This action might not be possible to undo. Are you sure you want to continue?
Here at Elite Stuff I felt the need of one magazine that provides just the right quantity of stuff to read & not 100 pages of clutter that one can’t read even after spending whole one month. So I came up with an idea of compiling an e-magazine that is 1. Free of cost 2. Contains only few pages which one can read in less time 3. Has stuff for every community like students, hobbyists and all. So here I am with the first issue of Elite Stuff. It houses articles about software, gadgets, tech news & not so common personality development. I hope in this world where everyone carries a notebook its easy to read a few pages of an e-mag whenever you get free time. Enjoy reading!!! Editor: Star Tech
2. Cover Story – Be Aware Of Malware
4. 8. 9. 11.
Gadgets & Gizmos
6. Scintillating Softwares 5 Worth Visiting Websites Personality Plus Tech News
Click here to apply for free subscription
Cover Story – Be Aware Of Malware
Page 2 of 11
In recent years, consumers have become more tech savvy and have a better understanding of the mysticism of the Internet. From banking and shopping online, keying in our user IDs and passwords and confidently sharing our personal information at secure sites, these are everyday occurances. Although it makes our life easier, our increasing online usage also makes us vulnerable to digital threats. When we enjoy the convenience of online banking, we invariably expose ourselves to phishing attacks. We download applications from the Internet and invite malware to take control of our computers. Email attachments may unknowingly bring in Trojans that might play havoc with our computers. However, if we exercised a little more caution, we could prevent the threat of malware from capturing our online identity. To do that we need to be aware of the different types of risks that exist, how they work and what can be done to safeguard our data against them. Danger defined: By and large, we tend to categorize all online threats as viruses. But what really is a virus? Historically speaking, a virus is a type of a computer program that not only infects your computer, but makes multiple copies of itself and proliferates within documents or applications on your computer. It also has malicious repercussions like corrupting file content, denying access to databases, stealing personal information and the like. Back in the days of the floppy disk, an infected disk could infect a host computer if the user executed or copied files from it. This digital plague could further infect other floppy disks or other media if inserted into the host computer, thus replicating them. To prevent these viruses from spreading and damaging files, computer security firms developed applications that could detect and even remove viruses within files. In cases where this disinfection was not possible, the program would delete the file from the computer or move it to a secure location (much like a quarantine). However, today’s virus engineers are smarter. Drawing on the power of the Internet, there are very few viruses out there that still spread by physical media—most viruses proliferate through the Internet across various programs. This has given rise to worms that travel through local and web networks, Trojans that are capable of camouflaging their presence and spyware that can steal your data without your knowledge. Welcome to the new world of malware. Computer worm: In computer terminology, a Worm is a self-replicating threat that travels through a network and settles in a computer via a variety of online applications like e-mails, chat clients, P2P clients, etc. A worm does not attach itself to any program that explicitly needs to be executed for its spread. Instead, it travels through networked applications and primarily replicates itself up to a point where the network is clogged with its clones, preventing it from being used by legitimate applications. The different types of worms you could encounter are: E-mail worm: This type of worm uses e-mail as its vehicle. When an infected e-mail reaches your inbox, it does nothing unless the e-mail is opened to be read. When you open the mail, you may see an attachment or a link to a real or fictitious web site. The moment you click on the link and visit the web site, the worm gets triggered. Once activated, it starts searching your address book and sends e-mails to your contacts. It can even fake the sender’s address, so that the recipient assumes that the mail is not from someone he knows. Clearly, across an office network consisting of tens or hundreds of users, the numbers of ficticious e-mails traversing the mail servers grow exponentially over a short time. E-mail worms often bring down mail servers and clog their functioning.
Page 3 of 11
File sharing network worm: This worm generally proliferates through a shared folder of a machine. It creates a copy of itself and masks its intent by using a seemlingly harmless and unassuming name. The moment you connect to a networking site like ‘kazaa.com’ and your sharing folder gets accessed, the copy of the worm moves from your computer to other computers in the file sharing network. With millions of computers actively being used to access files from peer-to-peer networks, these worms can proliferate very quickly. Another popular type of worm is the instant messaging worm (similar to the email worm, but uses an instant messenger service as its vehicle). Trojan: Trojans are malicious programs that pose as legitimate applications. When users execute such programs, blissfully unaware of their real intent, the host computer gets infected. Once on your computer, it may strike in a variety of ways, ranging from capturing what you see on your screen to logging what you type. The captured information is then sent to the author of that malware through the Internet. You could therefore stand to lose precious data, bank passwords and the like. The different types of Trojans include remote access Trojans, where others can gain access to and even take over your machine, data sending Trojans that scan your computer and send data to the author, and destructive Trojans that simply delete files on the host computer. Trojans can also infect your computer and you may face denial of service (unavailability of data). Trojans even have the potential to counter anti-virus software by changing their coding DNA (a process known as polymorphism), making it harder to detect. Spyware is also a type of computer application, developed with the intention of stealing information from your computer. These applications can steal data including the history of web sites you have visited, passwords that you have used to access online secure services, etc . However, unlike Trojans and worms, spyware cannot replicate but it does exploit the host computer for commercial gain. These include everything from throwing unsolicited pop-up advertisements, capturing your web browser’s home page and directing it elsewhere. Adware: Adware is more of an annoyance than a threat. Typically found in applications downloaded from questionable web sites, it infects the host computer by downloading and installing other advertising material and displaying it on your computer via annoying popups that appear while you use Internet applications. This is where adware generally gets confused with advertisingsupported software. The latter is not malicious and only displays an advertisement within the window of the application program (such as trial or shareware versions of software). Adware, on the other hand, displays advertisements randomly, often when you least expect it. The last call: This new breed of Internet threats may or may not be harmful to users, but they do hamper the performance of computers. To protect computers from today’s digital threats, an anti-virus program is a good place to start. Look for application suites that specifically offer protection against all of these threats and not just ones that offer plain vanilla virus protection. In today’s world, data security requires blanket protection systems that do it all. You can also install antispyware and adware application like NoAdware, ErrorDoctor, Spynukke, AdAware, etc. Secondly, it is important to exercise caution on what applications and files are downloaded. This includes your mail attachments. Chain mails with attachments (such as .exe, .com, .scr, .bat, or .pif), download sites that contain links of questionable web sites, applications that aren’t from
Page 4 of 11
trusted sources should all raise a user’s alarm bells. Most of the time, the battle against malware can be won before it even begins—all it takes is a bit of vigilance.
Gizmos & Gadgets
Spice Mobiles has added another camera phone to its portfolio - the Spice M-7070
Equipped with a 5 MP camera, 8x digital zoom, anti- shake and auto- focus features, face detection and dual LED flash the phone allows taking videos at 30 fps. The Spice M-7070 is a Multi SIM (GSM-GSM) handset that also features FM Recording, 16 GB expandable memory and EDGE and Java support. The phone is available in the market at an MRP of Rs. 7999. Intel reveals information about future Atom chips Intel's next range of Atom chipsets seem to be ready to take Nvidia Ion head on. The new lineup will be smaller, faster, will reduce the average power consumption by as much as 20%, and are expected to be available as early as January of 2010. However the best feature of these chips is the integration of a GPU. The three new processors will all come at 1.66GHz and will come with an integrated Intel NM10 Express graphics chipset. With the integration of the CPU, GPU and memory controller on one chip, the come the reduction in size by 60% for a netbook footprint and up to 70% for a desktop. Intel's next range of Atom chipsets seem to be ready to take Nvidia Ion head on. The new lineup will be smaller, faster, will reduce the average power consumption by as much as 20%, and are expected to be available as early as January of 2010. However the best feature of these chips is the integration of a GPU. The three new processors will all come at 1.66GHz and will come with an integrated Intel NM10 Express graphics chipset. With the integration of the CPU, GPU and memory controller on one chip, the come the reduction in size by 60% for a netbook footprint and up to 70% for a desktop. Of the three new processors, the N450, D410 and the D510, the N450 is intended for netbooks, while the D410 and D510 are intended for low end desktops, The N450 comes with a 512kb L2 cache and a total TDP of 7 watt, making for longer battery lives on netbooks.
Page 5 of 11
HCL Infosystems unveiled new range of 3G enabled ME series Net book, the HCL ME 06
Designed to match the persona of today’s youth and support the on-the-go lifestyle of business executives, HCL ME 06 comes with integrated 3G capabilities, offering seamless connectivity and faster access to the internet. With energy star 5.0 certified, HCL ME 06 will be available in a range of colours including red, blue and black. HCL also launched the new notebook ‘HCL ME 45’, equipped with multi touch gesture touchpad that helps a user to expand, shrink and rotate the picture through the movement of figures on touchpad. Other innovative features include - SPLIT ME where one can share their data without worrying about the size of the file. LOCK ME that prevents data theft from the system. This feature ensures that the data cannot be copied on to external storage devices, USB memory sticks, CD optical disk drives, hard disk drive without getting authorization from the user, Secure ME is an effective tool which can be used to lock any application installed on the PC e.g. Internet Browser, Adobe, Power point etc, another feature. Encrypt ME allows the user to encrypt their data and avoids unauthorized access of the data providing assurance against data theft. The HCL ME 06 netbook is priced at Rs. 19,990 and HCL ME 45 notebook is available for Rs. 39,990. These products will be available across stores.
Firefox 3.5 edges out IE 7 It has barely been a week since Microsoft's browser ballot scheme was announced, and already we see Firefox beginning to edge out Internet Explorer. Not that I imply causation, just coincidence; the browser ballot is still a few months away. StatCounter, a web analytics firm which tracks over 3 million websites, recorded that finally the latest version of the Firefox browser (3.5) has managed to surpass Internet Explorer 7, which had been the most popular
Page 6 of 11
browser till date. Now with a 21.92% share, Firefox 3.5 has edged out Internet Explorer 7 (with a share of 21.18%) and Internet Explorer 8 (a share of 20.34%). Internet Explorer still has a high share of 13.93% still beating Chrome, Safari, and Opera.
Needless to say, all versions considered, Internet Explorer is still the most popular browser with a 55% share while Firefox comes seconds with an impressive 32%. However, with the ballot option coming in March next year, Firefox is sure to gain an even more significant lead in the coming year.
While the truly good news will come when Internet Explorer will finally die the death it deserves, this growing trend of adopting alternative browsers is a pleasant one indeed. With all the goodness that HTML5 brings, its impact will be severely limited if Internet Explorer is not safely out of the way. It is too much to hope that the coming year will finally see Firefox take a lead over Internet Explorer as a whole, however we do hope for a severe dent. Free Video to Audio Converter 2009 3.0.1 Free Video to Audio Converter - Completely free audio extractor for Windows
Free Video to Audio Converter is a powerful audio extractor extracting audio from video, like convert MPEG to MP3 , convert MPEG to M4A, and AVI to MP3. The primary function of the video to audio converter is extracting audio from video files, such as
Page 7 of 11
convert AVI to MP3, and convert MPEG, WMV, MP4, MOV and RM to MP3 file. Moreover, Free Video to Audio Converter can convert among various audio formats as an audio converter. • • Free Video to Audio Converter is an extremely easy-to-use audio extractor which can extract audio from video, convert MPEG to MP3, and convert MPEG to M4A and AVI to MP3 with high conversion speed to give you the best quality. Compared with other audio extractors, Free Video to Audio Converter supports so comprehensive video and audio formats like AVI, MPEG, GIF, Flash, MP4, WMV, MP3, WMA, WAV, M4A, AAC, and OGG, as well as APE/CUE decoding and audio CD ripping with lots of codecs. With various settings and high conversion speed, Free Video to Audio Converter is Completely Free!
Download Link: Free Video to Audio Converter 2009 3.0.1 Input: AVI, 3GP, GIF, MPEG, WMV, MP4, DV, MOV, M4V, VOB (the video format used in DVD), SWF, NUT, RM, APE, CUE, 3G2, MP2, MP3, RA, WMA, WAV, M4A, AAC, OGG and CDA. Output: WMV, MP2, MP3, WMA, WAV, M4A, AAC, AC3, OGG and AU
5 Worth Visiting Websites!
www.pdftoword.com : Using our PDF-to-Word conversion technology, you can quickly and easily create editable DOC/RTF files, making it a cinch to re-use PDF content in applications like Microsoft Word, Excel, Open Office, and WordPerfect. Best of all, it's entirely free! www.scribd.com : Scribd began with a simple observation — that the desire for self-expression through the written word is as old as humanity itself. But even with the proliferation of blogs and other self-publishing tools, there was no easy way for average people to publish to a readership of millions. Today, Scribd is the largest social publishing company in the world — the website where more than 60 million people each month discover and share original writings and documents. Scribd’s vision is to liberate the written word — to turn everyone into a publisher and create the best possible reading experience on the web and mobile platforms. www.onlyfreewares.com : For all you out there who want utilities, converters, web development tools, programming & other exciting software but free of cost then this site is only for you. Visit this site & download all the free stuff present there. Plus if you are a programmer then you can upload your own creations also. What else a computer geek wants?
Page 8 of 11
www.twitter.com : Twitter is a privately funded startup with offices in the SoMA neighborhood of San Francisco, CA. Started as a side project in March of 2006, Twitter has grown into a realtime short messaging service that works over multiple networks and devices Simplicity has played an important role in Twitter's success. People are eager to connect with other people and Twitter makes that simple. Twitter asks one question, "What's happening?" Answers must be under 140 characters in length and can be sent via mobile texting, instant message, or the web. One more reason of being on twitter is that all famous personalities are tweeting. www.softpedia.com : Windows, Linux, Mac, Driver, Scripts, Mobile, Gadgets, Games & what not. All the important stuff is available here. News & Reviews make this site more appealing. If you keep downloading dozens of software all day then do visit this place for arranged & updated versions of every freeware & shareware.
5 Ways To Stay Focused On Your Goals No matter how excited you are about your goal, with so many distractions and things that may be going on in your life, you can easily find yourself losing focus on your goals and what you want to accomplish. Below you will find 5 things that will help you stay focused on your goals. FINISH WHAT YOU STARTED You probably have heard the saying, "So many things to do and not enough time to do them." Even though that may be true, you still have to complete them all, especially if these things help you to reach your goals. To make it easier for you, just take 1 thing you have to do and complete that task until it is done. When it is done, you will feel a sense of accomplishment and it will motivate you to move on to your next task. ORGANIZE TO MAKE THINGS EASY AND SIMPLE Take a moment to put things in order. If people write to you or send you orders in the mail, make 3 piles. Put the letters that need to be answered right away in the 1st pile. Letters that can be answered at a later date you can put in the 2nd pile and letters that have orders in them, you can put in the 3rd pile. Doing things like this in other areas of your life will help you keep things in priority and keep you focused on your goals. CHANGE THE WAY YOU LOOK AT THINGS
Page 9 of 11
If you find yourself at times having a negative attitude, you must realize that the way you look at things can make all the difference when it comes to reaching your goals. Even when obstacles stand in your way, maintaining a positive attitude, not a negative one and knowing that things can and will get better, will help you stay on track in reaching your goals. UNDERSTAND GOALS WILL TAKE TIME TO REACH Everything in life, if it is worth it, will take time. This goes for the goals you set for yourself. When you set goals, you should set 2 types of goals. A short term goal such as 6 months and also a long range goal, such as 3 years. You must realize that you are not going to reach your long term goals in 2 weeks. Whatever your goals may be, only through hard work, determination and keeping yourself focused, this is the way you will eventually reach your goals. STUDY AND READ ARTICLES ON MOTIVATION Reading articles, books or even listening to cassette tapes on motivation is a must if you want to keep yourself focused on your goals. Many successful people will tell you that even when they wanted to give up and throw in the towel, a paragraph in a book or something a motivational speaker said put them back on the right track and helped them reach their goals. So if you want to stay focused on your goals, take these 5 points and put them into action today.
Google abandons China Google has had enough of China's interference with the beautiful anarchy that is the internet. Enough sacrifices have been made to the freedom of information. China has made in clear with its many moves to constrain people's access to the internet that are are very against the idea of freedom on the internet. The fact that any person can choose to access anything they want at any time, and usually at no cost is too uncomfortable an idea for them. With the increasing number of restrictions that aim to limit the freedom on internet in China, Google has decided to take this bold move, knowing full well that this might, and it most probably will mean the end of in China. CES 2010: 12 new Intel Core i3, i5 and i7 processors launched Intel is making headlines at CES in Las Vegas, unleashing more than 12 new processors into the market less than two weeks into 2010. Introducing new processors for both the mobile and desktop platforms, Intel’s new Core processor family naming scheme really comes into play, with the Core i3, i5, and i7 all available in new variants. The Google NEXUS ONE is out! Will cost you about Rs. 24,400 Considering that the device was seeded to thousands of Google employees before it was even officially unveiled, it is no surprise that the there is little new to learn about it. However, now the Google Nexus One phone is official, the tease is over. As expected the Google Nexus One runs the Android 2.1 operating system. The other specification of the phone have been confirmed, and were right on the mark. The Google Nexus One has a Qualcomm Snapdragon 1Ghz processor (QSD 8250), 512MB RAM, 512MB internal storage, included 4GB microSD card (upgradable to 32GB), and a 3.7-inch widescreen AMOLED touchscreen with a resolution of 800x480. The phone is 3G capable and supports WiFi and Bluetooth 2.1. The phone includes multiple sensors: AGPS, accelerometer, digital compass, proximity sensor, ambient light sensor, and a secondary microphone for noise cancellation. The camera on
Page 10 of 11
the Google Nexus One phone has a 5MP sensor with autofocus, and LED flash, and can capture video at up to 720x480 resolution (DVD quality). The phone has very few physical buttons, merely a power button, volume controls (up/down), and four illuminated soft-touch buttons for the Back, Menu, Home, and Search functions. The phone features a clickable trackball which changes color (tricolour) according to function. The touchscreen of the Google Nexus One is capacitive and offers haptic feedback. Finally, the Google Nexus One will be available for $179 with a T-Mobile contract, and a unlocked phone will set you back by as much as $529 (~Rs. 24,400). Microsoft Office 2010 pricing details released
Microsoft has now officially released the pricing details for its Office 2010 product editions. The pricing and details for the four editions are as below:
Page 11 of 11
Visit E-Lite Stuff Website
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.