Professional Documents
Culture Documents
http://anupriti.blogspot.com/
2
Contents
1 2008 13
1.1 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
SPAM UNSUBSCRIBED IS SPAM SUBSCRIBED (2008-12-26 22:36) . . . . . . . . . . . . 13
MIAN BV KE JHAGDEY (2008-12-26 22:37) . . . . . . . . . . . . . . . . . . . . . . . . . . 13
HOW 2 DELIVER GOOD PRESENTATIONS? (2008-12-26 23:08) . . . . . . . . . . . . . . 13
BALANCE is DIFFICULT (2008-12-27 00:12) . . . . . . . . . . . . . . . . . . . . . . . . . 14
Ghazal maestro in making (2008-12-27 00:42) . . . . . . . . . . . . . . . . . . . . . . . . . . 14
TUNE UP 2009 UTILITIES (2008-12-27 00:53) . . . . . . . . . . . . . . . . . . . . . . . . . 15
MURPHYs LAW : JALANDHAR 2 AMRITSAR & BACK (2008-12-28 14:56) . . . . . . . 15
RFID (2008-12-28 21:51) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3D TELEVISION (2008-12-29 21:54) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2 2009 19
2.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
IPTV - TRIPLE PLAY or QUADRUPLE PLAY? (2009-01-01 21:35) . . . . . . . . . . . . 19
WHY BLOG? (2009-01-02 07:55) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
MPEG vs H.264 (2009-01-03 21:26) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
DUAL SCREEN LAPTOP : LENOVA (2009-01-06 22:39) . . . . . . . . . . . . . . . . . . . 21
Get Flummoxed : Futuristic Laptops (2009-01-08 15:05) . . . . . . . . . . . . . . . . . . . . 22
DOES DEMOCRACY MEAN FREE 2 STRIKE? (2009-01-09 14:49) . . . . . . . . . . . . . 26
Software Leloooo....Software lelooooo (2009-01-12 14:05) . . . . . . . . . . . . . . . . . . . . 27
Google & Carbon Dioxide : The relationship most of us dont know (2009-01-13 18:22) . . . 28
HOLOGRAPHIC TEXT Messages (2009-01-17 23:23) . . . . . . . . . . . . . . . . . . . . . 29
COMPRESSION.... has a LIMIT? (2009-01-19 22:11) . . . . . . . . . . . . . . . . . . . . . 29
THE NAME IS RAJNIKANTH (2009-01-20 22:14) . . . . . . . . . . . . . . . . . . . . . . . 30
DETRITUS...(I mean dust) vs IT (2009-01-30 20:14) . . . . . . . . . . . . . . . . . . . . . . 32
2.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
INTEL & BIKE (2009-02-05 18:33) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3
Fighting LIGHTSCRIBE !!! (2009-02-11 16:46) . . . . . . . . . . . . . . . . . . . . . . . . . 35
IT ostracized!!!!! (2009-02-26 23:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Fight of the Browsers : ACID3 TEST (2009-03-05 22:27) . . . . . . . . . . . . . . . . . . . 38
Be CAREFUL (2009-03-08 00:14) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
PictBridge (2009-03-17 16:05) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
THE LINK : BJP & OPEN SOURCE!! (2009-03-18 16:25) . . . . . . . . . . . . . . . . . . 43
Download video from Magazines/Billboard: MMCC (2009-03-21 23:06) . . . . . . . . . . . 44
2.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
IRON KEY : Worlds Most Secure Pen Drives (2009-04-07 22:14) . . . . . . . . . . . . . . . 46
GUIYU : THE CONNECTION WITH E-WASTE (2009-04-14 23:04) . . . . . . . . . . . . 50
Recession Laptop (2009-04-30 18:30) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Nehru Place : The hub (2009-05-02 08:02) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Briefcase PC (2009-05-04 22:53) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
WORK : New Denition (2009-05-06 15:43) . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
HP and VLC at logger heads? (2009-05-09 17:07) . . . . . . . . . . . . . . . . . . . . . . . . 65
USB Bootable Vista (2009-05-11 22:13) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Chinese Mobile - Death or Life :The answer is nally LIFE (2009-05-13 08:44) . . . . . . . 68
E Waste (2009-05-17 22:29) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
E WASTE (2009-05-17 22:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
WINDOWS 7 : MY FIRST HANDSHAKE (2009-05-27 12:58) . . . . . . . . . . . . . . . . 69
WINDOWS 7 : MY FIRST HANDSHAKE-1 (2009-05-27 23:49) . . . . . . . . . . . . . . . 70
WINDOWS 7 : MY FIRST HANDSHAKE-2 (2009-05-28 14:52) . . . . . . . . . . . . . . . 71
WINDOWS 7 : MY FIRST HANDSHAKE-3- THE PASSWORD RESET DISK
(2009-05-28 23:33) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
WINDOWS 7 : MY FIRST HANDSHAKE-4 - THE SNIPPING TOOL (2009-05-29 22:21) 73
ANOTHER FIRST HANDSHAKE : OFFICE 2010 (2009-05-31 23:16) . . . . . . . . . . . . 74
2.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
GSM vs CDMA & Open Market Handset (2009-06-02 23:20) . . . . . . . . . . . . . . . . . 75
THE G Family : 0G to 4G (2009-06-05 00:10) . . . . . . . . . . . . . . . . . . . . . . . . . 77
Buy a Keyboard : Get a Computer (2009-06-06 23:43) . . . . . . . . . . . . . . . . . . . . . 78
PAPER BOOKS CONVERGE TO E-BOOKS : KINDLE DX (2009-06-07 16:25) . . . . . . 79
Google & Bing (2009-06-11 15:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Google and Bing : Bade miyaaan Chotey Miyaan (2009-06-11 16:09) . . . . . . . . . . . . . 81
My DIGIT Webinar (2009-06-12 22:37) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4
H.A.M.R : Storage Futurity (2009-06-20 23:46) . . . . . . . . . . . . . . . . . . . . . . . . . 82
Storage Technology - Graduating Trends (2009-06-21 22:09) . . . . . . . . . . . . . . . . . . 83
Hi Tech Door Bell : Is it required? (2009-06-22 16:20) . . . . . . . . . . . . . . . . . . . . . 86
Hi Tech Door Bell : Is it required? (2009-06-22 16:20) . . . . . . . . . . . . . . . . . . . . . 87
Are you secure at your friendly neighbourhood CYBER CAFE ? (2009-06-26 15:27) . . . . 87
NOW CHIP IN BATHING SOAP!!!! (2009-06-27 22:14) . . . . . . . . . . . . . . . . . . . . 89
UNIQUE IDENTIFICATION PROJECT : UID (2009-06-28 16:01) . . . . . . . . . . . . . . 90
2.7 July . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Check your ANTIVIRUSes Loyalty : EICAR Way (2009-07-03 23:07) . . . . . . . . . . . . 91
USB DHAMAAAL!!! (2009-07-04 22:40) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
AMD : The Launch of ISTANBUL (2009-07-06 22:47) . . . . . . . . . . . . . . . . . . . . . 95
KYPS : HELPS AVOID BEING VULNERABLE!! (2009-07-08 16:20) . . . . . . . . . . . . 95
E-WASTE : DEPOSIT & GET PAID (2009-07-10 23:01) . . . . . . . . . . . . . . . . . . . 97
EYE-FI : GETs YOUR CLICK UPLOADED (2009-07-11 00:02) . . . . . . . . . . . . . . . 99
PC IN A FLOWER VASE : ECSs MING VASE (2009-07-14 23:09) . . . . . . . . . . . . . 100
HDD DOCKING STATION (2009-07-20 22:03) . . . . . . . . . . . . . . . . . . . . . . . . . 102
DATA STORAGE IN BACTERIA : ASTONISHING-MUST READ (2009-07-26 22:32) . . 103
2.8 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
WHO ESPIED MY COMPUTER? (2009-08-02 15:33) . . . . . . . . . . . . . . . . . . . . . 105
FREE UPGRADATION - ONLY A TRICK!!! (2009-08-02 15:50) . . . . . . . . . . . . . . . 105
SSDs vs HDDs : WHO is GOOD? (2009-08-05 00:59) . . . . . . . . . . . . . . . . . . . . . 106
Being BUSYYYYY (2009-08-15 10:05) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
WiMAX - THE POWER (2009-08-27 22:29) . . . . . . . . . . . . . . . . . . . . . . . . . . 107
2.9 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Use KEYBOARD for MOUSE (2009-09-01 07:26) . . . . . . . . . . . . . . . . . . . . . . . . 107
http://www.emailtheweb.com (2009-09-01 07:42) . . . . . . . . . . . . . . . . . . . . . . . . 108
E mail a Web Page : http://www.emailtheweb.com/ (2009-09-01 07:53) . . . . . . . . . . . 108
xB BROWSER (2009-09-04 23:34) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
xB Browser - Makes you anonymous (2009-09-04 23:45) . . . . . . . . . . . . . . . . . . . . 109
INTEL vs THE SEVEN SAMURAIs (2009-09-11 22:36) . . . . . . . . . . . . . . . . . . . . 109
SATA 1.0 vs SATA 2.0 vs SATA 3.0 : The hunger for speed (2009-09-11 22:49) . . . . . . . 110
PRINT A BATTERY : PRINTABLE BATTERY (2009-09-11 23:22) . . . . . . . . . . . . . 111
HOW IS UR FAVORITE USB MADE? (2009-09-11 23:40) . . . . . . . . . . . . . . . . . . 112
EXTERNAL DRIVES : ARE THEY REALLY FAST? (2009-09-21 19:38) . . . . . . . . . . 112
SUBMARINE COMMUNICATIONS : IT HAS BEEN TOUGH (2009-09-21 21:33) . . . . . 112
5
LIGHT PEAK TECHNOLOGY : INTEL (2009-09-24 16:17) . . . . . . . . . . . . . . . . . 114
MORRO : THE MICROSOFT SIDE OF ANTIVIRUS (2009-09-24 22:29) . . . . . . . . . . 115
SECURITY ESSENTIALS : NO MORE MORRO (2009-09-30 20:22) . . . . . . . . . . . 116
DUAL SCREEN CAMERA : SAMSUNG ST 550 & ST 500 (2009-09-30 20:34) . . . . . . . 117
THE FUTURE OF OSs : MICROSOFT VERSION (2009-09-30 22:08) . . . . . . . . . . . 118
2.10 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
RADIATION EFFECTS & UR MOBILE - QUANTIFIED (2009-10-01 20:22) . . . . . . . . 119
MY WINDOWS 7 HOUSE PARTY PACK : THANK YOU MICROSOFT (2009-10-05 20:44) 121
NIKON S1000PJ : DIGITAL CAMERA WITH INBUILT PROJECTOR (2009-10-06 20:32) 125
1 MBPS BROAD BAND CONNECTION : HUMAN RIGHT IN FINLAND (2009-10-18 22:12) 125
KINDLE : WELCOME TO INDIA (2009-10-25 20:34) . . . . . . . . . . . . . . . . . . . . . 126
RDM : Rival for BLU RAY? (2009-10-25 22:09) . . . . . . . . . . . . . . . . . . . . . . . . . 128
D-ROLL : No end to imagination (2009-10-26 21:23) . . . . . . . . . . . . . . . . . . . . . . 129
2.11 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Green Dam Youth Escort : Whats that? (2009-11-06 06:25) . . . . . . . . . . . . . . . . . 130
LAPTOP Face Recognition falls FLAT!!!! (2009-11-26 08:00) . . . . . . . . . . . . . . . . . 131
2.12 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Google Binged!!!! - My 100th Post (2009-12-13 01:00) . . . . . . . . . . . . . . . . . . . . . 132
Y2K Bug!!!!Do u remember the time? (2009-12-28 22:12) . . . . . . . . . . . . . . . . . . . 133
BIDI makes LCD touchscreen A PASSE past (2009-12-30 07:49) . . . . . . . . . . . . . . . 133
3 2010 135
3.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
2010 (2010-01-01 06:38) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
HP in the racists scoooop!!! (2010-01-08 06:34) . . . . . . . . . . . . . . . . . . . . . . . . . 135
DUAL SCREEN LAPTOP : Another attempt by (2010-01-08 07:25) . . . . . . . . . . . . . 136
Charge cell phones by using Radio-Waves (2010-01-10 10:44) . . . . . . . . . . . . . . . . . 136
When EARS Speak!!! (2010-01-11 19:25) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
The ALT key Combos (2010-01-13 07:22) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
CHINA & GOOGLE (2010-01-16 07:55) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Microsoft choose to stay in China: Why not? (2010-01-17 07:06) . . . . . . . . . . . . . . . 139
SHARING DESKTOPS REMOTELY (2010-01-17 07:43) . . . . . . . . . . . . . . . . . . . 139
ZUNE 120 GB (2010-01-18 21:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Google vs Bing : On Data retention policy change (2010-01-19 21:44) . . . . . . . . . . . . 142
ROOT WEB DIRECTORY VERIFICATION (2010-01-29 07:56) . . . . . . . . . . . . . . . 143
3.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
6
IP Spoong : Legal Acceptance in India? (2010-02-01 07:47) . . . . . . . . . . . . . . . . . 144
CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!! (2010-02-03 22:55) . . . . 145
Whos Who? : Terminology world of Portable Computers (2010-02-05 17:25) . . . . . . . . 146
TRACE INDIA (2010-02-07 19:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
NVIDIA : Optimus technology (2010-02-13 07:40) . . . . . . . . . . . . . . . . . . . . . . . 147
WEB 2.0 SUICIDE MACHINE (2010-02-15 07:46) . . . . . . . . . . . . . . . . . . . . . . . 147
Steganography : Hide in a JPEG/BMP (2010-02-16 21:15) . . . . . . . . . . . . . . . . . . 148
How to avoid an infected USB/PEN Drive? (2010-02-17 07:52) . . . . . . . . . . . . . . . . 149
SVCHOST.EXE vs SCVHOST.EXE (2010-02-18 21:51) . . . . . . . . . . . . . . . . . . . . 150
Intel Core" i3 Processor & Server 2003 (2010-02-23 07:36) . . . . . . . . . . . . . . . . . 151
3.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
The Journey from MB to GB : Pen Drives (2010-03-05 22:53) . . . . . . . . . . . . . . . . . 152
Search Web by FACE recognition - Work is ON!!!: ONE ALBUM (2010-03-07 21:06) . . . . 152
OS CARD : For now just an idea sirjeeeeeeee!!! (2010-03-11 22:19) . . . . . . . . . . . . . . 153
LIQUID COOLING IS IN - FOR CPUs & GPUs (2010-03-15 08:09) . . . . . . . . . . . . . 153
Secure ur Wireless media (2010-03-17 22:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Secure ur WiFi (2010-03-18 07:47) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
GOOGLE nally is OFF from China (2010-03-24 08:40) . . . . . . . . . . . . . . . . . . . . 155
Consequences of Googles China Exit (2010-03-24 09:14) . . . . . . . . . . . . . . . . . . . . 156
MOZZILA Firefox & GERMANY (2010-03-24 21:27) . . . . . . . . . . . . . . . . . . . . . . 157
DANGEROUS PASSWORDS (2010-03-24 21:58) . . . . . . . . . . . . . . . . . . . . . . . . 158
CLEAR PLAY & DVD PLAYERs : E-CENSOR (2010-03-25 07:49) . . . . . . . . . . . . . 158
WiFi at home : Take precautions (2010-03-28 07:19) . . . . . . . . . . . . . . . . . . . . . . 159
DATA RECOVERY FROM RAM? (2010-03-31 22:44) . . . . . . . . . . . . . . . . . . . . . 160
3.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
HOW TO HYPER LINK IN COMMENTs AT BLOGGER? (2010-04-01 07:50) . . . . . . . 160
7 years of Indian Cyber Law (2010-04-07 23:14) . . . . . . . . . . . . . . . . . . . . . . . . . 161
(2010-04-08 07:47) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Computer EASTER EGGs (2010-04-15 06:59) . . . . . . . . . . . . . . . . . . . . . . . . . . 161
3.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
EAVES DROPPING RISK : EMR (2010-05-03 23:12) . . . . . . . . . . . . . . . . . . . . . 162
I M IN CHIP- MAY MONTH EDITION 2010 (2010-05-11 06:48) . . . . . . . . . . . . . . 162
SHADOWS IN THE CLOUD (2010-05-31 15:02) . . . . . . . . . . . . . . . . . . . . . . . . 164
3.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
XINGYUN : Worlds Fastest Computer (2010-06-07 11:12) . . . . . . . . . . . . . . . . . . 164
7
Prisoners all set to est BPO : A rst from Cherlapally Central Jail (2010-06-08 23:59) . . . 165
What material Laptops are Made of? (2010-06-09 09:30) . . . . . . . . . . . . . . . . . . . . 165
Securelist.com : Informative attempt by Kaspersky Labs (2010-06-09 09:44) . . . . . . . . . 166
Google and Caeine : The Secret Link (2010-06-11 23:14) . . . . . . . . . . . . . . . . . . . 166
Google and Caeine (2010-06-11 23:14) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Where does your Website Rank in the web? (2010-06-12 14:15) . . . . . . . . . . . . . . . . 167
Mobiles & Brain Cancer : WHO Speaks. (2010-06-12 17:59) . . . . . . . . . . . . . . . . . . 167
GOOGLE STREET VIEW - FIGHTING PRIVACY ISSUES (2010-06-16 21:03) . . . . . 168
WiFi Amplied 10 times : Here comes WiGig" (2010-06-16 22:40) . . . . . . . . . . . . . . 169
Microrings - Ultimate Wireless Communication (2010-06-16 22:51) . . . . . . . . . . . . . 169
INTEL : UPCOMING PROCESSORS (2010-06-18 23:13) . . . . . . . . . . . . . . . . . . . 170
PANOPTICLICK : Your Browser Finger Print (2010-06-25 21:19) . . . . . . . . . . . . . . 171
Why not leapfrog 3G TO 4G? (2010-06-27 10:17) . . . . . . . . . . . . . . . . . . . . . . . . 171
3.7 July . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
COWS & DATA CENTRES : LINKED!!!! (2010-07-03 21:40) . . . . . . . . . . . . . . . . . 172
Intel meets Car : Makes it SMART CAR (2010-07-07 18:01) . . . . . . . . . . . . . . . . . 172
IT meets HIGH TECH TAPS : Renshui Faucets (2010-07-08 19:36) . . . . . . . . . . . . . . 173
MOST AMAZING TECHNIQUE TO TRANSFER DATA:SLURP (2010-07-08 22:21) . . . 173
SAMSUNGs GALAXY BEAM - Projector meets Mobile (2010-07-09 20:48) . . . . . . . . . 174
Augment your regular desktop with a FACE RECOGNITION feature (2010-07-10 22:19) . 175
How Google detects Invalid clicks? (2010-07-10 22:35) . . . . . . . . . . . . . . . . . . . . . 176
Increasing Laptop Bty Life : Few ways (2010-07-19 07:15) . . . . . . . . . . . . . . . . . . . 176
User Mapped-Section open??? (2010-07-26 21:14) . . . . . . . . . . . . . . . . . . . . . . . . 177
3.8 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
IPAD WORLD & VARIETIES (2010-08-12 22:23) . . . . . . . . . . . . . . . . . . . . . . . 177
Windows Systernals (2010-08-23 21:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
BILL GATES & Khan Academy (2010-08-25 21:55) . . . . . . . . . . . . . . . . . . . . . . 178
3.9 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Man in the Browser Attack : New dimension of cyber attack (2010-09-02 19:20) . . . . . . 179
ScareWare : One more WAREior in the family (2010-09-02 19:58) . . . . . . . . . . . . . . 180
TABNAPPING : A new generation Cyber Crime (2010-09-02 21:25) . . . . . . . . . . . . . 180
E-Waste & Indian Policy (2010-09-06 07:40) . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
New Gen BIOMETRICS : PALMSECURE from FUJITSU (2010-09-13 07:52) . . . . . . . 182
ORDER OF VOLATILITY OF DIGITAL EVIDENCE (2010-09-15 21:04) . . . . . . . . . . 183
Cyber Warfare : It has started (2010-09-16 13:47) . . . . . . . . . . . . . . . . . . . . . . . 184
8
ZERO DAY EXPLOIT : ??? (2010-09-18 22:45) . . . . . . . . . . . . . . . . . . . . . . . . 185
Root Kits : Hidden Undetected Threats (2010-09-18 22:57) . . . . . . . . . . . . . . . . . . 186
Browser Forensics - Not Simple (2010-09-19 13:26) . . . . . . . . . . . . . . . . . . . . . . . 187
Shadows in the Cloud : Cyber Espionage (2010-09-30 11:24) . . . . . . . . . . . . . . . . . . 188
3.10 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
CLEANERS & FOOTPRINTS (2010-10-07 17:14) . . . . . . . . . . . . . . . . . . . . . . . 188
Security Enabled Hardware :INTEL - McAfee Merger (2010-10-08 17:54) . . . . . . . . . . 188
(2010-10-08 19:32) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
(2010-10-08 19:38) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
ALL izz WELL!!!!!inside this- Check out FREE STUDIO (2010-10-08 21:56) . . . . . . . . 190
RISK MANAGEMENT : Beware while u update with Patches (2010-10-08 22:09) . . . . . 190
Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla
(2010-10-08 22:32) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Stuxnet : A Milestone in Malicious Code History (2010-10-11 22:19) . . . . . . . . . . . . . 191
Biggest release of Patch update by MICROSOFT (2010-10-12 07:27) . . . . . . . . . . . . . 193
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:41) . . . . . . . . . . . . . . . 193
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:55) . . . . . . . . . . . . . . . 193
CANURE : 100 on ACID3 Test (2010-10-15 19:57) . . . . . . . . . . . . . . . . . . . . . . . 193
Is ur Account Hacked ?- Common ways u get compromised. (2010-10-16 07:43) . . . . . . . 194
Stuxnet : Some more good info (2010-10-16 08:06) . . . . . . . . . . . . . . . . . . . . . . . 195
CaaS : CRIME WARE AS A SERVICE at oer now (2010-10-18 18:05) . . . . . . . . . . . 195
Service Packs & Infection Rates (2010-10-19 22:19) . . . . . . . . . . . . . . . . . . . . . . . 195
Collection of Forensic Softwares : TUCOFS (2010-10-20 21:56) . . . . . . . . . . . . . . . . 196
Crack 14 Character passwords in Seconds : Objectif Scurit (2010-10-26 07:57) . . . . . . 196
Image Ballistics : Incredible IT (2010-10-31 16:20) . . . . . . . . . . . . . . . . . . . . . . . 196
VIRUS in Boot Sector in Hard Disk fresh from OEM!!!! (2010-10-31 21:08) . . . . . . . . . 197
OPERATION CISCO RAIDER (2010-10-31 22:24) . . . . . . . . . . . . . . . . . . . . . . . 197
3.11 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6$ is all to shut down a Cloud Client site!!!! (2010-11-01 08:34) . . . . . . . . . . . . . . . . 198
Intel opens rst chip plant in China?? (2010-11-01 18:01) . . . . . . . . . . . . . . . . . . . 199
Adobe ash Player hit!!!! (2010-11-01 18:45) . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Bredolab grabs Attention (2010-11-01 19:11) . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Mozilla @ Prone again!!!! (2010-11-02 07:54) . . . . . . . . . . . . . . . . . . . . . . . . . . 200
MICROSOFT & Failures!!! (2010-11-02 22:08) . . . . . . . . . . . . . . . . . . . . . . . . . 200
Get Paid to Hack GOOGLE (2010-11-04 17:31) . . . . . . . . . . . . . . . . . . . . . . . . . 201
Removing METADATA from JPEG & IMAGE FILES (2010-11-04 18:14) . . . . . . . . . . 202
3.12 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Full stop from being tracked online :An attempt from FIREFOX (2010-12-05 18:50) . . . . 204
Operation Pay Back & LOIC (2010-12-28 22:29) . . . . . . . . . . . . . . . . . . . . . . . . 204
9
4 2011 205
4.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Case of Albert Gonzalez : The Largest Online Fraud in U.S. History (2011-01-29 10:44) . . 205
FBI : A Parents Guide to Internet Safety (2011-01-29 11:00) . . . . . . . . . . . . . . . . . 206
Trojan.Spy.YEK : The Corporate Spying Tool (2011-01-29 11:26) . . . . . . . . . . . . . . . 206
BitDefender : Tips for Safe Shopping on Mobile Devices (2011-01-29 11:44) . . . . . . . . . 207
4.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
IE users stand vulnerable again : Warning from MICROSOFT (2011-02-01 20:43) . . . . . 207
AMD comes up with FUSION (2011-02-01 21:05) . . . . . . . . . . . . . . . . . . . . . . . . 207
Win32.Hlux : January 2011 King of worms (2011-02-06 19:46) . . . . . . . . . . . . . . . 208
DRIVE BY ATTACK (2011-02-06 20:03) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
DATA STORAGE IN BACTERIA : 9,00,000 GB stored in 1 gm of Bacteria (2011-02-08 21:24) 208
INTERNET KILL SWITCH???? (2011-02-09 20:34) . . . . . . . . . . . . . . . . . . . . . . 209
MALWARE & AUTORUN : LOVE BIRDS OF PROPOGATION (2011-02-09 20:40) . . . . 210
The Gawker case : EXPERIENCING A HACK (2011-02-13 20:00) . . . . . . . . . . . . . . 210
NOKIA & MICROSOFT : A MERGER TO READ ABOUT (2011-02-15 20:59) . . . . . . 211
NOKIA should have merged with GOOGLE : Google CEO (2011-02-16 20:02) . . . . . . . 212
Easy Upgrade from USB 2.0 to USB 3.0 :Transcends USB 3.0 Express Card Adapter
(2011-02-16 21:02) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Be veri careful : Recent cases of duping online in DELHI (2011-02-19 09:29) . . . . . . . . . 212
4.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
ANDROID & GOOGLE : AT LOGGER HEADS???? (2011-03-02 19:29) . . . . . . . . . . 213
QUALITIES OF A GOOD ANTIVIRUS (2011-03-13 20:16) . . . . . . . . . . . . . . . . . . 214
How to Disable/Enable Use of USB Storage Devices in Windows (2011-03-15 13:18) . . . . 217
4.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
The weak password problem : Now solved???? (2011-04-03 21:48) . . . . . . . . . . . . . . 219
The weak password problem : Now solved???? (2011-04-03 21:55) . . . . . . . . . . . . . . 219
Revenge : YouTube Style (2011-04-04 22:16) . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Beware of Radioactive Emails (2011-04-05 07:51) . . . . . . . . . . . . . . . . . . . . . . . 220
HOW DO U FIND IF YOUR PC IS HACKED?- PART 1 (2011-04-27 20:47) . . . . . . . . 221
HOW DO U FIND IF YOUR PC IS HACKED?- PART 2 (2011-04-27 20:52) . . . . . . . . 221
HOW DO U FIND IF YOUR PC IS HACKED?- PART 3 (2011-04-27 20:55) . . . . . . . . 221
HOW DO U FIND IF YOUR PC IS HACKED?- PART 4 (2011-04-27 20:59) . . . . . . . . 222
HOW DO U FIND IF YOUR PC IS HACKED?- PART 5 (2011-04-27 21:01) . . . . . . . . 222
HOW DO U FIND IF YOUR PC IS HACKED?- PART 6 (2011-04-27 21:03) . . . . . . . . 223
4.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
10
McMurdo station & more DATA CENTRE Locations (2011-05-16 21:47) . . . . . . . . . . 223
4.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
INSPIRED FROM INDIA : CHINAs ATTEMPT ON TAKING ON CORRUPTION
(2011-06-13 14:45) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
BULLET PROOF HOSTING (2011-06-13 15:06) . . . . . . . . . . . . . . . . . . . . . . . . 224
SYMANTEC SPOTS ONE INTERESTING E-MAIL CAMPAIGN (2011-06-13 15:24) . . . 224
FLIRT BOTS (2011-06-13 15:56) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
FLIRT BOTS (2011-06-13 16:03) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
MAKE incognito YOUR DEFAULT SETTING (2011-06-13 18:38) . . . . . . . . . . . . . . 226
Your VOICE to charge your MOBILE (2011-06-13 21:38) . . . . . . . . . . . . . . . . . . . 226
ANDROID APPLICATIONS CLONED : Developers make it spam (2011-06-27 21:44) . . . 227
4.7 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
JAVA SE DEVELOPMENT KIT NOT FOUND!!!! (2011-08-19 22:42) . . . . . . . . . . . . 227
IBM developing PCs that may run 30 times faster (2011-08-21 12:44) . . . . . . . . . . . . 228
Now Aerial cyber attack!!!!r u safe anyway? (2011-08-21 13:40) . . . . . . . . . . . . . . . . 229
touched........20,000 (2011-08-22 11:31) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
4.8 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
CHINA CAUGHT ON WRONG FOOT in its own MARCH (2011-09-03 19:22) . . . . . . . 230
HDFC CLEAN BOWLED by Hidden SQL Injection Vulnerability (2011-09-03 20:12) . . . . 231
CYBER SECURITY : ACTIVE ATTACKS (2011-09-20 20:57) . . . . . . . . . . . . . . . . 232
XSS and CSS : Whats the dierence ? (2011-09-20 22:33) . . . . . . . . . . . . . . . . . . . 232
DEEP FREEZE : A way to protect ur system!!! (2011-09-20 22:57) . . . . . . . . . . . . . . 232
DEEP FREEZE : II (2011-09-20 23:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Common Malware Symptoms (2011-09-25 20:43) . . . . . . . . . . . . . . . . . . . . . . . . 233
When malware prevent you surng internet : MALWARE REMOVAL -1 (2011-09-25 20:50) 233
4.9 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
nVidia GeForce GPU cracks six character password in four seconds (2011-10-10 20:26) . . . 233
HIBERNATION MODE : HOW SAFE FOR YOU? (2011-10-11 22:26) . . . . . . . . . . . 234
WIRESHARK Troubleshoot (2011-10-22 23:19) . . . . . . . . . . . . . . . . . . . . . . . . . 234
DUQU : FROM THE GEN STUXNET???? (2011-10-30 23:10) . . . . . . . . . . . . . . . . 235
BACKTRACK 5 : How to use ? (2011-10-30 23:24) . . . . . . . . . . . . . . . . . . . . . . 235
SOME MORE ON DUQU (2011-10-31 20:50) . . . . . . . . . . . . . . . . . . . . . . . . . . 236
RED PHONE : ENCRYPTED VOICE FOR ANDROID!!! (2011-10-31 21:52) . . . . . . . . 236
4.10 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
DUQUs MICROSOFT LINK!!! (2011-11-02 20:21) . . . . . . . . . . . . . . . . . . . . . . . 236
Our Browsing History Is Leaking into the Cloud!!!! (2011-11-02 21:29) . . . . . . . . . . . . 237
11
DISCONNECT URSELF (2011-11-15 21:20) . . . . . . . . . . . . . . . . . . . . . . . . . . 237
DISCONNECT.ME in Incognito mode (2011-11-15 21:26) . . . . . . . . . . . . . . . . . . . 239
THREATS TERMINOLOGY & GLOSSARY : PART 1 (2011-11-24 22:50) . . . . . . . . . 239
COOKIES & TYPES ? (2011-11-27 21:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
CONTROL COOKIES TAKING CONTROL FROM UR BROWSERS (2011-11-27 22:12) . 241
Cookienator : Option to control cookie menace (2011-11-27 22:26) . . . . . . . . . . . . . . 241
4.11 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Windows 8 Developer Preview : Pre Beta Version for Developers (2011-12-01 07:10) . . . . 242
LogMeIn HAMACHI (2011-12-02 22:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Snake oil Cryptography (2011-12-02 23:01) . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Windows 8 Developer Pre BETA : How to get full screen on a VM? (2011-12-03 14:04) . . . 243
LIKE Button in Facebook : Tracks u!!! (2011-12-03 21:54) . . . . . . . . . . . . . . . . . . 243
12
Chapter 1
2008
1.1 December
SPAM UNSUBSCRIBED IS SPAM SUBSCRIBED (2008-12-26 22:36)
I am sure you would all have recieved all types of spam mails at one time or the other on daily,weekly or on
some periodic basis.Now there is an interesting thing about these spam mails.When you recieve a mail and
you declare it as spam,it goes to your spam box which you keep clearing every now and then.Any time you
try reading any such mails you would often come across 'TO UNSUBSRIBE CLICK HERE.Here is the
trick of the spam generator.Any time you click this you conrm to the spammer that this is an active e-mail
id.This way though you may unsubscribe the spam from that particular spammer but the spammer gets to
know that yours is an active email id and he sells...i REPEAT..he sells your email id to another spammer
with the guarantee that yours is an active email id or a genuine email id.Most of the spammers.i mean the
originators send the spam mails to randomly computer software generated email id`s and of these all when
u click from your particular id to unsubscribe they get to know that one of these email id`s is genuine and
active.Hence the more you unsubscribe the more you get subscribed to.So friends..dont unsubscribe..!!!!!!
MIAN BV KE JHAGDEY (2008-12-26 22:37)
By god this life is really beautiful and complex,the best thing is the relationships that we have here.Today
for the 100000th time i had a ght with my only half and it is still on,the small egos of ladies,the small
MANhood inside evry man....and when they clash...it is good 2 c...no eye 2 eye...no talks,pin drop silence
maintained at home,kitchen is the most eected..it seems udhar barsoon se koi jaata vaata nahee hai....apna
apna khana...apna apna peena....mian gets busy on his laptop...bv on her soaps(star plus ...colors....sony..zee
and what not).......and the environment looks like 2 continue for eternity...since koi kum nahee hai...ek se
badhkar ek hain....phir suddenly ek din kisi ek kee rooh jagegi aur bolegi bahut hua...chal normal hoja...and
life starts again with a promise kee hum dono ek hain...aaagey se koi ladaaai nahee....we r one.....so waiting
for the time....now busy with lap top!!!!
HOW 2 DELIVER GOOD PRESENTATIONS? (2008-12-26 23:08)
1. How to deliver presentation?Presentation is an art that cannot come overnight,it is ur personality whn u
stand there that blends with the subject matter on how u give it.The same set of slides in a presentation given
13
by two dierent persons will make a dierent impact all together as and when the presentation gets nished.
2. One has to be exactly reach the podium with a free mind and a clear aim on what he has to speak,what
is his scope and what is he going to speak about.Now for a presentation,the presenter need not be an expert
on that topic,but he should be aware of tits & bits,he should be ready to take on questions for which he is
not prepared from the audience on how is he going to answer them.He should avoid speaking even a word on
which he is unsure and he is not condent to take on. 3. Another important aspect is the word humour.To
involve the audience in the presentation,the humour has to b a crucial part of any presentation.Now i dont
mean that humour includes putting some funny slides or poking out few good/bad/dirty jokes for the sake
of it.It again depends on the audience,if it is a mass audience u should be happy since mass involves every
type of people,thus u can have a choice between ur insertions or what u plan to speak to make them
involved and if it is restricted audience or a small group of people u should be able to gauge the background
they have in common and insert suitable humour likewise.It is left to you how u make the audience smile
anyhow.Ask them something that they can easily take on without getting embarassed.Include a surprise in
some form.Example if u have to give a presentation which is likely to be more than 10 minutes(....which
mostly are!!!!)...insert a 5 sec movie clip...may b some jackie chan quick action bashing or amitabh from
deewar in the mandir scene....rajnikanth with ying ciggarete etc etc etc....the scope is aplenty....just catch
the audience by surprise and tell them...that was just to evoke some interest....or take out a tennis ball from
ur pocket and throw it to a person in the audience who is a little known to you or even not known will
do and ask him to catch.....or do ask me more on such ideas...AUDIENCE IS THE KEY ALWAYS...YOU
HAVE TO GAUGE THEM PRIOR TO GIVING THE PRESENTATION....these ideas will certainly look
WAGUE/IDIOTIC/STUPID at rst glance....but i have tried them all....and i have met with success.....i
love giving presentations.... 4. One just need to get in love with this art once,i have seen this.....u get in
once...and u will not be able to come out of this.You will start waiting for opportunities wherein you would
get an opportunity to give a presentation unlike the otherway round most of the times..will keep adding more
in days 2 come....
BALANCE is DIFFICULT (2008-12-27 00:12)
Life 2 day is veri demanding....you cannot have spare time lest you get some leave...i m speaking about the
balance between time u give to ur parivaar and ur profession....how so ever smart u r...you will never be
able to make a perfect balance....you give more time 2 ur profession u get stuck with the family...and u give
more time to family u will start hearing that u r not working.......so iss ka ek he solution hai....jo mann kare
vo karo......jab bv roye to ghar is priority and when boss demands....then company becomes priority.......and
when both demand then prefer 2 sleep.....baaki own time is evenly booked 2.
Ghazal maestro in making (2008-12-27 00:42)
This link will denitely make u smile....thats a promise [EMBED]
Anonymous (2008-12-28 17:17:00)
kya baat hai!kya baat hai!!!good one!
14
TUNE UP 2009 UTILITIES (2008-12-27 00:53)
1. I have been an avid follower of this utility since using 2007 when i used this rst as TuneUp 2007 which
got followed by [1]Tune up 2008.And recently tuneup 2009 has been launched.There was a mark dierence
between the 2007 and 2008 versions.But the recent one has come as a small disappointment.The same face
lookup,the same color template with no new features except the one nding out automatic diagnostics for
ur computer setup.Either i m too early to comment on this or may be i m little harsh in saying that. 2. The
main features include Intelligent recommendations for your unique PC optimization, Identies your personal
settings and protects them,Highlights your PC`s optimization potential, including unused programs and
resource-draining settings and the best is the Recommendation options which explains performance results
before taking any action. 3. So thats all new which is there in this version.Baaki,all the earlier features
maintain status quo at their respective tabs and positions.
1. file://localhost/mnt/ext/blogbooker/tmp/tzw310kp/www.tune-up.com
MURPHYs LAW : JALANDHAR 2 AMRITSAR & BACK (2008-12-28 14:56)
1. Do you believe in murphys law?I have so many instances to recount that murphy works on me.The theorem
recently worked on me when i travelled from jalandhar to amritsar along my FIL & MIL(Father & mother
in law ...) in my wagon r duo.
2. The aim was to start,with a top up lpg tank in car, start from jalandhar at 1100h,reach golden temple
by 1300h,have darshan and reach wagah by 1600h...and start return at around 1830h from wagah back to
jalanadhar,and reach back by 2100h ,looks perfectly ne w.r.t the road conditions and time limit....what was
to follow is the result of what happens when u strike murphy.
3. I m a proud owner of a wagon r duo that works on both petrol & lpg.So as we started on the journey
i decided to topup the lpg tank from the only source near me so that journey could become economical.As
i reached the HPCL outlet,i was told that LPG is out of stock and i would have to wait fr a day to get a
economical drive.Marta kya na karta
sofwaree
for once i thot that they were sellin softy
56
gosh surely a comp hub
Mohit (2009-06-25 14:36:58)
great!!!
you can have everything right here in NH ..The piracy hub... &
if someone is good at bargainig ..he/she can have these for min of Rs 30-35...
Anonymous (2009-10-28 17:06:12)
Why ur stomach i aching if they are selling the pirated softwares...we are the only one getting benet from it.......do
u have enough courage to buy original windows 7 at cost 6000/- when we can get it at 100-200/- rs. in NP.
ANUPAM (2009-10-28 21:16:30)
hi stomach ache anonymous ...thanks for the comment...i did not even need rs 200 for the windows 7...i got it for
free chk the link at http://anupriti.blogspot.com/2009/10/my-house-party-pack-thank-you-m icrosoft.html
RONY (2010-03-10 22:46:38)
this is really india
nishu (2010-04-09 15:56:18)
I love NH & India
rajnish (2010-07-01 19:38:37)
i love my india...ye mera india
Briefcase PC (2009-05-04 22:53)
57
1. Now this is likely going to be the longest one till date in terms of what I write since a lot of work and
eort has gone into it. The idea had been obsessing me for months now about tting a PC into a brief case.
I got the mite of this possibility from one of my senior colleagues Baiju last year. Some how I thought with
a year down the lane, with a much better form factor available now a days I would be able to squeeze 'More
in Less. So when I got the ocial permission from my honcho in the oce, I was quick in exercising the
same.
2. Where to start from ? So the rst question came to my mind about where to start from. Whether I
start from selecting the mother board or rst I select the most lilliputian brief case available in the market
or the smallest monitor or what? So I googled a good deal on if any one can give me lead on this ,but what I
generally got from the web was assembled lot of pc essentials with a cobweb of wires. So I came back round
round to where I was primitively of the search.
3. By now I had started having a feeling of thriftlessness as I had invested or should I appositely say
wasted about 5-6 days on the issue of where to start from? So eventually cogitated to start from the
smallest mother board. So the recent Digit magazine and Amod Sir(big boss of IT related issues in my
circle) suggested that go for the recently launched atom processor based essential series mother board.
58
So when I nally got one on my table it looked like in set. A real treat to start with. Ideate a mother board
with processor that encroaches only 7 inch by 7 inch area. So I was happy to start with this and nally made
it nal for selection.
4. Some thing about the mother board. Now this one is designed to support Internet-centric computing for
the new exible Mini-ITX form factor. Following features are inbuilt :
(a) Integrated 45nm Intel Atom" processor
(b) Energy-ecient solution for home users as well as for unique vertical market needs.
(c) Designed with Intels leading edge 45nm Hi-k metal gate processor,
(d) Provides incredible opportunities to communicate, listen, watch, play via Internet connectivity.
(e) 4 USB Drives
(f) Lan port
(g) COM1/LPT1
(h) Regular interfaces for Mouse and Keyboard ie PS/2 etc
59
5. Bootable pendrive or Hard Disk ? Next in row was the hard disk.I was quiet aye that I would be
able to make a bootable pendrive or a bootable lap top harddisk. So I tangled with various web pages that
claimed to make a bootable pen drive.But.but..but....I could never bring home the bacon. I mean
could not make that. I tried all stunts incl formatting with FAT32,assayed many 3
rd
party software`s but
could not. Eventually I turned discomted and decided to go with an internal SATA drive. But I am still
working on this. I will make it in days to come if any one has been able to make it after googling. That`s
slightly ahead anyway. So for the time being I selected a SATA 160 GB. No hue and cry about the simple
connections with the mother board.
6. Choice of the SMPS : The SMPS was a choice to be made from a sea full of resources. Right from
Chotu and Tambi of Zebronics make who do not have fans but are able to make it thru ns only to the
MICRO ATX cabinet of i-ball ,I called all of them one by one in my oce and then nally settled with the
iball one with the fan on lower side.I was some how keen on keeping the fan facing down in the briefcase. So
went ahead with it.Although Tambi and Chotu were quiet keen on making it inside my briefcase owing to the
beautiful and very bewitching form factor.
7. Key board : Now was the choice of the keyboard. I had no time wasting in this. I was sure
about the exible keyboard of Icom worth Rs 350/- only .Now this one is a thing to watch out for those
who have not seen and heard of .I rst saw it in the hands of Patil Sir.So rst impression of it carried
for about a year or so. Although I had another option of trying the laser keyboard,but some how the
cost kept me on the back foot.The grey market cost of the same ex secunderabad is Rs 4500/-.So to
be economical for the rst time,I played safe with the cheap and trust worthy exible icom Keyboard.
60
8. DVD Drive : Now what is left? The DVD drive, mouse and the briefcase. So when I embarked
on surveying about the DVD drive.I had a choice between the small 3.5 dvd drive of LG/Samsung and
the normal DVD drive. So instead of trammeling and constricting to use of the smaller DVDs I went
ahead with the normal drive size. To be precise I plowed ahead with LG Combo drive DVD-R/RW.
9. Briefcase : So for now I had the masala in form of all the actors and actresses to star in the movie, I
mean the hardware. So now I had to choose a brief case which can take it all. First I surveyed the local make
briefcases available in jalandhar.I got many choices, but some how people around me actuated me to go for
the trademarked ones to obviate any breakage and ensure a strong casing for protection. So the cheapest I
could home on was of make Safari 21.Why Safari and why not a VIP? Simply because Safari is a trusted
cheaper brand. Although I could have attempted to t all in a 17 one,but for sake of safety I thought...21
is better.I was correct in deciding this as I agnized later.
10. So all at the table now. How to earmark the land to the hardware in the available land space inside the
briefcase ? Tried few combinations and then more combinations and then was nally able to home on the
61
layout as shown in the pic inset.
11. Sealing : After the regular slots were made for the motherboard interface, SMPS power supply plug,
SMPS fan, DVD drive, another problem that was standing upright was the case of sealing. How do I seal
the brief case from outside detritus?Should I use the cheap looking tape or should I use the cut pieces
of the briefcase or wax it? I fortunately got in contact with one civil carpenter who prefaced me to a
type of sealing which is actually a gel and when you ll it in the empty space to be sealed, it gradu-
ally takes into the form of rubber overnight. Jet black in color. How does it look like? Shown in set.
So I decided to try this. And I got what I wanted but some how I was dysphoric with the nal nish.
12. Monitor : Oh!How can I forget the monitor. No ghts and confusions on that. Actually wanted to go
for a 14 TFT since it would encroach lesser area,but some how I found that 14 TFT is not available easily
and at the place it is available, it is even costlier then the 15 one. Seems like manufacturers have kiboshed
making this size. Since I had ample of space for this one too,I went ahead with a 15 TFT LG make.
13. Fitment : How to make the DVD drive, Hard disk, SMPS and the mother board stick to the base of the
briefcase? The rst thought that came to my mind was to stick all with good quality thick Velcro. But some
how was hesitant in going ahead with this.The second option was screw and nut, a stronger alternative!!So
I opened up the bottom screws from DVD Drive and screwed them again from bottom with the briefcase
62
base in between, it came out nicely intact and neat. Similarly for the SMPS and the motherboard. For the
mother board one small forethought was to place cut to size small rubber pads to maintain a distinct air gap
between the motherboard bottom and the briefcase. For the hard disk I went for a thick Velcro since it would
be the most prone for changing at times and I have to experiment it replacing with a pendrive!!!!!!!Monitor
was dicult to decide upon w.r.t tment. Velcro would not have been able to take on the load, bolting is
not possible, ddling with back cover is not advisable..now what? So came a solution from the house
hold queen of my life, my wife. She recommended trying it with a sliding drawer rail tted on both sides of
the monitor. And....it worked like the rails were made for the monitor to t in. Problem solved. See
the tment in set.
14. Extra`s : Just to take care of the additional risk of placing motherboard in open I covered the inside
briefcase with a cut to size transparent acrylic ber sheet screwed on aluminum channels if u can notice in
the pic below with keyboard on top.
15. Ratiocination : All items tted, tment done, repair tool kit inside, sealing done, connections made,
the thing of assembling the pc inside a briefcase is over. But that felicitousness from within has not come
since I am still failing at making a bootable pen drive!!!!!!!!!!!!!!!
63
anand (2009-05-05 07:17:00)
Hi Anupam, Its great.
Anand.
Pankaj (2009-05-05 09:36:00)
Hi Anupam
It is really a great eort. Congrats !!! You must send this to the EME Journal and a write up to the Comp Sc dept.
How have u taken care of heating issues?
Your blog is always interesting and I have visited it in the past also. I am in Delhi now and look fwd to meeting you
all when u r here.
Wishing you many more such achievements in future.
Regards
Pankaj Verma
Ujjwal (2009-05-06 23:17:00)
Anupam,
Good Job done... I think this should go to some records (like Guiness/ Limca Book).
This is really a fantastic acheivement.
Regards,
Ujjwal
Nikhil Chauhan (2009-05-07 00:20:00)
Anupam:
Bravo! This is fantastic vision and execution.
What are some of the use cases you envision for this?
-Nikhil
ANUPAM (2009-05-07 05:42:00)
nikhil...the utility is to be exploited as a test jig in forwards areas or attend to in situ defective computers which
generally are left un attended to during operations and exercises,to save on time etc etc.Besides I have catered it
to allow for general software installations required mostly...thanks for the compli.....aur kuch value addition ho to
bataa!!!!
sartaj (2009-05-07 12:26:00)
sirji........gr8 work....next time im home...am coming straight to take a look!!!!!!!cheers......amazing!!!
Rakesh (2009-05-08 09:28:00)
Its great!!Well done.Keep it up
Mohd Sahid Khan (2009-05-09 09:29:00)
its great at least we have three inventor in our group.Baiju , Patil and U.Good job keep fabricating.Recently Baiju
has lot of innovations something like broadcasting vedio across the net by using remote wireless VOIP gateway.
regards
Khan
shweta (2009-05-10 22:27:00)
bhabhi ko time diya itna kabhi
64
anshuman (2009-05-11 00:06:00)
sir
excellent work done .
i must say it is fandu idea n get a patent
on it fast.
a v
Baiju (2009-05-11 20:51:00)
Dear Anupam
There was no limit to excitement when i saw your chottu pc .
Really excellent work done . that wasTHE way i wanted to make it .
Well documented eort.Its so nice to hear that someone is doing a professional job.
Keep it up. all the very best.
Regards
Baiju
DAVID NICHOLSAN (2009-09-24 16:27:23)
Thats gr8 work!!u have done the same with good details mentioned here....i m also working on a similar one...will
show u soon..regards...david
Bidisha (2010-05-12 12:33:43)
What an amazing eort !!!
WORK : New Denition (2009-05-06 15:43)
1. The Center for Disease Control has issued a medical alert about a highly contagious, potentially dangerous
virus that is transmitted orally, by hand, and even electronically. This virus is called Weekly Overload
Recreational Killer (WORK). If you receive WORK from your boss, any of your colleagues or anyone else
via any means whatsoever -DO NOT TOUCH IT!!!This virus will wipe out your private life entirely. If you
should come into contact with WORK you should immediately leave the premises and do the following :
a. Take two good friends to the nearest liquor store and purchase one or both of the antidotes
i. Work Isolating Neutralizer Extract (WINE)
ii. Bothersome Employer Elimination Re-booter (BEER).
b. Take the antidote repeatedly until WORK has been completely eliminated from your system.
3. You should immediately forward this link to friends and save their lives before they get infected with
WORK....thanks manish for fwd!!!
Anonymous (2009-05-06 15:57:00)
ha ha ha.....reali good
HP and VLC at logger heads? (2009-05-09 17:07)
1. One ne evening last week,suddenly my speakers of laptop dozed of permanently...I mean no sound
output.I took it as a regular audio driver conict since I keep installing and uninstalling softwares on my lap-
65
top.So in next few days...i tried ddling with the drivers....did fresh installations...but kuch kaam na aaaya!!!
2. Since I am addicted to keep the speakers ON for music everytime I am working,I thought the laymans
idea of formatting would come as the best and easiest solution...so I went ahead and formatted the system
and installed a fresh Vista premium OS.But.......sameproblem stood again.....I thought may be my speakers
have conked o............which is unlikely otherwise........
3. Today came another close friend of mine Sunil with a similar problem....in his notebook Compaq.He gave
me an astoundingly unbelievable news......that after he called up his HP auth dealer with the problem he got
this answer ........The laptop will not cover under warranty if its identied that the diagonse report nds the
user used the VLC player..............
4. Shocking indeed for me..............I have been using VLC Player of and on with media player classic at
times regularly.When I googled on this i got few threads which said the same thing.......these threads include
the following links :
a. http://www.infoin.com/2009/01/29/hp-and-vlc-player-on-conict/
b. http://forum.videolan.org/viewtopic.php?f=14 &t=57589
5. So did i screw my speakers because of VLC ? Pl answer...............any one....?????
6. The extract of one of the threads is reproduced below :
The Biggest Computer system vendor HP (Hewlett Packard) reporting their laptop customers to not to
use VLC Player.VLC Player is the popular open source video player software among a lot of computer users.
Recently HP laptop users facing a inbuilt speaker problem, which is often getting malfunction across the
users. The ocial HP service center executives advicing the laptop users to stop using the VLC player to
watch, play media les. They reporting that playing a media les using VLC Player causing the damage
to the built in speakers.As an additional information the ocial HP service center executives informing the
customers bring the laptop to service for the build in speaker problem that , 'the laptop will not cover under
warranty if its identical that the diagonse report nds the user used the VLC player.
Anonymous (2009-05-12 21:23:00)
dont worry man, service center people will surely replace the speakers. i guaranty you.
Anonymous (2009-06-07 22:16:05)
A friend of mine had the same problem and the HP service center chaps had the same response (i.e. not covered under
warranty). Its pretty unfair.
USB Bootable Vista (2009-05-11 22:13)
1. For long I have been trying to nd out and try ....infact have already tried many options on how to make a
pendrive bootable till one day I got in touch with the link [1]http://kmwoley.com/blog/?p=345 #more-345
66
2. I could not nd out 50 % of the meaning of the commands that I blindly typed and followed as per the
screen shots available....but nally I could make one.
3. Simple steps ,no need to worry about screwing up your system......no probs at all...it all goes
smoothly.Extract is produced below for dispersion.
4. Required hardware :
USB Flash Drive (4GB+)
Microsoft OS Disk (Vista / Windows 7)
A computer running Vista / Windows 7
Step 1: Format the Drive
The steps here are to use the command line to format the disk properly using the diskpart utility. [Be
warned: this will erase everything on your drive. Be careful.]
1. Plug in your USB Flash Drive
2. Open a command prompt as administrator (Right click on Start > All Programs > Accessories >
Command Prompt and select 'Run as administrator
3. Find the drive number of your USB Drive by typing the following into the Command Prompt window:
diskpart list disk The number of your USB drive will listed. You`ll need this for the next step. I`ll
assume that the USB ash drive is disk 1.
4. Format the drive by typing the next instructions into the same window. Replace the number '1 with
the number of your disk below. select disk 1 clean create partition primary select partition 1 active
format fs=NTFS assign exit When that is done you`ll have a formatted USB ash drive ready to be
made bootable.
Step 2: Make the Drive Bootable
Next we`ll use the bootsect utility that comes on the Vista or Windows 7 disk to make the ash drive
bootable. In the same command window that you were using in Step 1:
1. Insert your Windows Vista / 7 DVD into your drive.
2. Change directory to the DVD`s boot directory where bootsect lives: d: cd d:\boot
3. Use bootsect to set the USB as a bootable NTFS drive prepared for a Vista/7 image. I`m assuming
that your USB ash drive has been labeled disk G:\ by the computer: bootsect /nt60 g:
4. You can now close the command prompt window, we`re done here.
Step 3: Copy the installation DVD to the USB drive
The easiest way is to use Windows explorer to copy all of the les on your DVD on to the formatted ash
drive. After you`ve copied all of the les the disk you are ready to go.
Step 4: Set your BIOS to boot from USB
This is where you`re on your own since every computer is dierent. Most BIOS`s allow you to hit a key at
boot and select a boot option.
1. http://kmwoley.com/blog/?p=345#more-345
67
Chinese Mobile - Death or Life :The answer is nally LIFE (2009-05-13 08:44)
1. While doing a course in Secbad many of my colleagues purchased cheap but high in functions chinese
brand mobile phones.There were few reactions in form of a anticipatory ban in few months from date of
purchase since they do not have IMEI (International Mobile Equipment Identity) numbers and posed a
serious security risk. ......but those who chose to buy it were ready for the risk.....then nally the news came
out in media that with eect from Apr 15 09 this year about 16 million handsets would go out of service ,
as GSM service providers, including Airtel and Vodafone pull the plug on them.
2. The verdict is nally out.The government has given a go-ahead to GSM operators to provide a new unique
identication number to over 16 million China-made mobile phones in the country. Users of these handsets,
which don`t have the 15-digit International Mobile Equipment Identity (IMEI) number, will have to shell out
about Rs 180 to obtain the number. This has been made possible with the help of a new software, developed
by GSM operators` body Cellular Operators Association of India (COAI) and Mobile Standards Alliance
of India.The association has obtained the IMEI numbers from GSMA, the global body that allocates these
numbers.
3. Thanks TOI InfoTech Tab.
E Waste (2009-05-17 22:29)
1. In an earlier attempt to touch upon the subject when I discussed GuiyU,I did not mention much about
what we are doing in Idia execpt for some remarks at the end and one comment by one reader.
68
E WASTE (2009-05-17 22:44)
[1]
1. I earlier attempted to discuss on this subject when I wrote on Guiyu few weeks back.But I had not
written anything on what India has been doing on the subject matter except for some one liner remark at
the end.But that was because I did not nd anything of weight anywhere. Recently I found some useful
content at [2]http://india.ewasteguide.info/.
2. This site mentions about K.G.NANDINI ENTERPRISES (KGN) based in Bangalore which is Indias
rst full integrated electronic waste recycling plant. The Plant is located in Bidadi, next to Wonderla and
has a capacity of 1.0 ton per hour. KGN has taken the license (CFE & CFO) from KSPCB for a capacity
of 7200 MT/annum and does accept all kind of ewaste (printed circuit boards, computers, electrical cables,
electrical transformers, small house hold appliances etc.).
3. In a rst step hazardous wastes or elements are removed manually. Loading point of the plant is the
shredder. The reduced material is then passing a magnet, FE parts are removed. Afterwards the material
enters the delamination mill, the heart of the process. Very high forces aect the composite materials and
are thereby reduced and delaminated. The material is pneumatically transported from the mill to a cyclone,
is discharged and conveyed to a screening machine. The classied material is transferred to a battery of
separators; non ferrous metals are separated from plastics. All process steps are connected by conveyors, are
automated and controlled by visualization. A central lter system, which is equipped with explosion and re
safety measures, de-dust the entire process. The equipment reects the state-of-the-art technology had has
been developed and provided by swissRTec AG from Switzerland.
4. This is one acchi baat I thought is good to share!!!!
1. http://4.bp.blogspot.com/_z1QH8I3k9vk/ShBKwFd5h-I/AAAAAAAAAVE/vdAXp8PsCP0/s1600-h/123.jpg
2. http://india.ewasteguide.info/
WINDOWS 7 : MY FIRST HANDSHAKE (2009-05-27 12:58)
1. After a long time about 4 months in which I didnt get much time to work on this and after 3 unsucessful
attempts...i mean 3 infected downloads....I am nally writing this from the new Beta OS Windows 7......yes
the successor to Windows VISTA!!!!!!!
69
2. Till now I have been able to load the chipset dvr, graphics card driver,oce 2007 and one F Secure
Antivirus Internet edition for windows 7.No compatability issues and rst impression is generally OK till
now......one bad thing is shayaad that wondows classic style has been done away with!!!!
3. In a few days more...i will be writing more about whats new and dierent in Windows 7 when compared
to Vista!!!!!!!!
WINDOWS 7 : MY FIRST HANDSHAKE-1 (2009-05-27 23:49)
1. In further exploring Windows 7,few more facts that have come to my knowledge include the following:
70
2. Minimum conguration :
GHz processor (32- or 64-bit)
1 GB of RAM (32-bit); 2 GB of RAM (64-bit)
16 GB of available disk space (32-bit); 20 GB of available disk space (64-bit)
DirectX 9 graphics device with WDDM 1.0 or higher driver
3. Task bar Classic style is out.
4. Sticky notes is a new permanent feature which was earlier an optional gadget in Vista.Once clicked,it gets
a little yellow notepad and one can type short note for own reference and mailing.Pic of sticky note yellow
window from my laptop is shown inset.
5. A lot has been put in renovation and refurbhishment of taskbar.The taskbar at the bottom of the screen
is what one used to launch and switch programs between them. In Windows 7 one can pin any program to
the taskbar so it`s always just a click away, icons can be rearranged just by clicking and dragging. Hovering
over the icons will make thumbnails appear of every le or window that is open in that program.But the
over all eect is not looking so appealing till now 2 me.
6. Speed for reaching desktop while start and reaching in o mode while shut down is relatively much much
faster.
WINDOWS 7 : MY FIRST HANDSHAKE-2 (2009-05-28 14:52)
1. Continuing further exploring Windows 7 was a good expereince and has started looking promising to me.
2. Windows explorer : Windows Explorer has also been modied. New commandbar, new left-side pane
containing Libraries, Favorites, etc, new Details Pane, a few new options in View menu like Content and
at last re-sizable Searchbar.
3. Installation did not ask many questions nor did it take much time...may 30-35 minutes...i was on the
desktop.
4. Desktop context menu is similar to earlier OS but addends 2 new choioces which are :
71
a Share with
b. Gadgets
5. Control Panel window has also been redesigned. The left sidebar takes lesser space and resizes itself
whenever any control panel item is opened in the window which provides more space.
6. Calculator is a thing that I have left for now for it needs to be worked on with few examples with new
features.For now I would just add that PROGRAMMER and STATISTICS are two new menu options that
have been added.
7. Outlook Express is not seen till now and has been done away with!!!!
8. More will be added as I explore more!!!!!!!
WINDOWS 7 : MY FIRST HANDSHAKE-3- THE PASSWORD RESET DISK
(2009-05-28 23:33)
1. When you protect your Windows 7 user account by assigning a password to it, you have the option of
creating a password hint.(NOTHING NEW). Windows 7 displays the password hint if you enter an incorrect
password. If you didn`t save a password hint, or if you can`t remember the password even with the help
of the hint, you can reset your passwordbut only if you have created a password reset disk(THE NEW
THING). I used to earlier do this with a GATE CRASH CD.You can create this disk on either a USB ash
drive or a oppy disk, but not on a CD. Dont think you will ever lose or forget your password? It might
sound unlikely, but it can happen, especially in an environment that requires you to change your password
on a regular basis. Creating a password reset disk is a simple precaution that might save you a lot of grief.
2. To create a password reset disk:
a. Connect a USB ash drive, or insert a disk into your computers oppy disk drive.
b. In Control Panel, click User Accounts and Family Safety, and then click User Accounts. Then in the
Tasks list, click Create a password reset disk.
c. The Forgotten Password wizard starts.
d. On the Welcome page, click Next.
e. On the Create a Password Reset Disk page, select the USB ash drive or oppy disk drive you want to
use, and then click Next.
f. On the Current User Account Password page, enter the password you use to log on to Windows 7, and
then click Next.
g. When the progress bar displays 100 % complete, click Next. Then on the Completing the Forgotten
Password Wizard page, click Finish.
3. To reset your password by using a password reset disk:
a. On the Windows 7 Welcome screen, enter a blank password into the password box, and then press Enter
or click the Go button. Windows informs you that the user account name or password is incorrect.
b. Click OK to return to the Welcome screen, and then click the Reset password link that appears below
the password box. The Password Reset wizard starts.
c. On the Welcome page, click Next.
d. On the Insert the Password Reset Disk page, select the USB ash drive or oppy disk drive you want to
use. Insert the password reset disk into the drive, and then click Next.
72
e. On the Reset the User Account Password page, enter a new password and password hint, and then click
Next.
f. On the Completing the Forgotten Password Wizard page, click Finish.
WINDOWS 7 : MY FIRST HANDSHAKE-4 - THE SNIPPING TOOL (2009-05-29 22:21)
1. This one is surely going to be one of the most HIT feature of Windows 7.This feature allows users to
capture , edit and share information of web and local pictures (images).Snipping allows you to send the
capture image/text to anyone using the option listed on the menu options.This allows user to save the
selected portion in any of the formats PNG,GIF,JPEG & MHT.
2. To explain it in a simpler way.What we used to earlier till Vista when we wanted a screen shot.Four steps
:
- Press print screen
- Go to Paint Brush
- Do paste
73
- Save in desired format
3. This is now replaced by one click on the snipping tool...all steps done in one click.No print screen,no opening
of paint brush,no paste,no saving.So time saved is time gained.
Harjot Singh Pelia (2009-05-30 14:45:21)
hi anupam,
nice to see someone amongst us doing something useful.
anyway. though not exactly the same feature however a similar feature did exist in oce 2007 - OneNote. you can
directly take screen clippings from the screen or print the entire page to OneNote instead of the printer.
You can also take snapshots of a part of the page too.
anyway good job done ....pl keep us updated and keep up the good job.
harjot
ANOTHER FIRST HANDSHAKE : OFFICE 2010 (2009-05-31 23:16)
1. After a week long handshake with Windows 7 and some interaction with my microsoft acquaintance who
told me further about release of beta version of Oce 2010.So being on leave allows me to explore this also.So
74
I downloaded the same today and for the rst time the software installed on Windows 7 smoothly in about
20 minutes.....i dont know why it took so long.
2. The beta release of the software is known as Technical Preview Oce 2010.
3. A quick glance on all of the packages in form of Word,Powerpoint etc gave a glance of new features and
few new menus,though not yet explored look good.....will give some insight in days to come
2.6 June
GSM vs CDMA & Open Market Handset (2009-06-02 23:20)
1. In recent times, another eld that has been buzzing vibrantly apart from IT is the world of mobiles and
tele-communications. I have somehow always endeavored to be updated on computers and IT...but this
eld is also a very concerning eld to dig and poke into.
75
2. So the rst thing of interest to me was to know as to why in India, CDMA has not been such a huge
success as in west.Why GSM has been given the lead in handsets. Why is it that a CDMA subscriber has a
limited choice of handsets and a GSM subscriber has a variety to choose from? To be with stats, of the 376.12
million mobile subscriber base(ex INDIA only) only 97.77 million use CDMA network.(Pic Inset courtesy :
www.mobiletor.com)
3. CDMA services were launched in the year 2002 in India with the sole intention of acquiring a sizeable
subscriber base by allowing the customers to aordable devices with minimum features like color screen and
FM Radio. In order to attain this aim,the OEMs then introduced handsets that could be used only with their
networks. More distinctly I remember RELIANCE doing the brunt of the job. But that was in 2002.Over
last seven years, the times have commuted, the customer`s desires have changed, the technology has changed,
the psych of the intended customer has changed for better. He has become ready to shelve out some money
for more features and why not? With the introduction of handsets like Nokia 5800,LG Cookie and Samsung
Pixon, the customer is likely to be enticed!!!!!!!!!!!
4. Those customers who got into the CDMA tag over the years have had no problem with the services prof-
fered, the price of the calls, all is OK except for the problem that they have to persist in with the same handset
for so long as there is no choice in the CDMA segment. But not now..OEMs of the handsets have started
coming up with new generation handsets which support both GSM and CDMA in one. The most common
handset manufacturers that come rst to mind include NOKIA,SAMSUNG,LG,VIRGIN,MOTOROLA and
now more promising Indianised manufacturers include FLY,GEE PEE,X FONE,LEMON,MAGICON(I am
certain u have heard none of them)
5. So the good thing about the CDMA subscribers is the introduction of OMH ie Open Market Handset
started by the CDMA development group which is an international body comprising CDMA Operators,
manufacturer`s and application providers. This body enables full boasted CDMA devices to be used in any
OMH compliant operator network. Thus the Bandhan of constraining to one operator and OEM is no more
rifer.
76
THE G Family : 0G to 4G (2009-06-05 00:10)
1. The 'G` (0G,1G,2G,2.5G,2.75G,3G,4G) family that has now become, originally started with mobile tele-
phone service MTS in the US in 1946 (ie 0G) followed by Analog Communication standards in 1980s(ie 1G).
One of the largely used 1G based service in earlier 80s was NMT (Nordic Mobile Telephone) that was used
in Nordic countries, Switzerland, Netherlands, Eastern Europe and Russia.
2. 2G (or 2-G) is short for second-generation wireless telephone technology and these were commercially
launched on the GSM standard in Finland in early 90s. Three elemental benets of 2G networks were :
(a) Phone conversations were digitally encrypted.
(b) More ecient on the spectrum allowing for far greater mobile phone penetration levels
(c) 2G introduced data services for mobile, starting with SMS text messages.
The main 2G standards are:
GSM (TDMA-based)
IS-95 aka cdmaOne , (CDMA-based, commonly referred as simply CDMA in the US
PDC (TDMA-based), used exclusively in Japan
iDEN (TDMA-based), proprietary network used by Nextel in the United States and Telus Mobility in
Canada
IS-136 aka D-AMPS, (TDMA-based, commonly referred as simply TDMA in the US
3. 2.5G is considered to be a way between 2G & 3G cellular wireless technologies. The term second and a
half generation is used to describe 2G-systems that have implemented a packet switched domain (Packet
switching is a network communications method that groups all transmitted data, irrespective of content,
type, or structure into suitably-sized blocks, called packets.) in addition to the circuit switched domain(a
circuit switching network is one that establishes a circuit between nodes and terminals before the users
may communicate, as if the nodes were physically connected with an electrical circuit.) This got famously
known as GPRS and was able to provide data rates from 56 kbit/s up to 114 kbit/s.
4. 2.75G actually meant to refer the EDGE technology ie Enhanced Data rates for GSM Evolution,as
the name suggestsallows improved data transmission rates as an extension on top of standard GSM. EDGE
77
can carry data speeds up to 236.8 kbit/s. There is also something known as evolved EDGE which is a
further extension over EDGE wherein Peak bit-rates of up to 1Mbit/s and typical bit-rates of 400kbit/s are
supported.
5. 3G is the third generation of telecommunication hardware standards and general technology for mobile
networking, superseding 2.75G. This would be able to provide even higher transmission rates that would
range from a minimum speed of 2Mbit/s to a maximum of 14.4Mbit/s for stationary users, and 348 kbit/s
in a moving vehicle.
6. 4G is the short term for fourth-generation wireless, the stage of broadband mobile communications that
will supplant the third generation (3G). While neither standards bodies nor carriers have concretely dened
or agreed upon what exactly 4G will be, it is expected that end-to-end IP and high-quality streaming video
will be among 4Gs distinguishing features. Fourth generation networks are likely to use a combination of
WiMAX and WiFi.
7. I was curious to know about all the G`s and have written in brief of what I have understood very clearly
and read from Wiki and other good sources.Thanks Wiki again!
Buy a Keyboard : Get a Computer (2009-06-06 23:43)
1. When you buy a
computer,you buy a keyboard : LOGIC UNDERSTOOD. 2. When you buy a Keyboard,you get a com-
puter : LOGIC NOT UNDERSTOOD. 3.
Let me explain Para 2.Asus has come up with a EEE Keyboard which is actually a PC with a typical QW-
ERTY keyboard,minus NUM PAD.In place of the numpad ,we get a 5 inch,800 x 400 resolution touch screen.
4. Keyboard is equipped with a
78
Intel Atom Processor,16 GB SSD,1 GB Memory,VGA & HDMI OUTS,a few USB Ports and support for
WiFi and Blue tooth.
5. Cost : Approx 24K to be launched in June 09 : INDIA
PAPER BOOKS CONVERGE TO E-BOOKS : KINDLE DX (2009-06-07 16:25)
1. We have been hearing often in our oces, in the forums, in various visionary speeches from bosses about a
paperless oce. I heard this word for the rst time in late 90s when the company I was working in, the CEO
gave a mention about a paperless oce. The word induced internal laughs amongst most of the audience of
how is it possible?
2. Slowly over a period of time, now 10 years, the thing doesnt look inconceivable. To add to the various
options available today in form of e-mails, web sites, mobiles etc.....the latest IN thing is KINDLE DX from
Amazon. The gadget is shown in the pic inset.
79
3. Recently read about the same in the June issue of Digit. It also mentioned about how the biggest library
of the world ie British Library is putting in lots of eort in digitizing books available presently on its shelves.
It has put up four giant scanners, working for last 2 years with the help of a 21 MP camera clicking all the
way while a robotic arm turns them.
4. The conguration of this KINDLE Dx is as follows :
- Slim: Just over 1/3 of an inch, as thin as most magazines
- Carry Your Library: Holds up to 3,500 books, periodicals, and documents
- Beautiful Large Display: 9.7 diagonal e-ink screen reads like real paper; boasts 16 shades of gray for
clear text and sharp images
- Auto-Rotating Screen: Display auto-rotates from portrait to landscape as you turn the device so you
can view full-width maps, graphs, tables, and Web pages
- Built-In PDF Reader: Native PDF support allows you to carry and read all of your personal and
professional documents on the go
- Wireless: 3G wireless lets you download books right from your Kindle DX, anytime, anywhere; no monthly
fees, no annual contracts, and no hunting for Wi-Fi hotspots
- Books In Under 60 Seconds: You get free wireless delivery of books in less than 60 seconds; no PC
required
- Long Battery Life: Read for days without recharging
- Read-to-Me: With the text-to-speech feature, Kindle DX can read newspapers, magazines, blogs, and
books out loud to you, unless the books rights holder made the feature unavailable.
Google & Bing (2009-06-11 15:58)
1. Most of you must have come across a new search buzz known as BING launched by Microsoft.I have binged
a few times but have recurred back to Google most of the times since it is a habit as on date.Although best
80
wishes to BING....since the more these two ght..the better it is for us.
2. An interesting site that compares these two is [1]http://www.bingandgoogle.com
3. This site would give the search results from both the sites on one page.Like wise MELIORATE ie mysite
name appears on second and third number in GOOGLE and yet to nd a place at BING.....
1. http://www.bingandgoogle.com/
Google and Bing : Bade miyaaan Chotey Miyaan (2009-06-11 16:09)
1. Most of you must have come across a new search buzz known as BING launched by Mi-
crosoft.I have binged a few times but have recurred back to Google most of the times since it
is a habit as on date.Although best wishes to BING....since the more these two ght..the better
it is for us. 2. An interesting site that compares these two is [1]http://www.bingandgoogle.com
3. This site would give the search results from both the sites on one page.Like wise MELIORATE ie mysite
name appears on second and third number in GOOGLE and yet to nd a place at BING.....
1. http://www.bingandgoogle.com/
My DIGIT Webinar (2009-06-12 22:37)
1. Digit,the IT magazine is presently celebrating its 8th Anniversary Carnival and has launched many events
including webinars,daily online contests,workshops across the country.
2. I was part of one WEBINAR on Security of PC today.It was a rst for me,although this would be a
regular feature for most of my IT savvy friends The word makes the meaning of the term understandable
ie a Seminar held on web.It included a presentation run by a Digit rep and about 25 invitees logged in to
discuss on the several issues related.A screen shot just for info.
81
3. Overall a new thing and experience.
Salman (2009-06-19 19:40:38)
Nice blog keep it up
Thanks
Salman
www.tips4blogging.co.cc
H.A.M.R : Storage Futurity (2009-06-20 23:46)
1. In the last 15 years of my interaction with various modes of storage medias right from the days of oppy
drives,tape drives,CDs,DVDs and now Blue Rays,we have all witnessed as to how the storage is shrinking
and shrinking and shrinking...(reminds of the ascent of dharmender paaji saying daru peeing and peeing and
peeing...from Sholay)...khair this is not the intented aim here.
2. A new buzz word in the future storage trends has come up in the name of H.A.M.R....briefed below.
3. Heat-assisted magnetic recording ie HAMR is a technology that magnetically records data on high-stability
media using laser thermal assistance to rst heat the material. HAMR takes advantage of high-stability
magnetic compounds such as iron platinum alloy. These materials can store single bits in a much smaller
area without being limited by the same superparamagnetic eect that limits the current technology used
in hard disk storage. The only catch being that they must be heated to apply the changes in magnetic
orientation. HAMR was developed by Fujitsu in 2006 so that it could achieve one terabit per square inch
densities.
82
4. Seagate Technology said it had successfully demonstrated the principles behind HAMR, the name for the
technology that could form the basis of Seagates next-generation hard drives. The successful demonstration
doesnt mean that the technology is right around the corner as the roadmap calls for HAMR to be introduced
in about ve or six years.
5. If the technology lives up to its promises, however, then HAMR could blow away the superparamagnetic
limit by about a factor of 100, according to Seagate. The company hopes to read and write 50 terabits (6.25
terabytes) of data in a square inch using low-cost manufacturing techniques.
6. Thanks Wiki and Seagate for info.
Salman (2009-06-21 09:55:56)
nice blog
Thanks
Salman
www.tips4blogging.co.cc
ANUPAM (2009-06-21 10:25:30)
thanks salman...will see ur site sooon
Storage Technology - Graduating Trends (2009-06-21 22:09)
1. Recently I was asked to write a paper on Trends in Storage Technology for an internal oce maga-
zine.Although have been aware of the trends in a hazzy manner but it gave me an opportunity to revise
the entire lot and infact made myself cognizant of many new things all set to arrive in near future.Relevant
extract as would be making the reader wise on subject matter is produced below.
2. Many dierent forms of storage, based on various natural phenomena, have been invented. So far,
no practical universal storage medium exists, and all forms of storage have some drawbacks. Therefore a
computer system usually contains several kinds of storage, each with an individual purpose. The two primary
storage technologies are magnetic and optical.
3. The primary types of magnetic storage are:
(a) Diskettes (oppy disks)
(b) Hard disks
(c) High-capacity oppy disks
(d) Disk cartridges
(e) Magnetic tape
4. The primary types of optical storage are:
(a) Compact Disk Read-Only Memory (CD-rfruROM)
(b) Digital Video Disk Read-Only Memory (DVD-ROM)
(c) CD-Recordable (CD-R)
(d) CD-Rewritable (CD-RW)
FUTURE TRENDS
5. MEMS : One technology that promises to store more information than disk drives is micro electrome-
chanical systems. MEMS have electrostatic actuators electrically-driven springs and levers that can
83
move components like storage media and read/write heads tiny, precise distances. It involves recording bits
by heating the tips to melt tiny pits in a plastic storage medium, similar to burning a CD. The presence of
a pit represents a 1 and the absence a 0. The device reads bits by sensing changes in temperature. When a
tip moves across the surface and falls into a pit, more of the tip is in contact with the surface, which causes
it to dissipate heat more quickly.
6. Holographic Storage : Holographic storage devices have the potential to both hold much more data
than magnetic technologies and access it much faster. Holograms are made by bouncing a laser beam o
an object and having a second laser beam intersect the reected light. The laser beams interfere with each
other, producing a unique pattern of bright and dark areas that can be captured in storage media like light-
sensitive plastics or glass composites. The resulting hologram can be illuminated by shining the second laser
beam on the media at the same angle as when the hologram was recorded.
7. Blu Ray : Blu-ray Disc (also known as Blu-ray or BD) is an optical disc storage medium de-
signed/created by Sony to supersede the standard DVD format. Its main uses are for storing Playsta-
tion 3 games, high-denition video and data storage with 50GB per disc. The disc has the same physical
dimensions as standard DVDs and CDs. The name Blu-ray Disc derives from the blue-violet laser used
to read the disc. While a standard DVD uses a 650 nanometre red laser, Blu-ray uses a shorter wave-
length, a 405 nm blue-violet laser, and allows for almost six times more data storage than on a DVD.
8. Network Storage : Network storage is a generic term used to describe network-based data storage, but
there are many technologies within it. Direct Attached Storage (DAS) is a storage device that is directly
84
attached to a host system. The simplest example of DAS is the internal hard drive of a server computer,
though storage devices housed in an external box come under this banner as well. DAS is still, by far, the
most common method of storing data for computer systems.
9. Molecular Switches : Storing a bit in a single molecule is about as small as you can get. Certain
molecules can be used to store data because they can be switched back and forth between two stable states
that can represent the 1s and 0s of digital data. One of these is rotaxane, which contains a thin, thread-
like section with a ring that moves freely around it. The ends of the thread section are thicker, preventing
the ring from slipping o. Researchers have found ways to move the ring from one end of the thread to the
other and the ring will stay where it is placed.
10. Nanotechnology, shortened to Nanotech, is the study of the control of matter on an atomic and
molecular scale. Generally nanotechnology deals with structures of the size 100 nanometers or smaller, and
involves developing materials or devices within that size. Nanotechnology is very diverse, ranging from novel
extensions of conventional device physics, to completely new approaches based upon molecular self-assembly,
to developing new materials with dimensions on the nanoscale, even to speculation on whether we can directly
control matter on the atomic scale. Breakthrough Nanotechnology Will Bring 100 Terabyte 3.5-inch Digital
Data Storage Disks
11. Storage-specic operating system : Just as a computer operating system makes a computer usable, a
storage-specic operating system will make storage devices and their associated networks operate in a usable
manner. Powerful storage networking switches may provide the platform for the storage-specic operating
system.Moving intelligence away from servers and storage systems into interconnected switches in the core of
the network could solve interoperabliity problems that are inherent in heterogeneous enterprise environments
and administration tools and allow complex infrastructures to be managed as a single, scalable entity.
12. Storage Virtualization: Virtualization improves storage manageability by separating the presentation
of storage to the server operating system from the actual physical devices. Virtualization consists of taking
several physical storage devices and joining them to appear as one logical unit to manage. This represents a
collective pool from which users can request any amount of disk space. The users will thus be able to access
storage without knowing where a device is, and how it is congured.
13. H.A.M.R : Heat-assisted magnetic recording ie HAMR is a technology that magnetically records data
on high-stability media using laser thermal assistance to rst heat the material. HAMR takes advantage
of high-stability magnetic compounds such as iron platinum alloy. These materials can store single bits in
a much smaller area without being limited by the same super paramagnetic eect that limits the current
technology used in hard disk storage. The only catch being that they must be heated to apply the changes
in magnetic orientation. HAMR was developed by Fujitsu in 2006 so that it could achieve one terabit per
85
square inch densities.
14. R.A.I.D & M.A.I.D : RAID is an acronym to describe a Redundant Array of Inexpensive Disks, a
technology that allowed computer users to achieve high levels of storage reliability from low-cost and less
reliable PC-class disk-drive components, via the technique of arranging the devices into arrays for redundancy.
On the other hand we have MAID, an acronym to describe Massive Array of Idle Disks ,a system using
hundreds to thousands of hard drives for near-line data storage. MAID is designed for Write Once, Read
Occasionally (WORO) applications. In a MAID each drive is only spun up on demand as needed to access
the data stored on that drive. This is not unlike a very large JBOD but with power management.
Anonymous (2009-07-11 18:36:43)
very informative. Keep it up! - rinkoo
Hi Tech Door Bell : Is it required? (2009-06-22 16:20)
1. IT is venturing into all Galis and Muhallahs at global level.It is no more conned to certain sectors.Well,I
am writting this one because it made me laugh all the way!!!may be I am being foolish but I am still laughing
while I am writing this.
86
2. I recently came across this good tech info site ie [1]http://www.emmexcorpio.blogspot.com/
that introduced me to the subject heading.The picture explains it all...yes!!!this is a door bell...
3. It made me laugh because I directly connected it
with the INDIAN RESIDENCES.The doodh wala,the safaiwala,the milk man,all friends and relatives,the
surprising visitors,we have all encountered and will keep encountering till eternity in India atleast.So I was
wondering what thier reactions would be like if they read all that. 4. But anyway the idea is good and is
based on simple database query run fed by the owner of the house or oce
1. http://www.emmexcorpio.blogspot.com/
Salman (2009-06-23 19:25:05)
really awesome blog keep it up
Salman
www.tips4blogging.co.cc
Hi Tech Door Bell : Is it required? (2009-06-22 16:20)
1. IT is venturing into all galiyaan and muhallahs of
Are you secure at your friendly neighbourhood CYBER CAFE ? (2009-06-26 15:27)
[1]
87
1. This one comes after I have read a wonderful article in the DIGIT Carnival issue Jun 09 on Cyber caf
Security. This article covered how few Cyber Cafe`s with notorious intentions can play with crucial, critical
and condential information of the user who might have accessed his e-mail accounts or would have booked
a ight ticket with his credit card or might have done some personal work on the cyber cafe`s PC.In the
following paragraphs I would just go over the preventive measures in brief as outlined in that article. Genuine
Informative CREAMY INFO THAT IS!!!!!!!!
2. PORTABLE WEB BROWSER : A portable web browser as the name suggests would be able to allow
you to take bookmarks and passwords with you while not writing any information on the host computer.
This allows to bypass key loggers who would be expecting that all that you type would be logged in one
separate le unknown to the user. So this feature of the portable browser would allow you to access your
accounts without typing and thus preventing from leaking your crucial info. But at the same time you have
to be aware that PENDRIVE would be equal to your most precious thing in life..so don`t ever try and
attempt loosing it.Mozzilla,Opera have these free softwares ready for download at the click of a button and
Chrome is working still!!!!!
3. Another thing about the key logger software`s available in the market, yes they include OPEN SOURCE
TYPE ALSO...so all the more vulnerable the user becoming a quarry. Key logger can be of two types :
a. Hardware Type By using a small chip in the keyboard which makes by passing impossible.As shown
in the gure below,we see a normal CPU rear from back and another PC with the malicious chip placed in
between the cable.
b. Software Type Can be activated with the help of a Trojan or with the help of a simple installation.
4. A software based key logger can either keep a record of what is being typed or would be able to take
periodic screen shots while the user is using the PC.All this being sent to a remote server without the
knowledge of the bechara user.Hai na kamaaal ke baat!!!!!!!!!!
5. VIRTUAL KEYBOARD : Although the endeavor of the cyber cafe PC user should be to ensure that
in no circumstance, credit card details should be typed,but if at all it is marta kya na karta wali baat,then
use of virtual keyboard should be exploited. This would be available as Start > Accessories > On Screen
Keyboard.Although there are ways and means to even break this,but then there would never be a guarantee
of sort.after all U R ON THE WEB BHAISAAAB...every thing is accessible.
6. I would like to mention one more thing here..VIRTUAL KEYBOARDS/ON SCREEN KEYBOARDS
are not a guarantee for ensuring safety. There are key loggers which are even congured to log only details
from on screen key boards. There is a solution to this also and that is OBFUSCATION.
7. OBFUSCATION : This basically allows key loggers to log a certain combination of keys,while keying in
dierent combination. There are some programs that are targeted at dierent obfuscation algorithm and thus
by pass typing in the meat thing. Obfuscation is actually the deliberate hiding of the softwares behavior,
is used by malware authors as well as legitimate software developers. They both use code obfuscation
techniques to keep curious souls from understanding how their software works and what it is doing to the
computer on which it runs.A complex thing in itself but who needs to know that..aaam khao..not to worry
of guthli!!!!!!!!!!!How to use it?Pl BING or Google.
88
8. Another important thing to be ensured is to protect your USB drive from Viruses.The rst thing to
do when you plug in your USB Drive into a public computer is to identify and disable malicious processes
running. Process Explorer is a good utility for doing this.This is actually like windows task manager but
with few more good options to work on. A Screen Shot from my lap top shown below.
9. Securely deleting data : Last but not the least.ensure using a good software that ensures that no
trace of activity on the used computer is left behind.I recommend using ERASER and Free Commander
..tried and tested.....
1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SkSe7L8F7YI/AAAAAAAAAbs/ZCAczZB33rU/s1600-h/pc-security.jpg
NOW CHIP IN BATHING SOAP!!!! (2009-06-27 22:14)
1. I was really amazed to read this one in TOI today wherein I came to know that in few remote villages of
south India,some panic occured after they found a chip resembling a pen drive in their toilet soaps.
2. This was prominent in a village near Bajpe and as rumours spread that the chip was a bomb or was
inserted to make blue lms, the villagers made a beeline to the police station. Police investigated and found
that the chip was installed for collecting data. A team from Hindustan Lever Limited was conducting studies
related to Lifebuoy soap and its usage in the village.
3. 'There was nothing harmful in it. A chip was installed in the soaps as a part of the research. The
team had visited about 28 houses. A representative from UK, Julian Collins had explained the villagers in
89
detail about the project. The only mistake was that they had not obtained permission from the district
administrator to conduct the research, he added.
4. Though most of the houses had signed a consent letter for the use of the soap, on seeing the chip, they
panicked. The company`s documents, however, showed everything was above board.Meanwhile, Sumathi,
Project co-ordinator of the company said, 'Hindustan Lever Limited was conducting a two-year project to
study children`s health in connection with the use of Lifebuoy soap.
5. Thus chip was a data-collection card which entered data about the children`s health in relation to the
number of times they used the soap.All documents regarding the research project are clear and the company
had obtained permission from the superintendent of police and about 30-40 people were working on the
project.
6. Wonder what else is in store when this can be claimed to be the begining of some sort in the name of
research and
investigation!!!!
7. Some extract taken from http://www.punemirror.in
UNIQUE IDENTIFICATION PROJECT : UID (2009-06-28 16:01)
1. We all know how the launch of PAN Cards and Voter ID Cards in the initial period say about 7-8 years or
may be slimly earlier created discombobulation amongst the aam janta. Photos clicked, Data base created
and then all got inter amalgamated and I got somebody elses pan card with a dierent pic and altogether
dierent address with the age of my grandfather endorsed in BOLD.The thing and the vision seems to have
ameliorated today.
2. Now on top of this Sarkaar plans to make a Unique Identity Card.Since the sarkaar never wanted to take
a chance this time ,the onus of the culmination of the project has been given to INFOSYS and the over all
coordinator is none other then Mr Nandan Nilekani,the co chairman of infosys.
3. The UID (Unique Identity) project is one of the most aspirational projects of the UPA government. The
UID programme will provide an identity card to every citizen to establish citizenship and address security
concerns.
4. The identity cards purported will be smart cards which will carry information of each and every individual,
his/her nger biometrics as well as a photograph. A unique National Identity Number will be assigned to
each individual including those below 18 years of age.
5. The government will spend around $6 billion on developing smart cards apart from a gigantic citizen
database. Karnataka has reportedly been chosen as the pilot state to carry out the project.
6. The broad idea is to get all the births, deaths, marriages, passport data, bank account data, ration card
data into one database. This will help all these oces to just tap into the central database as and when
required and update their accounts.
7. In year 2000, Tata Consultancy Service was assigned with the task of studying the feasibility of this
project. It came up with the report which said that the government would have to earmark around Rs
10,000 crore in three to four years, to implement it.The project would also require completely new software,
capable of handling detailed information on at least one billion data entries.
8. This proposal that took almost a decade to become a project. And now the government is reportedly
looking at a three-year term to complete the entire programme. I am slightly positive about this deadline
being met as the project is in the hands of INFOSYS.
90
9. Info from [1]http://infotech.indiatimes.com and [2]http://www.ciol.com
1. http://infotech.indiatimes.com/
2. http://www.ciol.com/
Anonymous (2009-06-28 17:20:10)
how do u search all this man?
Anonymous (2009-08-01 14:04:05)
How do you help Nandan Nilekani in making the project successful ? Can we join the project voluntarily ?
ANUPAM (2009-08-01 14:52:44)
nandan has now become a one man army anyway!!!
2.7 July
Check your ANTIVIRUSes Loyalty : EICAR Way (2009-07-03 23:07)
1. The world of bloggers is increasing at an astonishing pace and there are lots and lots of good of them
with loads of benecial and estimable info. Recently I came across one good one that introduced me to The
European Institute for Computer Anti-Virus Research (EICAR).
2. Now this was able to provide me a real cool trick that of testing the reliability of the antivirus being run.
I tested the same on two computers. One with a antivirus loaded and the other one badly infected. I will
now share the cream instead of minting words.
3. It is just a matter of simple cut & paste.Just do the following steps and the matter of how reliable your
antivirus is will be taken care of.
(a) Open Notepad and paste the code given below
X5O!P %@AP[4\PZX54(P)7CC)7 } $EICAR-STANDARD-ANTIVIRUS-TEST-FILE! $H+H*
(b) Save the notepad with the name eicar.com
4. If ur Anti-Virus is powerful , it will stop u from saving .. Or atleast trap it few seconds after saving.
5. That`s it!!!!!So simple.So my infected computer was able to save the same and the F - secured one caught
the moment I tried saving it and deleted it too!!!!!!!!Screen shot in set
91
6. Thanks EICAR and [1]http://www.technotips24x7.co.cc/
1. http://www.technotips24x7.co.cc/
USB DHAMAAAL!!! (2009-07-04 22:40)
1. The world of USB based gadgets is in for some real surprising things.Two of the recent ones that surprised
me really are mentioned below.
2. USB Beverage chiller : The name says it all.
92
Features:
Works w/ Soft Drinks, Coee, Tea, and More
High Eciency - Works in Just a Few Minutes after Plugging into USB Port
Draws Power Directly from USB Interface
Plug and Play (No Driver Required)
On Board Button to Switch from Warm to Chill
Weight : 440 gm
USB Cable length : 1.1 m
3. USB Mini Fridge : Again the name says it all.The features include :
Powered entirely via your computer`s USB port
Internal blue LED illumination
Keeps one 12oz can of beverage chilly cold
No batteries required
93
[1] [2]
4. Where are we heading this way?
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/Sk-PilnzirI/AAAAAAAAAcs/C9-ie2UHkLs/s1600-h/Cool_USB_Fridge_Cooler.
jpg
2. http://4.bp.blogspot.com/_z1QH8I3k9vk/Sk-PSrJcJqI/AAAAAAAAAck/2hwtiKImJq8/s1600-h/usb1.jpg
Techsense (2009-07-05 02:12:41)
http://itstechsense.blogspot.com/
94
AMD : The Launch of ISTANBUL (2009-07-06 22:47)
1. I really wonder whats going to be the end of MOOREs Law.Where did the thing start from and whats
going to be the conclusion or is their really going to be any?First it was the pentium, then pentium 2,then
3 ,then 4,then Core 2 duo,dual core,then it was Quad Core and now comes the launch of SIX PACK ABS
.....sorry..I mean Six Core Processor,the rst of its kind from the AMD,to be known as the ISTANBUL
Processor.Why so named is still a question?
2. The good thing is that these processor can simply be used to replace and upgrade the existing lot of Quad
Core processors ie the Opteron Series without investing again into the motherboard and making it obsolete.
3. Istanbul comes with a powerful DDR2 memory architecture and the AMD virtualisation technolgy.Just
to be clear these are 6 distinct physical cores, just as the Shanghai processors contained 4 distinct physical
cores. Each core comprises 512K of L2 cache and 128k of L1 cache. The L3 is a 6MB cache shared by the
six cores.
4. This also comes as an answer to the Intels Nehalem Xeons.I assume that with the launch of IS-
TANBUL,now the quad series of the AMD is heading for a conclusion and a farewell from the exisiting
motherboards since Istanbul can simply t into the same slot as the Quad cores.
5. So next after Istanbul will be ?????.......Afghanistan!!!!ha ha ha....long and fast lives the MOOREs Law.
KYPS : HELPS AVOID BEING VULNERABLE!! (2009-07-08 16:20)
[1]
95
1. In an earlier post when I had discoursed how much prone are you at any cyber cafe or at some other non
friendly computer when u surf web on a holiday outside or when u dont have your own laptop,how prone
you become to keylogger!!I had given out given out few suggestions in form of using mobile/portable browser
etc. that was at http://anupriti.blogspot.com/2009/06/are-you-secure-at-your-friendly .html
2. Not a new thing but I tried this for the rst time yesterday ie KYPS that stands for Keep Your Password
Secret.Now for the understanding of this I will write a small step by step instruction.
3. BACKGROUND
How to avoid typing username and password at the outside or malicious looking cyber cafe computer.?
4. SOLUTION
(a) Register at http://kyps.net/home/
(b) Get a set of codes at your email id
(c) Register those username/passwords site that u intend using sometime later at some other computer.
(d) Now when u wish to access the email account at the cyber cafe you simply have to log into the site of
KYPS and site will help you reach and access the e-mail without using the username and password,but by
using the one time codes that I had mentioned earlier.
5. EXAMPLE
(a) You register your email id abc@yahoo.com at KYPS.
(b) Once you register,a set of codes will be mailed to you.Qty will be decided as per your choice.Say 80.
(c) These codes will look some thing like :
100 9?nRQuJ8p 110 DzobNpk?M 120 Xg1Z2kXsL 130 maXXcACKV
101 x0Ivy4XsB 111 jcK8p7JRl 121 WqJ6GXDz4 131 XfjKVH65p
102 ilKzybBE0 112 /nvspLbmr 122 VoaX7yI1 132 5ILuG5ddN
103 tXaRNJwk? 113 lcMEO?GN? 123 MjpXow3CI 133 vBbKpkXiT
104 lAJNJnfcZ 114 Lf?U7Zzyn 124 VX71za0+J 134 KGXkxsVc
96
(d) You go to a Cyber Cafe.Log into the KYPS site with your e-mail id.
(e) Select which e-mail you would like to access.
(f) Once selected, KYPS will ask you the equivalent code of 100 ie 9?nRQuJ8p
(g) and you log into the email page to access your mails.
(h) DONE.Thats it.
6. RISK
The only risk you build here is that since you rely on KYPS which has your info in their server but they
claim is never stored.So one risk closed is one risk open......thats the funny side of SECURITY
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/SlR8LhMiIlI/AAAAAAAAAds/F1t4rpkcQQY/s1600-h/logo+(1).gif
ramesh kumar (2009-07-10 22:22:14)
is it worth the risk?risk never gets over once u r on the web!!!
E-WASTE : DEPOSIT & GET PAID (2009-07-10 23:01)
1. In an earlier post I discussed about the consequences of e-waste and how few organisations were involved
in controlling the issue.
2. Recently I came to know of this site at [1]www.techshop.in/e-cycle which claims to recyle e-waste in a
real economical manner.They pay you for the trash that you deposit.More details mentioned below.
3. MGA & Associates is a major organisation for the recovery & recycling of electronic equipments and
components based strategically in the deep sea port area of Kandla India. MGA & Associates plans & carries
out the collection, transportation, processing & recovery of all base materials from electronic equipments.
They oer an environmentally sound and compliant route for organisations for their end of life and obsolete
electronic equipments & components with the best available techniques. All MGA & Associates processes and
daily operations are backed up by ISO 9001 and ISO 14001Quality & Environmental management systems
certied by Bureau Veritas.
97
4. MGA & Associates was formed in 2003 by a group of dedicated & professional individuals with over 60
years of collective experience in recovery and recycling of electronic equipment and components and is one
of the largest professional processors of this type of equipment.
5. Your e-waste can be sent or deposited in person against which you get the coupons at the following
locations:
(a) Polytela e-Commerce PVT. LTD.
25, Gaurav Industrial Estate, Bail Bazaar,
Kurla (W), Mumbai 400070.
Tel.: +91 9920213743 , +91 9323699901
Fax: +91 2264501259 E-mail: support@TechShop.in
(b) MGA & Associates
Factory Site
Plot No. 262/263, Sector 4, Kandla Special Economic Zone,
Gandhidham - 370 230, Gujarat, INDIA.
Tel.: +91 2836 252225, +91 2836 253930
Fax: +91 2836 252522 E-mail: info@mgaind.com
(c) Logix Express
37/1945 Om Karam CHS ltd. Gandhinagar. Bandra E. Mumbai. 400051.
Tele: 022 26510708/26510687.
M- 09833175486.
Contact Person: Mr. Abhishek.
(d) DELHI
Logix Express
8908/2 Multani Dnada. Opp. Rangoli Guest House.
Pahargung. 110055.
Tele: 011 32617289.
M- 09999796936.
Contact Person: Mr. Govind.
(e) AHMEDABAD
Logix Express
Block No. 71 to 76, Sagar Estate Part 3.
Opp. Ekta Hotel. Sarkhej Bavala Road.
Sarkhej- Ahmedabad. 380210.
Contact Person: Govind.
Tele: 079 26890419.
M- 09979865961.
(f) HYDERABAD
Logix Express
C/o Fast Freight Courier
1-10-9/3, Airport Road, Opp. IBP Petrol Bunk,
Begumpet, Hyderabad-500016.
98
Contact Person : Mr. Anil Reddy
M- 9848017335
(g) CHENNAI
Logix Express
13/Devsigamani Street.
Chulaimedu.
Chennai.94.
Contact Person: Mr. Silverraj.
M- 09841418946.
(h) BANGALORE
Logix Express
C/o Ever Green Logistics
6, 4th Cross, 5th Main,
S R Nagar, Bangalore-560027.
Contact Person : Mr. Ravi
M- 09845836058.
(i) PUNE
Logix Express
Survey no 755, Kalpana warehouse.
Opp. Hotel Ram kamal, Pune Nagar Road.
Katkewadi, Wagholi, Dist. Haveli
Pune-412207.
Contact Person: Mr. Raja Ram.
M- 09850604994/09730073535.
(j) SURAT
Logix Express
Ground Floor, Swagat Complex.
Kadodara Chokdi.
Surat.
Contact Person: Jayendra.
M- 9979865968.
6. GOOD WORK...SO FREE PUBLICITY!!
1. http://www.techshop.in/e-cycle
Anonymous (2010-05-30 15:21:52)
Wonderful. I am going to reproduce it with your permission
Anonymous (2010-05-31 09:45:58)
welcome anonymous....
EYE-FI : GETs YOUR CLICK UPLOADED (2009-07-11 00:02)
1. Whats the route from the moment you click any pic from your digital camera or your camera phone
to the time you upload the selected few.It involves clicking the pic followed by Booting-up your computer,
99
plugging in your camera, uploading pics to the hard drive and nally choosing what to send to the web
!!!that has started becoming annoying now...since the number of pics a camera freak clicks is huge....so he
generally shams it out and let them remain in the stoarge media by default.
2. SOLUTION : EYE-FI Memory Card. The Eye-Fi camera memory card (Pic in set) not only
provides memory as usual for your pictures, but uploads the snaps as you take them.
3. The procedure involves just sync the card to a hard drive or Wi-Fi network, and getting it plugged into a
digital camera and start snapping away. Pics are then routed to the hard drive or to one of 17 photo vendors
(like Facebook or Flickr.) The cards software deftly handles scaling and compression while privacy settings
at the individual sites allow you to lter what gets published. The software handles scaling and compression
as well as privacy settings.
4. The Wi-Fi chip uses 70 percent less power than competing products, allowing it to be comfortably nestled
in a standard SD card.
5. Thank you [1]http://www.technovelgy.com
1. http://www.technovelgy.com/
Widi Septyono (2009-07-13 21:44:42)
Maybe if you are interested in my blog, please give comments and I will soon reply
PC IN A FLOWER VASE : ECSs MING VASE (2009-07-14 23:09)
1. One Taiwanese computer maker has come up with a novel way to camouage a computer made for your
living room: give it the shape and color of a Ming Dynasty vase. 2. Elitegroup Computer Systems (ECS) put
the small blue and white vase-shaped computer on display by a large-screen LCD TV at Computex Taipei
2009, to the eect that it really looked like Chinese art work rather than a gadget. 3. Inside the shapely
plastic covering includes (a) Home media computer complete (b) A Blu-ray Disc player oering full 1080p
high-denition video quality (c) Intel Atom N230 microprocessor (d) Nvidia Ion graphics chips and a (e)
2.5-inch hard disc drive. (f) Bottom of the vase reveals plugs for an HDMI cable, an Ethernet cable and USB
ports. 4. See all this in the pictures in set....really amazing!!!
100
[1]
[2]
[3]
101
[4]
1. http://2.bp.blogspot.com/_z1QH8I3k9vk/SlzDQjJxFFI/AAAAAAAAAe8/sqYKQUchOBg/s1600-h/4.jpg
2. http://2.bp.blogspot.com/_z1QH8I3k9vk/SlzDLqURVBI/AAAAAAAAAe0/QemJe3SRe90/s1600-h/3.jpg
3. http://4.bp.blogspot.com/_z1QH8I3k9vk/SlzDDQcMWOI/AAAAAAAAAes/9TRJv-pq8kk/s1600-h/2.jpg
4. http://1.bp.blogspot.com/_z1QH8I3k9vk/SlzC7urAu9I/AAAAAAAAAek/MEkrMfLbYiY/s1600-h/1.jpg
HDD DOCKING STATION (2009-07-20 22:03)
1. In a typical IT savvy home,one would expect a desktop and a laptop today.So do Ihave that.I got my
present desktop about 6 years back and have been since upgrading as and when I nd an opportunity to
make up with the race of not being left in obsolesence.Thus today I have about 6 IDE/sata based hard disks
at my home that bear the back up and conne themselves to the shelves till they are required.
2. Once required,I attach them with the easily available USB to SATA or USB to the typical IDE port.Now
when I do this,the table that I work on becomes a horde of wires with keyboard, mouse,power cable of
this conversion kit
ging bank intermingling with each other.To make this neater a new thing that I recently came across is
the HDD DOCK STATION.More below :
102
3. The plug-n-play ready, high speed HDD Docking Station provides the user with exibility, portability and
performance. The unit supports both 2.5 and 3.5 SATA drives up to 1TB in size. The docking station is
also hot-swappable using the USB2.0 and eSATA interfaces so it can be moved from computer to computer
with ease for all your backup needs. If data integrity is your habit, then the HDD Docking is the perfect
solution for you. 4. The dock is compatible with Windows and supports HDD upto 1 TB. 5. Thanks
http://www.sunbeamtech.com
DATA STORAGE IN BACTERIA : ASTONISHING-MUST READ (2009-07-26 22:32)
1. I had read about this about 2 months back but could not get any thing rock solid about what is the
concept like actually?Although still not much detail is available,the crux from various sites is reproduced
below for one to just imbibe the idea.
2. Articial DNA with encoded information can be added to the genome of common bacteria, thus preserving
the data. The technique was developed at Keio University Institute for Advanced Biosciences and Keio
University Shonan Fujisawa Campus. So now what would happen to those USB ash memory thumbdrives
which is claimed as being small!!
103
3. The technology aims at the succesful development of a DNA memory utilizing living organisms. The
researchers proposed a method to copy and paste data within the genomic sequence of a living organism,
Bacillus subtilis. Since microbs such as the Bacillus subtilis are very small and they keep gene information for
generations, they can be applied for extremely smaller-size, larger-volume memory media that can store data
for a longer period of time, compared to electronic or magnetic media including CD-ROM, ash memoryand
hard disc.
4. According to researchers, up to 100 bits of data can be attached to each organism. Scientists successfully
encoded and attached the phrase e=mc2 1905 to the DNA of BACILLUS SUBTILIS, a common soil
bacteria.The Bacillus itself creates new copies of the data every time it reproduces itself, thus making it an
ideal archival storage system.
5. While the technology would most likely rst be used to track medication, it could also be used to store
text and images for many millennia, thwarting the longevity issues associated with todays disk and tape
storage systems which only store data for up to 100 years in most cases.It is also claimed by the inventor
that unlike optical/magnetic storage, data would be safe for thousands of years!!!
6. However, DNA sequences gradually change as their generations advance and that has been a hurdle in
the research of biotic memory media. Changes in the DNA arrangements would make recovery of the stored
104
data impossible, provided that no error correction techniques found at magnetic or optical storage media is
available. The research group said its latest development indicated a possible resolution for this problem.
7. The technology proposes a method to copy and paste data within the genomic sequence of a living
organism, Bacillus subtilis, thus acquiring versatile data storage and the robustness of data inheritance.
Two or more dierent DNA molecules which carry the encoded data were duplicated into multiple genomic
areas for data storage. The encoded data is then retrievable by complete genome sequencing and searching
for duplicated coding regions using multiple alignments of all the possible decoded bit-data sequences of the
genomic DNA. Therefore, even if the recorded information is partly destroyed, the original correct information
can be restored.
8. Thanks http://www.technovelgy.com
rinkoo (2009-07-28 19:58:53)
Great!
2.8 August
WHO ESPIED MY COMPUTER? (2009-08-02 15:33)
[1]
1. How many times would you be able to know who logged in or who used ur computer in your absence?NOt
much most of the times!!!An easy to nd out the details is a one liner solution......
2. So,here is the trick for that ..Simply type as given below in the RUN bar ie
Start - Run - TYPE eventvwr.msc
3. All details of login will be in front of your eyes.SIMPLE!!!!!!!
4. Thanks [2]http://www.technotips24x7.co.cc/
1. http://1.bp.blogspot.com/_z1QH8I3k9vk/SnVmaJ65imI/AAAAAAAAAgM/rONK0NTohz4/s1600-h/spying.jpg
2. http://www.technotips24x7.co.cc/
FREE UPGRADATION - ONLY A TRICK!!! (2009-08-02 15:50)
1. This trick comes for those who wish to upgrade their processors in the respective computers for
free.......(only the name) 2. Start -> run -> type regedit.exe -> press ok 3. In registry editor -> HKEY
105
LOCAL MACHINE\HARDWARE\DESCRIPTIONlashSystem\CentralProcessor\0 4. On right Pane Se-
lect ProcessorNameString and change the value to Pentium 5 or as you desire!! Note: For those PC bugs
only who just use the machine and dont worry of whats inside?Of course,they can be content with the
name they give....viz an old celeron be renamed to QUAD CORE......and so on!!!! 5. Thanks again to
[1]http://www.technotips24x7.co.cc/
1. http://www.technotips24x7.co.cc/
SSDs vs HDDs : WHO is GOOD? (2009-08-05 00:59)
1. O late few notebook manufacturers have been seen promoting their product for being the rst to
introduce SSDs. Now at the rst glance they really seem to be promising since they oer less energy
consumption, less weight, no mobile parts and also oer better speed in some ways than regular hard disk
drives. But the question is whether they are strong enough to deliver the performance through out their life
span. This puts a question mark????????????
2. If you have just bought a shiny new SSD, it isn`t likely to continue performing at blazing speeds after
some usage. An empty drive will always perform better than one written to. The good news is that after
an initial dip in performance, SSDs tend to level o. Even if they do drop in performance over time
undercutting a manufacturer`s claims consumer ash drives are still vastly faster than traditional hard
drives, because they can perform two to ve times the input/output operations per second of a hard drive.
Why does performance drop?
3. Unlike a hard disk drive, any write operation to an SSD requires not one step, but two: an erase followed
by the write. When an SSD is new, the NAND ash memory inside it has been pre-erased. But, as data
is written to the drive, data management algorithms in the controller begin to move that data around the
ash memory in an operation known as wear leveling. These algorithms are used to more evenly distribute
data across ash memory so that no one portion wears out faster than another, which prolongs the life of
whole drive. Even though wear-leveling is meant to prolong the life of the drive, it can eventually lead to
performance issues. SSD performance and endurance are related.
4. Generally, the poorer the performance of a drive, the shorter the lifespan. That`s because the management
overhead of an SSD is related to how many writes and erases take place. The more write/erase cycles there
are, the shorter the drive`s lifespan. Consumer-grade Multi-Level Cell (MLC) memory can sustain from
106
2,000 to 10,000 write cycles. Enterprise-class Single- Level Cell (SLC) memory can last through 10 times the
number of write cycles of an MLC-based drive.
What Matters ?
5. ALGORITHM : A read-modify-write algorithm in an SSD controller will take a block about to be written
to, retrieve any data already in it, mark the block for deletion, redistribute the old data, then lay down the
new data in the old block.
6. Some manufacturers use algorithms that combine writes to more eciently use NAND ash memory
space; others use cache to store writes in order to lay them down more eciently.
7. BUGS : Bugs Can Cause Slow-Downs, Too Intel`s X25-M SSD had a rmware bug that led to ma-
jor fragmentation problems that dropped throughput dramatically . But what`s clear is SSDs need more
development to address these long term performance issues.
8. Thanks PC WORLD!!!
Being BUSYYYYY (2009-08-15 10:05)
For last few days...have not been able to upload anything new since i have been busy with a real task on
hand......will get back soon....!!!
WiMAX - THE POWER (2009-08-27 22:29)
For so long ....may be about two weeks I have not been able to upload any posts on this blog...courtesy an
opportunity to slightly dig deep into WiMAX...and I am really happy to have nally got deeper into this.I got
to know about various Wireless Technologies and terms viz OFDM, MMDS, LMDS, Blue tooth,WiFi,EVDO,
the G family, HSPA, 802.16M, 802.20, Cable modem, broad band over power line, LTE, FTTH, spectrum
bands, base stations, CPEs, NOCs, EDGE,Gateways,Back haul links,Security aspects of WiMAX.....a lot of
learning...gr8888...will share brief on all these aspects in days to come....
2.9 September
Use KEYBOARD for MOUSE (2009-09-01 07:26)
1. This one is a small worth a look trick which you can use to impress anyone.This trick allows you to move
your mouse pointer using your keyboard ie Numeric keypad.
2. Press your left alt+shift+numlock in your keyboard to enable this feature.
3. Now press ok.
4. Use the keys 1, 2, 3, 4, 5, 6 7, 8, 9 of numeric keypad to move the mouse pointer.
5. To perform mouse click use the key 5
6. To perform double click use + sign.
7. To disable this feature click on NumLock.
8. Got this one from [1]http://informativetipz.blogspot.com/
1. http://informativetipz.blogspot.com/
107
http://www.emailtheweb.com (2009-09-01 07:42)
1. Now even this one comes as a handy tool when you expect your friend to click a link for access to a
webpage.Now your friend may not be able to access the webpage for reasons like site not working that time
or site been crushed by the twin menace of malicious spam and malicious web pages and your email is crying
to be heard.
2. Now who on earth is worried about that page that did not open except you.I know none...except you....since
it is you who wish your link to be clicked
Instead of holding your breath waiting for your recipients to visit the web links you email to them, send the
web to them with EmailTheWeb.com
E mail a Web Page : http://www.emailtheweb.com/ (2009-09-01 07:53)
1. This one also comes as a pretty handy tool when u expect your friends to open a web page by clicking the
link you had sent to them on e-mail.It may open....and it may not open....the thing is ensured and guaranteed
if u use the feature given at [1]http://www.emailtheweb.com/
2. A few advantages this will be able to ensure are :
- will saves your recipients time by not making them click a link to read your web page. For busy people,
this improves the likelihood that they will read the linked web page.
- All scripts and dynamic elements of a web page is stripped out. This protects your recipients from popups
and other annoying activity that may be malicious.
- Allows you to email a page to someone who doesnt have access to the the web page (either because the
page was dynamically generated or the page is password-protected.)
- Todays web is more dynamic than ever and web pages are changing all the time. By emailing the entire
web page, you ensure that your recipient is seeing the same web page as youeven if the original web page
is changed.
- Many people need to have a archive record of a web page and use.
3. I have tried the same and nd it pretty okay.....you need to have a new account or you can simply access
the same using your Google/Gmail account.
1. http://www.emailtheweb.com/faq.html
xB BROWSER (2009-09-04 23:34)
1. xB Browser is a free and open-source anonymous web browser in the world which is just a click away from
anonymous surng right now! With xB Browser you can securely and anonymously surf the internet, and
bypass rewalls and website censorship. 2. The main advantage compared to other anonymous web browsers
is that xB Browser requires no conguration or technical knowledge in order to achieve anonymity. xB
Browser is open-source so you can feel safe knowing what goes into our code. Additionally, it is even portable
on a USB stick . 3. xB Browser was previously known as Torpark. It does not store a cache on the user hard
drive, nor does it store cookies, so there is no mess to clean up with eraser programs. xB Browser also has
advanced features such as SSL MD5 RSA certicate vulnerability detection, DOM object and ash cookie
protection,cross-site scripting attack prevention, user-agent cloaking, and java proxy control. xB Browser
108
also detects and disables malicious browser addons that are hidden in the windows registry. 4. I recently
downloaded the same from http://download.cnet.com/windows/3055-2144 4-10660326.html?tag=pdl-redir
and I am really impressed with the same......the only thing I got perturbed was with the speed.Having ridden
on chrome for over a year...the speed is not a match.It is about 45 Mb in size...isnt that heavy...well any
way...CHROME rules still.
xB Browser - Makes you anonymous (2009-09-04 23:45)
1. xB Browser is a free and open-source anonymous web browser in the world which is just a click away from
anonymous surng right now! With xB Browser you can securely and anonymously surf the internet, and
bypass rewalls and website censorship.
2. The main advantage compared to other anonymous web browsers is that xB Browser requires no congu-
ration or technical knowledge in order to achieve anonymity. xB Browser is open-source so you can feel safe
knowing what goes into our code. Additionally, it is even portable on a USB stick .
3. xB Browser was previously known as Torpark. It does not store a cache on the user hard drive, nor does
it store cookies, so there is no mess to clean up with eraser programs. xB Browser also has advanced features
such as SSL MD5 RSA certicate vulnerability detection, DOM object and ash cookie protection,cross-site
scripting attack prevention, user-agent cloaking, and java proxy control. xB Browser also detects and disables
malicious browser addons that are hidden in the windows registry.
4. I recently downloaded the same from [1]http://download.cnet.com/windows/3055-2144 4-
10660326.html?tag=pdl-redir and I am really impressed with the same......the only thing I got perturbed
was with the speed.Having ridden on chrome for over a year...the speed is not a match.It is about 45 Mb in
size...isnt that heavy...well any way...CHROME rules still.
1. http://download.cnet.com/windows/3055-2144_4-10660326.html?tag=pdl-redir
INTEL vs THE SEVEN SAMURAIs (2009-09-11 22:36)
1. The old story of 'MUTTHI MEIN TAQAT has come up with a new version in the 21
st
century in the
form of SEVEN SAMURAI
2. Dysphoric with Intel`s dominance in the sector, the conglutination of processor designers and manufactur-
ers has teamed up to develop a revolutionary new microprocessor. The coalition is led by the recent merger
of NEC, Renesas , Hitachi, Toshiba, Fujitsu, Panasonic and Canon. Nickname for the group: THE SEVEN
109
SAMURAI
3. The new microprocessor will be based on innovative energy-saving software. The nal, commercial CPU
will run on solar cells; it will be smart enough to use only as much power as is needed for the data being
processed at the time; and it will remain switched on even during power cuts. A prototype is reported to be
running at 30 percent of the power of current CPUs and remains ON even when mains power is cut. This
new standard, along with the CPU is likely to be introduced in 2012.
4. Come on ..come on brains of the world.ght more with each other for consumers like us who wish to
get the best!!!!!!!!!!!
5. Thanks [1]www.thinkdigit.com and [2]http://www.osnews.com
1. http://www.thinkdigit.com/
2. http://www.osnews.com/
SATA 1.0 vs SATA 2.0 vs SATA 3.0 : The hunger for speed (2009-09-11 22:49)
1. Today technology runs faster then u blink. Today when someone has not even come to terms from
IDE TO SATA 1.0 and when mostly have not even heard of SATA 2.0,in comes with a bigul siren SATA
3.0.YESSSSS!!!!with a whooping 6 Gb/Sec, and a range of new features for bandwidth intensive users, a much
rapider future lies ahead. SATA 3 is bound to increase the interface speed but to fully realize its potential
110
the viscera of a hard drive need to get quicker.
2. SATA 3 introduces changes including a new Native Command Queuing (NCQ) streaming command to
enable isochronous data transfers for bandwidth-hungry audio and video applications, better power man-
agement, and the connection mechanism for compact devices with connectors designed for the smaller 7mm
optical drives in laptops and a Low Insertion Force connector for 1.8-inch drives.
3. Thanks Digit again!!!!
PRINT A BATTERY : PRINTABLE BATTERY (2009-09-11 23:22)
1. Before I get into the meaning lemme tell you that this is again astonishing discovery.you can take a print
out of something as shown in gure and use it as a battery..I mean as a source of power.....read ahead to
nd out.
2. A new type of low-power battery that does not require a case and is thin enough to be printed on paper
is all set to venture on ur laps and desktop tables.The power source relies on an undisclosed mixture of
chemicals to produce 20 milliamp-hours at a terminal voltage of 1.5 volts for every square centimetre that is
printed. The battery material is roughly 0.5 millimetres thick and would, if mass-produced, cost just a few
cents per square inch, according to Israeli-based company Power Paper.
3. The subject battery has been developed by a team led by Prof. Dr. Reinhard Baumann of the Fraunhofer
Research Institution for Electronic Nano Systems.
111
4. As this is a printable battery so the characteristics of this battery dier signicantly from those of
conventional batteries. As the name suggest it must have very less weight.It weighs less than one gram on
the scales, is not even one millimeter thick and can therefore be integrated into bank cards.Its voltage is 1.5
V, which is general.The battery weighs less than one gram on the scales, is not even one millimeter thick
and can therefore be integrated into bank cards, for example. The battery contains no mercury and is in
this respect environmentally friendly. Its voltage is 1.5 V, which lies within the normal range. By placing
several batteries in a row, voltages of 3 V, 4.5 V and 6 V can also be achieved.
5. It is composed of dierent layers: a zinc anode and a manganese cathode, among others. Zinc and
manganese react with one another and produce electricity. However, the anode and the cathode layer
dissipate gradually during this chemical process. Therefore, the battery is suitable for applications which
have a limited life span or a limited power requirement, for instance greeting cards
6. The new battery consists of three dierent layers. It has conventional zinc manganese-dioxide components
as anode and cathode. Sandwiched in between, the cells chemical power source remains a closely guarded
secret.
7. Paper Power claims the material is non-toxic and non-corrosive, making the battery safe to use without
casing.Technically it will work like any other battery, but you can cut the battery into any size and shape
for your product.
8. Thanks www.newscientist.com,Digit.
HOW IS UR FAVORITE USB MADE? (2009-09-11 23:40)
WORTH A DEKKKO
[EMBED]
EXTERNAL DRIVES : ARE THEY REALLY FAST? (2009-09-21 19:38)
1. When one goes for buying a external hard disk,how important is for him/her to give due importance to
speed that is mentioned as spec....like 7200 rpm and 5400 rpm?Does it really matter in this case?
2. Well not much and as a matter of fact the dierence is ZERO = NULL = NIL.The faster the hard
drive ,the better : this generally stands true for the internal drives that remain connected to IDE/SATA.In
most of the cases pertaining to external drives the interface of connectivity is none other then USB which
is signicantly slower equated to SATA/eSATA/IDE on any day.USB drives at the most support a transfer
speed of 33-37 MB/s...and thats all...whether u connect a 5400 rpm or a 7200 rpm..
SUBMARINE COMMUNICATIONS : IT HAS BEEN TOUGH (2009-09-21 21:33)
1. Ever wondered how the internet and communications right from telgraph days has been working across
the globe?Everi one knows the technology behind these terms...but ever wondered how the same has been
estabilished.I will not dig deep...the pictures below will make it amply clear...one pic shows the layout of
submarine wires in the year 1901 and the other shows the OFC layout in the year 2005.......it would have
112
taken amazing human eort.....salutes to the manpower that had been behind all the tough work.....HATS
OFFFFFFF!!!!!!!!
[1]
2. Wanna get some light on the cost aspects? Cables with 10Gbps bandwidth were laid at a cost of $27000
per KM...thats right...per KM.....now do the calculations for the approx length.......
1. http://2.bp.blogspot.com/_z1QH8I3k9vk/Sreky6X9cjI/AAAAAAAAAhc/Yz0tm8wOt8c/s1600-h/cabe1gif
113
LIGHT PEAK TECHNOLOGY : INTEL (2009-09-24 16:17)
[1]
1. Your internet connection at home and oce would be happy biting at 10 or 100 Mbps, how about being
able to get upgraded to 100Gbps over the decade! yes...INTEL has thrown some light on this vide the new
Light Peak technology that uses light instead of electric signals to transmit data, meaning faster speeds,
smaller cables, and less signal loss. The subject technology is already in use in data-centers, but has not
been able to gate crash into mainstream computing yet.
2. In the coming year Intel plans to release this technology for use in consumer devices and mainstream
computing, for the rst time giving people the taste of transfer speeds up to 10Gbps. Light Peak is the
code-name for a new high-speed optical cable technology designed to connect electronic devices to each other
while allowing high bandwidth starting at 10Gb/s with the potential ability to scale to 100Gb/s over the
next decade.
114
3. Light Peak consists of a controller chip and an optical module that would be included in platforms
supporting this technology. The optical module performs the conversion from electricity to light and vice
versa, using miniature lasers and photo detectors.
4. Since this as optical technology, multiplexing multiple connections over a single cable will be much simpler,
and thus a single cable cold be used to connect your computer to multiple peripherals, workstations, displays,
disk drives, docking stations, and more.
5. Light Peak is designed to be cheap, and in fact claims to be smaller and cheaper than current telecom
modules. The Light Peak optical modules are up to 120 times smaller and up to 30 times cheaper than
current telecom modules! The optical bres used in it are in fact nearly as thin as human hair, and use
LASER chips called VCSEL (Vertical Cavity, Surface Emmiting LASER) which are a mere 250 microns by
250 microns.
6. Comeeeeeeeeee ON....what r we heading for in next 50 years....our generation is the lucky one to see all this
quick transition from les,postman to emails and Light peak transfer rate.No other generation other then the
present one would see this dierence....kids today are born without seeing a postman in their galiiiii....born
with computers and laptops in hands of ma and pa..
7. Thanks DIGIT & www.engadget.com
1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SrtO_MTGlsI/AAAAAAAAAiE/G1urBll-3JI/s1600-h/DELETE.jpg
MORRO : THE MICROSOFT SIDE OF ANTIVIRUS (2009-09-24 22:29)
1. Impregnable news is coming in that Microsoft is ready to launch its free anti-virus software called Morro for
personal computers. This is a huge competition in making for security software leaders like Symantec Norton
Antivirus and McAfee Anitvirus software.To address the growing need for a PC security solution tailored to
the demands of emerging markets, smaller PC form factors and rapid increases in the incidence of malware,
Microsoft Corp. plans to oer this to the new consumer security oering focused on core anti-malware
protection.
2. Code-named 'Morro, this streamlined solution will be available in the last quarter of 2009 and is likely
to allow comprehensive security from malware including viruses, spyware, rootkits and trojans.
3. The surprising news is that Microsoft isnt bundling Morro with Windows.Currently in beta testing, it
was available for download to the rst 75,000 people in the United States, Israel, Peoples Republic of China
and Brazil.
115
4. Morro will take advantage of the same core anti-malware technology that fuels the company`s current line
of security products, which have received the VB100 award from Virus Bulletin, Checkmark Certication
from West Coast Labs and certication from the International Computer Security Association Labs.
5. 'Morro will be available as a stand-alone download and oer malware protection for the Windows XP,
Windows Vista and Windows 7 operating systems. When used in conjunction with the ongoing security and
privacy enhancements of Windows and Internet Explorer, this new solution will oer consumers a robust,
no-cost security solution to help protect against the majority of online threats.
6. Microsoft in an open source mooood!!!!!!!!!!
SECURITY ESSENTIALS : NO MORE MORRO (2009-09-30 20:22)
1. So it has been launched nally after a long wait...a few debates...a few hues and a not so lots of pub-
licity....the microsoft antivirus SECURITY ESSENTIALS. I downloaded it today and saw thats it is veri
light at least as on date and has been able to capture the regular worms and malwares that were present in
my desktop.
116
2. One problem for most of the Hindustanis......it only works on genuine microsoft windows....since prior
to installation it checks if you have a genuine windows...if NOT ..then it comes out in between installation
without procedding ahead....
DUAL SCREEN CAMERA : SAMSUNG ST 550 & ST 500 (2009-09-30 20:34)
1. Earlier I had discussed about one dual screen laptop....then we all know about big touch screens on mobiles
in so many versions,shapes and sizes.Ever wondered what purpose would a dual screen serve in a typical
digital camera.Just scroll down and see the pics to get the concept...i am sure u will appreciate it!!!!
[1]
117
2. Delivering an unrivalled user experience, the 1.5 inch LCD screen located on the front of the camera now
allows consumers to take rst-rate photos by themselves in addition to the one who is busy clicking.
[2]
3. Thanks [3]http://www.samsung.com/sg/news/newsPreviewRead.do?news seq=14419
1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SsN00-xTIGI/AAAAAAAAAik/OTd19KeClBg/s1600-h/samsung-st500-st550.jpg
2. http://4.bp.blogspot.com/_z1QH8I3k9vk/SsN0vdw9MpI/AAAAAAAAAic/1mg5FbWH0Dc/s1600-h/main_M.jpg
3. http://www.samsung.com/sg/news/newsPreviewRead.do?news_seq=14419
THE FUTURE OF OSs : MICROSOFT VERSION (2009-09-30 22:08)
1. Microsofts involvement in playing a key role in the eld of future operating systems can be gauged from
the fact deciphered below in successive paragraphs.
2. So when Microsoft tries working on the futuristic versions of operating systems...the sur-
prise is that windows does not come in the discussion....windows is out...yessss!!!it is terms like
MIDORI,SINGULARITY,BARRELFISH,HELEOS.....the names must be sounding french to people like
me....just read ahead!!!
MIDORI
3. Midori based on their Singularity operating system research project is an experimental operating system,
in which all code, even device drivers, and the kernel itself are written in managed code, making the operating
system much safer. The operating system also has a large focus on concurrency.Midori is in incubation, which
means it is a little closer to market than most Microsoft Research projects, but not yet close enough to be
available in any kind of early preview form to users.
BARRELFISH
4. Barrelsh, an OS written specically for multicore environments. It hopes to improve the performance of
boxes with such chips by creating a network bus and calls itself a multi-kernel operating system. Its focus is on
leveraging the increasing number of cores in desktop processors. The mainstream operating systems today,
Windows, and Linux, have both been designed for single-core computers, with multi-processing support
added on later.
5. The Barrelsh project instead tries to redene the entire operating system keeping in mind that multi-core
is here is stay. Today we have dual-core, quad-core, and even hexa-core, but given a decade, we may be
118
looking at hecto-, kilo-, or even mega-core computers! These will require a rethinking of the very organization
of the operating system.
6. Barrlesh does just that. It treats the multi-core processor environment as a collection of networked
processor cores, and applies the concepts used with distributed computing to manage the execution of the
computers processes. This has the eect of making the system much more scalable. An interesting part of
this approach is also
that the processor cores need not be homogeneous! The multiple kernels could all be running on processors
of dierent architectures, one kernel might be executing on an ARM, while another on a x86, and a third on
a GPU!
HELEOS
7. Heleos, another research OS in MS labs and their latest revelation, takes the concept of heterogeneous
multiprocessing further, and introduces satellite kernels.It explains that current operating systems are
designed with a homogeneous running environments in mind. For this reason, an operating system is written
for either an IA64, or an x86, or a PPC, or an ARM platform, however it cannot leverage all of them.
Our computers however are no longer homogeneous. We have CPUs and GPUs of dierent architectures,
each with multiple cores. The GPU is highly optimized for a vector processing, and has an architecture
which vastly diers from that of the CPU, with a completely dierent instruction set and performance
characteristics.
8. The Helios project introduces satellite kernels, which essentially presents the developers with a sin-
gle,uniform set of OS abstractions across CPUs of disparate architectures and performance characteristics.
This satellite kernel is a micro-kernel, and runs all other services and drivers in individual processes.
9. With Singularity and Barrelsh both available as open source releases, it seems Microsoft might just be
headed for a more open future.
10. Thanks DIGIT and Microsoft for the updates.
2.10 October
RADIATION EFFECTS & UR MOBILE - QUANTIFIED (2009-10-01 20:22)
1. We all hear about how the radiations emitted from our mobiles keep eecting us on the wrong side..but
what are the specications laid down for quantication of these eecting variables? What are these variables
?How much do they eect us? Do separate mobile handsets eect us in dierent ways?Are their any safe
limits in these? What are the available standards?
2. The rst and the most signicant variable is the Specic absorption rate (SAR) , a measure of the rate
at which energy is absorbed by the body when exposed to a [1]radio frequency (RF) electromagnetic eld.
It is dened as the power absorbed per mass of tissue and has units of watts per kilogram. SAR is usually
averaged either over the whole body, or over a small sample volume (typically 1 g or 10 g of tissue). The
value cited is then the maximum level measured in the body part studied over the stated volume or mass.
119
3. SAR is used to measure exposure to elds between 100 kHz and 10 GHz. It is commonly used to measure
power absorbed from mobile phones and during MRI scans. Few specications of good and bad mobiles as
found rated from TOI site at their INFOTECH tab are shown below with details :
SAMSUNG IMPRESSION : GOOD
Maximum radiation: 0.35 Watts per kilogram (W/kg) (based on reported radiation level when held up to
your ear)
SAR when held at the ear: 0.35 W/kg
SAR when worn on the body: 0.83 W/kg
MOTOROLA RAZR V8 : GOOD
Maximum radiation: 0.36 W/kg
SAR when held at the ear: 0.36 W/kg
SAR when worn on the body: 0.86 W/kg
SAMSUNG SGH-T229 : GOOD
Maximum radiation: 0.38 W/kg
SAR when held at the ear: 0.38 W/kg
SAR when worn on the body: 0.69 W/kg
MOTOROLA MOTO VU204 : WORST
Maximum radiation: 1.55 W/kg
SAR when held at the ear: 1.55 W/kg
SAR when worn on the body: 0.58 W/kg
BLACKBERRY CURVE 8330 : WORST
Maximum radiation: 1.54 W/kg
SAR when held at the ear 1.54 W/kg
SAR when worn on the body 0.99 W/kg
4. United States: The [2]FCC requires that phones sold have a [3]SAR level at or below 1.6 watts per
kilogram (W/kg) taken over a volume of 10 gram of tissue while European Union specify SAR limits within
2 Watts/kg taken over a volume of 10 gram
120
5. So next times some one asks you or even mentions about radiation eect of mobiles on health..just make
the aspect more clear of weather of not his/her mobiles in meeting the S.A.R norms or not?
6. Thanks Wiki,Tech gadgets and TOI.
1. http://en.wikipedia.org/wiki/Radio_frequency
2. http://www.fcc.gov/
3. http://www.mmfai.org/public/sar.cfm
MY WINDOWS 7 HOUSE PARTY PACK : THANK YOU MICROSOFT
(2009-10-05 20:44)
1. Two months back I had registered to host a house party on the occasion of launch of WINDOWS 7 ...the
next generation windows OS after answering a few FAQs on Windows 7 without realising that I would end
up as a winner of the signature edition of the house party pack including the original Windows 7.I got the
conrmation from microsoft two weeks back......still then I had thought of it being some spam mail....till I got
the tracker ID from DHL....so since last two weeks have been waiting to get that pack of Windows 7....and
nally today I got the pack today......and it looks like this .......grrrrrrrrrrrrrrrrrr8...thanks Microsoft for the
dabba.....so happy to use a genuine edition of a Windows OS for the rst time!!!!!ha ha ha!!!!that to on my
name direct from the US of A.
121
122
[1]
123
[2]
[3]
1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SsoSMp-NiRI/AAAAAAAAAjk/xCrI-dQ80jI/s1600-h/DSC09473.JPG
2. http://2.bp.blogspot.com/_z1QH8I3k9vk/SsoQecREbtI/AAAAAAAAAi8/6icVWjYYSAM/s1600-h/DSC09483.JPG
3. http://3.bp.blogspot.com/_z1QH8I3k9vk/SsoQdwFTsCI/AAAAAAAAAi0/YxSsb8AjJBk/s1600-h/DSC09484.JPG
anand (2009-10-06 06:55:19)
congrat.
Amsang (2009-10-07 23:37:08)
in the rst photo who is the one on the left
124
NIKON S1000PJ : DIGITAL CAMERA WITH INBUILT PROJECTOR
(2009-10-06 20:32)
1. The thing that was till now thought of as futuristic has nally arrived...and that too at a reasonable and
worthy price....the title says it all...DIGITAL CAMERA with a inbuilt PROJECTOR.
2. The rst one to attempt this and allowing the consumers to exploit this is NIKON...vide model NIKON
S1000PJ as shown in pic and video below.
[EMBED]
IEDig.com (2009-10-18 12:26:27)
I would like to invite you to join blogging Social Networking
[1]IEDig.com
which helps you to get more visitors to your blogs and you get the chance
to meet other celebrity bloggers.
[2]Join IEDig.com
1. http://iedig.com/
2. http://iedig.com/
1 MBPS BROAD BAND CONNECTION : HUMAN RIGHT IN FINLAND
(2009-10-18 22:12)
1. If there was any further proof needed of how much the Internet is aecting human lives and can help
enrich it, just look towards Finland. The country has become the rst in the world to make broadband
Internet access a human right, making us consider whether we should move there or not.
2. The Ministry of Transport and Communications has stated that starting next July, every person in
Finland will have the right to a one-megabit broadband connection. That`s right, 1Mbps. And here in India,
we start jumping around when the same is oered for upwards of Rs. 1,500.
3. The biggest kicker, though, is that in another six years, the Finnish government wants to make 100Mbps
speeds the mandatory minimum for all its 5.5 million citizens. Granted, that`s a small population, but it
still throws a poor light on almost all other governments across the world.
4. And yes, some variations of the above will be allowed if connectivity can be managed on mobile phone
networks.
125
5. It`s unfair to compare India to Finland, given the gross discrepancies, but doesn`t this make your blood
boil? There`s hardly any broadband penetration in India, Internet speeds are a joke and let`s not even get
started on 3G.
6. Thanks Indiatimes.com for the info
KINDLE : WELCOME TO INDIA (2009-10-25 20:34)
1. Kindle has nally reached the shores of Hindustan.For those of you,who are puzzled of what KINDLE is
all about what be able to judge a fair idea from the pics below.An e book storage and reading device.
2. Capable of wirelessly downloading books, magazines, newspapers and personal documents ,the Kin-
dle screen has no backlight, so it doesnt give
out the glare a normal screen would. The navigation is fairly simple and all the text content is custom
formatted.
3. The device features a 2,50,000 word dictionary that can be accessed independently to look
up a word, or from within text. It can also play MP3 but the quality of sound takes rating
this on the back foot.The battery life that comes due to the electronic ink display. On a single
charge it can last up to two weeks without the wireless network on. And 2-4 days with wireless!
126
4. Indian users can avail of a catalogue of 2,80,000 books, each downloaded in about a minute over 3G GSM
or EDGE. There are no data charges for downloading a book, the service for which is provided globally by
AT &T and its international partners.
5. Kindle is weighs around 290 grams, almost the weight of advanced mobile phones. The display specica-
tions include 6' diagonal E-Ink electronic paper display, 600 x 800 pixel resolution at 167 ppi, 16-level gray
scale. The Kindle oers 2Gb of Memory Storage though 1.4Gb would be available to the user and they dont
have to connect it to a PC if they need to transfer ebooks because it has inbuilt 3G connectivity & Wi-Fi
connectivity.
6. However, the Kindle does not have any sort of content ltration or rating system, so there is the risk of
mature content being easily accessible to minors. So, will the Kindle tinkle in India? Well a few things go
against it. First is the price tag .sources put it at about Rs 20,000/-.
7. Thanks www.thinkdigit.com and www.amitbhawani.com for info.
127
RDM : Rival for BLU RAY? (2009-10-25 22:09)
1. Even before Blu ray products have been able to reach the consumer,a new rival by the name of RDM(...in
short for Royal Digital Media) has come out with HD VMD(Versatile Multilayer Disc) and CH-DVD(China
Blue High-denition Disc) all set to tittupp into town to challange BLU Ray. Royal Digital Media has
introduced its bona de Blu-ray rival... while casually forgetting to name it. These high-denition discs
will be able to store up to 100GB and will boast military-grade encryption. RDMs format will transform
perceptions of high-denition, as it is able to display the next generation of high-denition: 1920p.
2. DreamStream is the rst company to implement a 2,048-bit encryption in consumer media. AES encryp-
tion, used in Sonys Blu-ray discs, relies on only a 128-bit system.
3. For consumers, RDMs increase in storage capacity allows for a single disc to hold approximately four
hours of video content at 1920p resolution.
4. Because RDMs system is based on inexpensive red laser technology, their players are expected to sell for
much less than Sonys, which routinely sell for hundreds of dollars. The retail prices for RDMs players and
discs are expected to equal those of the traditional DVD format, greatly undercutting Blu-ray, .
5. RDMs technology can be implemented into existing DVD production processes through the integration
of a proprietary software and rmware system. The only potential hardware modication is, at most, the
simple replacement of a single chip, said Levich. As such, existing DVD manufacturers will be able to
integrate RDMs technology with only minor modications to their production processes.
6. RDMs players are backwards compatible and able to read traditional CDs and DVDs. Moreover, an
innovation in data processing enables RDMs players to drastically enhance the playback quality of regular
DVD content, said Diebel.
7. The incorporation of DreamStreams encryption into RDMs system will thwart the piracy of digital
content. The content of RDMs discs will only be able to be read by RDMs players. Thus, ensuring that the
content cannot be copied and illegally distributed. Will it really?....so many claims till date on such issues
have been found cracked a day after launch.well for now ALL THE BEST for the new BLU ray rival.
128
8. Thanks http://dreamstream.info
D-ROLL : No end to imagination (2009-10-26 21:23)
The tashan of modern gadgets which apart from being fashionable are getting smaller, slimmer ,sleaker and
smarter day by day . And the latest creation to catch eye is 'D-roll or 'digital roll, the new device works
like a regular laptop, but rolls up to be a side bag or even a backpack for easy transportation. Designed like
an artist`s tube, the D-roll Laptop features a roll up OLED screen and a slide out keyboard, together with
a mouse and a detachable webcam that can be worn on your wrist when not attached to the system. The
mouse and web camera can also be used as the end caps for the laptop case, while the straps double as ports
to plug in your USB devices.
[1]
[2]
129
[3]
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/SuXHK-v40eI/AAAAAAAAAk8/8l_skURoK-E/s1600-h/d-roll_xuWzl_58.jpg
2. http://2.bp.blogspot.com/_z1QH8I3k9vk/SuXHKYGl19I/AAAAAAAAAk0/rpMl978UGCE/s1600-h/d-roll-laptop-concept-1_
BeZyG_17621.jpg
3. http://3.bp.blogspot.com/_z1QH8I3k9vk/SuXHJwFMktI/AAAAAAAAAks/oiMCDBViq5k/s1600-h/d-roll-laptop-concept-2_
UZnCt_17621.jpg
2.11 November
Green Dam Youth Escort : Whats that? (2009-11-06 06:25)
1. The title suggests that it has got something to do with college unions doing thier bit contribution in saving
some water or ghting over some water dam issue.But its nothing like that.It is the name of a rewall which
is a rst of its kind ocial government imposed content-control software developed in the Peoples Republic
of China (PRC). Under a directive from the Ministry of Industry and Information Technology (MIIT) , it is
mandatory to have either the software, or its setup les accompanied on a compact disc or pre-installed on
all new personal computers sold in mainland China, including those imported from abroad.
2. The rewall software is to be made a mandatory pre-requisite for new computers sold in the country,
as a meaure to help stamp out pornography and other vile elements on the Web. The move thus has been
widely criticised by industry groups and ocials as rash, politically intrusive, technically ineective and
commercially unfair.Few of the features of the software are enumerated below :
Designed to work with Microsoft Windows operating systems,the software is specically aimed at
restricting online pornography but could be used for other purposes.
Green Dam Youth Escort automatically downloads the latest updates of a list of prohibited sites from
an online database, and also collects private user data.
130
Green Dam recognizes pornographic images by analyzing skin-coloured regions, complemented by hu-
man face recognition. The software is incapable of recognizing pictures of nudity featuring black- or
red-skinned characters but sensitive enough to images with large patches of yellow that it censors
promotional images of the lm Gareld: A Tail of Two Kitties.
The softwares misrecognition of inappropriate contents in applications including Microsoft Word can
lead it to forcefully close those applications without notifying the user, and so cause data losses.
The software runs only on Microsoft Windows x86, so Microsoft Windows x86-64, Mac and Linux users
are ignored. Even on Microsoft Windows, the software is known to interfere with Internet Explorer
and Google Chrome, and is incompatible with Mozilla Firefox.
Some computers sold in China already come with parental-control software, but it isnt government-
mandated.
3. The latest good news for the chinese people is that for the time being the compulory shipping and
installation by the user has been put on hold.
4. Thanks http://www.circleid.com and o course wiki like always!!!!
LAPTOP Face Recognition falls FLAT!!!! (2009-11-26 08:00)
1. Now this is one interesting thing to read.All those claims by Saif Ali Khan in his ad promoting one company
for face recognition feature introduction had made its way out of the IT World.....well....so it seems!!!!read
ON.........
2. Experts from Bkis Internet Security in Vietnam have proven how easy it is to defeat this.In front of
technology experts, authors and press representatives from dierent countries participating in an internet
security conference, Bkis experts demonstrated the vulnerabilities in Face recognition function on Asus,
Lenovo and Toshiba laptops. Even when set at the highest security level, the laptop could not prevent Bkis
expert Mr Nguyen Minh Duc from breaking into the system. With some technical tricks, Duc in turn logged
onto Asus, Lenovo and Toshiba computer at the amazement and continuous applause from the audience.
Everyone was really surprised to see how a famous and trusted security technique could be broken so easily.A
Pic is shown below from actual demo loc.In some cases,even the owners of Facebook prole photo could be
printed and used.
131
3. What the researchers found is that the technology just isnt that hard to fool. Even photographs that
have previously been digitized and distributed, like those on Web pages or transmitted through videophone
conversations, will do the job.The model exploits the aw in image processing. In other words, it uses a
photo of a person instead of his/her real face. It works because the algorithms will process in eect digital
information.Provided those conditions, an attacker might take some photos of one user within the system,
perform some image editing, regenerate 'special pictures and penetrate into the system. 4. Now the worry
point is that Biometric data, including facial recognition, is increasingly being built into passports, drivers
licenses and other forms of ID. [1]Australia and Germany both use facial recognition to control access and
determine identity at border crossings, and the [2]U.S. and other countries are moving in that direction.
So....ab kya hogaaaa? 5. Thanks http://www.examiner.com,http://www.bkis.com and Chip magazine.
1. http://en.wikipedia.org/wiki/SmartGate
2. http://aero-defense.ihs.com/news/2008/nist-facial-recognition-120308.htm
Darin (2009-11-30 20:25:30)
Certainly the tested implementations of facial recognition have their issues and its good to know about them. Thats
a far cry, however, from saying that ALL implementations have the same weaknesses. Theres a very strong version
from Sensible Vision/Dell Computers, for example (NOT evaluated by the researchers...interesting), that not only
has very strong photo resistance, but also a very straight forward second factor feature that all but resolves the issue
entirely.
It also takes a bigger picture look at security by locking the desktop automatically when you walk away...a wide open
desktop being a much bigger threat than a brute force photo attack since hacking an already open machine doesnt
require any skill, eort or time at all...just physical proximity!
Of course no solution is perfect or ever will be. Given enough time and physical access, absolutely any security can
by bypassed. Its really a matter of picking the right tools to make this as dicult as possible given the threats likely
to be faced while still keeping the computer easy (or at least not too much more dicult) to use in the process.
Full disclosure - I have worked for Sensible Vision for quite some time now. Weve successfully used this technology
for several years already to protect security critical PCs in hospitals, banks - even a maximum security prison. The
new consumer Dell platform is based on the same technology.
Here is a link to our online response to this testing. http://www.sensiblevision.com/company/releases/2-24-09.htm
ANUPAM (2009-12-01 10:33:33)
thanks for the invaluable comments darin
2.12 December
Google Binged!!!! - My 100th Post (2009-12-13 01:00)
1. For so many days wanting to upload some post but just couldnt nd anthing so interesting before I read
about this.
2. From the time Bing was introduced and pitted against arch rival Google,there have been talks and forums
across proving each others superiority over each other.Now for the rst time some one Big has come up with
this.....it follows down..please read!!!
3. A Mozilla ocial today advised Firefox users to the extension that adds Microsofts Bing to the list of
the browsers search engines after Googles CEO downplayed consumers privacy concerns.
4. Citing a clip from a CNBC broadcast shown below, during which Google chief executive Eric Schmidt
discussed online privacy, During the interview, Google chief executive Eric Schmidt was asked: People are
132
treating Google like their most trusted friend...should they be? It was Schmidts answer that motivated
Dotzler to show users how to drop Google, Firefoxs default search engine, for rival Bing.
IF YOU HAVE SOMETHING THAT YOU DONT WANT ANYONE TO KNOW, MAYBE YOU
SHOULDNT BE DOING IT IN THE FIRST PLACE,SCHMIDT TOLD CNBC. IF YOU REALLY NEED
THAT KIND OF PRIVACY, THE REALITY IS THAT SEARCH ENGINES, INCLUDING GOOGLE, DO
RETAIN THIS INFORMATION FOR SOME TIME AND ITS IMPORTANT, FOR EXAMPLE, THAT
WE ARE ALL SUBJECT IN THE UNITED STATES TO THE PATRIOT ACT AND IT IS POSSIBLE
THAT ALL THAT INFORMATION COULD BE MADE AVAILABLE TO THE AUTHORITIES,ADDED
SCHMIDT.
[EMBED]
5. Asa Dotzler, Mozillas director of community development, then on provided a link to the Firefox extension
that adds Bing to Firefoxs search engine list.
6. Google chief executive Eric Schmidt would be now trying to undo his statement in some form but the
arrow has been shot..and the dent on the google is seen..so googler`s Be ware now on!!!!!!
7. Thanks http://www.computerworld.com
Y2K Bug!!!!Do u remember the time? (2009-12-28 22:12)
1. I was just wondering about the time when the much-hyped Y2K crisis had come in with a long, sustained
roar and went out with a mewl.While the world excogitated dire predictions of massive global infrastructure
failures everything from elevators to air trac control systems was rumored to be vulnerable , the specter
of a total paralysis of business operations resulting from cascading Y2K failures galvanized organizations
into a frenzy of activity. For many CIOs, the unprecedented size and scope of addressing Y2K problems was
the biggest project of their careers.
And then it was over. On Dec. 31, 1999, the world held its breath and nothing happened. Jan. 1, 2000
came in just like any other day. There were no major failures to report anywhere.
2. Today after 10 years....I feel the time has just rolled like a ball....so quickly we are a decade ahead of that
night....the night that was a wakeup call for every one who felt that there is no need of IT then....the night
that showed how heavily we r banked on the IT......
3. Thanks to http://www.computerworld.com for making me remember that.
BIDI makes LCD touchscreen A PASSE past (2009-12-30 07:49)
1. This is denitely going to be some thing new for most of the readers.....the following article makes the
present touchscreen a PASSEE by introducing the BIDI.
2. The BiDi Screen is an example of a new type of I/O device that possesses the ability to both capture images
and display them. This thin, bidirectional screen extends the latest trend in LCD devices, which has seen the
incorporation of photo-diodes into every display pixel. Using a novel optical masking technique developed at
the Media Lab, the BiDi Screen can capture lighteld-like quantities, unlocking a wide array of applications
from 3-D gesture interaction with CE devices, to seamless video communication.The BiDi Screen uses a sen-
sor layer, separated by a small distance from a normal LCD display. A mask image is displayed on the LCD.
When the bare sensor layer views the world through the mask, information about the distance to objects in
133
front of the screen can be captured and decoded by a computer. 3. This allows a typical LCD screen working
by interpreting hand gestures, without touching the screen.This allows viewers to control on-screen objects by
waving their arms in the air without touching the screen, let alone a mouse or keyboard.Although users can
touch the screen to activate controls on the display but as soon as they lift their nger o the screen, the sys-
tem can interpret their gestures in the 3-D.
4. This is a level of interaction that nobodys ever been able to do before, New Scientist quoted Ramesh
Raskar at the Massachusetts Institute of Technology Media Lab, as saying.The screen - dubbed BiDi, short
for bi-directional - allows users to manipulate or interact with objects on the screen in three dimensions.
5. It will also function as a 3D scanner, he adds. If you spin an object in front of screen, the software
will stitch together a 3D image.The new system uses an array of optical sensors that are arranged behind
a grid of liquid crystals, similar to those used in LCD displays. They physically control how much light
passes from the displays backlight.In the new system a regular grid of hundreds of pixels spread across the
screen use their liquid crystals to create a tiny hole that acts as a pinhole camera lens, focusing an image
of the scene in front onto a thin translucent lm a few centimetres behind the LCD. 6. Those images are
detected by a camera inside BiDi, allowing the device to know what is happening before it. 7. Thanks
http://infotech.indiatimes.com and http://web.media.mit.edu/ mhirsch/bidi/
134
Chapter 3
2010
3.1 January
2010 (2010-01-01 06:38)
This number is not to be connected with any Microprocessor or any IT equipment......this comes to wish you
all a VERI
HAPPY NEW YEAR 2010
HP in the racists scoooop!!! (2010-01-08 06:34)
1. Phenominal is the pace at which the IT Sector is growing and Interesting are the ways in which few errors
happen one of which I am mentioning down.....
2. The issue has attracted worldwide attention this month, when a US Black man known as Black Desi
posted a YouTube video that showed his HP webcam built in to its new computers refusing to track his face
but on the other hand it could do so just ne for his white friend Wanda.Titled HP computers are racist,
the YouTube video quickly attracted more then 500,000 hits and showed Black Desis webcam working as it
should when his work colleague White Wanda stepped in front of the camera, but when Black Desi got
in front, no face recognition took place.
[EMBED]
3. What does HP have to say about it?
We thank Desi, and the people who have seen and commented on his video, for bringing this subject to our
attention, it said in a blog on its help page.
The technology we use is built on standard algorithms that measure the dierence in intensity of contrast
between the eyes and the upper cheek and nose. We believe that the camera might have diculty seeing
contrast in conditions where there is insucient foreground lighting, the blog added.
4. So what would have happened is like this !!!!!HP would have conducted all QC tests in their labs which
in all probablity would have involved only the whites......HP by now mut have enrolled few Blacks for better
QC of their products in their labs......well that was just in good humour....
135
5. To errrrrr is human.....and to IT errrrr is HP.
DUAL SCREEN LAPTOP : Another attempt by (2010-01-08 07:25)
Charge cell phones by using Radio-Waves (2010-01-10 10:44)
1. Here comes another rst from NOKIA...no more charging from your mobile chargers...no more that last
minute search to nd that hidden mobile charger....now charge from a mixture of 78.03 % nitrogen, 20.99 %
oxygen, 0.94 % argon, 0.03 % carbon dioxide, 0.01 % hydrogen, 0.00123 % Neon, 0.0004 % helium, 0.00005
% krypton, 0.000006 % xenon or more simply AIR!!!!!!
2. Nokia says that in a few years time, they will be able to charge cell phones by utilizing close radio waves.
This conniving and shaking up technology could lead to brobdingnagian reductions in energy demand if
every cell phone could pull a charge of juice out of thin air.
3. Researchers at the Nokia Research Centre in Cambridge in the UK are working hard on a technology that
can harvest small amounts of energy from ambient radio and TV waves. The cell phone would pick up radio
wave frequencies as low as 500 megahertz up to 10 gigahertz, which includes television broadcasts, microwave
ovens, mobile phones, wireless LAN, bluetooth, GPS, and two-way radios. In theory, two circuits would be
capable of receiving and then converting the free energy to an electrical current to charge the battery of a
cell phone.
4. Hopefully, it would be enough energy to keep the phone charged in standby mode; although at rst it
won`t be adequate to charge the phone while in use, or to full battery capacity. So far, the device can collect
up to 5 milliwatts of power, and the short term goal is to collect 20 milliwatts of power, which is just enough
to keep the phone charged in standby mode. Ultimately, 50 milliwatts of power would be ideal and could
help slowly recharge the battery.
5. This technology could be applied to other electronic equipment as well. Radio waves could be used to
charge MP3 players, handheld devices, Kindles, portable game players, etc. Nokia isn`t relying on this type of
technology alone to power their phones, they are also looking at integrated solar cells to work in conjunction
with this new development. Deployment of this feature in Nokia phones is still at least 3 years away. We`ll
be standing by with our waning cell phones waiting for word.
6. Thanks http://technochest.com
136
When EARS Speak!!! (2010-01-11 19:25)
1. Do you any of the following :
(a) That your ears make sound?
(b) That these are know as [1]otoacoustic emissions?
(c) That this has a biometric angle?
(d) That any two persons always have dierent [2]otoacoustic emissions?
2. I am sure most of you dont because the exploitation of this fact has been recently discovered.Although it
has been known from quite some time, that our ear makes sounds of its own, sometimes due to a scientic
principle called otoacoustic emissions1, other times in protest to the loud music we listen to. In either case,
the sounds are too weak to detect using normal microphones.Although scientists knew about these sounds
since the 1940s, it was only with improvements in [3]microphone technology in the 1970s, that it became
possible to detect these [4]otoacoustic emissions (OAE).
3. Recently though it has been suggested that such sounds may in-fact be used for biometric security devices
of tomorrow. The variations in each persons OAE can be used as a metric for determining ones identity.
The technology is as simple as a microphone!
4. A good enough microphone embedded in any device can be used to detect these sounds, and accordingly
conrm ones identity, and be eventually used by banks to conrm the identity of a person over the phone,
or by the phones themselves before they allow someone to make a call!
5. So for example,as on date when u speak to a customer service at a bank...u r supposed to tell you
DOB,Phone number or street address for verication before you actually demand a solution to your account
query...not so will be required in near future...wherein your phone set will be able to detecty the sound in
your ear and verify your identity...nothing to memorise....plain simple unique identication.
6. Otoacoustic emissions can be clinically important as they are the basis of a simple, non-invasive, test for
hearing defects in newborn babies and in children who are too young to cooperate in conventional hearing
tests.
7. The good thing is that dead people do not emanate otoacoustic emissions.So unlike Hollywood
movies...wherein a cut thumb or extracted eye have broken the identity procedures...this one wont....
1. http://en.wikipedia.org/wiki/Otoacoustic_emission
2. http://en.wikipedia.org/wiki/Otoacoustic_emission
3. http://en.wikipedia.org/wiki/Microphone
4. http://en.wikipedia.org/wiki/Otoacoustic_emission
The ALT key Combos (2010-01-13 07:22)
Nothing new for those who are conversant with the special characters used in combination with the ALT
key.Following is a small summary i could manage from technochest...for those of you who do not understand
the use of such characters......they are of crucial signia in the world of PASSWORDS......got that!!!!!!
Alt +0162 = , Alt +0163 = , Alt +0165 = , Alt + 0128 = C
Alt +0169 = , Alt +0174= , Alt + 0153 = " , Alt + 0161 =
Alt +0177 = , Alt +0191 = , Alt +0215 = , Alt + 0247 =
Alt +0190 = , Alt +145 = , Alt + 155 = , Alt + 156 =
137
Alt + 157 = , Alt +159 = , Alt + 171 = , Alt + 172 =
Alt + 225 = , Alt + 230 = , Alt + 241 = , Alt + 0134 = f
CHINA & GOOGLE (2010-01-16 07:55)
1. The long tug of war between these two respective giants is nally coming to an end...and the end means
the end of GOOGLING in china.The fact that any person can choose to access anything at any time, and
usually at no cost is too uncomfortable an idea for the Chinese thinking tank and they have been busy
implementing moves and measures to constrain peoples access to the internet for about last two years that
i have read across in various articles and snips.
2. I can see the smile on the Bings face now....no Googling means more chance of a Binging
and likely revival of few earlier search engines...remember AltaVista generation about 10 years back.
3. Now Chinas logic behind this!!!!!we all
know when we google what happens...i had given on post at [1]http://anupriti.blogspot.com/2009/12/goo-
gle-binged-my-100th-p ost.html .This reason is valid though.Extract produced from Googles blog at
[2]http://googleblog.blogspot.com/2010/01/new-approach-to-china. html is reproduced below : Like many
other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December,
we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China
that resulted in the theft of intellectual property from Google. However, it soon became clear that what at rst
appeared to be solely a security incidentalbeit a signicant onewas something quite dierent.
First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty
other large companies from a wide range of businessesincluding the Internet, nance, technology, media and
chemical sectorshave been similarly targeted. We are currently in the process of notifying those companies,
and we are also working with the relevant U.S. authorities.
Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts
of Chinese human rights activists. Based on our investigation to date we believe their attack did not achieve
that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account
information (such as the date the account was created) and subject line, rather than the content of emails
themselves.
Third, as part of this investigation but independent of the attack on Google, we have discovered that the
accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in
China appear to have been routinely accessed by third parties. These accounts have not been accessed through
any security breach at Google, but most likely via phishing scams or malware placed on the users computers.
4. Whos is correct then? It is just a matter of perspective and convenience of the mind.
1. http://anupriti.blogspot.com/2009/12/google-binged-my-100th-post.html
2. http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
138
Microsoft choose to stay in China: Why not? (2010-01-17 07:06)
1. Just a day after I mentioned that Bing will be seen smiling on Googles exit from the dragon land, Microsoft
have released a ocial statement on this. Brief Extract from [1]http://infotech.indiatimes.com/News-Inte-
rnet-We will stay in China Microsoft/articleshow/5448256.cms reproduced below :
Microsoft Corp has no plans to pull out of China, its chief executive has said, playing down concerns about
recent cyber attacks and censorship raised by rival Google Inc.
The companys stance indicates the worlds largest software maker is not likely to support its erce rival in
its battle with China and rebus broad US political backing for Google.
There are attacks every day. I dont think there was anything unusual, so I dont understand, Microsoft
CEO Steve Ballmer told Reuters after a meeting on modernizing government services at the White House.
Were attacked every day from all parts of the world and I think everybody else is too. We didnt see anything
out of the ordinary.
1. http://infotech.indiatimes.com/News-Internet-We_will_stay_in_China_Microsoft/articleshow/5448256.cms
SHARING DESKTOPS REMOTELY (2010-01-17 07:43)
1. Of the many tools that exists today for desktop sharing including standard Windows Remote Desktop
Connection...i recently found one which is relatively very easy...the name is TEAMVIEWER.A very light soft-
ware about 2.56 Mb only,easy to install,no complex congurations,no IP setup problems,easy interface.....just
login like you log in a regular e-mail id account with a password.
2. I recently used it for trial with my friend across the another part of the continent.The result was quick
and very smooth.
3. The same is available for download at [1]http://www.teamviewer.com/index.aspx .There is a paid version
too with more features....but for general viewing and sharing,the unpaid will work fully to your requirements.
1. http://www.teamviewer.com/index.aspx
139
Harjot Singh Pelia (2010-01-25 11:33:25)
dear anupam,
hi a few queries:-
1. privacy issues
2. what all is shared by default
3. responsiveness
4. how is trac routed
5. copyright issues if any
pl cc copy of the reply to my mail id also
ZUNE 120 GB (2010-01-18 21:44)
1. For those of you who are hearing this name for the rst time,lemme tell you what it is in brief? ZUNE is
a Microsoft entertainment platform and [1]portable media player on the lines of Ipod by Apple on a larger
scale in terms of screen, capacity, features. etc. Of the various models of Zune, ZUNE120 measures 4.3
inches high by 2.4 inches wide. I will give some brief on this since i got this one recently.
Features
2. Main menu has the following scroll down as shown in screen shot from my ZUNE.
- Music
- Videos
- Pictures
- Social
- Radio
140
- Market Place
- Games
- Settings
3. Further brief on few of these of interest are enumerated below
Market Place allows browsing, previewing & downloading music directly from Microsofts Zune Marketplace
online store. Marketplace submenu further allows choosing between browsing Songs, Albums, and New
Releases, or search for specic music by keying in a few letters. Songs can be previewed for 30 seconds
with the option to add them to your virtual cart or purchase and download immediately. By signing up
for Microsofts Zune Pass music-subscription service (a free 14-day trial is available).....still to be availed by
me.....
ZUNE is WiFi enabled and allows keying in the passwords if required vide Zunepad.
Radio : An interesting part of my rst few days of interaction with ZUNE was non running of FM stations
till the time I got link to this thread ie [2]http://vasudevg.blogspot.com/2007/12/zune-fm-radio-tip.html
that involved simply changing country from preset US to Europe
Video format : The only problem that I faced was that the horde of movies that I possess do not run directly
on this.One needs to convert them to zune/ipod format with easy to use Windows Media Encoder....time
consuming but worth it when we play it here on the ZUNE......I converted Sivaji Rajinikanth(...my fav)
with a third party software Cucusoft...but was labelled with trial version watermark throughou(screen shot
down)....rest was quiet ok....then converted with windows media encoder...and worked perfectly ne....gr8
output in video and sound....
Ports : Only two including one to ear phone and the other to USB for interface with PC for sync and
charging battery.
Capacity : 120 GB...thats awesome for storage!!!!!
141
4. Any one across with any diculty or query on Zune player can just leave his/her problem....will get back
asap.......thats a promise for while.....
1. http://en.wikipedia.org/wiki/Portable_media_player
2. http://vasudevg.blogspot.com/2007/12/zune-fm-radio-tip.html
Anonymous (2011-01-04 16:32:33)
thanks
Google vs Bing : On Data retention policy change (2010-01-19 21:44)
1. Ever wondered about privacy policy of search engines specically about [1]Google and [2]Bing...i came to
know of this recently while i read at [3]http://www.bing.com/community/blogs/search/archive/2010/01/19
/updates-to-bing-privacy.aspx on the subject.
2. In case of [4]Bing,the amount of time IP addresses are stored from searchers is 18 months which the claim
now to reduce to 6 months. Generally, when Bing receives search data ,the following things undergo action
First, steps to separate the account information (such as email or phone number) from other information
(what the query was, for example).
Secondly , after 18 months another additional step of deleting the [5]IP address and any other cross session
IDs associated with the query.
142
3. Under the new policy, all the steps will continue as were applied previously except that now [6]IP address
will be completely removed at 6 months, instead of 18 months. Rival Google had cut retention time to 9
months from 18 in August 2008.Notwithstanding, Microsoft executives arrogates their initiative go much
further than Google , because Microsoft intends deleting all parts of the IP (Internet Protocol) address after
six months, while Google still retains part of the address after its self-imposed nine-month cut-o point.
4. Thanks [7]http://microsoftontheissues.com
1. http://www.google.co.in/
2. http://www.bing.com/
3. http://www.bing.com/community/blogs/search/archive/2010/01/19/updates-to-bing-privacy.aspx
4. http://www.bing.com/
5. http://en.wikipedia.org/wiki/IP_address
6. http://en.wikipedia.org/wiki/IP_address
7. http://microsoftontheissues.com/
ROOT WEB DIRECTORY VERIFICATION (2010-01-29 07:56)
http://anupriti.blogspot.com/anupriti.blogspot.comd31050ebd4c35e4bfe f7968f2083013109fa7941.htm
Gina (2010-01-30 06:35:32)
Hi.
Im trying to add a stuf like this to my root web diretory
Could you help me whit this ? Is for Mcafee site advisor to verify my site.
I cant gure it out...
thanks
ANUPAM (2010-01-30 07:45:35)
hi gina...m working on it...likely it is that we have to insert this in the HTML edit tab of the settings section...will
conrm asap...thanks
143
Gina (2010-01-31 20:12:07)
hi
Ive try it too, its not working in HTML...you have to put in in root web directory
But metatab from google may be inserted, and its working
ANUPAM (2010-01-31 21:09:34)
hi gina,how do we insert metatab from google?please guide!
Gina (2010-02-02 21:44:57)
This post has been removed by the author.
Gina (2010-02-02 23:51:54)
http://blogging.nitecruzr.net/2008/09/verifying-ownership-of-your-si te-to.html
sorry for the post before :)
now hope it helps :)
3.2 February
IP Spoong : Legal Acceptance in India? (2010-02-01 07:47)
1. I have been reading about this term for many years,have known about what it is through various sites,read
about types of IP spoong incl [1]Blind Spoong,[2]Non blind spoong etc.One question that started me
trying reach out details of this term was WHY IS IT AVAILABLE?What is the aim intended in spoong
an IP?Is it solely MALICIOUS?
2. Indian IT Act 2000 followed by amendments ie IIA 2006,IIA 2008 have not mentioned any thing on
this surprisingly!!Is it legal to use this for any reason?Recently I tried one third party software for this
to check out eectivity of this.As per the option available in this software I congured this to chang-
ing IP address every 8 minutes.Then after it started I checked out my IP address from 4 sites including
[3]whatismyip.com,[4]whatismyipadress.com etc.And yes!!! one minute I was shown in USA and the other
minute I was in Netherland followed by Russia,China etc.If a script kid like me can do this what can a
professional person intended with malicious intention can do.
3. Remember the Mumbai Blast episode wherein the email sent to the police were tracked only with the
help of IP address.God forbid,he knew of such tricks what would have we tracked out?
4. I will request any reader to just add his views or enlighten me on this!!
1. http://www.javvin.com/networksecurity/BlindSpoofingAttack.html
2. http://www.linuxsecurity.com/content/view/120225/
3. http://www.whatismyip.com/
4. http://whatismyipaddress.com/
144
CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!! (2010-02-03 22:55)
[1]
1. The earlier mention on [2]IP Spoong and the pleothra of options and techniques available for at-
tack,hack,sni,crashing a network etc are well known for not reaching out to the origin of the person or hacker
with the malaecious intention. [3]DARPA (...please google or bing if u wish to know more on [4]DARPA)has
nally come out with the 'Cyber Genome Program` which will allow any digital artifact either in form of a
document, or a piece of malware - to be poked into its very origins.
2. In in principle, it appears that almost any data shed from a relevant network, a computer, a pen drive,
someones phone or whatever is to be studied much as like a human genetic material. The code or documents
relationships with other digital artifacts will be revealed, perhaps its origins, and other info of interest to a
Pentagon admin defending military networks or a military/spook investigator tracing online adversaries.In
other words, any code you write, perhaps even any document you create, might one day be traceable back
to you - just as your DNA could be if found at a crime scene, and just as it used to be possible to identify
radio operators even on encrypted channels by the distinctive st with which they operated their Morse
keys. Or something like that, anyway.
3. The concept is a cyber-equivalent of human nger-prints or DNA. The project will thus seek to develop
a digital genotype as well as any inferred or observed phenotype in order to determine the identity of such
digital artifacts and thus the users who left them behind.
4. DARPA is now looking for technologists to develop and use the cyber-equivalent of DNA to target
the people behind cyber attacks. They are looking for geniuses in the elds of Cyber Genetics, [5]Cyber
Anthropology and Sociology and [6]Cyber Physiology who can jointly work out the practical solutions to
this project.The research involves creating lineage tree for digital artifacts, gaining better understanding of
software evolution, and automatic analysis of social relationships between users and malware. Each of these
researches will jointly develop the cyber equivalent of ngerprints or DNA.DARPA believes that this can
identify the best-of-the-best hackers.
5. Thanks [7]http://www.theregister.co.uk
1. http://1.bp.blogspot.com/_z1QH8I3k9vk/S2myLdPUuqI/AAAAAAAAAm8/lXWb5wHp8SU/s1600-h/darpa_50th_logo.jpg
2. http://anupriti.blogspot.com/2010/02/ip-spoofing-legal-acceptance-in-india.html
3. http://www.darpa.mil/
4. http://www.darpa.mil/
5. http://en.wikipedia.org/wiki/Anthropology_of_cyberspace
6. http://www.cyberphysiology.com/
7. http://www.theregister.co.uk/
145
Whos Who? : Terminology world of Portable Computers (2010-02-05 17:25)
1. The have been a pleothra of terms related to small portable computers in form of [1]Laptop, Leaptop,
Netbook, Notebook, Smartbook, Tablet,UMPC, Air Book etc all of which represent the segment that mass
of the people call or refer to just as Lap Tops.But there exists a dierence between all of these.....I have
tried to extract out the thin line dierence that exists between these all terms : - [2]Laptop : Main
Purpose : Device that serves either as a desktop replacement or a portable gaming rig. Characteristics :
Large screen,full QWERTY Keyboard. - [3]Net Book : Main Purpose : Device which is small and light
weight device meant basically for internet and the cloud for the people on the move. Characteristics : Small
Size,Light Weight,Long Battery Life. - Notebook : Main purpose : Used basically for documents and
presentations. Characteristics : Sleek and Lightweight,large screen - Smart Book : Main purpose : Hybrid
between smart phone and notebook with range of connectivity options. Characteristics : Long battery
life,Light weight. - Tablet : Main Purpose : Is like a digital slate with a full touc hscreen surface and no
keyboard. Characteristics : Basically a large touchscreen - UMPC : Main purpose : Stands for Ultra Mobile
PC,a tablet with a sliding keyboard. Characteristic : Low processing power. - Air Book : Main purpose
: Macintosh [4]AirBook by Apple which is positioned as the ultraportable in Apples MacBook Family and
was introduced at the Macworld Conference & Expo on January 15, 2008. Characteristic : 13.3-inch glossy
LED backlight TFT LCD widescreen display, 1280 x 800 pixel resolution and integrated nVidia GeForce
9400M graphics processor with 256 MB of DDR3 SDRAM shared with main memory - Leap Top : Just a
laptop branded by[5] HCL India it has trademarks for the term leaptop. 2. I actually got confused in these
thin boundary dierences...but thats the way it is in the market of brands. 3. Thanks [6]DIGIT and Wiki.
1. http://en.wikipedia.org/wiki/Laptop
2. http://en.wikipedia.org/wiki/Laptop
3. http://en.wikipedia.org/wiki/Netbook
4. http://en.wikipedia.org/wiki/MacBook_Air
5. http://www.hcl.in/
6. http://www.thinkdigit.com/
TRACE INDIA (2010-02-07 19:44)
1. I came across this relatively good Data Base site in which someone has attempted to ensure most of the
important things are traced to an area if not the street address.For eg when u enter a mobile number in the
search query,u will get to know the city and the state from which the number belongs to or like pincodes
of India are traceable to exact area identication or even vehicle numbers are traceable to the city....nice
attempt but still looking for more in depth query geneartion...i m sure they are working on it...meanwhile
enjoy what they oer now.Few links are given below :
MOBILE NUMBER LOOK UP at [1]http://www.indiatrace.com/trace-mobile-number-location/trace-
mobile-number.php
VEHICLE NUMBER LOOK UP at [2]http://www.indiatrace.com/trace-vehicle-location/trace-vehicl
e-number.php
PINCODE LOOK UP at [3]http://www.indiatrace.com/trace-pin-code/trace-pin-code.php
STD/AREA CODE at [4]http://www.indiatrace.com/trace-std-code /trace-std-area-code.php
IP ADDRESS LOCATION at [5]http://www.indiatrace.com/trace-ip-address/trace-ip-number.ph p
146
REVERSE DNS LOOKUP at [6]http://www.indiatrace.com/trace-reverse-dns/trace-reverse-dns .php
Even TRACES PEOPLE at [7]http://www.indiatrace.com/trace-people/trace-people.php
2. Thanks [8]http://www.indiatrace.com/index.php
1. http://www.indiatrace.com/trace-mobile-number-location/trace-mobile-number.php
2. http://www.indiatrace.com/trace-vehicle-location/trace-vehicle-number.php
3. http://www.indiatrace.com/trace-pin-code/trace-pin-code.php
4. http://www.indiatrace.com/trace-std-code/trace-std-area-code.php
5. http://www.indiatrace.com/trace-ip-address/trace-ip-number.php
6. http://www.indiatrace.com/trace-reverse-dns/trace-reverse-dns.php
7. http://www.indiatrace.com/trace-people/trace-people.php
8. http://www.indiatrace.com/index.php
NVIDIA : Optimus technology (2010-02-13 07:40)
1. nVidia has come up with the OPTIMUS TECHNOLOGY for the mobile PCs ie Laptops, Notebooks etc.
This technology selects and switches the graphics processor for an application, depending upon the type of
application. It automatically swops between an integrated graphics and the discrete graphic card based upon
whether the application running needs a brawny 3D chip, or not. This helps the device in oering improved
performance in applications when required, while saving on battery by reducing power drain in applications
that can do without 3D support.
2. Notebooks with nVidia technology as on date include Asus UL50Vf, N61Jv, N71Jv notebooks.
3. Thanks [1]http://www.thinkdigit.com/
1. http://www.thinkdigit.com/
WEB 2.0 SUICIDE MACHINE (2010-02-15 07:46)
1. An unheard term till now....WEB SUICIDE...what does it connote?
[1]
2. We all r slowly becoming addicted to internet for some use or the other... 85 % of internet surng
being used for social networking..can u believe that!!!a number of identities on various social network-
ing sites..[2]orkut..[3]facebook..[4]twitter ,[5]myspace,[6]linkedin and the list is getting endless....and most
of us are getting into habit of remaining online 24 hours...checking e-mails every 10-15 minutes or even
less..frequently scraping to all friends....uploading pics on sites....and some one has realized that by doing so
we all are missing on real people....parents,kids,wife and neighbours etc etc...thus has originated the concept
of [7]WEB SUICIDE......simply register with this site and u will kill,remove traces of each and every footprint
u ever had on these sites....the name of the site is [8]http://www.suicidemachine.org/
3. Extract from site Liberate your newbie friends with a Web2.0 suicide! This machine lets you delete all
your energy sucking social-networking proles, kill your fake virtual friends, and completely do away with
147
your Web2.0 alterego. The machine is just a metaphor for the website which moddr is hosting; the belly
of the beast where the web2.0 suicide scripts are maintained. Our service currently runs with Facebook,
Myspace, Twitter and LinkedIn! Commit NOW! 4. Well to some extent the intent is correct that we r
slowly loosing on realizing the importance of physical world,but removing urselg from web.....hmmm!!!!!i m
still a long way...how abt you?
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/S3izPmcaUSI/AAAAAAAAAnM/Rmtj4dyRQuU/s1600-h/Capture.JPG
2. http://www.orkut.com/
3. http://www.facebook.com/
4. http://www.twitter.com/
5. http://www.myspace.com/
6. http://www.linkedin.com/
7. http://www.suicidemachine.org/
8. http://www.suicidemachine.org/
Steganography : Hide in a JPEG/BMP (2010-02-16 21:15)
1. [1]Steganography is the art and science of writing hidden messages in such a way that no one,apart from
the sender and intended recipient, suspects the existence of the message, a form of security through obscurity
while [2]Cryptography is the practice and study of hiding information.
2. The advantage of [3]steganography, over [4]cryptography alone, is that messages do not attract attention
to themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion,therefore,
whereas cryptography protects the contents of a message,steganography can be said to protect both messages
and communicating parties. 3. Just for how it works..i tried one free [5]Steganography software Invisible
Secrets that allows one to encrypt and hide les in other les (carriers) which are not suspect of encryption
(JPG, PNG, BMP).The link I downloaded from can be accessed by clicking [6]here. 4. Now this is a small
1.8 MB software good enough to do the job.The le u see below of golden temple is just not a jpeg,it consists
of a text le with a message...the password to access the text le is 12 34....for those of u who r interested to
experiment 5. The scope of utility involves
provisioning solutions to the following queries of any user across : (a) Are you afraid that someone else
can see your sensitive and secret data stored on your computer ? (b) Are you afraid that hackers or other
people can penetrate your system and nd your valuable information ? (c) Your wife, boss and kids can
148
see what you used the internet for? (d) You have many passwords in your mind or spread all over your
computer and you cant organize them? (e) You want to send a secure email to your friend or partner and
you want nobody to read or to access it? (f) You want to password protect certain applications to be used
only by you? Do you want them not to be visible in the Start Menu, but still have quick access to them?
(g) You want to delete an email or a le but you think someone else can restore it and use it against you ?
(h) You want to combine le encryption with steganography (hide les and folders) to better protect your
documents and emails? (j) You want to hide les on your computer so that nobody nds them? 6. Thanks
[7]http://www.invisiblesecrets.com
1. http://en.wikipedia.org/wiki/Steganography
2. http://en.wikipedia.org/wiki/Cryptography
3. http://en.wikipedia.org/wiki/Steganography
4. http://en.wikipedia.org/wiki/Cryptography
5. http://en.wikipedia.org/wiki/Steganography
6. http://www.invisiblesecrets.com/ver2/index.html
7. http://www.invisiblesecrets.com/ver2/index.html
How to avoid an infected USB/PEN Drive? (2010-02-17 07:52)
1. The most common way for a virus to infect a healthy PC is through USB/Flash drives. Common [1]viruses
such as Ravmon , New Folder.exe, etc spread through [2]USB/ash drives . Invariably, anti virus programs
are unable to detect them and even if they do, in most cases they are unable to delete the le, only quarantine
it. Following are a step by step easy to do instruction
(a) A window appears similar to the one shown below.
(b) Dont click on Ok , just choose Cancel.
149
(c) Open the Command Prompt by typing cmd in the run box.
(d) In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
(e) This will display a list of the les in the Flash drive or Hardisk. Check whether the following les are
there or not
(i) Autorun.inf
(ii) Ravmon.exe
(iii) New Folder.exe
(iv) svchost.exe
(v) Heap41a
(vi) or any other .exe which may be suspicious.
(f) If any of the above les are there, then probably the USB drive is infected.
(g) In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only,
Archive, System and hidden le attribute from all the les.
(h) Now just delete the les using the command del lename. example del Ravmon.exe. Delete all the les
that are suspicious. To be on a safer side, just scan the USB drive with a latest anti-virus program like
[3]McAfee or TrendMicros PCCillin to check whether it is free of virus or not. Now remove the drive and
plug it again. In most of the cases, the real culprit turns out to be the Autorun.inf le which mostly gets
executed when someone clicks Ok in the dialog window which appears above. Thus the infections invariably
spreads...but not if u take these precautions as mentioned above.
2. Thanks [4]http://www.howtodothings.com
1. http://en.wikipedia.org/wiki/Virus
2. http://en.wikipedia.org/wiki/USB_flash_drive
3. http://home.mcafee.com/
4. http://www.howtodothings.com/
SVCHOST.EXE vs SCVHOST.EXE (2010-02-18 21:51)
1. Two approximately similar names but with poles apart function and reason to exist.If ever you have tried
cleaning or accessing an infected pen drive you must have come across these names in the le names list.I
would just try and make the dierence clear in brief below.
2. SCVHOST.EXE is a process which is registered as W32/Agobot-S [1]virus. This [2]Trojan
allows attackers to access your computer from remote locations, stealing passwords, Internet
banking and personal data. This process is a security risk and should be removed from your
system.
3. [3]SVCHOST.EXE is located in the System32 folder and is an built-in part of Windows OS. It cannot be
stopped or restarted manually. This process manages 32-bit DLLs and other services. At startup, Svchost.exe
checks the services portion of the registry and constructs a list of services that it needs to load. Under normal
conditions, multiple instances of Svchost.exe will be running simultaneously. Each Svchost.exe session can
contain a grouping of services, so that many services can be run depending on how and where Svchost.exe is
started. This allows for better control and debugging.
4. I hope this amply makes the dierence clear
150
1. http://en.wikipedia.org/wiki/Computer_virus
2. http://en.wikipedia.org/wiki/Trojan_horse_(computing)
3. http://support.microsoft.com/kb/314056
Intel Core" i3 Processor & Server 2003 (2010-02-23 07:36)
1. Strange are the ways sometimes when we get troubled by the PC.In an attempt to upgrade one of the
PCs to [1]Intel Core" i3 Processo[2]r,I found a problem I never thought of. 2. Now just to give u a small
brief,I have a small oce complex with about 15 computers on [3]Server 2003 which was running ne till one
day when i just decided to upgrade my server machine to [4]Intel Core" i3 Processor.I bought the combo
pack of this processor with its motherboard for about 11k,i assembled it and started with the setup of server
2003.....started nicely but this would never install completly in my N number of attempts and would hang
halfways.....then i thought like Murphy is acting ne with me and their is some problem with the processor
motherboard hardware...so replaced the same pack with a new one..but the problem persisted....i contacted
the local dealer,surprised with the problem he himself attempted the same but met with the same end.....
3. I changed my installation CDs ,still met with the same problem...nally I could arrive that there may be
some compatibility issue between [5]server 2003 & Intel Core" i3 Processor.........and reverted back to core
2 duo,the earlier one. 4. I would request readers to augment their comments, if any, with such a problem
being faced anywhere else.
1. http://www.intel.com/Consumer/Products/Processors/corei3.htm
2. http://www.intel.com/Consumer/Products/Processors/corei3.htm
3. http://www.microsoft.com/windowsserver2003/default.mspx
4. http://www.intel.com/Consumer/Products/Processors/corei3.htm
5. http://www.microsoft.com/windowsserver2003/default.mspx
Claudia Lawrence (2010-03-06 02:24:10)
Hi, ur blog is really nice & informative, while reading it I truly like it. I just wanna suggest that u should submit
your blog in this [1]website which is oering very unique features at cheap prices there are expert advertising team
who will not only provide the adspace but also promote ur blog & aliate ads through all over the networks which
will denitely boost ur trac & readers. Finally I have bookmarked ur blog & also shared to my friends. hope u have
a wonderful day & !!happy blogging!!.
1. http://www.blogerzoom.com/
Agha (2011-05-04 11:28:37)
use 2003 32 bit server with Service Pack, it will solve ur problem. Thanks
kamal kant (2011-05-07 13:55:36)
HI
I have hp laptop pailion g6 with core i5 processor 4gb of ram.When i install window server 2003 standard 64bit it
gives me error in blue screen 0x0000007b like this.can i install window 2003.please reply
Thanks in advance.
ANUPAM (2011-05-13 23:26:57)
@KAMAL perhaps the lone solution is uptodate patch of server 2003,the one generally oating in the market is not
updated with the SP3.....i had this similar problem...could be solved only after i updated it with the latest SP....as
recommended by AGHA.....
151
3.3 March
The Journey from MB to GB : Pen Drives (2010-03-05 22:53)
1. I bought my rst pen drive in the year 2004 at a price of Rs 42oo/- and the capacity was a whoooping 256
MB....yeah that was so high those days.....today i came across a link to Kingston that has recently launched
the world`s rst 256GB Pen drive.The new pen drive is DataTraveller 300 USB Flash Drive.
[1]
2. I know the next thing that comes to mind is what about the cost?......the cost is just Rs 48000/-(i heard
this is approx).
3. Thanks [2]http://www.newtechnology.co.in
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/S5JfSmvs1tI/AAAAAAAAAnk/mT2r77w4KlI/s1600-h/datatraveller-300.jpg
2. http://www.newtechnology.co.in/
Search Web by FACE recognition - Work is ON!!!: ONE ALBUM (2010-03-07 21:06)
1. [1]Microsoft Israel Innovation Labs is currently working on ONEALBUM ,a project under development,
that uses face-recognition technology to search for photos
2. OneAlbum scans faces that regularly appear in a users OneAlbum photo collection, then searches his
social networks ([2]Facebook,[3]Orkut, Windows Live and others) for more photos of these people. It then
automatically nds relevant photos in other albums on the Internet and brings them to the users album,
and shows them side-by-side with his photos. Not only facial recognition, but OneAlbum also involves
event-matching technology by analysing the people, dates, colours, and textures in a set of photos and will
recognise these photos as being taken in on the same event.
3. Little confusing in the rst reading.....what I understood is like one will be able to nd a same persons
photo when u bing(.. google)....so u put ur photo in the search bar and press enter...there u r......u see all
content results of same person.....dicult to believe but....will be available soon in coming years!!!!
4. Thanks [4]http://www.liveside.net
1. http://www.microsoft.com/israel/rnd/products/innovation_labs.html
2. file://localhost/mnt/ext/blogbooker/tmp/tzw310kp/www.facebook.com
3. http://www.orkut.com/
4. http://www.liveside.net/
152
OS CARD : For now just an idea sirjeeeeeeee!!! (2010-03-11 22:19)
1. Recently I came across this interesting idea article which introduced me to the [1]OS Card.....yess...the
operating system card....read on for some interesting info
(a) The OS Card would be inbuilt with a independant [2]operating system that is installed or ashed onto
a PCI-E card for computers.
(b) Complete operating system such as Windows/[3]solaris/ubuntu etc would come preloaded one of these
cards. Instead of booting and running your OS from your local hard drive, it would run most of the OS from
the PCI-E card.
(c) The card would be read only, protecting vital system les from malware such as trojans or viruses. A
small number of system les that would require read and write functions would be copied to your local hard
drive where they could be modied and read by the card.
2. What would this do? For amateurs it would make installing an operating system much easier. Instead of
having to deal with CDs, DVDs and serial numbers a person would simply buy the card and put it in their
computer.
3. The best thing to be curbed is that this would be able to put a serious incision in piracy of operating
systems. Furthermore, it would free up a considerable amount of space on your hard drive.
4. The OS Card could come with its own independent CPU and Memory (RAM), which would completely
remove the need for an operating systems system requirements. This would most likely speed up all other
processes and events being run on the computer now that system processes are now no longer hogging PC
resources.As on date some info on related product at [4]http://www.gi-de.com
5. What an idea sirjeeeeeeee@ [5]http://www.creativitypool.com
1. http://en.wikipedia.org/wiki/Operating_system
2. http://en.wikipedia.org/wiki/Operating_system
3. http://www.oracle.com/solaris/index.html
4. http://www.gi-de.com/portal/page?_pageid=42,103236&_dad=portal&_schema=PORTAL
5. http://www.creativitypool.com/
LIQUID COOLING IS IN - FOR CPUs & GPUs (2010-03-15 08:09)
1. I heard about water cooling concept in servers specic to data centers some years back.With induction of
i3 and continuing high end series, water cooling kits are no more visualization and futuristic components of
enthusiast and fancier machines. Now water cooling is all set to reach your desktops.Thus with the execution
levels of the core components increasing, keeping the heat levels under control has no more remained as a
challenge. 2. The Aquagate Max is the rst Enthusiast System Architecture (ESA) simpatico liquid cooling
kit which allows some amazing features . With multicontrol connected sensors located all around inside the
case the architecturte design eliminates the need to manually check that it works properly.Together with the
Cooler Master Cosmos ESA case it allows the advantage of being able to mount the liquid cooling kit inside
the system case with no external parts. More from gure below
153
[1]
[2]
[3]
3. Thanks [4]http://www.coolermaster.com
1. http://4.bp.blogspot.com/_z1QH8I3k9vk/S583k4Yb1BI/AAAAAAAAAos/liqaIJAlt1s/s1600-h/3.jpg
2. http://1.bp.blogspot.com/_z1QH8I3k9vk/S583e8IQjwI/AAAAAAAAAok/6AkaAh0PIiY/s1600-h/2.jpg
3. http://1.bp.blogspot.com/_z1QH8I3k9vk/S583WP-TdzI/AAAAAAAAAoc/L6OFgxSky74/s1600-h/1.jpg
4. http://www.coolermaster.com/
154
Secure ur Wireless media (2010-03-17 22:04)
Secure ur WiFi (2010-03-18 07:47)
[1]
1. http://2.bp.blogspot.com/_z1QH8I3k9vk/S6GNXxkf4II/AAAAAAAAApM/Sm3r52fXXN8/s1600-h/Picture1.jpg
GOOGLE nally is OFF from China (2010-03-24 08:40)
1. In my earlier post at [1]this,[2]this and [3]this,the subject matter was under decision making....nally the
result is out....Monday night, the cyberspace gargantuan shut its Chinese site and repositioned its search
engine services to unexpurgated Hong Kong after two months of confrontation with Beijing over censorship
and alleged hacking attacks.
155
[4]
2. The decision has its set of PROs & CONs....this will allow opportunity for others to make an attempt
to compete with google which has largely overshadowed the cyber space to a large extent with discussions
like one discussed for [5]Data retention policy between Google and Bing.This is going to make China lesser
dependent on Google for a large number of things which unknowingly we all have become used to.This will
disallow google to retain data as per their existing policies from the complete area of CHINA unlike others
who are happily allowing them to retain all data and surng habits.....now for the CONs....Chinese will not
be able to search with the precision they used to(...although will be a temporary phase...they may come up
with something better....)...is that the only CON??????I feel it is worth it!!!!!!!!!
3. Indian Sarkaaar....pls let your IT IQ refresh........thanks [6]http://images.smh.com.au and
[7]http://www.hindustantimes.com
1. http://anupriti.blogspot.com/2010/01/china-google.html
2. http://anupriti.blogspot.com/2010/01/microsoft-choose-to-stay-in-china-why.html
3. http://anupriti.blogspot.com/2009/11/green-dam-youth-escort-whats-that.html
4. http://3.bp.blogspot.com/_z1QH8I3k9vk/S6mHznVlTUI/AAAAAAAAApU/2Um-xY5q8zY/s1600-h/googlechina5-420x0.jpg
5. http://anupriti.blogspot.com/2010/01/google-vs-bing-on-data-retention-policy.html
6. http://images.smh.com.au/
7. http://www.hindustantimes.com/
Consequences of Googles China Exit (2010-03-24 09:14)
1. This is a uncoiled lift from [1]http://www.theatlanticwire.com.I thought worth putting it in here.For
original post please click [2]here.
2. The post has shown the following 4 consequences of exit :
(a) Cripples the Work of Chinese Scientists
A Nature News survey of Chinese scientists found that 84 percent of them thought losing access
to Google would 'somewhat or signicantly hurt their work process. Like their American
counterparts, Chinese researchers use Google and Google Scholar to nd papers and related
information.
'Research without Google would be like life without electricity, one Chinese scientist toldNature... If events
do continue in that direction, truly global enterprises like science could suer as information becomes harder
even if only moderately to exchange.
156
(b)
Puts the Onus on China to Liberate the Internet
Puts the Onus on China to Liberate the Internet
, says Leslie Harris, president of the Center for Democracy and Technology: [We applaud]
Google for following through on its commitment to protect human rights and for its continued
eort to enable Chinas people with unltered access to robust sources of information from all
over the world. Whether the Chinese people will be able to take advantage of Google search
now rests squarely with the Chinese government.
(c) Fully Exposes Chinas Censorship
Fully Exposes Chinas Censorship, writes Dan Nosowitzat Fast Company: Google almostexpects China to
block the crap out of the redirect. Theyll even be creating a new siteto monitor exactly how much of their
new services are being forcibly blocked by the Chinese government, updated daily. Google is also showing a
little concern about the future of its 600-person sales sta in China, and issuing a bit of a challenge to the
Chinese government: if they shut down the redirect to Google HK, Google will have to lay o a percentage of
its sales team, as theyll not be needed.
(d) Cleanses Googles Reputation
Cleanses Googles Reputation, cheers Preston Gralla at Computer World: China will become the worlds
largest Internet market, and in taking this step, Google is endangering its standing there. True, it only has a
relatively small market share at this point, but that would have changed over time, and even a relatively small
market share of a large market means a lot of revenue. Its rare that a tech company or any company, for
that matter takes a stand this principled, and Google should be congratulated for it. Other tech companies,
notably Apple and Microsoft, should follow suit, although all signs point to them continuing to cooperate with
Chinese censors.
3. Thanks [3]http://www.theatlanticwire.com
1. http://www.theatlanticwire.com/
2. http://www.theatlanticwire.com/opinions/view/opinion/4-Consequences-of-Googles-China-Exit-2937
3. http://www.theatlanticwire.com/
MOZZILA Firefox & GERMANY (2010-03-24 21:27)
1. In another notable policy implementation involving IT aspect and signifying the importance of browser
,German government and administration has suggested computer users not to use Firefox and run an alter-
native browser instead, because of a critical security demerit. It has recommended that PC users stop using
Firefox till Mozilla releases a x. 2. The advice is based on studies and recommendations of [1]BurgerCERT,a
division of German Federal Oce for Security in Information Technology. The reason why Germany is evok-
ing such ostensibly forceful action is based on the presence of a critical vulnerability in currently available
versions of Firefox that could be exploited by hackers to launch malicious code on users computers. 3. For
its part, Mozilla has acknowledged the security vulnerability, and has released the latest version of its Firefox
web browser ahead of schedule because of security vulnerabilities found in earlier versions.Firefox 3.6.2 was
due to launch at the end of March, but is already available to download from the Mozilla website. 4. Any
advises or thoughts from the [2]MOD(IT) INDIA.....none!!!!!! 5. Thanks http://www.computerweekly.com
1. http://www.thenewnewinternet.com/tag/burgercert/
2. http://www.mit.gov.in/
157
DANGEROUS PASSWORDS (2010-03-24 21:58)
1. According to a recent study,most dangerous passwords used across the cyber fora and continents are listed
below :
123456
Tops the list.The study reveals that 123456 is the most ordinarily used password. [1]Imperva found that
nearly 1 % of the 32 million people it studied were using 123456 as a password.
12345
The second most vulnerable password is 12345
123456789
Stands at a proud 3rd position
PASSWORD
The fourth most vulnerable password is the word Password itself
iloveyou
Another easy one for remembrance and breaking.
princess
Stands at 6th position
Rockyou
The seventh most compromising password is 12345
1234567
Rockyou is followed by 1234567 at No 8
abc123
the last one as per study....
2. How many of you have or had from the list?be carefullllllllllllllllllllllll
3. Thanks [2]Imperva and [3]TOI.
1. http://www.imperva.com/
2. http://www.imperva.com/
3. http://timesofindia.indiatimes.com/default1.cms
CLEAR PLAY & DVD PLAYERs : E-CENSOR (2010-03-25 07:49)
1. A new technology that can CENSOR ALL POTENTIALLY UNSAVORY SCENES of a movie, making
it watchable with children at home is all set to introduce it self to the parents.It invariably happens across
the homes when one family sits down to watch a movie on a DVD thinking there`s nothing up ahead likely
to cause embarrassment, only to nd the stars undressing and making the set of family watching the movie
awkward.
158
[1]
2. [2]ClearPlay (patented) comes to the rescue in all such cases.This is an advanced parental control feature
that allows ltering of regular DVD movies. ClearPlay is a technology that allows the users to skip over or
mute undesirable content such as profanity, graphic violence, and adult content.
3. A [3]ClearPlay-enabled DVD player is required, along with what are called Filter les. These les, which
are created by ClearPlay editors, will know where the possibly unwanted content is located, even to the exact
frame. This allows the ClearPlay DVD player to block oensive or undesirable content during playback of
the DVD. The choice is also made available to watch the lm in its original form, by turning the ltering o.
4. ClearPlay allows users to customize what they want to skip. There are twelve categories of content that
can be ltered and with four dierent levels (none, implied, explicit and graphic).These categories include:
Violence, Sex, Nudity and Vulgarity. You will also see a list, before the movie starts, of possibly questionable
content that ClearPlay will not remove depending on the movie, scene and/or situation.
5. Thanks [4]http://technochest.com
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/S6rLXsK4BII/AAAAAAAAAp4/-YLf3iDQOIs/s1600/CP-747_information.gif
2. http://www.clearplay.com/
3. http://www.clearplay.com/
4. http://technochest.com/
WiFi at home : Take precautions (2010-03-28 07:19)
1. Accessing WiFi at home is no more limited to tech geeks as the simple conguration has made it accessible
to even a layman who hardly has any know how of how it works and what are the dangers oating around if
159
he goes with the default settings.[1]The two year back case of a hacker emailing from an open WiFi account
in Mumbai reects the deep dangers associated with such mishaps.Following are a set of desirable cong
changes any WiFi account holder at home and oce whould take care of while conguring.....
Step 1: Change the default password Step: 2: Change the default IP address Step 3: Disable the DHCP
service DHCP (Dynamic Host Conguration Protocol) enables remote computers connected to the router to
obtain an IP address and join the network without needing to know the IP and router address information.
This is a simple and eective way of keeping intruders away. As far as possible, set up the computers on
your network with static IP addresses. If you still want to use DHCP to make your own conguration easier,
restrict the number of DHCP IP users to the number of computers on your network. For example, if you
have ve laptops running on the network, limit the DHCP IP addresses to 5 from the default 50. Step
4: Restrict the network mode Step 5: Change the default SSID Step 6: Opt for WPA2 or PSK security
over WEP Step 7: Enable the MAC Filter Step 8: Use the router`s rewall Step 9: Use Internet Access
Policies Step 10: Disable remote administration Step 11: Switch o the router when not in use Step
12: Disconnect the Internet when not needed Step 13: Position your router carefully Step 14: Update
the router rmware Step 15: Scan for signal leaks from time to time 2. Also check out [2]here.Thanks
[3]http://www.freealldown.com
1. http://economictimes.indiatimes.com/news/politics/nation/
WiFi-was-hacked-again-to-send-terror-mail-Mumbai-ATS/articleshow/3481850.cms
2. http://www.freealldown.com/2010/03/how-to-secure-your-router-in-11-steps.html
3. http://www.freealldown.com/
DATA RECOVERY FROM RAM? (2010-03-31 22:44)
1. If any one can just throw some light or post a link to any matter that exists on the web pertaining to
limitations/possibilities of recovery of data from RAM inside a computer?
2. Thanks.
david nicholson (2010-04-01 07:21:34)
i m sure this will help,check out at [1]http://tdistler.com/2008/02/21/data-in-ram-can-be-recovered-a fter-power-o
1. http://tdistler.com/2008/02/21/data-in-ram-can-be-recovered-after-power-off
3.4 April
HOW TO HYPER LINK IN COMMENTs AT BLOGGER? (2010-04-01 07:50)
1. I was recently commenting at a blogpost and wanted 2 place a hyperlink..but could not nd any option
while right clicking or from any where.Thus googled and found this simple two step procedure [1]here 2.
Thanks [2]http://mike.brisgeek.com
1. http://mike.brisgeek.com/2006/08/30/simple-html-for-formatting-blogger-comments/
2. http://mike.brisgeek.com/
160
7 years of Indian Cyber Law (2010-04-07 23:14)
1. While reading a recent article by Rohas Nagpal @ 7 years of Indian Cyber Law..i came across these cases
which have been briey but adequately discussed at length in the article by the author ie Rohas Nagpal.
Must read .just for updated info..
[1]- Avinish Bajaj vs State of Delhi
[2]- Firos Vs State of Kerala
[3]- Syed Asifuddin vs State of Andhra
[4]- SBI vs Rizvi Exports
[5]- State vs Mohd Afzal
[6]- Is ATM a computer
[7]- P.R.Transport agency vs UOI & others
2. For another link on similar info ,pls click [8]here.
3. Thanks [9]http://www.asclonline.com & [10]Mr Rohas Nagpal,President Asian School of Cyber Laws
1. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf
2. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf
3. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf
4. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf
5. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf
6. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf
7. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf
8. http://www.cyberlawconsulting.com/cyber-cases.html
9. http://www.asclonline.com/
10. http://www.asclonline.com/index.php?title=Rohas_Nagpal
(2010-04-08 07:47)
Computer EASTER EGGs (2010-04-15 06:59)
1. Whats an easter egg post doing here? Well even this has an IT context.In the computer world this refers
to an un documented lineament that is in a program that the makers of that program placed in the program
for additional fun and credits. Easter Eggs are in no way destructive to any software or hardware within the
computer and are usually meant for fun. For example an interesting computing easter egg is given below
- Type =rand(200,99)(without quotes) into the MS word and watch as around 567 pages get lled with
random text!! 2. Thanks [1]http://www.computerhope.com & [2]Digit magazine subscriber edition.
1. http://www.computerhope.com/
2. http://www.thinkdigit.com/
161
3.5 May
EAVES DROPPING RISK : EMR (2010-05-03 23:12)
1. Imagine someone sitting in a van outside a persons house can read the EMR that is emanating from
the users laptop computer inside the house and reconstruct the information from the users monitor on a
dierent device. Dierent devices have dierent levels of susceptibility to Tempest radiation. A handheld
calculator gives o a signal as much as a few feet away, and a computers electromagnetic eld can give o
emissions up to half a mile away. The distance at which emanations can be monitored depends on whether
or not there are conductive media such as power lines, water pipes or even metal cabinets in the area that
will carry the signals further away from the original source.
2. This problem is not a new one; defence specialists have been aware of it for over twenty years.Information on
the way in which this kind of eavesdropping can be prevented is not freely available. Equipment designed
to protect military information will probably be three or four times more expensive than the equipment
likely to be used for processing of non-military information.Until recently it was considered very dicult
to reconstruct the data hidden in the radiated eld, and it was therefore believed that eavesdropping on
digital equipment could only be performed by professionals with access to very sophisticated detection and
decoding equipment. As a result, digital equipment for processing information requiring medium or low level
protection, such as private and business information, is not protected against eavesdropping of this kind.
3. The EMR that is emitted by electric devices contains the information that the device is displaying or
storing or transmitting. With equipment designed to intercept and reconstruct the data, it is possible to
steal information from unsuspecting users by capturing the EMR signals. The U.S. government originally
began studying this phenomenon in order to prevent breaches in military security. The government was using
the technology to their advantage during WWII and realized that they needed to protect themselves against
others using the same tactics against them. The name Tempest, or Tempest radiation originated with the
U.S. military in the 1960s as the name of the classied study of what was at the time called compromising
emanations.
4. Today the phenomenon is more commonly referred to as van Eck phreaking, named after Wim van
Eck, the Dutch computer scientist who brought it to general attention in 1985 when he published his paper
Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, in which he demonstrated
that the screen content of a video display unit could be reconstructed at a distance using low-cost home-built
equipment - a TV set with its sync pulse generators replaced with manually controlled oscillators.
5. Van Eck phreaking is a major security concern in an age of increasing pervasive computing. High-security
government agencies are protecting themselves by constructing safe rooms that through the use of metallic
shielding block the EMR from emanating out of the room or by grounding the signals so that they cannot
be intercepted. It is possible, though costly, for individual users to shield their home computer systems from
EMR leakage.
6. Thanks [1]http://www.webopedia.com
1. http://www.webopedia.com/
I M IN CHIP- MAY MONTH EDITION 2010 (2010-05-11 06:48)
1. Dont get me wrong for those of you who read only I M IN CHIP...i m not inside the regular chip...but
have been able to nd space in MAY edition of the [1]Chip - Indias Most Trusted Guide To Gadgets And
Technology.Scanned copy attached.
162
[2]
[3]
2. Thanks [4]CHIP
1. http://www.chip.in/
2. http://1.bp.blogspot.com/_z1QH8I3k9vk/S-jFcTY1TcI/AAAAAAAAAqU/7y-7ZaxeGOo/s1600/chip0001.jpg
3. http://3.bp.blogspot.com/_z1QH8I3k9vk/S-ixNkvq5RI/AAAAAAAAAqM/cOEz4LnCsWg/s1600/anupamchip.jpg
4. http://www.chip.in/
Bidisha (2010-05-12 12:37:08)
Congratulations!
Your family and friends must be really proud of you!
Thanks for uploading it here, I could read both your aritcles and will follow this corner. Though not able to make
complete meaning out of everything; surely get the gist.
Keep writting!
Rgds.
Bidisha
wimpy (2010-05-12 20:55:26)
thats how i tracked you
hi buddy this is vikrant here.
mail me wimyoo@gmail.com
ANUPAM (2010-05-12 22:24:22)
vikrant sir!!!i got a mail domain failure from the email u mentioned....pls psot ur email again here
163
wimpy (2010-05-17 20:22:23)
sorry buddy! try this wimpyoo@gmail.com
even better call 9418760446
SHADOWS IN THE CLOUD (2010-05-31 15:02)
1. First time I heard this term...i thought its abt some movie...some crime thriller or may be some novel or
book...but when I actually came to know about this...it was exploring a whole new world....this is abt a 60 pg
brief on how cyber security can compromise you and your organisation secrets....wonderfully compiled...easy
to understand...easy english....gr88888 ...
[1]
2. I got the copy from SCRIBD at [2]http://www.scribd.com/doc/29493199/Shadows-in-the-Cloud-20100
40[3]6
3. Must read for IT Security enthusiasts!!
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TAOD09kemnI/AAAAAAAAAqk/WaqPeB5caFI/s1600/untitled.JPG
2. http://www.scribd.com/doc/29493199/Shadows-in-the-Cloud-20100406
3. http://www.scribd.com/doc/29493199/Shadows-in-the-Cloud-20100406
3.6 June
XINGYUN : Worlds Fastest Computer (2010-06-07 11:12)
1. Experts say one second of its work may take a whole day for a dual-core personal computer
2. Such is the astonishing ..or I say beyond imagination power of this ocially disclosed SUPERCOM-
PUTER named Xingyun from China that runs at more than one quadrillion (one thousand million million)
calculations per second.
3. XINGYUN is now the server of 'Dawn 6000` which has been jointly developed by Dawning Information
164
Industry Co. Ltd, Chinese Academy of Sciences Calculation Institution and the South China Supercomput-
ing Centre. It has been developed for DNA sequencing and for cloud computing.
4. Perhaps there is no end to improvement.....tomorrow will come up with much much higher speeds then
XINGYUN......wait and watch.....
Prisoners all set to est BPO : A rst from Cherlapally Central Jail (2010-06-08 23:59)
1. In a country where media,politicians,government, bureaucrats,actors,sportsman etc etc and most of the
citizens are busy baking power and minting money,this is one news that could do HINDUSTAN proud.
2. In a bold & really unique experiment,likely to be the rst of its kind in our country,there will soon be
BPO units with the inmates as employees. This is a unique development and Cherlapally Central Jail in
Hyderabad@Andhra Pradesh is the rst prison throughout the country to have such a unique facility in its
premises.These BPO units will have educated convicts serving out their terms. A public-private partnership
was signed up between the prison authorities and the Bengaluru based IT rm, [1]Radiant Infosystems.As
many as 250 inmates will be enrolled in the BPO unit and they will be later shortlisted according to their
qualications. Most of the inmates are matriculates and graduates. The shortlisted inmates will then be
given training by experts and then absorbed by the BPO company into their Jail unit. For starters, the
convicts working there will not have any access to phones as in the case of a normal call centre. They will
be mostly involved in bank-related data entry and transfer work.
3. We found that large number of convicts are willing to work on computers. So, I thought these prisoners
can made use of and they can be put on computer-based jobs, said Gopinath Reddy, Director General For
Prisons, Andhra Pradesh.
4. This is really positive contribution I feel....although a percent of readers may tend to opine about QoS
etc...but...worth a start and Idea....
5. Thanks [2]Voice & data and [3]http://news.oneindia.in
1. http://www.radiantinfo.com/
2. http://voicendata.ciol.com/
3. http://news.oneindia.in/
Anonymous (2010-06-14 11:23:46)
nice info to start my morning.....
What material Laptops are Made of? (2010-06-09 09:30)
1. Ever wondered what a typical laptop is made up of and where does all that material source to.......read
on...it is interesting to know the eort......
China: ABS, PMMA, Epoxy, PVC, Polyoxymethylene, PP, SBR, elastomer, PET, Magnesium Germanium,
Terbium
Russia: Steel, Ferrite, Ruthenium
Chile: Copper
South Korea: Glass, Cadmium
Australia: Titanium,Nickel
165
Peru: Indium
India: Barium
Khaidarkhan: Mercury
Canada: Aluminium, Uranium
South Africa: Cadmium, Chromium, Platinum, Manganese
Japan: Stainless Steel, Selenium
Brazil: Silicon, Tantalum
Zimbabwe: Lithium
Congo: Cobalt
Mexico: Bismuth
Tajikistan: Antimony
2. Thanks [1]http://www.sourcemap.org
1. http://www.sourcemap.org/object/typical-laptop-computer
Securelist.com : Informative attempt by Kaspersky Labs (2010-06-09 09:44)
1. Kaspersky has come up with the launch of a veri informative site on IT security with lots of articles and
updates on various types of viruses/malwares etc.You can access the same by clicking [1]here.
2. One interesting section by the name of Internal threats is available which should prove popular in future
and also Kaspersky Security Bulletin.
1. http://www.securelist.com/en/
Google and Caeine : The Secret Link (2010-06-11 23:14)
1. A little over year ago ,Google unveiled a 'secret project of 'next-generation architecture for Google`s web
search' which was supposed to include crawling, indexing, and ranking changes. While the biggest visible
changes in Microsoft`s relaunched search engine, Bing, was user-interface related, Google`s secret project
was supposed to be only infrastructure related and proposed no UI changes. 2. Thus after an year of
the unveiling,Google is now getting faster and more comprehensive with a new Web indexing system called
Caeine.As per the Google Blog Posts , the project now stands on completion stage and now provides 50
percent fresher results for Web searches.
[1]
166
3. The old indexing architecture was based on several layers, some of which were refreshed at a faster rate
than others; the main layer would get updated every couple of weeks.To refresh a layer of the old index,
entire web was analysed, which meant there was a signicant delay between when we found a page and made
it available to the user. With Caeine, the web is analysed in small portions and search index is updated on
a continuous basis.Thus more improvement on existing setup....that I say there is no end to improvement
4. Thanks [2]http://www.trustedreviews.com
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TBJ5q93359I/AAAAAAAAAqs/PJCU3EUCBKI/s1600/del.jpg
2. http://www.trustedreviews.com/
Google and Caeine (2010-06-11 23:14)
1. A little over year ago
Where does your Website Rank in the web? (2010-06-12 14:15)
1. An interesting free info site for to see what you have done with your website and what you need to do to
increase performance of trac and readers to your website is listed below. The site uses a combination of
tools to solve issues or tweak your best techniques used in your web design and content.
2. The name of the site is [1]http://truxtertech.com/siteworth.
1. http://truxtertech.com/siteworth
Mobiles & Brain Cancer : WHO Speaks. (2010-06-12 17:59)
1. In an earlier post at [1]http://anupriti.blogspot.com/2009/10/radiation-eects-ur-mob ile-
quantied.html,wherein the sad and bad eects of using mobiles on brain and health,the quantied SAR
ie specic absorption rate were discussed.There is good news for those who always feared using mobile
phones for standing at a risk to gain brain cancer in the long run.The WHO study on links between mobile
phone use and certain types of brain cancer has proved inconclusive.The researchers said that even though
there could be possible health risks from heavy mobile phone use, nothing conclusive has been found as yet.
2. The long ten year study of about 13,000 people focused on both healthy users of mobile phones and those
with two types of brain cancer - glioma and miningioma tumors. There were suggestions of an increased risk
of glioma, and much less so meningioma, in the users with highest decile (10 per cent) of cumulative call
time, in subjects who reported phone use on the same side of the head as their tumor. Strangely though,
the study declares these 10 per cent to be people who use their phone to call for more than 30 minutes a
day. These stats seem seriously doubtable. Going by it, almost everyone we know is in that 10 percent.
3. However, the study has been criticized, as biased, because mobile phone companies provided 25 percent
of the funding.Actually...now it is more then 15 years when the world has been actively using mobiles...more
so in india in last 10 years....had it been the other way...how much of the human populi in the world would
have been eected by now....
4. More at [2]http://www.who.int/mediacentre/factsheets/fs193/en/
1. http://anupriti.blogspot.com/2009/10/radiation-effects-ur-mobile-quantified.html
2. http://www.who.int/mediacentre/factsheets/fs193/en/
167
GOOGLE STREET VIEW - FIGHTING PRIVACY ISSUES (2010-06-16 21:03)
1. Ever heard of googles street view application...m sure many of you must have...for those who have not
heard of it...in brief it refers to a technology featured in Google Maps and Google Earth that provisions
isometric views from various positions along many streets in the world. Launched on May 25, 2007 the
application displays images taken from a eet of specially adapted cars. Areas not accessible by car are
sometimes covered by Google tricycles. On each of these vehicles there are nine directional cameras for
360 views at a height of about 2.5 meters, GPS units for positioning and three laser range scanners for the
measuring of up to 50 meters 180 in the front of the vehicle. There are also 3G/GSM/Wi-Fi antennas for
scanning 3G/GSM and Wi-Fi hotspots.
[1]
2. No about the ghting issue that i have reered in the subject topic.Now whether it is a facility for the world
base users to utilize viewing live views of streets world vide or it is an attempt to log in to the private data of
the users across.....yess...I repeat it is the private data of the users avaiable from the open WiFi signals from
their home computers and laptops.The intresting thing is that Google has accepted this collection of data
from unencrypted wireless networks....and they have put the blame on a masoom software engineer.Google
says the massive furore over Wi snooping by Street View cars was all the fault of one software engineer.In
an interview ,CEO Eric Schmidt said the whole aair came about because a software engineer inserted
unauthorised code into the Street View system software. The man is now under investigation internally by
the company as per posts on google blog.
[2]
3. Now what ever answer that google may come up with in form a mistake or simply putting the blame
on that software engineer(...where was the Software Testing deptt and QC then otherwise?),the point that
168
I intend putting accross is that just take care of envryting your WiFi router.Google has at least accepted
the fact and mistake and they are taking measures to rectify it...but it will not be always like that.....there
are so many mis adventurists present all around that looking around that unencrypted wireless networks for
misuse.....just [3]read this post again to avoid becoming a target like others.
4. Thanks [4]http://tech.blorge.com & [5]http://en.wikipedia.or[6]g/
1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TBj0WO9OOwI/AAAAAAAAAq8/OpvzXCfToog/s1600/google-street-tricycle.jpg
2. http:
//3.bp.blogspot.com/_z1QH8I3k9vk/TBjz92yhoVI/AAAAAAAAAq0/hdWkgcr439w/s1600/image-81729-panoV9free-ntwx.jpg
3. http://anupriti.blogspot.com/2010/03/wifi-at-home-take-precautions.html
4. http://tech.blorge.com/
5. http://en.wikipedia.org/
6. http://en.wikipedia.org/
WiFi Amplied 10 times : Here comes WiGig" (2010-06-16 22:40)
1. WiFi,the term that has revolutionised our lives at home with ease of access and mobile internet connectivity
is all set to receive a major boost in speed when the 60GHz frequency band comes into operation. Wi-
Fi Alliance conrmed an alliance with [1]WiGig" to expand the current WiFi band range. Current
WiFi technologies will remain, with the new 60Ghz range coming in to compliment these already existing
technologies. 60 GHz device connectivity will be an exciting enhancement to the capabilities of todays Wi-Fi
technologies. It will expand the utility of Wi-Fi, used by hundreds of millions of people every day.The goal
- to bring 7Gbps wireless connectivity to users!!!!
2. How does this happen? Basically transfer speeds that are turbo boosted. Today maximum data transfer
speeds are in the region of about 150 Mbps. Bringing in this new technology will boost that gure to
anywhere between 1 Gbps to 7 Gbps. That is about 10 times faster than the norm today. On the ipside,
higher frequency waves dont have the range of current lower frequencies, and the 60 Ghz band travels in a
straight line, meaning one would need line of sight between two devices to transfer data.
3. Estimates are that this technology will be available in devices that have dual-band or tri-band capabilities,
in approximately two years. These devices will most likely have the ability to switch between the current 2.4
Ghz or 5 Ghz, and the 60 Ghz band.
4. Thanks h[2]ttp://www.new-technology-world.com & [3]http://wirelessgigabitalliance.org/
1. http://www.blogger.com/WiGig%E2%84%A2
2. http://www.new-technology-world.com/
3. http://wirelessgigabitalliance.org/
Microrings - Ultimate Wireless Communication (2010-06-16 22:51)
1. Researchers based in Purdue University have developed a miniature device capable of converting ultrafast
laser pulses into bursts of radio-frequency signals, a step toward making wires obsolete for communications
in the homes and oces of the future.Such an advance could enable all communications, from high-denition
television broadcasts to secure computer connections, to be transmitted from a single base station, said
Minghao Qi, an assistant professor of electrical and computer engineering.The team fabricated tiny silicon
microring resonators, devices that lter out certain frequencies and allow others to pass. A series of the
169
microrings were combined in a programmable spectral shaper 100 microns wide, or about the width of a
human hair. Each of the microrings is about 10 microns in diameter.
[1]
2. Thus a single base station would be sort of a computer by itself, perhaps a card inserted into one of
the expansion slots in a central computer. The central computer would take charge of all the information
processing, a single point of contact that interacts with the external world in receiving and sending informa-
tion.There is no end to improvement......as i say.....just when we thought WiFi is the end of home trouble
shootings for easy connectivity...this goes many steps ahead.....
3. Thanks [2]http://www.new-technology-world.com
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TBkIQHF_igI/AAAAAAAAArM/eKpiryCABU0/s1600/microrings1.jpg
2. http://www.new-technology-world.com/connect/index.php?do=/Admin/blog/
microrings-new-technology-may-pave-the-way-for-ultimate-wireless-communicat/
INTEL : UPCOMING PROCESSORS (2010-06-18 23:13)
1. At an earlier post [1]here, I had discussed about the upcoming OSs incl Barrelsh,Midori,Helios etc likely
to be introduced by Microsoft in near future.....now some thing from leaked (which valve actually faltered
.no one knows?) source on the net about processors from INTEL,three quad-core Clarkseld processors,
the i7-720QM, i7-820QM and i7-920XM, clocked at 1.6GHz, 1.73GHz and 2GHz can be expected by the end
of this year
2. Low voltage chips including 25W 2.26GHz Core i7-660LM,1.46GHz Core i7-680UM and 1.33GHz Core
i5-560UM with an overall aim to enhance the battery life while end Dec 2010 will see high-end Core i7-680UM
that starts at 1.46GHz and speeds up to 2.53GHz and a 1.33GHz / 2.13GHz Core i5-560UM, plus a 25W
2.26GHz Core i7-660LM low-voltage chip will also see the year 2010. All these will have on-die Intel HD
Graphics .
3. Another 32nm Huron Riveris likely to make it to the user shores by early 2011 which will single handedly
handle WiMAX, WiDi and Intel Bluetooth alongside new concept dubbed Zero Power ODD which promises
a power-saving sleep mode for optical disks drives.
170
4. Thanks [2]http://www.theinquirer.net
1. http://anupriti.blogspot.com/2009/09/future-of-oss-microsoft-version.html
2. http://www.theinquirer.net/
PANOPTICLICK : Your Browser Finger Print (2010-06-25 21:19)
1. The development and growing interest in hacking and retrieving info from browsers has been gaining
signicant importance today when security is BAAP of all priorities in any IT eld.Today surfers are warned
that even with cookies deleted and disabled,advanced ngerprinting techniques could be used to identify
them.In an attempt to check and test browsers,[1]THE ELECTRONIC FRONTIER FOUNDATION has
come up with a site at http://panopticlick.e.org/ which tests your browser to see how unique it is based on
the information it will share with sites it visits.
[2]
2. Check out at [3]http://panopticlick.e.org/
1. http://www.eff.org/
2. http://4.bp.blogspot.com/_z1QH8I3k9vk/TCTRFlnv_5I/AAAAAAAAArU/Crqe5Hy7CIU/s1600/DE.png
3. http://panopticlick.eff.org/
Why not leapfrog 3G TO 4G? (2010-06-27 10:17)
1. It has actually been veri long hearing about Indian Government trying/deciding to start the 3G Spectrum
allocation. Finally few decisions have been made in last few weeks and something has been done in a limited
capacity.Now till the time this limited capacity becomes ready to take on fully operational 3G Services
across India,3G will be without doubt an obsolescent and old technology at global level.The amount of
infrastructure,investment,time and loads of eort that will be sucked in by this 3G setup is likely to go in
waste considering the thirst everywhere to be at par with the latest in communication.3G may look good
today when we are not aware of 4G Technology.For those who are interested to know about G family in
brief,pls click [1]here.
2. So,still when the exhaustive details on spectrum auction are awaited,why not leap frog to 4G thus
vamoosing the extraordinarily delayed 3G for attaining higher data speeds to nally allow users in India to
experience the state of art speeds.
1. http://anupriti.blogspot.com/2009/06/g-family-0g-to-4g.html
171
3.7 July
COWS & DATA CENTRES : LINKED!!!! (2010-07-03 21:40)
1. Cows and data centers ???Whats the link.......any guesses....strange you may nd but this has come from
HP who feel that both entities are connected...read on for the link///
2. According to HP Labs, the estimate dairy cow produced is about 55 kg of manure per day, and thus 20
metric tons per year. The manure that one dairy cow produces in a day can generate 3.0 kilowatt-hours
(kWh) of electrical energy.A medium-sized dairy farm with 10,000 cows produces about 200,000 metric tons
of manure per year. This farm can fulll the power requirements of a medium sized 1 megawatt (MW) data
center.The heat generated by the data center need not be wasted. Instead, it can be used to break down
animal waste which results in the production of methane.Methane can then be used to generate power for
the data center.HP Labs researchers say that this symbiotic relationship allows the waste problems faced by
dairy farms and the energy demands of the modern data center to be addressed in a sustainable manner.
3. Actually HP should have not just come up with the idea...with the strong hold they have in the market..it
would have more suited them to actually attempt the same on ground rather then advising and making
statistical data of the dung!!!!
4. Thanks [1]http://www.informationweek.in
1. http://www.informationweek.in/
Intel meets Car : Makes it SMART CAR (2010-07-07 18:01)
1. In an earlier post [1]here about Intels Bike,I discussed about how Intel had plans to get IT into Bike.Now
they have gone a step further.....I mean from Bike to Car...yess..they have graduated to Car.
2. Intel is currently working on a smart car that will register desired information about the speed, steering,
braking while also recording video footage from the outside.This would work well enough as a black box
since all the information can be used in case of crashes and if possible, even thefts. Safety features like an
on-board camera system, sensors to monitor the road condition, distance sensors to warn the driver of closing
in distances and mobile control to lock or unlock the car.
3. Thanks [2]http://www.newlaunches.com
172
1. http://anupriti.blogspot.com/2009/02/intel-bike.html
2. http://www.newlaunches.com/
IT meets HIGH TECH TAPS : Renshui Faucets (2010-07-08 19:36)
1. Water Taps with in-built chips , the Renshui high-tech faucets, allows customised control of the ow and
temperature of the water . All it takes is a simple touch and one can change these parameters to prepare a
perfectly tailor-made lovely bath.The water`s temperature is also displayed on the cool body of this faucet
that`s totally dierent in style and form.
[1]
2. With a simple touch, one can go from hot to cold water, on or o. Another great feature is the intelligent
light, which shows the water`s temperature to cut down the risk of scalding accidents. All these features
come wrapped in a contemporaneous design that will add sleek , style in additions to reducing your wallet
weight.
3. Thanks [2]http://www.trendir.com/
1. http://2.bp.blogspot.com/_z1QH8I3k9vk/TDXeaLjuGwI/AAAAAAAAArs/Q_h54J4dfTE/s1600/renshui-faucet.jpg
2. http://www.trendir.com/
MOST AMAZING TECHNIQUE TO TRANSFER DATA:SLURP (2010-07-08 22:21)
1. This is by far the most amazing thing I have seen in recent years....we have all seen ways to transfer
data from one PC to other including bluetooth,wi,cable and so on.....but this one involvesslurping up
(extracting) information and squirting out (injecting) pointers to digital objects. Hence, information can
173
be transferred from machine to machine without any kind of wired or unwired connection.It will be really
clear when you see the above video.....you use a dropper like object to pick up a folder from one desktop
to other......AMAZZZZINGGG!!!!!! [EMBED] 2. This clever innovation comes in from a former MIT Media
Lab student, Jamie Zigelbaum. 3. Thanks [1]http://zig.media.mit.edu/Work/Slurp
1. http://zig.media.mit.edu/Work/Slurp
SAMSUNGs GALAXY BEAM - Projector meets Mobile (2010-07-09 20:48)
1. Imagine one single mobile handset oering the following features : (a) Miniprojector at 640 x 480 pixel
resolution. (b) 3.7-inch Super-AMOLED (Active-Matrix Organic Light-Emitting Diode) (c) An 8-megapixel
camera. (d) Can be used as a wireless access point. (e) FM. (f) Wi-. (g) Bluetooth 3.0 (h) GPS (j)
Inbuilt 16 GB storage (k) TV out (l) MP3,MPEG4,WMV,DivX & H.264 (m) Touchscreen (n) 3G/EDGE
Connectivity (o) 530 hours Stand By (p) 7 hours talktime
[1]
2. Thats Samsung Galaxy Beam to be launched on 17th July 10
174
[2]
3. More at [3]www.[4]samsung[5]hub.com
1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TDc-MR8yl0I/AAAAAAAAAr8/16a70_vsaOA/s1600/2.bmp
2. http://2.bp.blogspot.com/_z1QH8I3k9vk/TDc-Ab8_GpI/AAAAAAAAAr0/tEJ8J4c6nEQ/s1600/1.jpg
3. http://www.blogger.com/www.samsunghub.com
4. http://www.blogger.com/www.samsunghub.com
5. http://www.blogger.com/www.samsunghub.com
Augment your regular desktop with a FACE RECOGNITION feature (2010-07-10 22:19)
1. Face recognition technology although has been compromised earlier on various times and occasions which
have been mentioned at this blog [1]here,[2]here and [3]here.But again things are improving with more
complex algorithms being used for processing and allowing a person to Log In.Now suppose an online exam
is being conducted which requires students to login with their accounts; anybody could login with anybody`s
account as long as they knew their username and password.So for regular window OS users,Luxand Blink
allows an alternative to traditional Windows login and a solution to problems. It provides its users with a
dierent way to login to Windows: through Facial Recognition.
[4]
175
2. [5]Luxand Blink is a free application comptable with 32 bit version of Windows Vista and Windows 7.
The download size of the application is 8MB and installs in a standard way. A webcam is required to be
installed in the computer...(did I need to tell that?)
3. So just look into a webcam for a moment, and you`ll be logged into your account before you notice.
Blink! employs advanced face recognition technologies to provide automatic, quick and reliable login to one
or many computer users. It uses its advance image recognition algorithms to recognize our face. Such is
the competence of this application, that whether the lighting is dierent or our hair are dierent, [6]Luxand
Blink will still recognize our face and log us in.So a regular old desktop becomes ready with the [7]FACE
RECOGNITION feature.
4. Thanks [8]http://www.luxand.com/blink/
1. http://anupriti.blogspot.com/2010/01/hp-in-racists-scoooop.html
2. http://anupriti.blogspot.com/2009/11/laptop-face-recognition-falls-flat.html
3. http://anupriti.blogspot.com/2010/03/search-web-by-face-recognition-work-is.html
4. http://1.bp.blogspot.com/_z1QH8I3k9vk/TDilyp0468I/AAAAAAAAAsE/4AZvNaV3rbI/s1600/12.jpeg
5. http://www.luxand.com/blink/
6. http://www.luxand.com/blink/
7. http://en.wikipedia.org/wiki/Facial_recognition_system
8. http://www.luxand.com/blink/
How Google detects Invalid clicks? (2010-07-10 22:35)
More often then not,most of the registered Google Ad sense users are always tempted to increase their
clicks on the ad to generate some monetary benet....this one comes specially for all those who try tricks of
trade....believe it or not their are none... Google is tooooooooo smart...read down below and links below :
1. IP Address If those clicked on their own ads multiple times from the same IP address means you will sure
get banned. 2. Sabotaged by third party Sometimes, you may also be sabotaged. A third party may decide
to do a series of illegal clicks on your advertisements for the purpose of getting you banned. If you notice any
suspicious clicks of this nature, Google encourages you to report it to them. 3. CTR The normal CTR ratio
must be in between 0.5 % 15 %. Anything more then 15 % will be agged. 4. Cookies Few Adsense users,
use the trick by using the dynamic IP address but it falls at as cookies in computer can be used to track
our cookies and help identify the invalid clicks. 5. Physical Location Google has many software and bots to
trace. They will trace the IP address of the small town and city. So do not click your own ads in dierent
internet cafe and also in friend`s home. If you do this, your account will agged. 6. Fake Web Trac Fake
web trac is anything that generates false impressions on your Google AdSense advertisements, including
participating in link farms or link exchange directories. 7. Search Engine Ranking If you got many clicks
without the help of search engine ranking, social media trac means Google will easily smell it. More veri
useful info here at [1]https://www.google.com and [2]http://www.ambabo.com
1. https://www.google.com/adsense/support/bin/request.py?hl=en&contact_type=invalid_clicks_contact
2. http://www.ambabo.com/do-you-know-how-google-detects-invalid-clicks/
Increasing Laptop Bty Life : Few ways (2010-07-19 07:15)
1. Hibernate: Hibernating the laptop is always a tidier option than putting it on standby, or shutting it
down. This is because the laptop`s hibernate mode saves it in the state it was hibernated in, and does not
require the laptop to reboot all applications, thereby using much less power.
176
2. Get some extra RAM: Whenever a laptop runs short of RAM memory it end up shifting to the virtual
memory which results in hard disk use, which is a much less ecient option in terms of power consumption.
Putting in extra RAM does use more power, so don`t get too much extra, but when compared to the use of
virtual memory it`s a more ecient option.
3. Apply energy saving options on the OS
4. Bring down the brightness of the screen
5. Shut Down External devices: Most USB devices and other external devices like external hard drives
or USB lights or even USB mice should be switched o and removed if not in use.
6. Shutdown background apps
7. Amend battery cycle: For a healthy Lithium-ion based battery, it is always suggested to keep the
electrons that are present inside in motion occasionally. That means it`s never a good idea to keep you
laptop plugged in or on charge all the time as the electrons lose their ability to store energy. One should let
it discharge fully and charge it completely at least once a month to keep the battery as good as new.
8. Switch-o unused wireless radios
9. Try to reduce multitasking: When using the laptop on battery power, one should try as much as
possible to use one application at a time, and should ideally shut one application completely before opening
another, to reduce consumption of both processing and battery power.
10. Defrag on regular intervals
User Mapped-Section open??? (2010-07-26 21:14)
1. Regular users of Torrents might have seen something like the title disturbing them and stopping them of
their downloads....i m one of them...so i tried and checked up few forums...tried doing force start etc...nothing
worked....then tried disabling the antivirus for a while.....and it worked.....
2. So...simply just disable the antivirus for the time u wish to download....so lose some...gain some....
3.8 August
IPAD WORLD & VARIETIES (2010-08-12 22:23)
1. Ever wondered about how many variants of IPAD exists from various companies apart from ap-
ple....many....and i mean really many....few of which i recently read in DIGIT
NOTION INK ADAM
1. Hard working hackers have recieved more then 700,000 pounds from thousands of
bank accounts in Britain using a malicious software which claimants say is the deadli-
est,brutaliest(whats this???)trojan attack ever seen....
2. More then 4,000 online banking customers have found themselves as unwanted customers
of this deal by hackers which empties their accounts while showing them fake statements so
the crime goes undetected.This trojan is being termed and guessed as a variant of the Zeus
177
trojan banking virus called Zeus v3. This is capable of collecting data such as passwords and
even transfers money out of accounts automatically.
3. Beware ...nothing of this scale has happened till date in INDIA...why....because poor dont
have much money and the rich keep and talk cash
1. Ever seen your account with minute details of each and every penny/cent/paise in your account...I m
sure many of you wouldnt have....how does it matter if its Rs 22323.45 or Rs 22322.12.....a dierence of
some paise ...we generally account for it against rounding o....but now on be ware...u may just be a salaami
target....better known as Saalami Attack
2. An example of this also known as penny shaving, is the mal practice of stealing money repeatedly in
extremely small quantities, usually by taking advantage of rounding o to the nearest money unit viz cent
or paisa in nancial transactions. It would be done by always rounding down, and putting the fractions of a
cent into another account. The idea is to make the change small enough that any single transaction will go
undetected.
3. IT comes with a whole lot of things...u get some,u loose some.....be ware.For more info click [1]here, [2]here
and [3]here.
4. Thanks [4]http://www.cyberpolicebangalore.nic.in and [5]http://en.wikipedia.org
1. http://all.net/CID/Attack/papers/Salami2.html
2. http://en.wikipedia.org/wiki/Salami_slicing
3. http://www.ibls.com/ibls-internet-law-document.aspx?d=2447
4. http://www.cyberpolicebangalore.nic.in/
5. http://en.wikipedia.org/wiki/Salami_slicing
Windows Systernals (2010-08-23 21:58)
1. I had not heard and read about this very low key but very powerful utility site which helps one manage,
troubleshoot and diagnose Windows systems and applications incl so many unheard functions and utilities
that one can go on and on exploring all.....the complete Windows systernals Suite can be downloaded by
clicking [1]here[2].
2. Another related site named [3]Sysinternals Live is a service that enables to execute Sysinternals tools
directly from the Web without hunting for and manually downloading them.
3. Must see and must try site.....click [4]here to hit direct.
1. http://technet.microsoft.com/en-us/sysinternals/bb842062.aspx
2. http://technet.microsoft.com/en-us/sysinternals/bb842062.aspx
3. http://live.sysinternals.com/
4. http://technet.microsoft.com/en-us/sysinternals/default.aspx
BILL GATES & Khan Academy (2010-08-25 21:55)
1. I m a follower of Bill Gates on twitter and have come to know of this khan academy thru this......
178
2. When every one looks forward to learning from Bill Gates on so many aspects of IT education.....where
do u guess his 11 year old son looks up-to for his education.....he follows Salman Khan...no no...not the
Bollywood Dabanggg...he is another Salman Khan.[1]..[2].click here to know more.....
3. Khan turns out thousands of videos from a converted walk-in closetin his Silicon Valley home (shown in
this pic below) ...................gr888888888 work...and imagine the amount of eort that he has put in single
handedly here......
4. This site at [3]http://www.khanacademy.org/ has 1600 plus videos for school level maths,chemistry and
science and many more subjects.....[4]more news ....click here
1. http://www.khanacademy.org/
2. http://www.khanacademy.org/
3. http://www.khanacademy.org/
4. http://money.cnn.com/2010/08/23/technology/sal_khan_academy.fortune/index.htm
3.9 September
Man in the Browser Attack : New dimension of cyber attack (2010-09-02 19:20)
1. The name is interesting though and so is the working behind....MITB (Man in the Browser) attacks are
designed by fraudsters to infect a web browser with malware which can result in mmodied web pages and
transactions that are largely transparent to both the user and the host application.Trojans incl [1]Silent
Banker,[2]Sinowal etc are pre programmed by fraudsters to activate when the user browser accesses a specic
website such as their online banking portal.The activated trojan can then track the online session and perform
real time interception etc that can lead to illegal money transfers,identity theft and further compromise on
the users personal info. 2. The Man-in-the-Browser attack is the same approach as [3]Man-in-the-middle
attack, but in this case a Trojan Horse is used to intercept and manipulate calls between the browser and its
security mechanisms or libraries in real time.A MitB attack will be successful irrespective of whether security
mechanisms such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place. 3. Thanks
[4]http://fanaticmedia.com/infosecurity/
1. http://www.symantec.com/security_response/writeup.jsp?docid=2007-121718-1009-99
2. http://www.symantec.com/security_response/writeup.jsp?docid=2007-121718-1009-99
179
3. http://en.wikipedia.org/wiki/Man-in-the-middle_attack
4. http://fanaticmedia.com/infosecurity/
ScareWare : One more WAREior in the family (2010-09-02 19:58)
1. Adware,spyware,malware....and now one SCAREWARE.Imagine this...u r surng innocently(???) on the
web via your home/oce PC,an advertisement appears on the web-page, trying to convince you that your
computer is at risk and you must download the anti-virus to clean it. Once you click on the advertisement,
a software trigger gets activated and you get caught in an unnerving loop impossible to abort. A scanner
window will appear with red-letter warnings listing viruses purportedly infesting your hard drive. A series
of dialogue boxes will follow giving you choices that all lead to the same screen: a sales pitch. Make the
purchase, and you get a bogus inoculation. Try to cancel it, and youll get repeated oers. Its like stepping
into quicksand. The more you try to get out of it, the deeper you sink.....this is Scareware..the latest new
generation way to get ur PC infected...although its rst origin dates to sometime in 2004...its now that this
is getting rm roots via increased strength of web surfers who are naive about security. 2. In brief, the
scareware trickery ensnares internet users in the following steps:
Criminals buy blocks of advertisement space on websites, intermittently slipping in a tainted adver-
tisement.
Just visiting a webpage with a tainted ad causes a fake warning box to appear.
Clicking OK or Cancel launches the same thing: a free scan.
After youve been lured into a fake free scan of your PC:
The bogus scan will purport to nd a virus infestation.
Ensuing boxes steer the user to activate Personal Antivirus, on left.
The activation prompts take the user to a shopping cart.
Declining to place an order triggers endless fake scans.
3. Thanks [1]http://fanaticmedia.com
1. http://fanaticmedia.com/
TABNAPPING : A new generation Cyber Crime (2010-09-02 21:25)
1. Another new term in the cyber crime is Tabnapping a combination of tab and kidnapping that could
be used by phishers to dupe users into giving up passwords by secretly changing already-open browser tabs.
All browsers on Windows and Mac OS X are vulnerable.It is thus a computer exploit,a kind of phishing attack,
which persuades users to submit their login details and passwords to popular Web sites by impersonating
those sites and convincing the user that the site is genuine. Eg . An open tab of Facebook for instance may
be a false window. But very few of us may notice. As a result, we readily log in our username and password
when prompted, only to fall to phishers.
180
2. [1]Aza Raskin is the person behind coining this term,this 1984 born genius is an active phishing re-
searcher.It is unlikely that Browser makers will patch this up soon the risk does not emanate from security
vulnerabilities per se.
3. However, every major browser has a lter of some kind designed to weed out malicious sites and sites
suspected of being infected with attack code. Those lters, assuming the blacklists underlying them are
current and accurate, would block tabnapping attacks.
4. Thanks [2]http://www.standardmedia.co.ke & [3]http://www.couponsherpa.com
1. http://www.google.co.in/url?sa=t&source=web&cd=3&ved=0CCUQFjAC&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%
2FAza_Raskin&ei=n8l_TPXfMYKGvAP8l4WhBA&usg=AFQjCNEn__1Loadv4fkU2tH5oUW6eRf9GQ&sig2=lF40D7j2Yi0SQBJo3mewOg
2. http://www.standardmedia.co.ke/
3. http://www.couponsherpa.com/
E-Waste & Indian Policy (2010-09-06 07:40)
1. In my earlier blog posts at [1]here,[2]here & [3]here ,issues of e-waste and its repurcussions were men-
tioned.....now seems like Indian govt has attempted to wake herself up and nd a solution.In a recent develop-
ment,Directorate of Revenue Intelligence (DRI) seized some containers in Chennai containing large quantity
of such waste. The imports were made despite a prohibitory order in this regard. The containers were full
of outdated computers and electrical waste. On further investigation, it was found that containers carried
hundreds of tonnes of e-waste sourced from Australia, Canada, Korea and Brunei in violation of norms.
2. E-waste is being dumped in the country by developing nations using loopholes in domestic rules which allow
NGOs and educational institutions to import such gadgets freely on the pretext of donations. onscious of the
fact that huge shipments of e-waste generated in developing countries are nding convenient burial ground
in India, the government had through a public notice on May 13, 2010 prohibited educational and other
institutions from importing second hand computers, laptops and computer peripherals, including printers,
plotters, scanners, monitors, keyboards and storage units. The step was short of a complete ban on such
imports.
3. The government is now looking at banning the import of used computers and other electronic waste -
coming primarily from developed nations such as US, Australia, Canada and parts of Europe - after several
cases of e-waste smuggling came to light recently. A decision is likely to be taken at the Economic Intelligence
Council meeting scheduled for this month to be chaired by nance minister Pranab Mukherjee.
4. Thanks [4]http://timesondia.indiatimes.com
1. http://anupriti.blogspot.com/2009/04/guiyu-connection-with-e-waste.html
2. http://anupriti.blogspot.com/2009/05/e-waste.html
3. http://anupriti.blogspot.com/2009/07/e-waste-deposit-get-paid.html
4. http:
//timesofindia.indiatimes.com/india/Govt-may-ban-import-of-e-waste/articleshow/6501864.cms#ixzz0yiABJRqh
181
New Gen BIOMETRICS : PALMSECURE from FUJITSU (2010-09-13 07:52)
1. Quiet often we seen biometrics ngers,palm,eyes,retina being chopped o in Hollywood movies for gaining
illegal access to control rooms and secure areas by the bad man...so we used to think like there is no end
and no permanent solution to this....now comes a solution to this problem wherein not the ngerprint or the
palm print is taken as authentication model....it is the veins inside that exist inside the palm that matter
and should match...now these veins should also be owing blood to authenticate the logger.
2. Fujitsu provides a highly reliable biometric authentication system based on palm vein pattern recognition
technology. PalmSecure" features industry-leading authentication accuracy with extremely low false rates,
and the non-intrusive and contactless reader device provides ease of use with virtually no physiological
restriction for all users.Applications include :
Physical access control / Time and Attendance
User authentication to PCs or server systems
Government / Commercial identity management systems
OEM terminal devices (POS, ATMs or information kiosks)
Other industry-specic applications
182
3. More about this [1]here.
1. http://www.fujitsu.com/us/services/biometrics/palm-vein/
ORDER OF VOLATILITY OF DIGITAL EVIDENCE (2010-09-15 21:04)
1. Not all information-based evidence is the same! Evidence can be organized into an 'order of volatility
meaning how long it will stick around for you to collect until it automatically is lost.
2. Dan Farmer & Wietse Venema created the below table of evidence volatility, which is commonly referenced
by forensic professionals. For example, information stored on a CD-R or some optical storage media can last
for about 10-100 years depending on the brand used. Information stored in a computer`s main memory, by
contrast, will last for only tens of nanoseconds before it is wiped out by the computer`s normal processing.
183
TYPE OF DATA
LIFESPAN
Registers, peripheral memory, caches, etc.
Nanoseconds or less
Main memory
Ten nanoseconds
Network state
Milliseconds
Running processes
Seconds
Disk
Minutes
Floppies, backup media, etc.
Years
CD-ROMs, printouts, etc.
Tens of years
3. Very critical from forensics point of view.....most people would want to turn a computer o (or at the
very least unplug it from the network) when they realize an incident has occurred. However, as noted in the
chart above, one will lose evidence in main memory and 'network state information (which other systems
the computer is connected with and what information they are exchanging) with such an approach. Even
shutting down a computer the 'normal way (Start / Turn O Computer / Turn O in Windows XP) can
delete evidence, as Windows performs a number of housekeeping tasks in the shutdown process, such as
closing opened les and clearing out the temporary disk cache.
4. Thanks Peter C. Hewitt (Read from Browser Forensics).
Cyber Warfare : It has started (2010-09-16 13:47)
1. I have been recently digging deep into reading [1]Tracking Ghostnet& [2]Shadows in the cloud.Crisp,to
the point,full of information,a must read for all IT Security savvy personnels.This is where I got to read about
184
[3]The May 2007 DoS Attacks on ESTONIA.Brief about this Estonia Case below :
2. Subject attacks on Estonia capitallyy known as Estonian Cyberwar or Web War 1, refers to a series of
cyber aggresses that began April 27, 2007 and deluged websites of Estonian organizations, including Estonian
parliament, banks, ministries, newspapers and broadcasters, amid the countrys row with Russia on some
relocation issue of the Bronze Soldier of Tallinn.Most of the attacks that had any inuence on the general
public were distributed denial of service type attacks ranging from single individuals using various low-tech
methods like ping oods to expensive rentals of botnets usually used for spam distribution. Spamming of
bigger news portals commentaries and defacements including that of the Estonian Reform Party website also
occurred.
3. Subsequent to the incident, a criminal investigation was conducted and On 24 January 2008, Dmitri
Galushkevich, a student living in Tallinn, was found guilty of participating in the attacks. He was ned 17,500
kroons (approximately US $1,640) for attacking the website of the Estonian Reform Party.So surprisingly,after
so much of damge had been done,so much of ministeries websites were defaced,the followup resulted in a single
conviction of a Russian Living in ESTONIA.Imagine....one single person from Russia was found responsible
for the cyber havoc that Estonia had to face.
4. The net and the cyber world is still in the stage of nascency and there is lots coming ahead for sure in
future...like the events surfaced in the movie [4]Live Free or Die Hard.Every one across the globe today has
realized the potential of Cyber warfare.....and the power is immense....anyone who is clear....stands as ONE
MAN ARMY.....as cited through one eg above.
1. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.nartv.org%2Fmirror%
2Fghostnet.pdf&ei=2dKRTKWtK4G2vQOG952SBA&usg=AFQjCNGmDHveSkcPYPDEfAIbi5V_6Wlcbw
2. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.nartv.org%2Fmirror%
2Fshadows-in-the-cloud.pdf&ei=pdKRTPKrCougvgOtkKGQBA&usg=AFQjCNG862EIwNn9zKt689y0-hUdDItN4g
3. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%
2F2007_cyberattacks_on_Estonia&ei=D9ORTOuRL4LovQO4-KXDAw&usg=AFQjCNGGEg4b8qvWEOshpfYXYTYmAdbKOg
4. http://www.google.co.in/url?sa=t&source=web&cd=2&ved=0CCYQFjAB&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%
2FLive_Free_or_Die_Hard&ei=UdORTMSqL46kvgOpkqGIBA&usg=AFQjCNHJ42RoeUPO2ZU7UoC5oFFHSCUrcg
ZERO DAY EXPLOIT : ??? (2010-09-18 22:45)
1. While reading an article on [1]Browser Forensics,came across this term 0-day exploit....whats it all
about?
2. A zero day exploit is a malevolent computer attack that takes capitalizes on a security hole before the
vulnerability is known. This means the security issue is made known the same day as the computer attack is
made. In other words, the software developer has zero days to prepare for the security breach and must work
as quickly as possible to develop a patch or update that xes the problem.This occurs on or before the rst
or zeroth day of developer awareness, meaning the developer has not had any opportunity to distribute a
security x to users of the software.
185
3. Zero day exploits may involve viruses, trojan horses, worms or other malicious code that can be run
within a software program. While most programs do not allow unauthorized code to be executed, hackers
can sometimes create les that will cause a program to perform functions unintended by the developer.
Programs like Web browsers and media players are often targeted by hackers because they can receive les
from the Internet and have access to system functions.While most zero day exploits may not cause serious
damage to your system, some may be able to corrupt or delete les. Because the security hole is made
known the same day the attack is released, zero day exploits are dicult to prevent, even if you have
antivirus software installed on your computer. Therefore, it is always good to keep a backup of your data in
a safe place so that no hacker attack can cause you to lose your data.
4. Thanks [2]http://www.techterms.com/
1. http://www.google.co.in/url?sa=t&source=web&cd=2&ved=0CBoQFjAB&url=http%3A%2F%2Fwww.browserforensics.org%
2F&ei=UPSUTNWyGYygvgOL0MyZDQ&usg=AFQjCNEj7ZDkhthSVE3OzOE14Xb-IT3HvQ
2. http://www.techterms.com/
Root Kits : Hidden Undetected Threats (2010-09-18 22:57)
1. Malwares,trojans,adwares,spywares,virus,wormwares etc etc....protection vide Internet security editions by
so many OEMs...and now rootkits(its not actually a recent development....)...has been in the threat making
for about 10-12 years..but now the term is getting serious....so what actually are rootkits?
2. Rootkit is the term given to a group of utilities that hackers can misrepresent to keep access into a
computer system once they have hacked into it. It gives them admission rights to nd out usernames
and passwords, allow strike against remote systems, remain hidden by erasing history from the system
logs, and overabundance of various surreptitious tools.Rootkit is a combination of two words, 'root and
'kit. Root means supreme & Kit means a group of programs or utilities providing access to a user to
retain a constant root-level contact to a terminal. The presence of rootkit ideally remains untraceable.
186
3. So more simply,they are a set of programs
that can hide not only themselves but also other viruses, spyware, keyloggers and network trac from normal
antivirus and spyware removal software! Yes, a rootkit can infect your computer and take full control of it!
You look inside a folder which contains rootkit les but you will see nothing. Why? Because the rootkit has
told it to tell the user there are no les here. That is why, they are so dangerous and hard to detect...... 4.
BlackLight,RKDetector 2.0,RootkitBuster 1.6,RootkitRevealer 1.71 & Rootkit Unhooker 3.0A are few of the
rootkit removal tools available...google for further details 5. Thanks [1]http://www.rootkitonline.com/
1. http://www.rootkitonline.com/
Browser Forensics - Not Simple (2010-09-19 13:26)
1. Just read one book by [1]Peter C.Hewitt on Browser Forensics.An eye opener for anyone....the amount of
info that stands compromised whilst using any browser is astonishing.....
2. Now in a normal routine maintenance when I used to clear my browser History,cookies and cache....when I
used to remove unnecessary les using utilities like [2]Glary Utilities,[3]Cc Cleaner and [4]Tuneup utilities....i
used to think that there r no traces left...before I was introduced to [5]Mandiants Webhistory, [6]Pasco,
[7]Galleta and [8]IE Passview.
3. I checked up rst with [9]Mandiants Webhistory....an 8 MB le...simple to install
,free.Web Historian
is a program that allows an investigator to collect, display and analyze web history data using Mandiant
Intelligent Response (MIR) technology. It seeks to provide a customizable yet simplistic interface to view
and navigate voluminous amounts of web history data. Perhaps the most powerful feature is the ability to
correlate and provide multiple views of the data (including graphical and timeline) through the Analyzer
and Web Proler tool, in the hopes that investigators can come to well-informed conclusions about the data
quickly.
4. So after I cleaned up my PC using every utility....and scanned the PC with this software....the result was
like nothing has been removed...all what I had accessed in last few days stands out in a compiled tabulated
form ready to be saved as a Excel le for record.So what exactly allows this info extraction in spite of
assurances from utilities available.The most recent versions of Windows store information about the pages
viewed by the browser in a le called index.dat. One of the index.dats, in turn, contains information pointing
to other les used in the browsing session. Windows has 3 types of index.dat les, for the cache, history and
cookie les, respectively.Obviously, viewing all 3 types will give us the best understanding of what browsing
took place. So....its not simply erasing ur history that could save you at some time......there is much much
more ........
1. http://www.browserforensics.org/wp.../03/BrowserForensics-v1-03-03-2010.pdf
2. http://www.glaryutilities.com/
3. http://www.piriform.com/ccleaner/download
4. http://www.tune-up.com/products/tuneup-utilities/
5. http://www.mandiant.com/
6. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.opensourceforensics.
187
org%2Ftools%2Funix.html&ei=EL-VTLnEKo2CvgPA05GaDQ&usg=AFQjCNFDCDT1hNbmmc_bCIjYd_HLC9Bptg
7. http://www.foundstone.com/us/resources/proddesc/galleta.htm
8. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.nirsoft.net%2Futils%
2Finternet_explorer_password.html&ei=J7-VTLW4G4KiuQPSl_GtDA&usg=AFQjCNGPXqseM96ZRiYB_j7CyfJRUh8dRA
9. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.mandiant.com%2F&ei=
-MCVTNLhMYOuvgOVkvjFAw&usg=AFQjCNGB8oo0VnFU1qzwiNmkZ7LWHh4Ekw
Shadows in the Cloud : Cyber Espionage (2010-09-30 11:24)
Uploaded a Presentation on this recently been my fav article to read on Scribd.....
[1]Shadows in the Cloud
1. http://www.scribd.com/doc/38447191/Shadows-in-the-Cloud
3.10 October
CLEANERS & FOOTPRINTS (2010-10-07 17:14)
1. O late I have been experimenting with few softwares which claim to do a 100 % cleansing action
of removing every browsing marks and history of any kind on your computer that u use for work and
surng.These incl the following :
- CyberScrub Privacy Suite v 5.1 - [1]PC Tools Privacy Guardian v4.5 - [2]Webroot Window Washer 6.5.5.155
- [3]MilEraserSetup XP2k - [4]Privacy-eraser - [5]Notrace-setup - [6]Eraser 6.0.7.1893
2. Among these I have no doubts of who is leading?....CyberScrub Privacy Suite v 5.1 & PC Tools Privacy
Guardian v4.5.Though CyberScrub Privacy Suite v 5.1 does leave Chrome traces and doest have Chrome
included in its list of browsers......It does a pretty neat job by giving options of wiping that include Navy
Sta Oce Publication (NAVSO PUB) 5239,Russian Gost,Brouce Schneier algorith and many others with
options of selecting passes......on the other side ie PC Tools Privacy Guardian v4.5...includes chrome as a
option to be selected with similar wiping algorith options.....
3. Try you must.......all of them to know the real dierence or simply follow the recommendations......
1. http://www.pctools.com/privacy-guardian/
2. http://www.webroot.com/En_US/consumer-products-windowwasher.html
3. http://3d2f.com/tags/mil/eraser/
4. http://www.privacyeraser.com/
5. http://www.no-trace.org/
6. http://eraser.heidi.ie/
Security Enabled Hardware :INTEL - McAfee Merger (2010-10-08 17:54)
1. 'Security is more eective when enabled in hardware provisions for something in the pipe known as
Security Enabled Hardware.Howzzz that???? There has been a lot of speculation about the rationale behind
Intels recent acquisition of McAfee....well if u r not aware of this Intel`s proposed $7.7billion purchase of
188
McAfee that comes as the most magnanimous takeover deal in the chip giant`s 40-odd-year history....u better
be now....although there is no product roadmap to speak of yet.
[1]
2. McAfee technology deeply desegregated into Intel products would mean adding security functional-
ity into Intel`s chip. But would this pushing security into silicon be able to negate the increasingly
sophisticated and dynamic threats from cyber crime? Though components of security could be sig-
nicantly enhanced if chips were designed integrating this way. What about updates,patches etc [2]
3. Security in the 21st century is about being dynamic, responding to the ever-changing threat landscape
in real-time, which you can do with a cloud-based system powered by a network of threat intelligence sen-
sors and reputation-based technologies that stop threats before they even hit the device. Pushing security
down to the hardware level makes it very dicult to be reactive, agile or fundamentally secure. 4. Thanks
[3]http://www.infosecurity-magazine.com
1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TK8N6-QPdhI/AAAAAAAAAuc/dfrD7LmDaRc/s1600/intel-mcafee1.jpg
2. http://4.bp.blogspot.com/_z1QH8I3k9vk/TK8MvQ2avLI/AAAAAAAAAuY/j3wWQLT8LT0/s1600/masthead_intel.jpg
3. http://www.infosecurity-magazine.com/
(2010-10-08 19:32)
(2010-10-08 19:38)
My routine surng on net invariably includes few video downloads,uploading videos to you tube and other
sites sometimes,convert various available audi video formats to compatible formats with the help of so many
189
convertors available accross,ddling with audio formats,burning CDs & DVDs with videos and data les....in
a typical scenario all this would be done on arange of softwares of dierent companies.....came across this
absoutely free software ie FREE STUDIO...one single window solution to evri task as mentioned above and
much more....and yes it is absolutely free...try it must...
ALL izz WELL!!!!!inside this- Check out FREE STUDIO (2010-10-08 21:56)
My routine surng on net invariably includes few video downloads,uploading videos to you tube and other
sites sometimes,convert various available audi video formats to compatible formats with the help of so many
convertors available accross,ddling with audio formats,burning CDs & DVDs with videos and data les....in
a typical scenario all this would be done on arange of softwares of dierent companies.....came across this
absoutely free software ie [1]FREE STUDIO...one single window solution to evri task as mentioned above
and much more....and yes it is absolutely free...try it must...
[2]
1. http://www.dvdvideosoft.com/free-dvd-video-software.htm
2. http://1.bp.blogspot.com/_z1QH8I3k9vk/TK9FjmRuCpI/AAAAAAAAAug/surFwtQF5MY/s1600/Capture.JPG
RISK MANAGEMENT : Beware while u update with Patches (2010-10-08 22:09)
1. A zero-day exploit as discussed at an [1]earlier post in this blog .....Some thing more to it...
2. A good extract straight lift from [2]Infosecurity-magazine.com
For a vendor, developing the update is not the part that takes time testing is. We have more than 600
million downloads when we publish an update. If we 'just break 10 % of the systems the update is installed,
it would be a huge denial of service. So testing is the name of the game. How well is an unocial patch
tested?Often the vendor publishes workarounds (at least we do). This should be part of your risk mitigation
strategy. Would the workaround be acceptable to buy you time?
How far do you trust the author of the unocial update? How big is the risk that the update comes with
pre-installed malware? The question immediately comes up: Why should we trust a vendor? Well, you
bought or downloaded the software at the rst hand so, you decided to trust the vendor at the beginning.
190
What do you do once the vendor releases an update? Can you de-install the unocial update?
Basically, it is a risk management decision, which should include at least the questions I raised above. Do
not just run for the unocial update to me it should be really the last resort, if even!
3. A good site to follow : Check out [3]http://www.infosecurity-magazine.com[4]
1. http://anupriti.blogspot.com/2010/09/zero-day-exploit.html
2. http://infosecurity-magazine.com/
3. http://www.infosecurity-magazine.com/
4. http://www.blogger.com/
Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla
(2010-10-08 22:32)
1. I am sure we all endeavor to keep the antivirus updated,keep the OS patch updated,keep cleaning reg-
istries,keep cleaning browser history at regular intervals,keep ensuring regular complete scan of the precious
PC Machine that we own....we all do this to ensure that we r safe while we browse...now read further to nd
out how it all goes in vain even with the best and leading browser company......
2. Antivirus company [1]Webroot have identied an information extracting trojan, which alters a Firefox
le, so that the browser stores passwords automatically.The trojan is named as Trojan-PWS-Nslogm and
is capable of stealing usernames and passwords stored by both Internet Explorer and Firefox browsers.By
default, whenever Firefox detects that login credentials are submitted through a Web form, it oers to
remember them for future use.When this happens, the user is presented with several options which include
Remember, Never for This Site or Not Now. If they choose remember, the browser stores the username
and password in a local database.Since its easier to steal credentials from this database instead of injecting
the browser process and grabbing them as they are submitted, the author of this trojan thought it would
make more sense to have Firefox remember all passwords without asking users for conrmation.To achieve
this, he created a routine to patch the nsLoginManagerPrompter.js le in the Firefox installation by adding
new code and commenting out some already existent lines.The Trojan then scrapes information from the
registry, from the so-called Protected Storage area used by IE to store passwords, and from Firefox`s own
password storage, and tries to pass the stolen information onward, once per minute, Andrew Brandt, a
malware researcher at Webroot, explains.
3. The password stealer installs itself in the c:\windows\system32 folder as a le called Kernel.exe. The
captured data is send to a command and control server via a deprecated ActiveX control called msinet.ocx.
4. So kya solution hai?...whats the solution to this?...simply stop using internet....just joking...solution being
worked out still at FIREFOX labs.Thanks [2]http://news.softpedia.com
1. http://www.webroot.com/En_US/consumer-products-antivirus.html
2. http://news.softpedia.com/
Stuxnet : A Milestone in Malicious Code History (2010-10-11 22:19)
1. Stuxnet,the internet worm,intent of which was thought to eect Irans nuclear programme has now taken
a U Turn towards HINDUSTAN....
191
2. American cyber warfare expert Jerey Carr has assured the GoI,that China the originator of this worm
which has terrorised the world since Mid 2010. Ascribing the break down of ISROs INSAT 4B satellite a
few months ago ,Carr said it is China which gained from the satellite failure. Although he re arms that the
conclusions are not denite.Invariably the eected systems are loaded with a Siemens software which have
been specically targetted to which Siemens has released a detection and removal tool.Siemens recommends
installing the Microsoft patch for vulnerabilities and disallowing the use of third-party USB sticks.It is further
contemplated that incorrect remotion of the worm could cause irrepairable damage.
3. Jerey Carr says The satellite in question (INSAT 4B) suered the power glitch in an unexplained
fashion and its failure served another states advantage in this case China, he said.The connecting link
between INSAT 4B and Stuxnet is that the Siemens software is used in ISROs Liquid Propulsion Systems
Centre ie S7-400 PLC and SIMATIC WinCC.Something about Stuxnet...these attack Windows systems using
four zero-day attacks and targets systems using Siemens WinCC/PCS 7 SCADA software. It is initially
spread using infected USB ash drives. Once inside the system it uses the default passwords to command
the software.Few intretsing things about this :
- Half a megabyte in size
- Written in dierent programming languages (including C and C++)
- Digitally signed with two authentic certicates which were stolen from two certication authorities (JMicron
and Realtek) which helped it remain undetected for a relatively long period of time. - Capabable to upgrade
via peer to peer.
- Eric Byres, an expert in maintaining & troubleshooting Siemens systems, expects that writing the code
would have taken many man-months.
4. Stuxnet is a threat aiming a specic industrial control system such as a gas pipeline,satellite systems &
power plants. The ultimate goal of Stuxnet is to sabotage the facility by reprogramming programmable logic
controllers (PLCs) to operate as the attackers intend them to, most likely out of their working and identied
boundaries.This worm represents the rst of many milestones in malicious code history ,it is the rst to exploit
four 0-day vulnerabilities, compromise two digital certicates, and inject code into industrial control systems
and hide the code from the operator. Whether Stuxnet will usher in a new generation of malicious code
attacks towards real-world infrastructure,overshadowing the vast majority of current attacks aecting more
virtual or individual assetsor if it is a once- in-a-decade occurrence remains to be seen.Stuxnet is of such
great complexity requiring signicant resources to developthat few attackers will be capable of producing
a similar threat, to such an extent that we would not expect masses of threats of similar in sophistication
to suddenly appear. However, Stuxnet has highlighted direct-attack attempts on critical infrastructure are
possible and not just theory or movie plotlines.The real-world implications of Stuxnet are beyond any threat
we have seen in the past.
5. When is India actually going to work for itself rather then performing across the globe...y is the world
telling us that we are eected here...even in the case of [1]SHADOWS IN THE CLOUD...we were told by the
[2]Shadow server foundation that our institutes have been compromised inspite of the fact that we have all it
takes to take the IT world by storm...but we are all working for ourselves...and not for own country...cream
is owing out and getting outsorced..IT IS ACTUALLY SAD THAT THE WORLD KNOWS INDIAS
POTENTIAL BUT THE INDIANS DONT KNOW THIER OWN.....
1. http://anupriti.blogspot.com/2010/09/shadows-in-cloud-cyber-espionage.html
2. http://www.shadowserver.org/wiki/
192
Biggest release of Patch update by MICROSOFT (2010-10-12 07:27)
1. Patches by MS to be released today are said to be the biggest and largest batch of updates by Microsoft
since Oct 2003.According to Microsoft, this batch will be the LARGEST in its history with no less than 16
security updates designed to address a total of 49 vulnerabilities in Windows, Internet Explorer, MS-Oce
and the software giants .NET Framework.
2. All this eort and size of the patches by MS reects how vulnerable each one of us remains to the
hacking and leak of personal info in wrong hands....the batch of updates will include Windows 7 critical
updates,updates for Internet Explorer, MS -Oce 2010.And all those happy using the pirated copies of OS
across remain as vulnerable as they are already....
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:41)
1. First watch this video and then read few lines on what CYBERTECTURE is?
[EMBED]
2. A state of art technological concept that appropriates a emblematic relationship between the urban fabric
and technology. It excogitates both hardware of built environment and software system and technologies
from micro to macro scales of development.I am sure the video would have opened thinking horizons to what
mroe can be done with this.....wish to read more....[1]click here
3. Click for more at [2]http://www.jameslawcybertecture.com/
1. http://www.jameslawcybertecture.com/
2. http://www.jameslawcybertecture.com/
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:55)
1. First watch this video and then read few lines on what CYBERTECTURE is?
[EMBED]
2. A state of art technological concept that appropriates a emblematic relationship between the urban fabric
and technology. It excogitates both hardware of built environment and software system and technologies
from micro to macro scales of development.I am sure the video would have opened thinking horizons to what
mroe can be done with this.....wish to read more....[1]click here
3. Click for more at [2]http://www.jameslawcybertecture.com/
1. http://www.jameslawcybertecture.com/
2. http://www.jameslawcybertecture.com/
CANURE : 100 on ACID3 Test (2010-10-15 19:57)
1. Last year in March 09,I [1]wrote on my acquaintance with ACID3 and then CHROME scored the highest
among the then present browsers.....now here comes a little known [2]CANURE and u believe it or not...whats
193
the score?...100 on 100......perfect 100....m sure worth a try...when chrome is scoring about 80 in 100 ,this
claims getting 100/100 in Acid 3 Web Tests and 145/160 in HTML 5 Test.
2. [3]Download here.
1. http://anupriti.blogspot.com/2009/03/fight-of-browsers-acid3-test.html
2. http://www.blixcorp.com/Blix.htm
3. http://www.mediafire.com/?hxbwaf9v1a69wyi#1
Is ur Account Hacked ?- Common ways u get compromised. (2010-10-16 07:43)
1. There is no doubt on the fact that [1]Google users are growing phenomenally.....and with this growing rise
also comes the phenomenal rise and ways to get compromised or become a [2]botnet.Thus a Google Account
is also valuable for spammers and other unknown citizenry looking to impair you with ur personal info and
data on ur pc and account inbox. It`s not so much about your account, but rather the fact that your circle
of relatives and friends see your Google Account and mails from it as reliable.
2. Nothing new about this but the most common ways hackers can login to your Google password are:
Password re-use: You sign up for an account on a third-party site with your Google username and
password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access
to your Google Account.
Malware: You use a computer with infected software that is designed to steal your passwords as you
type ('keylogging) or grab them from your browser`s cache data.
Phishing: You respond to a website, email, or phone call that claims to come from a legitimate
organization and asks for your username and password.
Brute force: You use a password that`s easy to guess, like your rst or last name plus your birth
date ('ujjwal3008), or you provide an answer to a secret question that`s common and therefore easy
to guess, like 'dosa for 'What is your favorite food?
3. Another common error that we all unknowingly is that we keep the password same for multiple accounts
on [3]yahoo,[4]gmail,[5]blumail and so on.......put on ur thinking caps......if one account linked to other user
name is compromised ....then in a way all are....
1. http://en.wikipedia.org/wiki/Google
2. http://en.wikipedia.org/wiki/Botnet
3. http://en.wikipedia.org/wiki/Yahoo!
4. https://mail.google.com/mail/?shva=1
5. http://www.blumail.org/
194
Stuxnet : Some more good info (2010-10-16 08:06)
1. Recently,[1]after i mentioned Stuxnet on [2]Meliorate...I found some more good info and FAQs at
[3]http://www.newscientist.com/........must read....
1. http://anupriti.blogspot.com/2010/10/stuxnet-milestone-in-malicious-code.html
2. http://www.anupriti.blogspot.com/
3. http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is-like-nothing-seen-before.html?full=
true
CaaS : CRIME WARE AS A SERVICE at oer now (2010-10-18 18:05)
1. Bhaigiri...Supari..khokha...and similar terms have been till date used in reference with the crime
world...now come to terms like [1]Software as a Service(SaaS), [2]Hardware as a service(HaaS) ,[3]Platform
as a service(PaaS) etc and the list is all set to become endless with cloud computing...whats the relation
here?????..it goes 2 merge these two separate worldsie CRIME & IT....the earlier terms mentioned pertain
to the world of crime and the later once refer to the vast possibilities and power knocking the users....thus
refers to Crimeware as a Service(CaaS)
2. The controverting side is the world of hackers & cyber criminals who seem to exploit their technical
tools to great eect. However, even for newbie hackers eager to join this world don`t need to possess the
required levels of technological expertise. CaaS (Crimeware-as-a-Service) pulled out of some distant Cloud
can provision the necessary tools, be they Virus/Worm Creation Kits, [4]Denial of Service (DoS) applications
or more simply estabilishing a botnet.A recent research proved they can be just a mouse click away! Kits
were easily located to build a variant of 'Indra` Malware, as well as a manifestation of Badboy , providing
the user with the power to create their own version to send on to their targets.
3. Granted these are not examples of cutting-edge malware, but they do however still pose a threat to
the unprepared and unsuspecting organisation. As amazing as it may seem, even today there are large
organisations who permit access to sites, and allow the download of Malware Construction Kits and even
more worrying, there are still pockets of companies who do not maintain their anti-virus or patches in an
up-to-dtate condition.
4. Crime is going to be a inherent part in the cyber world and the cause of worry is that unlike army and
mil est in the real world...no concrete eort and source is there to resist these evil forces.We are still acting
to a situtaion when need of the hour is to be more then PROACTIVE.....
5. Thanks [5]http://www.infosecurity-magazine.com/
1. http://en.wikipedia.org/wiki/Software_as_a_service
2. http://searchitchannel.techtarget.com/sDefinition/0,,sid96_gci1285741,00.html
3. http://en.wikipedia.org/wiki/Platform_as_a_service
4. http://en.wikipedia.org/wiki/Denial-of-service_attack
5. http://www.infosecurity-magazine.com/
Service Packs & Infection Rates (2010-10-19 22:19)
1. First it was windows XP..then it was SP1(Service Pack 1)...followed by SP2,SP3 ...further by Vista
SP1,SP2 and now Windows 7...how the upgrades in these packs have been reducing the infection rates is
briey reected as per stats from [1]Microsoft Security Intelligence Report.
195
- Infection rate for windows XP with SP3 is less then half of that for SP2 and less then a third of SP1.
- Windows Vista SP2 has a lower inefction rate then SP1 which is about 50 % lower then Windows Vista
Basic.
- In case of Server Operating SystemS,the infection rate for windows server 2008 with SP2 is about 20 %
less then the predecessor ie Windows Server 2008 RTM.
2. Thanks [2]http://www.microsoft.com/security/sir/
1. http://www.microsoft.com/security/sir/
2. http://www.microsoft.com/security/sir/
Collection of Forensic Softwares : TUCOFS (2010-10-20 21:56)
I found this good link with a identied set of softwares for various OSs and lot many links to other web-
sites..worth a look if u have some interest in [1]DIGITAL FORENSICS
Check out this link at [2]TUCOFS - The Ultimate Collection of Forensic Software
1. http://en.wikipedia.org/wiki/Digital_forensics
2. http://www.cybersnitch.net/tucofs/tucofs.asp?mode=mainmenu
Crack 14 Character passwords in Seconds : Objectif Scurit (2010-10-26 07:57)
1. There have been articles and forums on the powerful high speed GPU (video card) processors being able
to easily provision cracking passwords very apace.A new technology steps here to rule the roast and allow
password cracking upto 14 characters in seconds.....this is called [1]Objectif Scurit ,by a Swiss security
company,which uses rainbow tables on SSD drives.Seemingly it is the hard drive access time and not the
processor speed that slows down cracking speed. So using SSD drives can make cracking faster, but just how
fast? This technique has a phenominal capacity that could crack passwords at a rate of 300 billion passwords
a second, and could decode complex password in under 5.3 seconds.
2. A real time demo of cracking is available on line at [2]Objectif`s free online XP hash cracker.Just visit the
link and see urself by mentioning the hash in the text box.....astoundingly simple....
3. Thanks [3]http://www.objectif-securite.ch/en/products.php
1. http://www.objectif-securite.ch/en/products.php
2. http://www.objectif-securite.ch/en/products.php
3. http://www.objectif-securite.ch/en/products.php
Image Ballistics : Incredible IT (2010-10-31 16:20)
1. In a typical crime or a murder case anywhere involving a pistol or a ring weapon,the forensic or the
investigating personnels involved can make out the make and model of the ring weapon with the help of
the bullet found on site.The eld dealing with this is known as ballistics.Now sync this with the eld of
IT....now imagine that u have shot a photograph or are analyzing some pic and you wish to know which
camera was used to shoot that pic.......can u nd out???????Yes....the answer is yesss!!!the eld is known as
Image Ballistics.
196
2. In a recent case,i read about a rave party being organized at outer skirts of a city with about a 200 plus
people ,all collegites and similar age group....all of them had a blast and a few with some wrong ideas caught
hold of a girl...drugged her and made some obscene mms and clicked some pics...next day it was uploaded
on the you tube and the social networking sites.....now how to nd the culprit?pretty dicult when about
a 200 plus strength of personnels have to be inquired.....the answer is Image Ballistics....the investigating
agency got hold of the pics...came to know which model the pics were clicked from...yes the answer was
a famous Nokia Model mobile.....so the owners were now limited to 8 out of the 200 plus strength...there
mobiles checked and the simple recovery softwares were enough to nd out the culprit......imagine....isnt it
astonishing.....
[1] 3. I checked up the state of pics clicked from my
camera years back and all answers were correct.....few Nikon,few sony.......one easy and free tool for such
investigation is [2]JPEGSNOOP.Simple to download,very small size and great analysis report.....
4. [3]To know more click here......
1. http://2.bp.blogspot.com/_z1QH8I3k9vk/TM1Lrg5QMII/AAAAAAAAAuo/H9Qd16rQnew/s1600/CYBER+FORENSICS.jpg
2. http://www.impulseadventure.com/photo/jpeg-snoop.html
3. http://www.impulseadventure.com/photo/jpeg-snoop.html
VIRUS in Boot Sector in Hard Disk fresh from OEM!!!! (2010-10-31 21:08)
Have recently heard of this in reputed makes and model of Top list hard disks OEMs.Would like to know if
some has ever encountered this or has any form of info on this?
OPERATION CISCO RAIDER (2010-10-31 22:24)
1. Counterfeiting is not new....since we were born we have been seeing duplis and counterets of
Reebok,nike,hmv etc...the list is actually endless....this endless list is now augmented with IT inventory....to
cite you an example which has rocked the nations across is about OPERATION CISCO RAIDER.
2. Relevant original EXTRACT FROM [1]http://www.coastnetwork.com is produced below :
Cisco made a decision a decade ago to manufacture product in China as a way of cutting production costs.
A great deal of Cisco manufacturing is now done overseas, specically in China. What has happened is that
many of the companies that do the outsourcing for Cisco now run an extra shift and sell the now counterfeit
hardware out the back door. After all, they have the manufacturing capability, the expertise and the full
197
blessing of Cisco. The result? More and more counterfeit Cisco hardware is now showing up on American
shores. Part of the problem is that China does not have strong intellectual property protection laws. This is
a situation that Cisco and many other companies are still struggling to solve and one that does not promise
to be resolved soon.
Warning signs of a possible counterfeited item:
If you are getting discounts of 40-55 % o the list price for brand new hardware, i.e. sealed boxes, then
it is a red ag. The largest of Cisco`s customers the Bank of Americas, Ford Motor Company, United
Airlines, AT &T, etc. get these discounts. You don`t. If it is any consolation, even dealers do not get the
top corporate discounts.
While it is attering and tempting to receive big discounts for new Cisco hardware, it is also unrealistic and
should be treated with the utmost caution.
Ask what the retail price is and compare it to the price you are being quoted. If you are getting a 15-25 %
discount from the list price for new/sealed hardware, then you are being quoted a fair and realistic price.
Expect a reasonable discount, however; too big a discount often spells trouble.
Another sign to be aware of is the receipt of unsolicited email from unknown dealers oering you Cisco
hardware at very good prices. This warning is doubly true if the email or company originates from mainland
China.
3. Thanks [2]http://www.coastnetwork.com/counterfeitcisco
1. http://www.coastnetwork.com/
2. http://www.coastnetwork.com/counterfeitcisco
3.11 November
6$ is all to shut down a Cloud Client site!!!! (2010-11-01 08:34)
1. [1]CaaS,as mention at an earlier blog post here,has come up with a new success(or is it failure?) story.Now
this goes like this.....invest $6 and take down any clients server with the help of Amazons EC2 cloud
infrastructure!!!!!
2. The cloud-based denial-of-service attack was part of a presentation : Cloud Computing, a Weapon of Mass
Destruction? An onsite demo during the presenatation by Bryan and Anderson involved entering a name and
credit card number, the experts created a handful of virtual server instances on Amazons EC2. They started
with only three virtual servers, uploaded their prototype attack tool, called [2]Thunder Clap, scaled up to 10
servers, and then took their clients company o the Internet.Security consultants David Bryan of Trustwave
and Michael Anderson of NetSPI said that they encountered nothing to stop them, like no special bandwidth
agreements and no detection mechanisms for servers taking malicious actions. Their Thunder Clap program
uses cloud-based services to send a ood of packets toward the target companys network. They reported that
they can control the software directly or through a command left on a social network.Bryan and Anderson
launched the attack to test their clients network, a small business that wanted its connectivity tested.
According to DarkReading, Bryan said, A threat agent could potentially run extortion schemes against a
company by attacking for a couple of hours and then telling the company that, if you dont pay me, then
I will attack you again. Amazon reportedly failed to reply to complaints by the security consultants.
3. This can provision customised Botnets availability on rent, giving would-be attackers a criminal cloud
from which to buy services.......seems like it is still tooo early to rely 100 % on CLOUDS!!!!!!
198
4. [3]More on this here.......
1. http://anupriti.blogspot.com/2010/10/caas-crime-ware-as-service-at-offer-now.html
2. http://blogs.computerworld.com/term/views/9089/comments
3. http://bit.ly/aYeOGR
Intel opens rst chip plant in China?? (2010-11-01 18:01)
1. [1]The article at this post here informs in detail about the location,capacity of the rst Intel chip set plant
in China.The new plant fullls Intels total investment commitment in China to $4.7 billion. Intel has also
established an assembly and test site in Chengdu as well as R &D centers and labs in Beijing, Shanghai and
elsewhere in China, it said.
2. What made me took a second read on this article was that since about last 6 years,whatever Motherboards
and Chipsets from intel I have bought and seen in various machines....all chip sets have a common imprint
of MADE IN CHINA since then....so if this is the rst plant being set up in china....where were the earlier
ones being made or printed???????
1. http://www.reuters.com/article/idUSTRE69P0TW20101026
Adobe ash Player hit!!!! (2010-11-01 18:45)
1. A critical vulnerability has been exposed in Adobe Acrobat 9.4 and earlier 9.x versions for Windows and
Macintosh operating systems & Adobe Flash Player 10.1.85.3 and prior versions for Windows, Macintosh,
Linux and Solaris operating systems; Adobe Flash Player 10.1.95.2 and earlier versions for Android; and the
authplay.dll component .
2. This exploit (CVE-2010-3654) could cause a crash and provision attacker into the drivers seat to take
control of the aected system.
3. Adobe has released recommendations of how to avoid becoming a target on the subject matter but is still
working in labs to nd a x.....[1]click here for more
1. http://bit.ly/b1q6nB
Bredolab grabs Attention (2010-11-01 19:11)
1. A 27-year-old Armenian man has been charged as being the mastermind behind the Bredolab botnet, a
network of millions of compromised computers worldwide.Main features of this trojan botnet are enumerated
below for info :
Users of computers with viruses from this network will receive a notice of at the time of next login with
information on the degree of infection.
Bredolab, known for spreading spam and rogue antivirus, is thought by some experts to have infected
at least 30 million computers.
Spread via drive-by attack websites and spam email attachments.
199
Infecting machines with a backdoor that downloads additional malware without the victims knowledge.
Sends out spoofed password reset messages to Facebook users in an attempt to spread malware and
infect users of the social network.
Has the power to obtain information on the users computer including the ability to copy, change or
delete les and other information,
Pushdo botnet uses Facebook to spread malicious email attachment: A phony message warns users
that their Facebook password has been reset.
Majority of infections are in the U.S. and the U.K. and many Western European countries.
Discovered by the Dutch High Tech Crime Team in the late summer.
Capable of infecting 3 million computers a month. The botnet network used servers hired in the
Netherlands from a reseller of LeaseWeb, which is the largest hosting provider in the Netherlands, and
one of the largest hosts in Europe.
Able to constantly change its appearance to avoid detection by traditional antivirus signatures. Like
other botnets, the Trojan communicated with the command-and-control server using encrypted mes-
sages.
Mozilla @ Prone again!!!! (2010-11-02 07:54)
1. Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, when JavaScript is enabled, allows remote
attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the
appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory
corruption, as exploited in the wild in October 2010 by the Belmoo malware.
2. Thanks [1]http://www.us-cert.gov
1. http://www.us-cert.gov/
MICROSOFT & Failures!!! (2010-11-02 22:08)
1. For a IT giant like MicroSoft,this would not sync well,but for Microsoft,the year 2010 has seen more of
closures of major projects launched with lots of promises and fanfare but somehow unfortunately it did not
go the way microsoft desired tooo...and so had to be shut down in the same year....the list goes like this with
some details in few lines ....
February 2010 saw Microsoft announcing discontinuation of Xbox Live service for original Xbox con-
soles and games.
April 2010, Microsoft conrmed stopped working on tablet project, codenamed Courier which was
touted to be an Apple iPad rival.
September 2010, Microsoft announced that the Windows Live Spaces blogging service will be Terminate
gradually in favour of WordPress.com.
200
May 2010, Microsoft announced halt on the Response Point phone system.
June 2010 saw Microsoft announcing discontinuation its new generation of smartphones.
September 2010, Microsoft announced closure of Vine, a service built to help keep friends and family
in touch during emergencies.
[1]
2. Thanks [2]TimesofIndia
1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TNA-Gn9CvII/AAAAAAAAAus/m0PmGyoMdTE/s1600/Microsoft.jpg
2. http://timesofindia.indiatimes.com/
Get Paid to Hack GOOGLE (2010-11-04 17:31)
1. [1]Google has made it ocial now vide which Google willl pay $500 and $3,133 to people who discover
security vulnerabilities in its websites and online applications.......[2]Google calls the program experimental,
but says it gives security researchers new incentives to report Web aws directly and in real time to Googles
security team thereby improving upon zero day exploit matters.
[3]
2. This provisions Google a chance to x the vulnerabilities before it is exploited the way it should be. So, in
order to qualify, security researchers must privately disclose new aws to Google rst before they go public
with their research. Thus depending on the extent and scale of vulnerability made known to google,so will
201
be the prize money awarded....And Google says that participants shouldnt use automated tools to search
for aws
1. http://www.google.com/
2. http://news.techworld.com/applications/3246886/google-introduces-api-console-for-developers/
3. http://2.bp.blogspot.com/_z1QH8I3k9vk/TNKgAWx1wKI/AAAAAAAAAuw/aecAB15pirY/s1600/Google.jpg
Removing METADATA from JPEG & IMAGE FILES (2010-11-04 18:14)
1. Invariably we all nd various images from the net for our routine use,download them,modify them and
use them in our sites and posts....but are we authorised to do so?...coz each jpeg and image le by a digital
camera holds info in form of metadata and in few cases...the images may be copy right which may inadver-
tently rule against the user....so what to do to ensure safe...simple ...remove metadata from the image....but
how?...here comes [1]jhead for your help.Read and follow the instructions below :
- Press Start & Run or Windows key + R to open Run menu, type cmd.exe and press OK
[2]
- Type cd\ [To reach root directory]
- Type C:\md removemetadata [To create a new directory by the name removemetadata]
- Type C:\cd removemetadata [To reach the directory and Copy all pictures whose metadata is to be removed
to this directory ]
202
[3]
- Download the program le jhead.exe to C:\removemetadata
- Type cd removemetadata
- To remove all metadata of all JPEG les in this dir, type: jhead -purejpg * and press enter
[4]
- Done
2. So doing this small,boring but important function will avoid case study like the[5] mumbai case mentioned
at an earlier post.
203
3. Another easy way is to simply take a screen shot of the image and paste it in paint brush.But this would
be cumbersome to do when the images are in bulk quantity.[6]To download JHEAD...click here
1. http://www.softpedia.com/progDownload/JPEG-PNG-Stripper-Download-30786.html
2. http://4.bp.blogspot.com/_z1QH8I3k9vk/TNKt4KZHluI/AAAAAAAAAvk/ZbZkMtPfets/s1600/1.JPG
3. http://1.bp.blogspot.com/_z1QH8I3k9vk/TNKtcmHi9ZI/AAAAAAAAAvc/LK3mx8rgt9s/s1600/3.JPG
4. http://1.bp.blogspot.com/_z1QH8I3k9vk/TNKthIcvGkI/AAAAAAAAAvg/2OUkYZEIfEQ/s1600/4.JPG
5. http://anupriti.blogspot.com/2010/10/image-ballistics-incredible-it.html
6. http://www.softpedia.com/progDownload/JPEG-PNG-Stripper-Download-30786.html
3.12 December
Full stop from being tracked online :An attempt from FIREFOX (2010-12-05 18:50)
1. Firefox is working on a system which will provision web surfers to stop from being tracked online.We all
know how behemoths viz Google,Facebook and a plethora of OWMs use such information to sell targeted
adverts and make money without ever asking the consent of the user.Such a move would be welcomed by
privacy campaigners who have long complained that Google & Facebook are taking indecorums with the
information .Currently these information seeking companies make use of cookies that automatically save
themselves onto users computer when they surf the web, and then keep a track of the browsing history.This
data is then sold on to advertisers who put highly lucrative targeted ads on the individuals screen, depending
on what internet pages they have recently been looking at.
2. Vice president of engineering at Mozilla,Mike Shaver,summed up the plan by saying the aim was to put
the user in control but not overwhelm them.And this would not only be a welcome step being used against
information thefts but also actually be a booon for users who have been taken on a ride for so long on which
they never ever desired to also......
Operation Pay Back & LOIC (2010-12-28 22:29)
A good one to read about the link between Mega D Botnet,Operation Pay Back with the aid of LOIC @
[1]here
1. http://mashable.com/2010/12/09/how-operation-payback-executes-its-attacks/
204
Chapter 4
2011
4.1 January
Case of Albert Gonzalez : The Largest Online Fraud in U.S. History (2011-01-29 10:44)
1. This case that I recently read in brief pertains to an interesting online fraud case against Albert Gonzalez.I
have made it in a sequential point to compress the complete story for easy reading and grasping : [1]
(a) Albert started using computers at an early age, and while in high
school, managed to hack into the [2]Government of Indias website[ :( ]. Sadly, he was not charged at this
stage and only warned to stay away from computers for six months. (b) At the age of 19, he started his own
group of hackers, named [3]ShadowCrew, which tracked over a million credit card numbers for use in online
fraud. When the [4]FBI nally managed to shut the group down, Albert was charged. However, he worked
with the investigators and gave away vital information on his [5]cohorts and did not need to serve a sentence.
(c) Still on,Albert after two years worth of hardwork(????) compromised on sensitive data including 45.6
million credit and debit cards. (d) [6]TJX Companies notied the authorities of their data leakage. Albert
had the abilities to crack and hack his way through, but the low security measures didnt help TJX. Albert
was able to install his malware and sning software onto the networks of TJX and all the stores operating
under them, even outside of the United States. TJX discovered the breach in December of 2006 and was
under the belief that they had only been losing data for the past six to seven months, dating back to May
2006. After further investigation, they found that they were losing sensitive data since 2005. Albert had
already moved on to bigger and better operations by the time TJX had even started discovering the extent of
their security breach. (e) Gonzalez and his accomplices used [7]SQL injection techniques to create malware
backdoors on several corporate systems in order to launch packet sning (specically, [8]ARP Spoong)
205
attacks which allowed him to steal computer data from internal corporate networks. (f) During his spree he
was said to have thrown himself a $75,000 birthday party and complained about having to count $340,000 by
hand after his currency-counting machine broke.(ha ha ha.....wow!!!!anyway) (g) Gonzalez had three federal
indictments: - May 2008 in New York for the Dave & Busters case (trial schedule September 2009) - May
2008 in Massachusetts for the TJ Maxx case (trial scheduled early 2010) - August 2009 in New Jersey in
connection with the Heartland Payment case. (h). On March 25, 2010, Gonzalez was sentenced to 20 years
in federal prison. 2. For details of the case with many links please visit [9]HERE
1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TUOgAijp4II/AAAAAAAAAwI/WrlMAsx9zmU/s1600/ALBERT.jpg
2. http://india.gov.in/
3. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBYQFjAA&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%
2FShadowCrew&ei=8p5DTdK5DcrWrQeyp9BD&usg=AFQjCNGaxUOWyCzrR4s0JMwN4eItxMpCow&sig2=AmdCsBWiUJDuMk29tgLbeQ
4. http://www.fbi.gov/
5. http://en.wikipedia.org/wiki/Cohort
6. http://www.tjx.com/
7. http://en.wikipedia.org/wiki/SQL_injection
8. http://en.wikipedia.org/wiki/ARP_spoofing
9. http://en.wikipedia.org/wiki/Albert_Gonzalez
FBI : A Parents Guide to Internet Safety (2011-01-29 11:00)
A must read guide from The Federal Bureau of Investigation (FBI), an agency of the [1]United States
[2]Department of Justice for all the parents in the world, advising & trying to make them understand the
complexities of online child exploitation.....please click [3]HERE
1. http://en.wikipedia.org/wiki/United_States
2. http://en.wikipedia.org/wiki/United_States_Department_of_Justice
3. http://www.fbi.gov/stats-services/publications/parent-guide/parent-guide
Trojan.Spy.YEK : The Corporate Spying Tool (2011-01-29 11:26)
1. The [1]Stuxnet trembles and quakes are still not over and unlikely to be forgotten for some years.After the
stuxnet storm ,each one from the corporate sector IT bosses to IT admins in individual capacities,every one
was trying to be careful of any sign of outside intrusion . These days when some e-threat comes along and
snis for critical data, it could mean billions & trillions of money IN/OUT in seconds. 2. Trojan.Spy.YEK is
unlike a regular [2]Spying Trojan that looks for documents and archives that may hold private information
but also sends it back to the attacker. 3. Trojan.Spy.YEK has both spying & backdoor features with an
encrypted dll in its overlay, this Trojan is easily saved in windows\system32\netconf32.dll and once injected
in explorer.exe nothing can stop it from connecting (whenever necessary) to a couple of easy pings & sharing
all with the attacker. 4. The backdoor component helps it register itself as a service so as to receive and
follow instructions from a command and control center, while the spyware component sends away data
about les, operating system, while also making screenshots(trying to make a user freindly hand guide for
later action...isnt it so caring?????) of the ongoing processes. 5. Some of the commands it is supposed to
execute are: sending the collected les using a GET request, sending info regarding the operating system and
computer, taking screenshots and sending the results, listing the processes that run on the system and sends
them away, nding les with a certain extension. Shortly put, it uploads all the interesting data on a FTP
server without the user`s consent. 6. The fact that it looks for all that it is linked to archives, e-mails (.eml,
206
.dbx), address books (.wab), database and documents (.doc, .odt, .pdf etc) makes Trojan.Spy.YEKa prime
suspect of corporate espionage as it seems to target the private data of the companies. 7. This infection will
change the registry settings and other important windows system les. If Trojan.Spy.YEK is not removed it
can cause a complete computer crash.Some Trojan.Spy.YEK infections contain trojan and keyloggers which
can be used to steal sensitive data like passwords, credit card, bank account information etc. 8. On top of
that, the Trojan can run without problems on all versions of Windows from Win 95 to Seven.
1. http://anupriti.blogspot.com/2010/10/stuxnet-milestone-in-malicious-code.html
2. http://www.f-secure.com/v-descs/pswsteal.shtml
BitDefender : Tips for Safe Shopping on Mobile Devices (2011-01-29 11:44)
A small piece of advice by [1]BitDefender on security aspects while using new generation mobile devices.Pls
click [2]HERE
1. http://www.bitdefender.com/
2. http://news.bitdefender.com/
NW1883-en--Tips-for-Safe-Shopping-on-Mobile-Devices-and-Social-Media-Sites-this-Holiday-Season.html
4.2 February
IE users stand vulnerable again : Warning from MICROSOFT (2011-02-01 20:43)
1. This one is a real eye (....or more simply account) opener of so many IE Web browser users across the globe
and this one comes straight from the horses mouth....ie MICROSOFT which has warned that the approx
900 million users of its Internet Explorer Web browser are at risk of having their computers commandeered
and their personal information stolen by hackers.Microsoft has issued a critical security alert over a newly-
disclosed aw that impacts all versions of the companys Windows operating system, including Windows
XP (SP3), Windows Vista, Windows 7, Windows Server 2003 and Windows Server 2008 (R2). 2. The
trouble is meant primarily for users of IE only since no other major web browser available supports MHTML
les.Microsoft also adds that the bug is inside Windows, (else who is going to use IE??????).Till date/hr as of
now no hackers have been reported to exploit the vulnerability. 3. An attacker could construct an HTML link
designed to trigger a malicious script and somehow convince the targeted user to click it. When the user clicks
that link, the malicious script would run on the users computer for the rest of the current Internet Explorer
session.Such a script might collect user information (e.g. email), spoof content displayed in the browser, or
otherwise interfere with the users experience. 4. For the otherwise already loosing users at a quick pace,this
release would pacen up the loosing percentage of IE users across. 5. Thanks [1]http://www.smh.com.au
1. http://www.smh.com.au/
AMD comes up with FUSION (2011-02-01 21:05)
1. A small mention made earlier at this blog about [1]ISTANBUL,an AMD launch...now comes up with the
next gen processor known as FUSION. 2. The Fusion family will utilize a single-die design that combines
multi-core CPU (x86) technology with a powerful DirectX 11-capable graphics and parallel processing engine.
207
The APUs will also include a dedicated high-denition video acceleration block and a high-speed bus that
transmits data across diering types of processor cores within the same design and will include power-saving
features enabling all-day battery life. 3. More about[2] FUSION here
1. http://anupriti.blogspot.com/2009/07/amd-launch-of-istanbul.html
2. http://sites.amd.com/us/fusion/apu/Pages/fusion.aspx
Win32.Hlux : January 2011 King of worms (2011-02-06 19:46)
1. Email-Worm.Win32.Hlux was talk of the E-town in January across the webosphere. This mail worm
spreads via emails containing malicious links that prompt users to install a bogus Flash Player, supposedly
to view an e-card. The link leads to a dialog window that asks if the user agrees to download a le. Irrespective
of the response, the worm sets about to penetrate the system. In addition to propagating via email, Hlux
also has bot functionality and adds infected computers to a botnet before connecting to its command center
and executing its commands, which are primarily directed at sending pharmaceutical spam. 2. Kaspersky
Lab also detected a Trojan dropper masquerading as a key generator for the companys products. The old
adage Theres no such thing as a free lunch is particularly tting here as the dropper goes on to install
and launch two malicious programs. One of them steals program registration data and passwords for online
games. The second is a backdoor that also has keylogger functionality. 3. Kaspersky Lab also found the
mass distribution of malicious short links on Twitter. After a number of redirects, the attention-grabbing
links led users to a page promoting a rogue AV program. 4. Apart from these two hardworkers(?????..i mean
mal hardworkers) in january,the other shining star in the E-crime world is AdWare.Win32.WhiteSmoke.a
which if clicked, will download a program that demands payment to rectify errors it supposedly detects on
the system. 5. More detailed report on [1]http://www.kaspersky.com
1. http://www.kaspersky.com/
DRIVE BY ATTACK (2011-02-06 20:03)
1. A small and easy to infer article on DRIVE BY ATTACK [1]here
2. Thanks [2]http://www.bitesofapple.com
1. http://www.bitesofapple.com/2010/01/25/whats-a-web-drive-by-attack/
2. http://www.bitesofapple.com/
DATA STORAGE IN BACTERIA : 9,00,000 GB stored in 1 gm of Bacteria
(2011-02-08 21:24)
1. Earlier discussed [1]here & [2]here in my 2009 posts when the study,the concept and experiments were
on test bench have now touched reality.... 2. A team of undergraduates and instructors from the Chinese
University of Hong Kong (CUHK) has found a way to store a whole lot of data onto living bacteria cells
through a process they call 'massively parallel bacterial data storage. And in addition to storing huge
amounts of data, they have also gured out how to store and en/decrypt data onto living bacteria cells.
208
[3] 3. The team has managed to squeeze more than
931,322GB of data onto 1 gram of bacteria (specically a DH5-alpha strain of E.coli, chosen for its extracted
plasmid DNA size) by creating a massively parallel bacterial data storage system. Compared to 1 to 4GB per
gram data density of conventional media, the 900,000GB per gram gure the team has returned is genuinely
stupefying ie like to t the equivalent of 450 2TB hard disks (900TB) on a single gram of E.coli bacteria. 4.
A small ppt straight from the team can be seen [4]here.
5. Thanks devilsduke.com for the pic
1. http://anupriti.blogspot.com/2009/07/data-storage-in-bacteria-astonishing.html
2. http://anupriti.blogspot.com/2009/06/storage-technolgy-graduating-trends.html
3. http://2.bp.blogspot.com/_z1QH8I3k9vk/TVFm4vkrG9I/AAAAAAAAAwQ/sVwaCZQmZEA/s1600/E.COLI.jpg
4. http://2010.igem.org/files/presentation/Hong_Kong-CUHK.pdf
Anonymous (2011-04-12 04:06:24)
Its funny. What if we decided to store all of mankinds planet secrets into bacteria and send it into space. Than
somehow mutates with another organism creating articial life and than creating a race that will destroy the planet...
Just some out of reality thinking... =]
INTERNET KILL SWITCH???? (2011-02-09 20:34)
1. Recent events in Egypt and the debate over the 'Cyber Security and American Competitiveness Act of
2011, has introduced the cyber world with a yet another jargon term 'INTERNET KILL SWITCH.Whats
this all about and what does this mean.....crux in brief as i understood after going through few good infor-
mative sites....read onnnnn!!!!! 2. The term would give US the best tools available to swiftly respond to a
signicant CYBER threat.Thus if the U.S. detected a serious cyberthreat at some point of time, this switch
would enable the US President to instantly shut down any infrastructure connected to subject infrastruc-
ture.It is not a mandate to be able to shut down the entire Internet but rather authorizes the president to
order turning o access to 'critical infrastructure . 3. Our interest here is to look at just one dimension
of the issue the technical feasibility; the political and policy aspects, we`ll leave to others. 4. Thanks
[1]http://www.switched.com
1. http://www.switched.com/
209
MALWARE & AUTORUN : LOVE BIRDS OF PROPOGATION (2011-02-09 20:40)
[1]
1. All the family members of trojans,malware and adwares few of which are mentioned above have one
similarity in form of a common propagation method. They all abuse the autoplay feature of Autorun,
many by creating or manipulating Autorun.inf les on network drives and removable media, so that when
a user connects, the malware is automatically executed on their system. Newer operating systems, like
Windows Vista and Windows 7, have made changes to the way Autorun is congured (Windows Vista) and
how it works by default (Windows 7). These changes appear to have had a signicant dierence in the ability
for autorun-abusing malware to successfully infect these newer operating systems, especially for Windows 7.
2. More interesting details [2]here 3. Thanks [3]http://blogs.technet.com & [4]Microsoft Malware Protection
Center
1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TVKu2xutvCI/AAAAAAAAAwY/5OlOggwDbfA/s1600/Capture.JPG
2. http://blogs.technet.com/b/mmpc/archive/2011/02/08/breaking-up-the-romance-between-malware-and-autorun.
aspx
3. http://blogs.technet.com/
4. http://www.microsoft.com/security/portal/
The Gawker case : EXPERIENCING A HACK (2011-02-13 20:00)
1. A six-letter password in lower-case text takes a hackers computer just 10 minutes to crack. But make
those letters upper-case and it takes 10 hours for it to randomly work out your password. Thus simply
upper-casing your password can minimise a hackers chance of nding out your account.Add numbers and/or
symbols to your password and the hackers computer has to work for 18 days.Despite widespread warning,
50 per cent of people choose a common word or simple key combination for their password.The most used
passwords are 123456, password, 12345678, qwerty and abc123. 2. I read about the Gawker case recently
wherein the subject media rm Gawker urged subscribers to change their passwords after its user database
was hacked and more than 1.3 million passwords were stolen.Now imagine some one like Yahoo or Google
requesting one ne day on a similar line....wont our heart come out???? 3. The exact Gawker announce
ment goes like this 'Our user databases appear to have been compromised. The passwords were encrypted.
But simple ones may be vulnerable to a brute-force attack. You should change your Gawker password and
on any other sites on which you`ve used the same passwords. We`re deeply embarrassed by this breach.
We should not be in the position of relying on the goodwill of the hackers who identied the weakness
210
in our systems. And, yes, the irony is not lost on us. 4. The problem emanated when Gawker recently
launched a multi-site redesign thatthat failed spectacularly, leading visitors to blank pages. The culprit was
a misbehaving piece of JavaScript, but when a single line of JavaScript causes your entire suite of sites to
fail you no longer have websites, you have, well, nothing.The problem with Gawker`s redesign is that it uses
JavaScript to load everything. That means that, not only is there no chance for the site to degrade gracefully
in browsers that don`t have JavaScript enabled, the smallest JavaScript typo can crash the entire website. [1]
5. Now we all have seen it personally as we sometimes
tend to have the same password for multiple accounts on the web.....this could be a simple fall like a pack of
cards...one point failure leads to the complete fort coming down.....so guys...take care....change ur passwords
for better and stronger security.....
1. http://3.bp.blogspot.com/-dwqkWmhm9xQ/TVfqn2OvJGI/AAAAAAAAAwg/EoTkgJdeLCo/s1600/gawker-media-websites.jpg
NOKIA & MICROSOFT : A MERGER TO READ ABOUT (2011-02-15 20:59)
1. In todays shrinking world when we hear of merger of giants...its part of normal breaking news which
hardly puts together rolling eyeballs 7 pop ups ....But this one is slightly dierent or if not dierent it is
really BIGGGGGGG.This is about merger of fantabulous phone hardware NOKIA and the operating system
giant MICROSOFT coming toether to produce and try beating the phones across?
2. The deal which was in the rumour rounds already went much ahead of the expectations.....in eect, Nokia
is handing over its future - in smartphones at least - to Microsoft and Windows Phone 7. That means Good
bye & Happy journey Symbian . So can the combo really become the third horse in the race, giving Apple and
Android a run for their money ?I have my doubts.... [1]
3. Crux of the acquisition pointwise listed below : - Nokia to embrace Windows Phone as its principal
smartphone. - Nokia to contribute its expertise on hardware design, language support. - Both would closely
211
collaborate on joint marketing initiatives . - Bing would power Nokia`s search services(nobodys guess!!!) -
Nokia Maps would be a core part of Microsoft`s mapping services. 4. Just to mention,[2]a year earlier when
this merger was being talked about, was once declared an april fools rumour. And now about a year later it
is on ocial Microsoft site.Thanks [3]Microsoft site for info
1. http://1.bp.blogspot.com/-AaCLSC7AcVw/TVqcGeIhQOI/AAAAAAAAAwk/PAzB26V8O6c/s1600/Nokia-and-Microsoft.jpg
2. http:
//www.mobileindustryreview.com/2010/04/microsofts-100-billion-nokia-acquisition-absolutely-unbelievable.html
3. http://www.microsoft.com/presspass/press/2011/feb11/02-11partnership.mspx
NOKIA should have merged with GOOGLE : Google CEO (2011-02-16 20:02)
This comes straight after the [1]earlier post news spread across about the merge of Nokia & Mi-
crosoft......When asked about [2]Nokias choice of Windows Phone 7 as its smartphone system, Schmidt
said Google would have loved to see Nokia pick Android instead. Google tried to convince Nokia to choose
Android, and it can still make that decision in the future.....(ha ha ha....Google still has hopes of a future
revertive action by NOKIA....and who knows...it may just happen..we are just the readers!!!!!)
1. http://anupriti.blogspot.com/2011/02/nokia-microsoft-merger-to-read-about.html
2. http://www.infoworld.com/d/mobilize/nokia-partners-microsoft-adopts-windows-phone-7-223
Easy Upgrade from USB 2.0 to USB 3.0 :Transcends USB 3.0 Express Card Adapter
(2011-02-16 21:02)
1. Transcend has come up with a USB 3.0 Express Card Adapter, an easy-to-install add-in that allows
users to speedup their notebook with blatant ying speed of USB 3.0 technology.The new USB 3.0 Express
Card Adapter comes with 2 high-speed USB ports that fully support Super Speed USB 3.0 standard with
bandwidth of up to 5 GB/s. In addition to this, its quick and easy 2 install, the card enables speed enthusiasts
to experience data transfer rates up to ten times faster than USB 2.0 with optimized power eciency. 2.
Transcends PNU3 USB 3.0 Express Card Adapter is fully compatible with Windows 7 and comes at an
aordable price of approx Rs 1900 with 2 years Warranty(check out [1]Nehru Place rates before buying) 3.
Thanks [2]http://itvoir.com
1. http://npithub.com/
2. http://itvoir.com/
Be veri careful : Recent cases of duping online in DELHI (2011-02-19 09:29)
1. Inspite of regular discussions,regular readings of various advisories,the tongue(greed) of lust for more
money doesnt stop.. & it keeps looking for opportunities and thus keeps succumbing by loosing more ....In
a recent case both pertaining to saadi own dilli...two understandably IT educated pers were robbed of a
high value money transaction...how????briey mentioned below : - New Palam Vihar Resident case :
The case pertains to the resident of New Palam Vihar at New Delhi, India, Mr Dalbir Singh who recently
recieved the typical e-mail of winning a lottery of 14 Crore ( $ 37,000 approx) in the UK.Mr Dalbir Singh
contacted the accused for ascertaining the lottery amount and was convinced to pay Rs 17 Lakh for exchange
purpose as foreign currency had to be converted to rupee.Mr Dalbir Singh instantly transferred money from
212
his account to the account of the fraud.Since that day of transfer Mr Dalbir Singh has been only recieving
CONDOLONCES from all his friends and relative circle around.A very typical case of cyber lottery fraud.....
- E-mail Scam Tricks Student of JNU : This case pertains to the a Jawaharlal Nehru University (JNU)
student who was recently defrauded o Rupees 3 lakhs when he fell for a malicious e-mail scam.Initially
an e-mail came to the student apparently from an institution called Global Watch Institute, asking him for
being present in dual seminars on the topic: Racism and Human Rights the Institute was holding one each
in Madrid and New York.The student stated that the rst message came to him on December 17, 2010.
And, according to him, since his eld of study had a connection with the topic, he responded stating he was
interested.The e-mail also promised about bearing the entire cost of the students trip. However, over time
the fraudsters started asking for money from him to take care of certain expenditures such as booking his
hotel at Madrid along with health insurance asserting that theyd all be refunded when hed arrive in New
York.The student, believing the e-mail, wired the money, but neither heard of any seminar nor a trip abroad,
he stated. Indeed, all the things written inside the electronic mail was false.Worryingly, the above mentioned
e-mail fraud, according to security specialists, is an edition of the 419 scam, whichs also called Advance-fee
Fraud.They (specialists) outline that the method of operation in these malicious e-mail campaigns involves
duping a victim with fake pledges about certain huge reward to such an extent that he acquiesces to remit
money. For example, in the current instance, the scammers tricked the student into transferring cash after
promising falsely about arranging his presence at the seminars abroad.This is more organised form of the
frauds and scams that are happening all across..... 2. A Netizen need to know that they cannot win a lottery
unless they have not invested money on it.Please always take care of what you do on the net specially when
u r doing some kind of nacial transaction 3. Thanks [1]http://www.hindustantimes.com/,[2]http://ww-
w.spamghter. com/
1. http://www.hindustantimes.com/
2. http://www.spamfighter.com/
4.3 March
ANDROID & GOOGLE : AT LOGGER HEADS???? (2011-03-02 19:29)
1. This news is bound for only one thing.....a rst big dent on Googles untouched Kingdom in the cy-
ber world.There is a reported discord among the Android developers who are irked at Google`s Android
Market policies.They have formed the Android Developers Union to protest the policies.The new union
has compiled a list of seven demands including renegotiation of the 32pc 'Google Tax` on app sales, pub-
lic bug tracking, algorithmic transparency and increased payment options.They threaten Google that if
these demands are not met they will cease development and move their eorts to rival platforms. [1]
213
2. If the demands are not met, we will move our applications
to alternative marketplaces or the web, cease Android development in favour of other more open platforms,
we will dissuade other developers from developing Android projects, and we will work tirelessly to counter
any of Googles hypocritical claims about openness in the media. 3. This seems to be the rst kind of
big set back to google who may nd loosing an edge in its battle for the smartphone operating system and
applications market vis-a-vis Apple and Microsoft.[2]The seven demands of the android union can be seen
here... 4. This writeup does not reect my views of standing against anyone or supporting anyone but wishes
to inform the readers only for info........
1. https://lh3.googleusercontent.com/-iP3be5qqvKY/TW5Ma3WZBgI/AAAAAAAAAww/2wagX3CBzLI/s1600/logo_shadowone.
png
2. http://www.andevuni.org/
QUALITIES OF A GOOD ANTIVIRUS (2011-03-13 20:16)
1. Each Antivirus software in the web market today claims as the First and the topmost rated antivirus
amongst all.Each has a claim that says We check what others dont.A large percentage of typical user
have actually got no way to check out who is the actual one...Who is the BEST? They then generally select
the one that is based on the recommendations of their social circle and the convincing factor generated by
the site of the product or simply put...it can ba random selection at last. In fact in my quest to search
the best one amongst all....the number of QRs that one needs to check for one antivirus is a long one.Few
of the qualities that should not be missed at all are briey enumerated below. WEST COAST LABS
ANTI-VIRUS: The West Coast Labs Checkmark certication for antivirus eectiveness. WCL stands as
a global leader in research, testing and certication for information security products and services. They
have market-leading technology and testing facility in the UK, USA and india.Their services are being used
by the leading global brands to create market advantage and by large business enterprises for obtaining
crucial technical insight into product performance.WCL provides an authoritative and independent service,
delivering sound, meaningful technical information on which critical business decisions can be made.More
at [1]http://www.westcoastlabs.org/ ICSA CERTIFIED : The ICSA is an independent organization that
has a set criteria for certifying antivirus software. AV COMPARATIVES : Anti-Virus Comparative
test conducted in 2010. Overall scores are presented as Advanced + (A+), Advanced (A), Standard, and
Tested. SCOPE OF PROTECTION :Does the product protect from every threat? This rating evaluates
214
the breadth and depth of security from the software. While most security solutions tout 'multi-layered
protection, '360 degree defense and/or even '100 % security, some are certainly more thorough than others.
The best antivirus solutions will include traditional protection from viruses, worms, Trojans and spyware,
but should also include defense from keyloggers, phishing scams, email-borne threats and rootkits. While
antivirus programs are by no means full-blown internet security suites, they should protect from as many
threats on as many fronts as they can. EFFECTIVENESS : How eective is the application at protecting
your computer from harmful viruses and other malware? This rating combines various tests and certications
to determine how well the software performs. Antivirus is specically designed to protect your computer, so if
it doesn`t do that well, what good is it? All the features, bells and whistles, or sleek interface can`t make up for
poor performance. We look at results from the industry-standard security software testers and professional
security organizations to nd the most eective software available and evaluate overall eectiveness. In
general, our highest ranked programs are also the most eective. HACKERS : Anyone trying to take
control of your computer for malicious purposes. PHISHING : These criminal scams attempt to obtain your
identifying information by disguising as legitmate sources (like your bank, eBay, or facebook). ACTIVEX :
Several Microsoft programs use ActiveX controls for good, but these components can also be taken advantage
of. USER PROFILES : The software includes distinctive interfaces or features for particular users (often
beginners or advanced users). SELF-DEFENSE : The software monitors itself and the computer, eectively
protecting from intrusions or unauthorized changes. SCHEDULING : The ability to schedule specic scans
to occur at a specic time or interval. HISTORY/REPORT LOGGING : The software keeps a record
of the performed tasks and results for future reference or reporting. SILENT / GAMER MODE :
The gamer mode allows you to use the computer in full-screen mode (for games, presentations, or videos)
without interruptions from the security software. LAPTOP / BATTERY SAVING MODE : The
software can be set to delay scans or intensive processes for later in order to increase battery life. LINK
SCANNER : An integrated web tool that monitors web links and prevents/warns users from clicking on
malicious sites. BOOTABLE RESCUE CD:In the event of a complete system crash, you can use the
bootable rescue disc to preempt the OS and clean the system. FREE VIRUS SCAN ONLINE: The
security manufacturer oers a free virus scan online (often with incentive to purchase their products for
removal capabilities). AUTOMATIC DEFINITION UPDATES: The program automatically updates
virus denitions or DAT les. A virus denition is basically the formula that the software uses to determine
if a le is infected by a specic virus. MANUAL DEFINITION UPDATES: You can manually check
for virus denition updates. SCHEDULED UPDATES: Updates can be scheduled to run at a specic
time or interval. PULSE/PUSH UPDATES: Small, regular updates are initiated by the manufacturer
as needed to deliver important updates. ROLLBACK : The ability to revert to a previously working state
if the most recent update causes a problem. MANUAL SCANNING : Manual Scanning is the ability to
start a scan of your hard drive at any time. QUICK & DEEP SCAN : Manual and/or scheduled scans can
either be quick (scan most important areas) or deep (full scan of computer). OPTIMIZED SCANNING
: The software is congured to scan eciently, only scanning areas and les that have changed since the
last scan. SCAN INDIVIDUAL FILE(S) : The software can scan an individual le for viruses. This
is often available by right-clicking on the le and choosing to scan. EXCLUDE FILES : The software
allows the user to designate certain les, folders, or drives NOT to include in the virus scan. SCAN
COMPRESSED FILES : Scans zipped (.zip) or other compressed les that are usually obtained through
emails or downloaded from the web. QUARANTINES INFECTED FILES : If a le is suspected of
being infected with a virus, it moves the le to a quarantine area where you cannot accidentally access it.
AUTO-CLEAN INFECTED FILES : The anti-virus program will automatically clean or x les that are
infected. SCAN USB (AND OTHER EXTERNAL DRIVES) : The software is capable of scanning
external drives for viruses. PASSWORD PROTECT SETTINGS : Prevents the Anti-Virus settings
from being modied by other users. ADJUSTABLE SECURITY LEVELS : Security can be customized
and set to a particular level of potency. VULNERABILITIES : Microsoft and third-part software vendors
are constantly providing security patches or other updates. Some software takes a proactive approach and
helps you stay on top of the most recent updates. COOKIES : Though not typically malicious, cookies
215
are little chunks of code stored on your computer from web sites. SCRIPTS : Script Blocking technology
monitors Java and VBS scripts and alerts users of virus-like behavior. They stop these viruses before they can
infect a system without needing virus denitions. SPAM : Spam is unwanted email, whether its annoying
advertisements or a link to a virus. AUTO USB DETECT: Most antivirus software can scan USB drives,
but some automatically detect when an external drive is plugged in and will block malware from automatically
running. VIRUS SIGNATURES: Traditional virus detection is based on identifying malware by matching
it with known viruses. BLACKLISTING : Setting a le or website on the blacklist means that it should
never be allowed. WHITELISTING : Setting a le or website on the whitelist means that you trust
it and dont need the security software to scan/block it. HEURISTICS : Proactive virus blocking is
possible with behavioral analysis, le emulation, and/or generic signature detection. REAL-TIME : Real-
time protection means that the software protects you from viruses automatically, while the data is being
accessed. SECURITY NETWORK : This security approach involves the software manufacturer gathering
anonymous information about your system in order to benet everyone. If a virus is found on your computer,
they can quickly nd the cause and update denitions for all users. ON-ACCESS SCANNING : Your
les are scanned when you receive them and when you try to access them. ON-DEMAND SCANNING
: You can determine which les and when to scan for viruses. Its like manual scanning but you can be more
specic and scan a le at a particular time. Simply right-click on the lename. ADWARE : Though not
always harmful, these annoying programs cause advertisements to display on your computer without your
permission. EASE OF INSTALLATION : How easy is the product to download, install, and setup? This
rating is determined by install speed and simplicity. Security software shouldn`t be a chore to install, and
should have you protected as soon as possible. From download to install, to the rst scan; implementing
antivirus software should be quick and easy. EASE OF USE :How usable is the product? The Ease of Use
rating reects how easy the product is to use, run, and maintain. Antivirus software is complex stu, but
shouldn`t require a degree in computer security. The best security programs have all the features security
experts want, but are just as easily used by a beginner. Everyday computer users want a security solution
that they can install and forget about; software that doesn`t require constant maintenance or have annoying
interruptions. The best antivirus software is exible enough to do exactly what you want to (even if that
means running by itself). FEATURES : Does the software include additional benets? Whether for added
security or simple convenience, more features usually means better software. A well-rounded feature set
takes a security solution from good to great. More than bells and whistles, added features provide security,
usability and performance benets. UPDATES : Are timely updates delivered eectively? This rating is
based on the frequency and versatility of virus database updates. Security software is only as good as its
latest update. Viruses are being identied and added to signature databases all the time, so it`s important
that your virus denition list updates accordingly. Modern antivirus software are equipped with automatic
updates that perform regularly enough that you get faster updates that don`t slow down your system. The
best security providers even 'push updates to you as soon as they`re available. HELP & SUPPORT :
Does the product oer additional support and helpful resources? This rating is based on the quantity and
usefulness of additional product support. The best software doesn`t require reading an in-depth manual to
use, but still has one available. For specic questions, troubleshooting, and additional help, the best antivirus
manufacturers provide superior product support online and o. Additional support for software may come
in the form of assistance over the 24x7 phone, email, live chat, or through a number of additional resources
(knowledgebase, FAQs, tutorials). BACKDOOR : A special type of trojan (often called remote access
trojan or RAT), they essentially give control of your computer to a hacker. THREAT DETECTION
includes : Virus,Worm,Trojan,Spyware,Malware,Rootkit. BROWSER EXPLOITS :malicious code that
takes advantage of an internet browser vulnerability to make the browser do something you dont want
(freeze, crash, change settings, etc.) OS EXPLOITS: Malware that is designed to take advantage of
a vulnerability in the Windows Operating System. KEYLOGGERS : A virus designed to track and
monitor user keystrokes, often used to steal passwords, credit card numbers, etc. INBOUND EMAIL
PROTECTION : The anti-virus software scans les received through incoming emails on a POP3 account.
OUTBOUND EMAIL PROTECTION : The software scans outbound email attachments so you dont
216
spread viruses to others. INSTANT MESSAGING PROTECTION : The anti-virus software scans les
received through instant messaging (MSN Messenger, AIM, Yahoo Messenger). P2P/FILE SHARING
PROTECTION: The software protects from malicious les downloaded and/or accessed from peer-to-
peer le sharing programs. REGISTRY STARTUP PROTECTION : The software provides protection
before the OS loads, or has the ability to scan registry les. DIALERS : Malicious program that takes control
of your computer and uses it to dial expensive phone numbers. SUPPORTED CONFIGURATIONS:
Does it incl compatibility with Windows 7 (32 bit),Windows 7 (64 bit),Windows Vista (32 bit),Windows
Vista (64 bit),Windows XP (32 bit),Windows XP (64 bit) 2. Thanks [2]http://www.toptenreviews.com/ and
for those who want a pdf click here to access [3]http://www.scribd.com/doc/50645603/Qualities-of-a-Good
-Antivirus
1. http://www.westcoastlabs.org/
2. http://www.toptenreviews.com/
3. http://www.scribd.com/doc/50645603/Qualities-of-a-Good-Antivirus
How to Disable/Enable Use of USB Storage Devices in Windows (2011-03-15 13:18)
1. How often in oce and home, we desire to lock our USB drives from not being used by the regular circle
around to avoid any compromise on data.I m sure its many a time....either we resort to keeping the 3 level
regular strong password option or try out some third party USB Blocker option or more simply leave to
GOD and trust.But their is a way out from this...and a real easy one to atleast defy the circle with a small
trick....it goes this way.....
2. The situation to block the USB will fall in either of the categories : (a) USB storage device is not installed
in system (b) USB storage device is already installed in system CASE -1 : USB STORAGE DEVICE
IS NOT INSTALLED IN SYSTEM - Type %windir %\inf in Explorer address bar or RUN dialog box
and press Enter. Itll open inf folder. - Now look for following 2 les: usbstor.inf usbstor.pnf 3. Now to
change their user permissions setting Right-click on each le and select Properties. Goto Security tab
and select the desired user or group in Group or user names list which you want to restrict from using USB
drives. Now in Permissions for Users list, click on Deny checkbox next to Full control option and then
click on OK.
217
[1]
NOTE : - In Windows Vista, click on Edit button after selecting the user or group
in Group or user names list and then again select the same user or group in new di-
alog box. Now you can click on Deny checkbox. 4. Thats it. Now users will not be
able to install any USB storage device in system. CASE 2 : IF THE USB STORAGE DE-
VICE IS ALREADY INSTALLED IN SYSTEM 5. Type regedit in the run taskbar and reach
at : HKEY LOCAL MACHINE\SYSTEM\CurrentControlSetackslashServices\UsbStor [2]
6. In right-side pane, change value of Start to 4 7. Now whenever a user will attach a USB storage device
which is already installed in system, Windows will not detect it and itll not be shown in My Computer.
NOTE: If you want to revert it back to default, then change the value of Start to 3.
1. https://lh3.googleusercontent.com/-EEqPy4A7ZrU/TX8ZfUqevtI/AAAAAAAAAw0/V8tjgLdBkfA/s1600/delete1.jpg
2. https://lh4.googleusercontent.com/-AxLJjJGxVv0/TX8ZlL7I2MI/AAAAAAAAAw4/eokFxkeeoeg/s1600/delete2.jpg
218
4.4 April
The weak password problem : Now solved???? (2011-04-03 21:48)
1. We are part of the rst phase of IT revolution across the globe where every thing is happening....methods
to secure...methods to hack....stronger and powerful servers....patching vulnerabilities....ghting mal-
ware....analysing stuxnets genre...and what not....every thing is happening.....now the following text (org from
[1]http://lanl.arxiv.org/abs/1103.6219) opens another dimension to make the passwords secure..... Vulner-
abilities related to weak passwords are a pressing global economic and security issue. We report a novel,
simple, and eective approach to address the weak password problem. Building upon chaotic dynamics,
criticality at phase transitions, CAPTCHA recognition, and computational round-o errors we design an
algorithm that strengthens security of passwords. The core idea of our method is to split a long and secure
password into two components. The rst component is memorized by the user. The second component is
transformed into a CAPTCHA image and then protected using evolution of a two-dimensional dynamical
system close to a phase transition, in such a way that standard brute-force attacks become ineective. We
expect our approach to have wide applications for authentication and encryption technologies. 2. Thanks
[2]http://lanl.arxiv.org
1. http://lanl.arxiv.org/abs/1103.6219
2. http://lanl.arxiv.org/
The weak password problem : Now solved???? (2011-04-03 21:55)
1. We are part of the rst phase of IT revolution across the globe where every thing is happening....methods
to secure...methods to hack....stronger and powerful servers....patching vulnerabilities....ghting mal-
ware....analysing stuxnets genre...and what not....every thing is happening.....now the following text (org from
[1]http://lanl.arxiv.org/abs/1103.6219) opens another dimension to make the passwords secure..... Vulner-
abilities related to weak passwords are a pressing global economic and security issue. We report a novel,
simple, and eective approach to address the weak password problem. Building upon chaotic dynamics,
criticality at phase transitions, CAPTCHA recognition, and computational round-o errors we design an
algorithm that strengthens security of passwords. The core idea of our method is to split a long and secure
password into two components. The rst component is memorized by the user. The second component is
transformed into a CAPTCHA image and then protected using evolution of a two-dimensional dynamical
system close to a phase transition, in such a way that standard brute-force attacks become ineective. We
expect our approach to have wide applications for authentication and encryption technologies. 2. Thanks
[2]http://lanl.arxiv.org
1. http://lanl.arxiv.org/abs/1103.6219
2. http://lanl.arxiv.org/
Revenge : YouTube Style (2011-04-04 22:16)
1. Now this one is really good....we already know that IT has revolutionized our lives in so many as-
pects...all aspects like banking,oce work,exchanging mails
& GNU/Linux.
http://www.blogbooker.com
Edited: December 3, 2011