog window. To do this, open the Automator program (in the Applications folder) and follow these steps:
Encrypted PDF Print Plugin Automator workflow
When creating the workflow, for the encryption action be sure to check the option to show the action's input when the workflow runs (click for larger view).
  1. Create a new workflow.
  2. Select "Print Plugin" as the type of workflow to create.
  3. Locate the "Encrypt PDF Documents" action and drag it to the workflow area.
  4. Click the Options button for this action and check the option to "Show this action when the workflow runs."
  5. Locate the "New Mail Message" action and drag it to the workflow, below the encryption action (you can optionally use the "Add Attachments to Front Message" action, or have this in a separate workflow altogether).
Save the workflow with a name like "Mail Encrypted PDF" and you should be good to go. Now whenever you print a document you can choose this workflow from the PDF menu and after you supply the password to use, the system will generate the secured PDF document in a new e-mail message.

Monday 15 July 2013

BMW’s i3 needs to shock the EV market if it wants to be Bavaria’s battery-powered champ

BMW-i3-needs-to-shift-out-of-neutral-if-it-wants-to-be-Bavaria's-battery-powered-champ
When it comes to introducing new technologies, it’s often companies that are first to market who enjoy the most success. Just look at Ford and its mighty Mustang, Chrysler and its popular lineup of minivans, and more recently, Toyota, who announced that it has sold its 3 millionth Prius hybrid .

The minivan, pony car, and hybrid were the cause or were near the birth of their respective segments. BMW, of course, wants to be a part of this pantheon of trend-setting companies as well. And with its upcoming all-electric i3 EV (a plug-in hybrid is also in the works) it can be. However, in order for it to make waves, it needs to get the i3 out the door and onto the streets ASAP.
BMW obviously isn’t the first automaker to bring a full electric vehicle to the market, but with the release of its eagerly anticipated i3, which is rumored to arrive on North American shores in January 2014, it will be the first established luxury automaker to offer a high-end electric EV to the masses. But more exciting than that is the fact that it’s looking like it won’t cost a boatload of cash to buy (that’s what the i8 is for).
BMW's-i3-needs-to-shift-out-of-neutral-if-it-wants-to-be-Bavaria's-battery-powered-champ
If recent rumblings are to be believed, the electric city car’s sticker price is pegged at $35,000, which will get you an eco-minded Bimmer that has a perfect 50/50 weight distribution, can go from 0-62 mph in 7.2 seconds, and gets an estimated electric driving range of 81-99 miles in everyday driving from its 22 kWh lithium-ion battery pack.
Now, 35 grand might sound like a lot and in many ways it is. Sure, BMW is slapping a healthy heap of carbon fiber and the pancaked-style battery pack is likely going to cost an arm and a leg to produce, but what greenies should consider is that this is a an EV from BMW, a brand that has cemented its reputation on building cars with performance and driving dynamics that often seem out of this world. If that sounds like hyperbole then you obviously haven’t driven a 3-Series in like … ever.
That’s of course assuming the i3 delivers and we have no way of knowing until we drive one. BMW is already up against a sea of competitors – good ones to boot.
Fiat 500e
The Fiat 500e is an amazing EV, arguably one of if not the best on the (affordable) market, which is a shame considering it’s only available in California right now. Honda’s Fit EV is right there with it. The Fit’s dynamic sport mode and confident manners make it one of the most exciting to drive and Honda’s recent price drop is almost too good to be true. Like the Fiat though, it’s only available in a small number of states, limiting its usefulness to interested parties outside of Oregon, California, New York, New Jersey, Massachusetts, Maryland, Rhode Island, and Connecticut.
Honda-Fit-EV
Of course EV competition like the Nissan Leaf, Honda Fit EV, and the Fiat 500e, while good, do not carry the same weight brand-wise as a “BMW.” Remember, luxury cars are as much about the badge on their nose as they are the actual performance. BMW has a leg up in this regard as its reputation precedes it.
Currently the Nissan Leaf is sitting pretty as the top selling electric car of all time. The Japanese automaker has sold more than 50,000 of the cars worldwide. To add some perspective, Honda sells roughly 30,000 Civics a month, but for a segment very much in its infancy, Leaf sales are nevertheless impressive.
But the Leaf, for all its trappings, is not a luxury car, it’s not even the best EV on the market (I’d argue the Fit EV and 500e any day of the week, not counting Tesla’s Model S of course). It’s a very good car, but its modest success is largely attributed to the fact that it was the first mass produced EV to market when it debuted in 2010.
Nissan knows this, which is why its luxury wing Infinity is hard at work developing an EV of its own. Last year Infinity showed off its LE concept sedan at the 2012 New York Auto Show. The all-electric luxury sedan was said to drop in 2015, a full year after the reported 2014 debut of the BMW i3, with some impressive specs: a 4-kWh lithium-ion battery, a 100-kw electric motor producing 134 horsepower and 240 pound-feet of torque, and a 100-mile range. Some chatter about utilizing the black art of wireless charging was also mentioned.
Infiniti-LE-Concept-Wireless
Now, reports say the EV will be delayed beyond that because it wants to add better tech, with Infinity refusing to give a concrete release date. Better tech is great, but by delaying its luxury EV, Infinity could be handing the keys to the segment over to competitors like BMW.
What automakers delving into the EV game need to understand is that you can’t just wow consumers at car show and then delay product launches, you need to grab their attention first and then deliver a real product that they can run out and buy.
We can talk about concepts and designs studies until we’re blue (green?) in the face but unless that amazing new EV is available in your area, are you even paying attention? BMW isn’t guilt-free either, the i3 has been on the radar for some time now.
BMW-i3-Motion
But for BMW, the date draws near and the i3 needs the same momentum the Leaf had to get it going. It needs to be the first luxury automaker to bring a better EV to market and the fact that the i3 is shaping up to be (mostly) affordable bodes well not only for BMW but for EV adopters looking for something more upscale and prestigious. And here’s the thing: BMW’s are inherently cooler than Nissans, Hondas, and Fiats. And I don’t care what anyone says, new technology in the EV segment is almost always cool and there are always early adopters out there that just can’t wait to get their hands on the “next best thing,” so let’s drive the i3 already.
We’ve been excited for the BMW i3 for what seems like forever now and it finally looks like there’s a light at the end of this dark, dark tunnel. BMW just needs to get its Bavarian butt in gear and get the i3 out the door – and fast!

How to protect your fancy new ‘Connected Home’ from savvy hackers

Smart Oven HackedDEF CON and Black Hat aren’t rappers with guest spots on Jay-Z’s new album; they’re a pair of security conferences, that you’ve likely never heard of or paid any attention to. You might want to change that this year. A major part of these conferences are presentations by security professionals (that’s pronounced “hackers”) who spend their days breaking into all things digital, and this year’s agendas are stacked with demonstrations of exploits against connected home technology.
The explosion of otherwise mundane internet-enabled devices – thermostats, light bulbs, ovens, TVs, the list goes on – has everyone from script kiddies to intelligence agencies just as excited about the new attack avenues these gadgets and appliances open. Any device that can talk to another device or the internet can potentially be hackabled to do something unintended by its creator or owner, and this will soon be demonstrated publicly at Black Hat #Fouladi and DEF CON.

Why worry?

Granted, a hacker going after your internet-enabled toaster may not be lucrative in the same way that stealing your identity or banking credentials might be, but money’s not always the motive in hacking circles. Many of the most damaging attacks on computers have been perpetrated for shock value, underground credibility, or professional reputation. Burning down a home by hacking connected appliances would be worth a lot more cred than pwning Grandma’s computer. This is admittedly a worst-case scenario, but there are innumerable ways that a compromised connected home could be used to wreck your day. A hacked baby monitor could be used by would-be burglars to figure out when you’re not home, the script kiddie next door could shut off your heat mid-winter and burst your pipes by hacking your internet-connected thermostat, or shut off your smart-grid enabled fridge and spoil all the food. A few years back, proof-of-concept attacks against compromised networked laser printers were able to make them singe paper. Back when I had X10 automation-enabled switches throughout the house, friends used to drive by and mess with my house lights, just for fun. Exploits against an X10 successor, Z-Wave, will be demoed soon at BlackHat and DEF CON.
The point: This isn’t just tinfoil-hat stuff; there are plenty of plausible attacks against a connected home. Unlike the annoyance factor when a computer gets hacked, there can be real-world physical consequences when unsecured connected appliances are exploited.

Insecure by default

True security is about balancing risk and reward
Security is often an afterthought in the design of connected devices. It’s not something that most consumers are educated about, and it’s often hard to describe in a bullet point or checkbox fashion (“Security: Yes”). Further, many of the old-line manufacturers that are entering the connected devices space don’t have institutional knowledge around security; it’s not historically been an issue for, say, refrigerators. In the product development tug-of-war between security and convenience, security is usually the loser. A great example can be seen when you pair your phone to a Bluetooth headset or your car. Often you’ll be prompted for a PIN code, but it’s usually all zeros (in fact, it’s so common that some new devices just try all zeros and never prompt for a PIN at all if it works). The pairing PIN is a security feature built into Bluetooth to help prevent an attacker from interfering in a way that allows later eavesdropping of the encrypted connection, but it’s been effectively neutered by the many manufacturers that choose not to use it in the name of convenience. An attack on a headset might merely result in some juicy gossip from your phone calls going around at the next block party, but the consequences of a pairing attack could be much worse with something like a door lock or garage door opener.

What to do?

We might have you so scared now that you’re tempted to just live the Luddite life; rest assured that’s not our intent. We love the idea of the connected home, but reasonable steps should be taken to protect yourself from having it used against you.

Secure your network

This should go without saying, but know how to secure your WiFi network. There’s almost no excuse for running an open unencrypted WiFi network. If your router is more than a few years old, odds are that its security mechanisms are probably exploitable and it should be replaced. Newer WiFi routers have built-in guest network capabilities that can isolate untrusted devices from each other and from the rest of your network – a useful feature for most devices that only need internet access and don’t need to talk to other devices. Extra configuration may be required to properly secure devices that need to talk to each other (like automation controllers and security cameras), but it’s possible to limit that communication without laying bare the rest of your home’s network.

Know what’s in your home

Keep an inventory of your connected appliances and other devices (including manufacturer names and model numbers). Whenever you bring a new gadget home, update the list. Educate yourself about some basic security principles before welcoming new connected devices into your home. How does the device connect (Bluetooth, WiFi, GSM, something proprietary)? If it’s controllable by a tablet app or computer, how does the association process work? Is there a PIN or password? Is the process encrypted? How do updates work, and for how long will they be provided? This information should be available from the manufacturers, either published on their websites in technical specifications, or by contacting customer support. If a manufacturer can’t or won’t answer these questions for you, vote with your wallet and take your money elsewhere.
Connected Home Kitchen
Devices that magically “just work” without any kind of secure association process or encryption involved may be ripe for hacking. True security is about balancing risk and reward; the amount of damage that could be done by someone exploiting a Bluetooth soundbar or a WiFi-enabled LED light bulb is probably pretty minimal compared to the benefits of having such things around. The script kiddie next door might be able to hassle you about your Justin Bieber fetish or run an impromptu lightshow on your dime, but it’s not the end of the world. On the other hand, the things a bad guy could do with larger connected appliances, internet-enabled heating, and security systems definitely deserve some serious consideration.

Keep up-to-date

Set up a regular schedule to check for updates and exploits for the items on your connected devices list. Some devices may update automatically; even better! Well-behaved manufacturers should provide security updates for years, but others call it done once it’s shipped, and move on to the next project. Google around for well-known exploits against the connected devices in your home. If you find some, and the manufacturer hasn’t provided updates that address them, it might be time to retire that particular device. Sometimes, it’s worth the risk to keep using an exploitable device, but it’s best to be informed.
At the end of the day, the connected home is here to stay. Just like the previous waves of home and mobile computing, there are bound to be some growing pains as manufacturers fumble their way through security. We’re hoping more connected device makers will take security seriously, before the less savory attendees at Black Hat and DEF CON start playing with your new toys.

Turn a cracked Nexus 7 into an e-book reader


The Google Nexus 7 is one of our favorite budget Android tablets for many reasons, but durability isn't one of them. As our Always On torture test has demonstrated, the touch screen on the Nexus 7 is a rather delicate flower.
If you've experienced the fragility of this screen first-hand, chances are you've got the tablet gathering dust somewhere with a partially or completely unrespons
ive screen.
The good news is that you might be able to give your broken tablet new life, so long as it still powers up. Inspired by this tutorial found on Imgur (tipped to me by CNET's Xiomara Blanco) I endeavored to see if one could set up a Nexus 7 without using the touch screen, for use as a dedicated e-book reader.
A USB OTG adapter connected to a smartphone.
To make this happen, your first step is to get your tablet working using an alternative input method (assuming your touch screen is hosed). The easiest way to do this is to invest in an inexpensive USB OTG adapter. You can read all about this wondrous accessory on Sharon Vaknin's extensive tutorial.
Connect the adapter between your tablet and a USB mouse, and you should be able to navigate around Android with a standard mouse pointer. Your first task on your now-functioning tablet is to disable the tablet's screen lock. We don't want to rely on the USB mouse as a long-term solution, so disabling the screen lock will allow you to jump in and out of your tablet with nothing more than the sleep/wake button.
Jump into your Android settings, select Security, and at the top you should see a field for Screen Lock. Tap it, and select None from the list. Realize, though, that this will leave any private information and accounts on this tablet accessible to anyone who picks it up. If that's a concern to you, now would be a good time time to delete any sensitive information and disassociate any accounts from the tablet you don't want meddled with.
Next up, decide on what e-book reader you prefer to use for this. The key is that you'll need one that supports the ability to use the tablet's volume buttons as a means to advance book pages. I didn't do an exhaustive search for apps that include this feature, but I found that Google's own Play Books app (included on the Nexus 7) offers this, as well as Amazon's Kindle app. The B&N Nook app didn't seem to include this feature, but for those looking for an alternative e-reader with great open-format support, give Cool Reader a try.
The settings panel in Google's Play Books app.
Once you've settled on your reader software, locate the app's settings and check the box that enables the page-turn function using the volume keys. After that, back out, open a book, and give the volume key page control a try.
If it works, then it's nearly time to jettison the USB mouse and adapter and fly this thing using only button controls (sleep/wake, up/down). But first, decide on a book that you're set on spending some time with for a while. A task as seemingly simple as changing books will require you to fish out that mouse and adapter again, so open up a worthy digital tome before you unplug.

Use custom fonts with Over for iOS

With Over you can place text over a photo. The app has several free fonts, but it also allows you to import your own font to the app.
Over was recently one of the apps offered by Apple for free as part of its celebration of the App Store's fifth anniversary.
The simple app helps add some creativity to photos by overlaying text or artwork onto your personal photos. You're able to customize your artwork by changing the color and fonts used. Built into the app is a long list of free fonts,
along with many more fonts you can purchase in-app.
Recently added to the app was the ability to import any font you currently own in. All you'll need is the TTF or OTF file for the font (the app can't open a ZIP file).
Once you have the file and are sure you have the rights to use it as you see fit, you can get it to your device by e-mailing it to yourself, or via Dropbox.
I downloaded Google's Roboto font, which is coincidentally available as a purchased font from Over for 99 cents, and placed it in a Dropbox folder. 
Don't give up when you see this image. Just tap on the download button to add your font to Over.
Using Dropbox to access the font files, you'll receive an error message stating Dropbox can't view the file. That's OK, just tap on the download icon in the lower-right corner of the screen and you'll be presented with the option to open it in Over.
When e-mailing a font file to yourself, you simply need to wait for it to download and then tap on the attachment. From there you'll be able to open the font in Over.
Once the import process is complete, Over will alert you and you'll then see the font listed at the top of the font list. You can now use it as you would any other font within the app.
Currently there's no method to delete installed fonts, but the Over team has indicated it's in the works and will be coming in a future updated.

How to clear browsing history on the new Chrome for Android


Chrome 28 for Android browsing historyThe latest version of Chrome for Android makes it much easier to clear your browsing history than before.

Clearing the browsing history on Chrome for Android has always been a bit of a chore. You either had to memorize chrome://history, or bookmark it. Chrome 28 for Android has changed that by adding a menu item for quick and easy access to your browsing history.

Once the history data comes up, you can click on the "X" next to the individual sites you want to clear. You can also click on the "Clear browsing data" button to clear your entire browsing history, cache, cookies and site data, saved passwords, and autofill data.
To get to Chrome's browsing history on Android, hit the menu key, then select "History."

Use Google as a Proxy Server to Bypass Paywalls, Download Files

If you have trouble accessing a web page either because the website is blocked at your workplace, or because that page happens to be behind a paywall, there are a couple of undocumented Google proxy servers that may help you read that page.
Google Proxy Server

When you access any page via one of these Google proxies, the content of that page gets downloaded on Google servers and then served to you. The lesser-known gmodules.comproxy, discussed later, will even allow you to download documents, videos and other web files that are otherwise blocked.

1. Google Translate as a Proxy

To use Google Translate as a proxy, set the destination language as the actual language of the page and the source language as anything but the destination language.
For instance, if you are to access a page written in English, set the destination language (tl) in the translate URL as “en” and the source language (sl) as “ja” for Japanese. (example)
http://translate.google.com/translate?sl=ja&tl=en&u=http://example.com/
Google Translate Proxy (bookmarklet)
Advantage: This is the most popular Google proxy and the download web pages looks exactly like the original provided the domains serving the images and CSS aren’t blocked at your place.

2. Google Mobilizer as a Proxy

Next in the list is Google’s Mobilizer service. Google has discontinued the main mobilizer service on google.com (secure) but you can still access it through any country-specific Google domain like google.co.in or google.ie. The URL would be:
http://www.google.ie/gwt/x?u=http://example.com/ (example)
Google Mobilizer Proxy (bookmarklet)
Advantage: The presentation (CSS) isn’t retained but this mode is perfect for reading text-heavy pages and do have the option of disabling inline images for faster loading.

3. Google Modules as a Proxy

The gmodules.com domain is part of the Google personalized homepage service and is primarily used for hosting gadgets that are available for the Google homepage.
http://www.gmodules.com/ig/proxy?url=http://example.com/ (example)
Google Modules Proxy (bookmarklet)
Advantage: This is the only Google proxy that will let you download files (like PDFs, .MP4 videos, etc) in addition to viewing regular web pages.