From Blog to Book.
1 2008 13
1.1 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
SPAM UNSUBSCRIBED IS SPAM SUBSCRIBED (2008-12-26 22:36) . . . . . . . . . . . . 13
MIAN BV KE JHAGDEY (2008-12-26 22:37) . . . . . . . . . . . . . . . . . . . . . . . . . . 13
HOW 2 DELIVER GOOD PRESENTATIONS? (2008-12-26 23:08) . . . . . . . . . . . . . . 13
BALANCE is DIFFICULT (2008-12-27 00:12) . . . . . . . . . . . . . . . . . . . . . . . . . 14
Ghazal maestro in making (2008-12-27 00:42) . . . . . . . . . . . . . . . . . . . . . . . . . . 14
TUNE UP 2009 UTILITIES (2008-12-27 00:53) . . . . . . . . . . . . . . . . . . . . . . . . . 15
MURPHY’s LAW : JALANDHAR 2 AMRITSAR & BACK (2008-12-28 14:56) . . . . . . . 15
RFID (2008-12-28 21:51) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3D TELEVISION (2008-12-29 21:54) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2 2009 19
2.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
IPTV - TRIPLE PLAY or QUADRUPLE PLAY? (2009-01-01 21:35) . . . . . . . . . . . . 19
WHY BLOG? (2009-01-02 07:55) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
MPEG vs H.264 (2009-01-03 21:26) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
DUAL SCREEN LAPTOP : LENOVA (2009-01-06 22:39) . . . . . . . . . . . . . . . . . . . 21
Get Flummoxed : Futuristic Laptops (2009-01-08 15:05) . . . . . . . . . . . . . . . . . . . . 22
DOES DEMOCRACY MEAN FREE 2 STRIKE? (2009-01-09 14:49) . . . . . . . . . . . . . 26
Software Leloooo....Software lelooooo (2009-01-12 14:05) . . . . . . . . . . . . . . . . . . . . 27
Google & Carbon Dioxide : The relationship most of us don’t know (2009-01-13 18:22) . . . 28
HOLOGRAPHIC TEXT Messages (2009-01-17 23:23) . . . . . . . . . . . . . . . . . . . . . 29
COMPRESSION.... has a LIMIT? (2009-01-19 22:11) . . . . . . . . . . . . . . . . . . . . . 29
THE NAME IS RAJNIKANTH (2009-01-20 22:14) . . . . . . . . . . . . . . . . . . . . . . . 30
DETRITUS...(I mean dust) vs IT (2009-01-30 20:14) . . . . . . . . . . . . . . . . . . . . . . 32
2.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
INTEL & BIKE (2009-02-05 18:33) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Fighting LIGHTSCRIBE !!! (2009-02-11 16:46) . . . . . . . . . . . . . . . . . . . . . . . . . 35
IT ostracized!!!!! (2009-02-26 23:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Fight of the Browser’s : ACID3 TEST (2009-03-05 22:27) . . . . . . . . . . . . . . . . . . . 38
Be CAREFUL (2009-03-08 00:14) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
PictBridge (2009-03-17 16:05) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
THE LINK : BJP & OPEN SOURCE!! (2009-03-18 16:25) . . . . . . . . . . . . . . . . . . 43
Download video from Magazines/Billboard: MMCC (2009-03-21 23:06) . . . . . . . . . . . 44
2.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
IRON KEY : World’s Most Secure Pen Drives (2009-04-07 22:14) . . . . . . . . . . . . . . . 46
GUIYU : THE CONNECTION WITH E-WASTE (2009-04-14 23:04) . . . . . . . . . . . . 50
Recession Laptop (2009-04-30 18:30) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Nehru Place : The hub (2009-05-02 08:02) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Briefcase PC (2009-05-04 22:53) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
WORK : New Deﬁnition (2009-05-06 15:43) . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
HP and VLC at logger heads? (2009-05-09 17:07) . . . . . . . . . . . . . . . . . . . . . . . . 65
USB Bootable Vista (2009-05-11 22:13) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Chinese Mobile - Death or Life :The answer is ﬁnally LIFE (2009-05-13 08:44) . . . . . . . 68
E Waste (2009-05-17 22:29) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
E WASTE (2009-05-17 22:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
WINDOWS 7 : MY FIRST HANDSHAKE (2009-05-27 12:58) . . . . . . . . . . . . . . . . 69
WINDOWS 7 : MY FIRST HANDSHAKE-1 (2009-05-27 23:49) . . . . . . . . . . . . . . . 70
WINDOWS 7 : MY FIRST HANDSHAKE-2 (2009-05-28 14:52) . . . . . . . . . . . . . . . 71
WINDOWS 7 : MY FIRST HANDSHAKE-3- THE PASSWORD RESET DISK
(2009-05-28 23:33) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
WINDOWS 7 : MY FIRST HANDSHAKE-4 - THE SNIPPING TOOL (2009-05-29 22:21) 73
ANOTHER FIRST HANDSHAKE : OFFICE 2010 (2009-05-31 23:16) . . . . . . . . . . . . 74
2.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
GSM vs CDMA & Open Market Handset (2009-06-02 23:20) . . . . . . . . . . . . . . . . . 75
THE ’G’ Family : 0G to 4G (2009-06-05 00:10) . . . . . . . . . . . . . . . . . . . . . . . . . 77
Buy a Keyboard : Get a Computer (2009-06-06 23:43) . . . . . . . . . . . . . . . . . . . . . 78
PAPER BOOKS CONVERGE TO E-BOOKS : KINDLE DX (2009-06-07 16:25) . . . . . . 79
Google & Bing (2009-06-11 15:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Google and Bing : Bade miyaaan Chotey Miyaan (2009-06-11 16:09) . . . . . . . . . . . . . 81
My DIGIT Webinar (2009-06-12 22:37) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
H.A.M.R : Storage Futurity (2009-06-20 23:46) . . . . . . . . . . . . . . . . . . . . . . . . . 82
Storage Technology - Graduating Trends (2009-06-21 22:09) . . . . . . . . . . . . . . . . . . 83
Hi Tech Door Bell : Is it required? (2009-06-22 16:20) . . . . . . . . . . . . . . . . . . . . . 86
Hi Tech Door Bell : Is it required? (2009-06-22 16:20) . . . . . . . . . . . . . . . . . . . . . 87
Are you secure at your friendly neighbourhood CYBER CAFE ? (2009-06-26 15:27) . . . . 87
NOW CHIP IN BATHING SOAP!!!! (2009-06-27 22:14) . . . . . . . . . . . . . . . . . . . . 89
UNIQUE IDENTIFICATION PROJECT : UID (2009-06-28 16:01) . . . . . . . . . . . . . . 90
2.7 July . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Check your ANTIVIRUS’es Loyalty : EICAR Way (2009-07-03 23:07) . . . . . . . . . . . . 91
USB DHAMAAAL!!! (2009-07-04 22:40) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
AMD : The Launch of ISTANBUL (2009-07-06 22:47) . . . . . . . . . . . . . . . . . . . . . 95
KYPS : HELPS AVOID BEING VULNERABLE!! (2009-07-08 16:20) . . . . . . . . . . . . 95
E-WASTE : DEPOSIT & GET PAID (2009-07-10 23:01) . . . . . . . . . . . . . . . . . . . 97
EYE-FI : GETs YOUR CLICK UPLOADED (2009-07-11 00:02) . . . . . . . . . . . . . . . 99
PC IN A FLOWER VASE : ECS’s MING VASE (2009-07-14 23:09) . . . . . . . . . . . . . 100
HDD DOCKING STATION (2009-07-20 22:03) . . . . . . . . . . . . . . . . . . . . . . . . . 102
DATA STORAGE IN BACTERIA : ASTONISHING-MUST READ (2009-07-26 22:32) . . 103
2.8 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
WHO ESPIED MY COMPUTER? (2009-08-02 15:33) . . . . . . . . . . . . . . . . . . . . . 105
FREE UPGRADATION - ONLY A TRICK!!! (2009-08-02 15:50) . . . . . . . . . . . . . . . 105
SSDs vs HDDs : WHO is GOOD? (2009-08-05 00:59) . . . . . . . . . . . . . . . . . . . . . 106
Being BUSYYYYY (2009-08-15 10:05) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
WiMAX - THE POWER (2009-08-27 22:29) . . . . . . . . . . . . . . . . . . . . . . . . . . 107
2.9 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Use KEYBOARD for MOUSE (2009-09-01 07:26) . . . . . . . . . . . . . . . . . . . . . . . . 107
http://www.emailtheweb.com (2009-09-01 07:42) . . . . . . . . . . . . . . . . . . . . . . . . 108
E mail a Web Page : http://www.emailtheweb.com/ (2009-09-01 07:53) . . . . . . . . . . . 108
xB BROWSER (2009-09-04 23:34) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
xB Browser - Makes you anonymous (2009-09-04 23:45) . . . . . . . . . . . . . . . . . . . . 109
INTEL vs THE SEVEN SAMURAIs (2009-09-11 22:36) . . . . . . . . . . . . . . . . . . . . 109
SATA 1.0 vs SATA 2.0 vs SATA 3.0 : The hunger for speed (2009-09-11 22:49) . . . . . . . 110
PRINT A BATTERY : PRINTABLE BATTERY (2009-09-11 23:22) . . . . . . . . . . . . . 111
HOW IS UR FAVORITE USB MADE? (2009-09-11 23:40) . . . . . . . . . . . . . . . . . . 112
EXTERNAL DRIVES : ARE THEY REALLY FAST? (2009-09-21 19:38) . . . . . . . . . . 112
SUBMARINE COMMUNICATIONS : IT HAS BEEN TOUGH (2009-09-21 21:33) . . . . . 112
LIGHT PEAK TECHNOLOGY : INTEL (2009-09-24 16:17) . . . . . . . . . . . . . . . . . 114
MORRO : THE MICROSOFT SIDE OF ANTIVIRUS (2009-09-24 22:29) . . . . . . . . . . 115
SECURITY ESSENTIALS : NO MORE ”MORRO” (2009-09-30 20:22) . . . . . . . . . . . 116
DUAL SCREEN CAMERA : SAMSUNG ST 550 & ST 500 (2009-09-30 20:34) . . . . . . . 117
THE FUTURE OF OSs : MICROSOFT VERSION (2009-09-30 22:08) . . . . . . . . . . . 118
2.10 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
RADIATION EFFECTS & UR MOBILE - QUANTIFIED (2009-10-01 20:22) . . . . . . . . 119
MY WINDOWS 7 HOUSE PARTY PACK : THANK YOU MICROSOFT (2009-10-05 20:44) 121
NIKON S1000PJ : DIGITAL CAMERA WITH INBUILT PROJECTOR (2009-10-06 20:32) 125
1 MBPS BROAD BAND CONNECTION : HUMAN RIGHT IN FINLAND (2009-10-18 22:12) 125
KINDLE : WELCOME TO INDIA (2009-10-25 20:34) . . . . . . . . . . . . . . . . . . . . . 126
RDM : Rival for BLU RAY? (2009-10-25 22:09) . . . . . . . . . . . . . . . . . . . . . . . . . 128
D-ROLL : No end to imagination (2009-10-26 21:23) . . . . . . . . . . . . . . . . . . . . . . 129
2.11 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Green Dam Youth Escort : What’s that? (2009-11-06 06:25) . . . . . . . . . . . . . . . . . 130
LAPTOP Face Recognition falls FLAT!!!! (2009-11-26 08:00) . . . . . . . . . . . . . . . . . 131
2.12 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Google Binged!!!! - My 100th Post (2009-12-13 01:00) . . . . . . . . . . . . . . . . . . . . . 132
Y2K Bug!!!!Do u remember the time? (2009-12-28 22:12) . . . . . . . . . . . . . . . . . . . 133
BIDI makes LCD touchscreen A PASSE past (2009-12-30 07:49) . . . . . . . . . . . . . . . 133
3 2010 135
3.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
2010 (2010-01-01 06:38) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
HP in the racists scoooop!!! (2010-01-08 06:34) . . . . . . . . . . . . . . . . . . . . . . . . . 135
DUAL SCREEN LAPTOP : Another attempt by (2010-01-08 07:25) . . . . . . . . . . . . . 136
Charge cell phones by using Radio-Waves (2010-01-10 10:44) . . . . . . . . . . . . . . . . . 136
When EARS Speak!!! (2010-01-11 19:25) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
The ALT key Combos (2010-01-13 07:22) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
CHINA & GOOGLE (2010-01-16 07:55) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Microsoft choose to stay in China: Why not? (2010-01-17 07:06) . . . . . . . . . . . . . . . 139
SHARING DESKTOPS REMOTELY (2010-01-17 07:43) . . . . . . . . . . . . . . . . . . . 139
ZUNE 120 GB (2010-01-18 21:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Google vs Bing : On Data retention policy change (2010-01-19 21:44) . . . . . . . . . . . . 142
ROOT WEB DIRECTORY VERIFICATION (2010-01-29 07:56) . . . . . . . . . . . . . . . 143
3.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
IP Spooﬁng : Legal Acceptance in India? (2010-02-01 07:47) . . . . . . . . . . . . . . . . . 144
CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!! (2010-02-03 22:55) . . . . 145
Who’s Who? : Terminology world of Portable Computers (2010-02-05 17:25) . . . . . . . . 146
TRACE INDIA (2010-02-07 19:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
NVIDIA : Optimus technology (2010-02-13 07:40) . . . . . . . . . . . . . . . . . . . . . . . 147
WEB 2.0 SUICIDE MACHINE (2010-02-15 07:46) . . . . . . . . . . . . . . . . . . . . . . . 147
Steganography : Hide in a JPEG/BMP (2010-02-16 21:15) . . . . . . . . . . . . . . . . . . 148
How to avoid an infected USB/PEN Drive? (2010-02-17 07:52) . . . . . . . . . . . . . . . . 149
SVCHOST.EXE vs SCVHOST.EXE (2010-02-18 21:51) . . . . . . . . . . . . . . . . . . . . 150
Intel® Core" i3 Processor & Server 2003 (2010-02-23 07:36) . . . . . . . . . . . . . . . . . 151
3.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
The Journey from MB to GB : Pen Drives (2010-03-05 22:53) . . . . . . . . . . . . . . . . . 152
Search Web by FACE recognition - Work is ON!!!: ONE ALBUM (2010-03-07 21:06) . . . . 152
OS CARD : For now just an idea sirjeeeeeeee!!! (2010-03-11 22:19) . . . . . . . . . . . . . . 153
LIQUID COOLING IS IN - FOR CPUs & GPUs (2010-03-15 08:09) . . . . . . . . . . . . . 153
Secure ur Wireless media (2010-03-17 22:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Secure ur WiFi (2010-03-18 07:47) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
GOOGLE ﬁnally is OFF from China (2010-03-24 08:40) . . . . . . . . . . . . . . . . . . . . 155
Consequences of Google’s China Exit (2010-03-24 09:14) . . . . . . . . . . . . . . . . . . . . 156
MOZZILA Firefox & GERMANY (2010-03-24 21:27) . . . . . . . . . . . . . . . . . . . . . . 157
DANGEROUS PASSWORDS (2010-03-24 21:58) . . . . . . . . . . . . . . . . . . . . . . . . 158
CLEAR PLAY & DVD PLAYERs : E-CENSOR (2010-03-25 07:49) . . . . . . . . . . . . . 158
WiFi at home : Take precautions (2010-03-28 07:19) . . . . . . . . . . . . . . . . . . . . . . 159
DATA RECOVERY FROM RAM? (2010-03-31 22:44) . . . . . . . . . . . . . . . . . . . . . 160
3.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
HOW TO HYPER LINK IN COMMENTs AT BLOGGER? (2010-04-01 07:50) . . . . . . . 160
7 years of Indian Cyber Law (2010-04-07 23:14) . . . . . . . . . . . . . . . . . . . . . . . . . 161
(2010-04-08 07:47) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Computer EASTER EGGs (2010-04-15 06:59) . . . . . . . . . . . . . . . . . . . . . . . . . . 161
3.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
EAVES DROPPING RISK : EMR (2010-05-03 23:12) . . . . . . . . . . . . . . . . . . . . . 162
I M IN ”CHIP”- MAY MONTH EDITION 2010 (2010-05-11 06:48) . . . . . . . . . . . . . . 162
SHADOWS IN THE CLOUD (2010-05-31 15:02) . . . . . . . . . . . . . . . . . . . . . . . . 164
3.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
XINGYUN : World’s Fastest Computer (2010-06-07 11:12) . . . . . . . . . . . . . . . . . . 164
Prisoners all set to est BPO : A ﬁrst from Cherlapally Central Jail (2010-06-08 23:59) . . . 165
What material Laptops are Made of? (2010-06-09 09:30) . . . . . . . . . . . . . . . . . . . . 165
Securelist.com : Informative attempt by Kaspersky Labs (2010-06-09 09:44) . . . . . . . . . 166
Google and Caﬀeine : The Secret Link (2010-06-11 23:14) . . . . . . . . . . . . . . . . . . . 166
Google and Caﬀeine (2010-06-11 23:14) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Where does your Website Rank in the web? (2010-06-12 14:15) . . . . . . . . . . . . . . . . 167
Mobiles & Brain Cancer : WHO Speaks. (2010-06-12 17:59) . . . . . . . . . . . . . . . . . . 167
”GOOGLE STREET VIEW” - FIGHTING PRIVACY ISSUES (2010-06-16 21:03) . . . . . 168
WiFi Ampliﬁed 10 times : Here comes WiGig" (2010-06-16 22:40) . . . . . . . . . . . . . . 169
’Microrings’ - Ultimate Wireless Communication (2010-06-16 22:51) . . . . . . . . . . . . . 169
INTEL : UPCOMING PROCESSOR’S (2010-06-18 23:13) . . . . . . . . . . . . . . . . . . . 170
PANOPTICLICK : Your Browser Finger Print (2010-06-25 21:19) . . . . . . . . . . . . . . 171
Why not leapfrog 3G TO 4G? (2010-06-27 10:17) . . . . . . . . . . . . . . . . . . . . . . . . 171
3.7 July . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
COWS & DATA CENTRES : LINKED!!!! (2010-07-03 21:40) . . . . . . . . . . . . . . . . . 172
Intel meets Car : Makes it SMART CAR (2010-07-07 18:01) . . . . . . . . . . . . . . . . . 172
IT meets HIGH TECH TAPS : Renshui Faucets (2010-07-08 19:36) . . . . . . . . . . . . . . 173
MOST AMAZING TECHNIQUE TO TRANSFER DATA:SLURP (2010-07-08 22:21) . . . 173
SAMSUNGs GALAXY BEAM - Projector meets Mobile (2010-07-09 20:48) . . . . . . . . . 174
Augment your regular desktop with a FACE RECOGNITION feature (2010-07-10 22:19) . 175
How Google detects Invalid clicks? (2010-07-10 22:35) . . . . . . . . . . . . . . . . . . . . . 176
Increasing Laptop Bty Life : Few ways (2010-07-19 07:15) . . . . . . . . . . . . . . . . . . . 176
User Mapped-Section open??? (2010-07-26 21:14) . . . . . . . . . . . . . . . . . . . . . . . . 177
3.8 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
IPAD WORLD & VARIETIES (2010-08-12 22:23) . . . . . . . . . . . . . . . . . . . . . . . 177
Windows Systernals (2010-08-23 21:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
BILL GATES & Khan Academy (2010-08-25 21:55) . . . . . . . . . . . . . . . . . . . . . . 178
3.9 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Man in the Browser Attack : New dimension of cyber attack (2010-09-02 19:20) . . . . . . 179
ScareWare : One more WAREior in the family (2010-09-02 19:58) . . . . . . . . . . . . . . 180
TABNAPPING : A new generation Cyber Crime (2010-09-02 21:25) . . . . . . . . . . . . . 180
E-Waste & Indian Policy (2010-09-06 07:40) . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
New Gen BIOMETRICS : PALMSECURE from FUJITSU (2010-09-13 07:52) . . . . . . . 182
ORDER OF VOLATILITY OF DIGITAL EVIDENCE (2010-09-15 21:04) . . . . . . . . . . 183
Cyber Warfare : It has started (2010-09-16 13:47) . . . . . . . . . . . . . . . . . . . . . . . 184
ZERO DAY EXPLOIT : ??? (2010-09-18 22:45) . . . . . . . . . . . . . . . . . . . . . . . . 185
Root Kits : Hidden Undetected Threats (2010-09-18 22:57) . . . . . . . . . . . . . . . . . . 186
Browser Forensics - Not Simple (2010-09-19 13:26) . . . . . . . . . . . . . . . . . . . . . . . 187
Shadows in the Cloud : Cyber Espionage (2010-09-30 11:24) . . . . . . . . . . . . . . . . . . 188
3.10 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
CLEANERS & FOOTPRINTS (2010-10-07 17:14) . . . . . . . . . . . . . . . . . . . . . . . 188
Security Enabled Hardware :INTEL - McAfee Merger (2010-10-08 17:54) . . . . . . . . . . 188
(2010-10-08 19:32) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
(2010-10-08 19:38) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
ALL izz WELL!!!!!inside this- Check out FREE STUDIO (2010-10-08 21:56) . . . . . . . . 190
RISK MANAGEMENT : Beware while u update with Patches (2010-10-08 22:09) . . . . . 190
Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla
(2010-10-08 22:32) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Stuxnet : A Milestone in Malicious Code History (2010-10-11 22:19) . . . . . . . . . . . . . 191
Biggest release of Patch update by MICROSOFT (2010-10-12 07:27) . . . . . . . . . . . . . 193
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:41) . . . . . . . . . . . . . . . 193
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:55) . . . . . . . . . . . . . . . 193
CANURE : 100 on ACID3 Test (2010-10-15 19:57) . . . . . . . . . . . . . . . . . . . . . . . 193
Is ur Account Hacked ?- Common ways u get compromised. (2010-10-16 07:43) . . . . . . . 194
Stuxnet : Some more good info (2010-10-16 08:06) . . . . . . . . . . . . . . . . . . . . . . . 195
CaaS : CRIME WARE AS A SERVICE at oﬀer now (2010-10-18 18:05) . . . . . . . . . . . 195
Service Packs & Infection Rates (2010-10-19 22:19) . . . . . . . . . . . . . . . . . . . . . . . 195
Collection of Forensic Softwares : TUCOFS (2010-10-20 21:56) . . . . . . . . . . . . . . . . 196
Crack 14 Character passwords in Seconds : Objectif Sécurité (2010-10-26 07:57) . . . . . . 196
Image Ballistics : Incredible IT (2010-10-31 16:20) . . . . . . . . . . . . . . . . . . . . . . . 196
VIRUS in Boot Sector in Hard Disk fresh from OEM!!!! (2010-10-31 21:08) . . . . . . . . . 197
OPERATION CISCO RAIDER (2010-10-31 22:24) . . . . . . . . . . . . . . . . . . . . . . . 197
3.11 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6$ is all to shut down a Cloud Client site!!!! (2010-11-01 08:34) . . . . . . . . . . . . . . . . 198
Intel opens ﬁrst chip plant in China?? (2010-11-01 18:01) . . . . . . . . . . . . . . . . . . . 199
Adobe ﬂash Player hit!!!! (2010-11-01 18:45) . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Bredolab grabs Attention (2010-11-01 19:11) . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Mozilla @ Prone again!!!! (2010-11-02 07:54) . . . . . . . . . . . . . . . . . . . . . . . . . . 200
MICROSOFT & Failures!!! (2010-11-02 22:08) . . . . . . . . . . . . . . . . . . . . . . . . . 200
Get Paid to Hack GOOGLE (2010-11-04 17:31) . . . . . . . . . . . . . . . . . . . . . . . . . 201
Removing METADATA from JPEG & IMAGE FILES (2010-11-04 18:14) . . . . . . . . . . 202
3.12 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Full stop from being tracked online :An attempt from FIREFOX (2010-12-05 18:50) . . . . 204
Operation Pay Back & LOIC (2010-12-28 22:29) . . . . . . . . . . . . . . . . . . . . . . . . 204
4 2011 205
4.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Case of Albert Gonzalez : The Largest Online Fraud in U.S. History (2011-01-29 10:44) . . 205
FBI : A Parent’s Guide to Internet Safety (2011-01-29 11:00) . . . . . . . . . . . . . . . . . 206
Trojan.Spy.YEK : The Corporate Spying Tool (2011-01-29 11:26) . . . . . . . . . . . . . . . 206
BitDefender : Tips for Safe Shopping on Mobile Devices (2011-01-29 11:44) . . . . . . . . . 207
4.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
IE users stand vulnerable again : Warning from MICROSOFT (2011-02-01 20:43) . . . . . 207
AMD comes up with FUSION (2011-02-01 21:05) . . . . . . . . . . . . . . . . . . . . . . . . 207
Win32.Hlux : January 2011 ” King of worms” (2011-02-06 19:46) . . . . . . . . . . . . . . . 208
DRIVE BY ATTACK (2011-02-06 20:03) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
DATA STORAGE IN BACTERIA : 9,00,000 GB stored in 1 gm of Bacteria (2011-02-08 21:24) 208
INTERNET KILL SWITCH???? (2011-02-09 20:34) . . . . . . . . . . . . . . . . . . . . . . 209
MALWARE & AUTORUN : LOVE BIRDS OF PROPOGATION (2011-02-09 20:40) . . . . 210
The Gawker case : EXPERIENCING A HACK (2011-02-13 20:00) . . . . . . . . . . . . . . 210
NOKIA & MICROSOFT : A MERGER TO READ ABOUT (2011-02-15 20:59) . . . . . . 211
NOKIA should have merged with GOOGLE : Google CEO (2011-02-16 20:02) . . . . . . . 212
Easy Upgrade from USB 2.0 to USB 3.0 :Transcend’s USB 3.0 Express Card Adapter
(2011-02-16 21:02) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Be veri careful : Recent cases of duping online in DELHI (2011-02-19 09:29) . . . . . . . . . 212
4.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
ANDROID & GOOGLE : AT LOGGER HEADS???? (2011-03-02 19:29) . . . . . . . . . . 213
QUALITIES OF A GOOD ANTIVIRUS (2011-03-13 20:16) . . . . . . . . . . . . . . . . . . 214
How to Disable/Enable Use of USB Storage Devices in Windows (2011-03-15 13:18) . . . . 217
4.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
The weak password problem : Now solved???? (2011-04-03 21:48) . . . . . . . . . . . . . . 219
The weak password problem : Now solved???? (2011-04-03 21:55) . . . . . . . . . . . . . . 219
Revenge : YouTube Style (2011-04-04 22:16) . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Beware of ’Radioactive’ Emails (2011-04-05 07:51) . . . . . . . . . . . . . . . . . . . . . . . 220
HOW DO U FIND IF YOUR PC IS HACKED?- PART 1 (2011-04-27 20:47) . . . . . . . . 221
HOW DO U FIND IF YOUR PC IS HACKED?- PART 2 (2011-04-27 20:52) . . . . . . . . 221
HOW DO U FIND IF YOUR PC IS HACKED?- PART 3 (2011-04-27 20:55) . . . . . . . . 221
HOW DO U FIND IF YOUR PC IS HACKED?- PART 4 (2011-04-27 20:59) . . . . . . . . 222
HOW DO U FIND IF YOUR PC IS HACKED?- PART 5 (2011-04-27 21:01) . . . . . . . . 222
HOW DO U FIND IF YOUR PC IS HACKED?- PART 6 (2011-04-27 21:03) . . . . . . . . 223
4.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
McMurdo station & more DATA CENTRE Locations (2011-05-16 21:47) . . . . . . . . . . 223
4.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
INSPIRED FROM INDIA : CHINAs ATTEMPT ON TAKING ON CORRUPTION
(2011-06-13 14:45) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
BULLET PROOF HOSTING (2011-06-13 15:06) . . . . . . . . . . . . . . . . . . . . . . . . 224
SYMANTEC SPOTS ONE INTERESTING E-MAIL CAMPAIGN (2011-06-13 15:24) . . . 224
FLIRT BOTS (2011-06-13 15:56) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
FLIRT BOTS (2011-06-13 16:03) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
MAKE incognito YOUR DEFAULT SETTING (2011-06-13 18:38) . . . . . . . . . . . . . . 226
Your VOICE to charge your MOBILE (2011-06-13 21:38) . . . . . . . . . . . . . . . . . . . 226
ANDROID APPLICATIONS CLONED : Developers make it spam (2011-06-27 21:44) . . . 227
4.7 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
JAVA SE DEVELOPMENT KIT NOT FOUND!!!! (2011-08-19 22:42) . . . . . . . . . . . . 227
IBM developing PCs that may run 30 times faster (2011-08-21 12:44) . . . . . . . . . . . . 228
Now Aerial cyber attack!!!!r u safe anyway? (2011-08-21 13:40) . . . . . . . . . . . . . . . . 229
touched........20,000 (2011-08-22 11:31) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
4.8 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
CHINA CAUGHT ON WRONG FOOT in its own MARCH (2011-09-03 19:22) . . . . . . . 230
HDFC CLEAN BOWLED by Hidden SQL Injection Vulnerability (2011-09-03 20:12) . . . . 231
CYBER SECURITY : ACTIVE ATTACKS (2011-09-20 20:57) . . . . . . . . . . . . . . . . 232
XSS and CSS : Whats the diﬀerence ? (2011-09-20 22:33) . . . . . . . . . . . . . . . . . . . 232
DEEP FREEZE : A way to protect ur system!!! (2011-09-20 22:57) . . . . . . . . . . . . . . 232
DEEP FREEZE : II (2011-09-20 23:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Common Malware Symptoms (2011-09-25 20:43) . . . . . . . . . . . . . . . . . . . . . . . . 233
When malware prevent you surﬁng internet : MALWARE REMOVAL -1 (2011-09-25 20:50) 233
4.9 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
nVidia GeForce GPU cracks six character password in four seconds (2011-10-10 20:26) . . . 233
HIBERNATION MODE : HOW SAFE FOR YOU? (2011-10-11 22:26) . . . . . . . . . . . 234
WIRESHARK Troubleshoot (2011-10-22 23:19) . . . . . . . . . . . . . . . . . . . . . . . . . 234
DUQU : FROM THE GEN STUXNET???? (2011-10-30 23:10) . . . . . . . . . . . . . . . . 235
BACKTRACK 5 : How to use ? (2011-10-30 23:24) . . . . . . . . . . . . . . . . . . . . . . 235
SOME MORE ON DUQU (2011-10-31 20:50) . . . . . . . . . . . . . . . . . . . . . . . . . . 236
RED PHONE : ENCRYPTED VOICE FOR ANDROID!!! (2011-10-31 21:52) . . . . . . . . 236
4.10 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
DUQU’s MICROSOFT LINK!!! (2011-11-02 20:21) . . . . . . . . . . . . . . . . . . . . . . . 236
Our Browsing History Is Leaking into the Cloud!!!! (2011-11-02 21:29) . . . . . . . . . . . . 237
DISCONNECT URSELF (2011-11-15 21:20) . . . . . . . . . . . . . . . . . . . . . . . . . . 237
DISCONNECT.ME in Incognito mode (2011-11-15 21:26) . . . . . . . . . . . . . . . . . . . 239
THREATS TERMINOLOGY & GLOSSARY : PART 1 (2011-11-24 22:50) . . . . . . . . . 239
COOKIES & TYPES ? (2011-11-27 21:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
CONTROL COOKIES TAKING CONTROL FROM UR BROWSERS (2011-11-27 22:12) . 241
Cookienator : Option to control cookie menace (2011-11-27 22:26) . . . . . . . . . . . . . . 241
4.11 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Windows 8 Developer Preview : Pre Beta Version for Developers (2011-12-01 07:10) . . . . 242
LogMeIn HAMACHI (2011-12-02 22:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Snake oil Cryptography (2011-12-02 23:01) . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Windows 8 Developer Pre BETA : How to get full screen on a VM? (2011-12-03 14:04) . . . 243
”LIKE” Button in Facebook : Tracks u!!! (2011-12-03 21:54) . . . . . . . . . . . . . . . . . . 243
SPAM UNSUBSCRIBED IS SPAM SUBSCRIBED (2008-12-26 22:36)
I am sure you would all have recieved all types of spam mails at one time or the other on daily,weekly or on
some periodic basis.Now there is an interesting thing about these spam mails.When you recieve a mail and
you declare it as spam,it goes to your spam box which you keep clearing every now and then.Any time you
try reading any such mails you would often come across 'TO UNSUBSRIBE CLICK HERE¨.Here is the
trick of the spam generator.Any time you click this you conﬁrm to the spammer that this is an active e-mail
id.This way though you may unsubscribe the spam from that particular spammer but the spammer gets to
know that yours is an active email id and he sells...i REPEAT..he sells your email id to another spammer
with the guarantee that yours is an active email id or a genuine email id.Most of the spammers.i mean the
originators send the spam mails to randomly computer software generated email id`s and of these all when
u click from your particular id to unsubscribe they get to know that one of these email id`s is genuine and
active.Hence the more you unsubscribe the more you get subscribed to.So friends..dont unsubscribe..!!!!!!
MIAN BV KE JHAGDEY (2008-12-26 22:37)
By god this life is really beautiful and complex,the best thing is the relationships that we have here.Today
for the 100000th time i had a ﬁght with my only half and it is still on,the small ego’s of ladies,the small
MANhood inside evry man....and when they clash...it is good 2 c...no eye 2 eye...no talks,pin drop silence
maintained at home,kitchen is the most eﬀected..it seems udhar barsoon se koi jaata vaata nahee hai....apna
apna khana...apna apna peena....mian gets busy on his laptop...bv on her soaps(star plus ...colors....sony..zee
and what not).......and the environment looks like 2 continue for eternity...since koi kum nahee hai...ek se
badhkar ek hain....phir suddenly ek din kisi ek kee rooh jagegi aur bolegi bahut hua...chal normal hoja...and
life starts again with a promise kee hum dono ek hain...aaagey se koi ladaaai nahee....we r one.....so waiting
for the time....now busy with lap top!!!!
HOW 2 DELIVER GOOD PRESENTATIONS? (2008-12-26 23:08)
1. How to deliver presentation?Presentation is an art that cannot come overnight,it is ur personality whn u
stand there that blends with the subject matter on how u give it.The same set of slides in a presentation given
by two diﬀerent persons will make a diﬀerent impact all together as and when the presentation gets ﬁnished.
2. One has to be exactly reach the podium with a free mind and a clear aim on what he has to speak,what
is his scope and what is he going to speak about.Now for a presentation,the presenter need not be an expert
on that topic,but he should be aware of tits & bits,he should be ready to take on questions for which he is
not prepared from the audience on how is he going to answer them.He should avoid speaking even a word on
which he is unsure and he is not conﬁdent to take on. 3. Another important aspect is the word humour.To
involve the audience in the presentation,the humour has to b a crucial part of any presentation.Now i dont
mean that humour includes putting some funny slides or poking out few good/bad/dirty jokes for the sake
of it.It again depends on the audience,if it is a mass audience u should be happy since mass involves every
type of people,thus u can have a choice between ur insertions or what u plan to speak to make them
involved and if it is restricted audience or a small group of people u should be able to gauge the background
they have in common and insert suitable humour likewise.It is left to you how u make the audience smile
anyhow.Ask them something that they can easily take on without getting embarassed.Include a surprise in
some form.Example if u have to give a presentation which is likely to be more than 10 minutes(....which
mostly are!!!!)...insert a 5 sec movie clip...may b some jackie chan quick action bashing or amitabh from
deewar in the mandir scene....rajnikanth with ﬂying ciggarete etc etc etc....the scope is aplenty....just catch
the audience by surprise and tell them...that was just to evoke some interest....or take out a tennis ball from
ur pocket and throw it to a person in the audience who is a little known to you or even not known will
do and ask him to catch.....or do ask me more on such ideas...AUDIENCE IS THE KEY ALWAYS...YOU
HAVE TO GAUGE THEM PRIOR TO GIVING THE PRESENTATION....these ideas will certainly look
WAGUE/IDIOTIC/STUPID at ﬁrst glance....but i have tried them all....and i have met with success.....i
love giving presentations.... 4. One just need to get in love with this art once,i have seen this.....u get in
once...and u will not be able to come out of this.You will start waiting for opportunities wherein you would
get an opportunity to give a presentation unlike the otherway round most of the times..will keep adding more
in days 2 come....
BALANCE is DIFFICULT (2008-12-27 00:12)
Life 2 day is veri demanding....you cannot have spare time lest you get some leave...i m speaking about the
balance between time u give to ur parivaar and ur profession....how so ever smart u r...you will never be
able to make a perfect balance....you give more time 2 ur profession u get stuck with the family...and u give
more time to family u will start hearing that u r not working.......so iss ka ek he solution hai....jo mann kare
vo karo......jab bv roye to ghar is priority and when boss demands....then company becomes priority.......and
when both demand then prefer 2 sleep.....baaki own time is evenly booked 2.
Ghazal maestro in making (2008-12-27 00:42)
This link will deﬁnitely make u smile....thats a promise [EMBED]
Anonymous (2008-12-28 17:17:00)
kya baat hai!kya baat hai!!!good one!
TUNE UP 2009 UTILITIES (2008-12-27 00:53)
1. I have been an avid follower of this utility since using 2007 when i used this ﬁrst as TuneUp 2007 which
got followed by Tune up 2008.And recently tuneup 2009 has been launched.There was a mark diﬀerence
between the 2007 and 2008 versions.But the recent one has come as a small disappointment.The same face
lookup,the same color template with no new features except the one ﬁnding out automatic diagnostics for
ur computer setup.Either i m too early to comment on this or may be i m little harsh in saying that. 2. The
main features include Intelligent recommendations for your unique PC optimization, Identiﬁes your personal
settings and protects them,Highlights your PC`s optimization potential, including unused programs and
resource-draining settings and the best is the Recommendation options which explains performance results
before taking any action. 3. So thats all new which is there in this version.Baaki,all the earlier features
maintain status quo at their respective tabs and positions.
MURPHY’s LAW : JALANDHAR 2 AMRITSAR & BACK (2008-12-28 14:56)
1. Do you believe in murphys law?I have so many instances to recount that murphy works on me.The theorem
recently worked on me when i travelled from jalandhar to amritsar along my FIL & MIL(Father & mother
in law ...) in my wagon r duo.
2. The aim was to start,with a top up lpg tank in car, start from jalandhar at 1100h,reach golden temple
by 1300h,have darshan and reach wagah by 1600h...and start return at around 1830h from wagah back to
jalanadhar,and reach back by 2100h ,looks perfectly ﬁne w.r.t the road conditions and time limit....what was
to follow is the result of what happens when u strike murphy.
3. I m a proud owner of a wagon r duo that works on both petrol & lpg.So as we started on the journey
i decided to topup the lpg tank from the only source near me so that journey could become economical.As
i reached the HPCL outlet,i was told that LPG is out of stock and i would have to wait fr a day to get a
economical drive.Marta kya na karta
i started with a khula dil...ke kuch nahee hota....let it be petrol......and
travelled 25 km ahead...i met solid...zero visibility DHUND and with a lot of driving skills and maneuvering
i reached amritsar by 1430h....and i met the jaam of life....so as to reach golden temple by 1545h........the line
of devotees at the gurdwara could put to shame a european football world cup stadium rush.....so we paid
our devotion from heart outside only and started race for wagah.
4. Again we met the dedicated traﬃc jam,normal rush,lots of dhundh and fog on way to wagah and successfuly
reached wagah at 1710h...2 c public rushing back as the drill parade concluded for the day...but FIL insisted
that he would atleast c the gate of pakistan and their sentries.....so much excited was he that he rushed ahead
manuevring the public against the direction....he ﬁnally saw the gate ....saw the pak sentries....and returned
back...but ye kya hua....”BETA MERA BATAUA GAYAB.........”then followed our grieveinces and sympathy
for the FIL/papa/nana..so that was the act by a smart jeb katra.......so it was 1750h and we decided to rush
back as we were getting late already........
5. Suddenly the responsible damaad realised that lunch kab hoga.....but it was 2 late...so we decided for an
early dinner.......but the visibility was 2 2 2 tooo low to even think of snailing to jalandhar....and then the
good thing happened...the head light of the car focussed on a oﬃcers mess board on the wagah road.....and
we decided to stay put their for the night.The deal of the day concluded.
6. We started next day after 1100h and reached in 3 hrs scawling thru the tough foggy conditions......THANX
MURPHY....Do i blame murphy or my planning?
RFID (2008-12-28 21:51)
1. Here’s an old thing in a new bottle...i mean old wine with a new meaning altogether.Radio-frequency
identiﬁcation (RFID) as would anyone know is an automatic identiﬁcation method, relying on storing and
remotely retrieving data using devices called RFID tags or transponders.
2. This is not a new invention ..but the usage certainly has made it something like new.The vast usage of
RFID 2day includes a big scope from controlling inventory to controlling limited access to vehs and pers
to new generation security systems.
3. Big guns of the manufacturing industries across the globe have already exploited the usage of this
technology and now the technology is gradually making way in the Indian industry in the form of Daphene
systems,ESSL to name a few that come to my mind instantly.
4. The good thing is that even as the technology is introduced to the consumer for the ﬁrst time,it comes
cheap...and i mean dirt cheap.Imagine controlling an inventory of a lakh plus item at just under 25K...ie less
then 25 paise per item and now body would ignore at such a low cost in bulk for the beneﬁt of organisa-
tion.This would not only maintain the inventory but would also avoid any theft being carried out in some
body’s pocket....so this is just the beginning of another technology revoloution...all u guys who keep looking
for some technical buzz word...keep a track of this.....
3D TELEVISION (2008-12-29 21:54)
1. Read about this lately in one magazine.This is about the 3D TV.From the good old Texla era to the
color tv revolution to the ﬂatrons to the LCDs and DLPs,now comes the 3D TV.What is 3D TV?Easy to
explain in layman terms....u must have seen few movies on theatre screens with your 3d glasses ON like the
Polar Express or Shiva ka insaaf in mid Eighties or the famous kids movie Chota Chetan....the concept is
similar...wish to see 3D images on a 3D TV ,you need to wear 3D glasses.
2. Sky’s digital satellite broadcast hardware delivered the content to a standard Sky + HD system,
which was then played back over a ’3D Ready’ TV.The technical demonstration lasted for the complete
duration of a match that featured the England v New Zealand rugby union test match and the Liverpool FC
v Marseille UEFA Champions League match, among others.
3. Sky’s 3D system currently requires viewers to wear special glasses, and 3D TV hardware comes at a price
not easy to aﬀord as on date. Manufacturers such as Philips have 3D TV technology already and LG will
be launching a system next year.
4. I assume that this will be a turning point in broadcasting technolgy once the subject becomes cheap or
even just aﬀordable.But the toll of dedicated viewers will take time as it is not only about viewing with
3D glasses but also ﬁlming with special 3D TV equipment for a telecast or recording......is it far?....who
knows.....u cant underestimate the speed of TECHNOLOGY ABSORPTION!!!!
Nikhil Chauhan (2008-12-31 13:03:00)
Interesting stuﬀ Anupam. Do you think this technology can enter Indian market in the next few years? Given that
the entry of satellite TV has recently started and HD is nowhere on the horizon, I think it’ll take sometime before
we can see this in our living rooms. That said, IPTV is something that’s gaining a lot of traction and with the high
broadband adoption rates, that technology deﬁnitely would be sustainable. Thoughts?
anupam (2009-01-01 17:12:00)
yes dear nikhil,the regime of 3d tv will have a restricted viewing in this country where the concept is still unknown
to most of the country men.How many would be able to recount the three movies shiva ka insaaf,ploar express,chota
chetan when i mention 3d movies earlier.So this will remain conﬁned to the luxury lanes of 5 star hotels and privileged
corporate giants oﬃces...and yes u said it correct the introduction of IPTV which has been recently introduced in
INDIA will send shivers down the airtel/sky/dish tv lot when they compare the tariﬀ and running expenditures!!!
IPTV - TRIPLE PLAY or QUADRUPLE PLAY? (2009-01-01 21:35)
1. Recently a veri dear friend of mine Nikhil mentioned the word IPTV in one of his comments...i was
familiar with the word to the extent that i knew that IPTV (Internet Protocol Television) is a system where
a digital television service is delivered using Internet Protocol over a network infrastructure, which includes
delivery by a broadband connection.
2. To see in the indian context,i just dug google slightly deep to know the scope and horizon for eﬀect on
laymen who is used to seeing the TV trash through the sincere loyal galee ka cable walah or the dish tv lot(ie
airtel/dishtv/tata sky etc)...the ﬁndings were interesting...the word is buzzing in the TV industry and the
word is sending shivers down the spine of the eﬀected pers including the gali ka cable walah and the satellite
3. The best thing about this is that unlike the satellite tv where u have a multiple choice of combo’s of various
channel’s (with separate monthly tags)IPTV will have all in one thus leading to no confusion no tension about
which package to go for.I could ﬁnd reliance and bsnl already into marketing and commisioning of STB’s in
selected states.Although initial reaction to this has been lukeworm,since the common men is still wondering
in the land of combinations oﬀered by the satellite tv companies lot.
4. Now when the word IP is tagged within IPTV,it is bound to create added advantage with itself....sharing
pics/photos across your TV with another frend with access to IPTV...hai na sahee....TV ka TV and sharing
also on TV ...this is just the tip of the ice berg...as time grows it will be much more then just watching TV
and sharing ﬁles.So wait and watch
5. The tariﬀ is approx about 250 per month(price ex bsnl yr 2008) with all channels generally about 125
including all those high TRP types including saas bahu,dance reality shows and sports etc.
6. What does TRIPLE PLAY mean ? The commercial bundling of IPTV, VoIP and Internet access is
referred to as ”Triple Play” service (when these three are oﬀered with mobility, the service is referred to as
”Quadruple Play”).That’s it.Just simple but a techie word...thats what IT is all about!!!!
WHY BLOG? (2009-01-02 07:55)
1. If the answer to this question is asked from people,I am sure we will get varying answers from getting
publicity, to earning money, to be in the IN thing,to become blog grok,to be zaraa hat key from the league,to
create a discussion,to become a reference,agar vo kar sakta hai to y not me and the list is endless and will go
on.We all have diﬀerent reasons to blog.The purpose is same ....achieving SATISFACTION in some form...be
it money or publicity or sharing or discussing .........
2. We all are working some where in some organisation.We all have diﬀerent interests,diﬀerent tastes when
it comes to plain choice be it any thing like I may be interested in something to do with IT,you may be
interested in something to do with cooking,dance,teaching,commerce, share market,art,painting,music etc
and we all do diﬀerent things in oﬃce(which obtrudes and eats into maximum time of our active life) which
may not gel with the profession in which we are working.Even if we work in some similar environment we
may not get the right set of hoi poll oi(ie people) to discuss or to hear what we have in our minds.So here
is the job of the BLOG giving you a MUGWUMP(ie independent) platform to voice YOUR opinion on a
bailiwick (ie subject) of your interest.
3. First I didn’t knew what to start and where to start from,then after I got some time and was able to
dig into the abstruser target of writing few lines every now and then in the blog,I realise it has gradually
moulded into a regular habit.
4. Irrespective of the scuttle butts,irrespective of any number of visitants,irrespective of any readers BLOG
stands out in the world of web reﬂecting you and you only.To make it shine you keep improving upon it by
continuous feeding of good shareable info.
MPEG vs H.264 (2009-01-03 21:26)
1. A not so techie person like me knows MPEG as the extension of videos also known with the extension
name of .mpg,.mpeg,.mp1.We have been seeing this name since the birth of CDs in late 90s(...i m speaking
in Indian gali context,thats when this term evoluted to a common man ).
2. Any one who has followed up the term MPEG would know or would have heard names of various versions
that followed MPEG1,MPEG2, MPEG3, MPEG4 and lately some thing known as H.264 comes up in the
context of video compression technology.So this term aroused my interest to know in some detail about what
has been the change and value addition over these various versions that keep following up every 2-3 years.
3. Moving Picture Experts Group(....expanded form MPEG) also known as ISO/IEC JTC1/SC29 WG11
evoluted from MPEG 1 to H.264 2day.
4. MPEG 1 : The earliest standard for compression of video and audio was designed to compress VHS-quality
raw digital video and CD audio.This included many severe shortcomings in form of a lower resolution,less ef-
ﬁcient audio compression system,lack of ﬂexibility,access control issues,unsuitable for HDTV,did not support
5. MPEG-2 : Successor tO MPEG 1 Standard that describes a combination of lossy video compression and
lossy audio data compression methods also permitted storage and transmission of movies using currently
available storage media and transmission bandwidth.This overcame the shortcomings of MPEG-1 mentioned
6. MPEG-3 : A coding standard designed to handle HDTV signals but it was soon discovered that MPEG-2,
at high data rates, would accommodate HDTV.Thus, in 1992 HDTV was included as a separate proﬁle in
the MPEG-2 standard and MPEG-3 was rolled into MPEG-2
7. MPEG-4 : About this I will give a point wise summary in days to come.In brief otherwise it absorbs
many of the features of MPEG-1 and MPEG-2 and other related standards adding new features such as
support for 3D rendering.MPEG-4 is still a developing standard and is divided into a number of parts.
Companies promoting MPEG-4 compatibility do not always clearly state which ”part” level compatibility
they are referring to.
8. The key parts to be aware of are MPEG-4 part 2 and MPEG-4 part 10 used by the Nero Digital AVC,
by Quicktime 7, and by next-gen DVD formats like HD DVD and Blu-ray Disc.
9. Now comes the talk about H.264.In short H.264 is a standard for video compression, and is equivalent
to MPEG-4 Part 10, or MPEG-4 AVC (for Advanced Video Coding). It uses motion-compensation-based
codec standard.Now whats motion compensation?Will speak on this in few days after I get 2 know what it
10. Thanks wiki for sharing this.
Amsang (2009-01-06 11:05:00)
yeh meliorate kaun hai....
ANUPAM (2009-01-06 16:07:00)
Sir,Meliorate means GET BETTER
harjot (2009-01-20 20:48:00)
good eﬀort , keep it up
DUAL SCREEN LAPTOP : LENOVA (2009-01-06 22:39)
1. Now thanks 2 laptopmag.com that I could get this pic that actually shows the newly unvield model
from lenova the THINKPAD W700ds.The ﬁrst of its kind in the laptop world.With a purpose of ? Still 2
decide!!!but yes some ideas start propping in every one’s mind about what he/she can do with such a model
if given a choice to work on.
2. A word about the cost ranges from a cool 90,000 Rs and beyond.Inside the W700ds is a choice of Intel
Core 2 Quad processors, NVIDIA Quadro FX graphics and up to 8GB of DDR3 memory. There’ll be a
choice of hard drives in RAID conﬁguration, or solid-state drives with a 17” main display and 10.6” vertical
display.Weight is going to be a problem as the baby model baby needs a pull of 40Newtons for a pick ...I
mean approx 4.1 kg.....bhaisaab over weight to hain!!koi doubt nahee...but is it worth?Who will actually need
it as on date?I can guess with guarantee about few big corporate houses who like the TASHAN factor or for
those who have the Lakshmi and can spare some for a style.
3. So the initial reaction is going to be limited.But......yes there is a but......I mean how many of us knew
that we will possess a laptop few years back...when it seemed like a rich mans shauk.....not many....and 2day
desktop are actually pursuing the stone age road already.So it is just a matter of time,low cost and sale and
economic growth of a country like Hindustan where each one of us has a dil ke andar tashan kee baat.....style
kee baat.....so i assume that this concept will be well recieved in near future.
4. Certainly,there needs more reﬁnement on the concept w.r.t the cost & the weight.Lets weight ...I mean
wait and watch......
Get Flummoxed : Futuristic Laptops (2009-01-08 15:05)
1. Got these pics from http://www.tuvie.com/category/laptop.This site has a collection and details of all
these laptops with brief details.Below is a collection of these real good lucrative futuristic laptop sets.Worth
DOES DEMOCRACY MEAN FREE 2 STRIKE? (2009-01-09 14:49)
1. Days will not be far when we search fuel on google!!!!No time to joke anyway.This comes in context of the
PSU and the govt dispute.Now an eﬀect, to the scale of eﬀecting the entire nation, over a regular issue that
keeps propping every now and then,can happen in apna own democratic HINDUSTAN only.
2. In this country the meaning of democracy is not understood by many.To many it means anyone can speak
anything,anyone can do anything,anyone can sit on a dharna or may be anyone can go on strike.This is what
is understood by many.Now since yesterday anyone who has been watching TV would have come across usual
common man cry over shortage of petrol...kisi kee maa bemaar hai...kisi ki koi meeting hai...someone is left
stranded on a NH1 highway for want of petrol....and the list goes on.No body is eﬀected in the PSUs and
nor in the goverment.They both are ﬁghting and the common men is being pisoed.
2. This kind of a strike clearly reﬂects SELFISHNESS,MEAN-NESS,Miserly attitude of the strikers.Have
some responsibility towards the nation.There is no diﬀerence I ﬁnd between a cosseted,spoilt,ballsed up
tyke and them.For want of a wage revision they are ready to put at stake the NATION. 3. Any out-
side country watching this could easily take this opportunity if this doesn’t get under control at the earli-
est.Movement/Motility/Commuting across a country,mind it not a city or a town or a village,in context of
an entire nation is held up.Imagine at this time ,being struck by a natural calamity,all relief measures would
be held up for want of an issue like wage revision of a PSU.Awful!!!Execrable. 4. Now it would be seen
I am sure all the echelons in these PSUs would move scotfree,no action would be taken.....because INDIA
has the biggest democracy in the world.What does democracy mean,no body knows!!at least the PSUs don’t
know.The fact that these Mongrel’s have put a country at stake before their own meagre selﬁsh mind is
enough to prove them guilty of commiting a undesired umbrage. 5. So recommended action is DECREASE
Anonymous (2009-01-30 11:09:00)
Hi Meliorate: The tag line reads ’... there is no end to improvement’. Would you mind improving on the partial
knowledge reﬂectd in the above blog by going through this link:
and possibly also this:
ANUPAM (2009-01-31 06:41:00)
1. i read through your links and would like to tell you that YESS you have been subjected to worst possible treat-
ment by the sarkar,but just being treated like that should not make you do what you have done...STRIKE is not the
solution...what would you like to prove by that?
2. If army also does the same thing...even they r frustrated lot after the sixth pay commission...their structure has
been lowered,thier proposals have been thrown...would you agree if ARMY GOES TO STRIKE?I certainly know the
answer ..it would be NO...there are some duties and responsibilities that are not just salaried...they carry a bonding
and obligation towards nation....and so is yours...you move the nation on road,on rail every where across.....
Software Leloooo....Software lelooooo (2009-01-12 14:05)
1. I have spent my bachpan in the middle class galiyaan of Saket wherein I was frequent to hearing the sabzee-
wala singing and doing cantabile on his cycle with loads of subziyaan .....”AALLLU LELOOOO....Baigan
lelo...........” and so on and the list went on till he recited his entire list of subzees in his bunny bag.
2. Lately I got cued of this sequence as I visited Nehru Place,the hub of IT Hardware selling and
Software.Not less then about 30-35 persons with a bag full of CDs and DVDs with a collection of ple-
beian photocopy list of all the latest softwares (cracked) were found freely dispersing the song ”Software
Leloooooooo.....Software Leloooooo”.I was surprised thus,for the second time I put my ears wide open to
get the substantiation again.Yes....indeed they all were selling SOFTWAREs....all including Windows Server
2008,Autocad 2009,Windows 7 beta,Encarta 2009,Encylopedia 2009 and so on...........the list is endless.....
3. I wanted to take a pic of that but regrettably I was not carrying anything to get them clicked.Nehru Place
is one real place to be known as IT HUB...the real one.....much like we have sabzee ka bazzaar there we have
a IT ka bazaar.People who do not K of computer(.........does it even exist in the word)...are found selling old
harddisks...RAM....all.....u name it they have it.....and at a price at which BILL
GATES WILL ANNOUNCE HIS RETIREMENT AGAIN.SUN,SOLARIS and all major software developers
would get deposited in their closest and respective ICU’s............Rs 60/ is all it takes to get a combination
of all these softwares in one DVD........yes...a DVD...DUAL LAYER with a capacity of 16 GB........Janta is
found even bargaining & dickering on this and they even get it.
4. Is it right or wrong?.........of course it is wrong !!! but who cares.........oh darling yeh hai India.........
Google & Carbon Dioxide : The relationship most of us don’t know (2009-01-13 18:22)
1. Now this again is something new that I came across. I certainly know about a typical data center and its
long term cordial relation of janam janam with heat generation. Now what I came across new is something
to do with statistical data about equivocalness and measurement of this heat connection with the Google
2. A recent study survey says that performing two Google searches from a desktop computer generates
about 15 gm of Carbon Dioxide which tantamounts to boiling a kettle for a cup of tea. Isn`t it something
nonplussing. Now I am sure you would read the sentence again. Meanwhile I will go ahead..
3. So hunting in Google has a deﬁnite environmental wallop. So why is everyone after google...y measure
in terms of google hits .y not measure in terms of hits of http://anupriti.blogspot.com Ha...ha ha..ha
.its simple because Google has the largest number of hits about 200 million global hits every day and-
http://anupriti.blogspot.com has only the author who reads..SIMPLE!!!!!!!!!!
4. Further in store is says that CO2 emanations caused by individual use of internet generates about 0.02
gm of CO2 per second. This increases by 10 fold to 0.2 gm of CO2 when viewing a website with complex
images, animations or videos.
5. So what`s the worry folks.is their something to worry...Yes I unfeignedly believe it`s a critical issue.
The internet revolution has just begun in last 8-9 years and has a long way to go and if this is the beginning
what`s in store ahead ???What now then?........let the brain techies think over it and we can just appreciate
later....thats what 99 % of us belong to and do most of our lives...!!!!!!!!!!!!!!
HOLOGRAPHIC TEXT Messages (2009-01-17 23:23)
This thing I had heard and discussed long back when I was being graded in an institute or still clearer
...when I was studying few years back ....then it was taken as an IT hoax that would never happen or would
take light years to become a reality...not any more for those who believe that IT is the biggest biggest thing
to have happened in the history of mankind after the invention of wheel...zyada to nahee bola....khair any
way....this video shows what can be the impact of a holographic text message....needless to explain this...it
is to be understood by seeing!!!!!!so watch it to believe it......
COMPRESSION.... has a LIMIT? (2009-01-19 22:11)
1. Compression of ﬁles to me means diminution or simply reduction in size of data in order to save space or
transmission time.So till recently I used to use the famous winzip which used to give an average reduction of
30-40 % of the original ﬁle size.But that stood till recently before I met a ﬁle of size 716kb....even less then
one MB and when I unzipped it ..it stood out to be a complete 696 MB...amazing..yes a compression beyond
2. For information compression can be as simple as removing all extra space characters, inserting a single
repeat character to indicate a string of repeated characters, and substituting smaller bit strings for frequently
occurring characters. This kind of compression can reduce a text ﬁle to 50 % of its original size and this is
made possible with the help of various programs that uses various obscured formulas or algorithms.
3. This lead me to hounding for various zipping softwares available in the web world and I found one
KGB....now the KGB site claims (http://kgbarchiver.net/) that it reduces 1 GB into 1 MB......I said in
my mind.....ke bhaiya this is impossible till i tried compressing one avi ﬁle of 700MB ...........and the reduced
size was 726kb...........so was it!!!!!!!so I mailed it to my mail box....downloaded it in my oﬃce next day.and
yes...i downloaded 700kb ﬁle and I got extracted with a 700 MB ﬁle...so theorem proved LHS =RHS.
4. So where is the discommotion?...good things never come easy........i had to wait for 135 minutes for
compression and ”Yes” before you try it make sure you have a good processor which can bear the load of
work that would be given to the bechara processor combined with gooooooood RAM......the other problem
is availability of the software at a price...where did I get it from? do u wish to know? the answer starts from
T & ends with Z.........still not understood......better mail me ur email id.......will let u know!!!!!!!!!!
THE NAME IS RAJNIKANTH (2009-01-20 22:14)
1. Now whats Rajnikanth doing here in this BLOG..which deems itself to reﬂect IT news and small things
about life.Actually a personal favorite of mine...I thought I must include this favourite of mine...this guy is
amazingly amazing for those who know him....and for those who do not know him...I really understand that
they r missing something.....i mean not someting...but quiet a LOT...ek baar rajni ka issssshtyle dekhogey
to vaaakai TENSION free ho jayogey.....
2. This guy has stupefying,ﬂummoxing,baﬄing or more simply just amazing SCREEN PRESENCE.I have a
lot of respect for him for he is unlike a superstar in so many ways we see other actors and still dooms large on
them.The XXX factor could be measured when crowds from all sections of the society Hindi/Telugu/TAMIL
oﬀ course/Kannada/Japan/Russia throng the cinema theatres.Google is the place where one would be able
to measure the scale of strength he modulates when he appears in his movies today....even as a young-
ster.....(though he is closing on 60 next year).
3. Here is a list of characteristics of the character that Rajnikanth entertains on in his list of HITS...
a. Rajnikanth makes onions cry
b. Rajnikanth can delete the Recycle Bin.
c. Ghosts are actually caused by Rajnikanth killing people faster than Death can process them.
d. Rajnikanth can build a snowman..... out of rain.
e. Rajnikanth can strangle you with a cordless phone.
f. Rajnikanth can drown a ﬁsh.
g. When Rajnikanth enters a room, he doesn’t turn the lights on,......... .... he turns the dark oﬀ.
h. When Rajnikanth looks in a mirror the mirror shatters, because not even glass
is stupid enough to get in between Rajnikanth and Rajnikanth.
j. The last digit of pi is Rajnikanth. He is the end of all things.
k. Rajnikanth does not know where you live, but he knows where you will die.
l. Rajnikanth calendar goes straight from March 31st to April 2nd, no one fools Rajnikanth.
m. If you spell Rajnikanth wrong on Google it doesn’t say, ”Did you mean Rajnikanth?” It simply replies,
”Run while you still have the chance.”
n. Once a cobra bit Rajnikanth’ leg. After ﬁve days of excruciating pain, the cobra died.
o. Rajnikanth was once on Celebrity Wheel of Fortune and was the ﬁrst to spin. The next 29 minutes of the
show consisted of everyone standing around awkwardly, waiting for the wheel to stop.
p. It takes Rajnikanth 20 minutes to watch 60 Minutes.
q. Rajnikanth once shot down a German ﬁghter plane with his ﬁnger, by yelling, ”Bang!”
r. Behind every successful man, there is a woman. Behind every dead man, there is Rajnikanth.
s. Rajnikanth destroyed the periodic table, because Rajnikanth only recognizes the element of surprise.
t. Rajnikanth got his drivers license at the age of 16 Seconds.
u. WHEN YOU SAY ”NO ONE’S PERFECT”, RAJNIKANTH TAKES THIS AS A PERSONAL INSULT.
francisfreny (2009-02-05 08:58:00)
Simply Superb(pronounce in southern style)!!! excellent research work by a very talented and an amazing person
DETRITUS...(I mean dust) vs IT (2009-01-30 20:14)
1. People ask me about why I choose words like 'detritus¨ when I could have chosen a simple word like
Dust which is more familiar to the aam Indian janta.well..even I don`t know why I sometimes try to make
simple thing complex..so that`s not the subject I am going to discourse here..the subject relates to the
kinship, the aﬃnity and the relationship between IT in India and dust.
2. Not so long back I remember in my school computer classes we were made to remove shoes and then
countenanced to enter the consecrated Mandir ie the computer lab of the school. Be it the school principle or
the vice patron/patron or be it any Hiﬁ panjandrum..(I mean a VIP)..he would only enter the sacred mandir
of the school after removing his/her shoes. There on, I was made clear in the mind that dust and IT share
a typical gali ka majnu(Dust) and a pulchritudinous or more simply a beautiful girl(IT) relation..where
the majnu will be always after the girl and girl would try make a vague attempt to repudiate the undesired
advances from the majnu...and the winner will be majnu.
3. In came so many IT giants in India viz SONY, Samsung, Philips, Moser Bair and the list goes on.they
introduced Zero Dust Labs in there respective manufacturing units. I have been fortunate to visit most of
these wherein I was made to look like an astronaut covered in beautiful, neat, clean white tailored cloths
with boots of snowman before I could enter these labs.It was an exercise beyond doubt for an employee
who would go through this drill of changing clothes in the morning as he enters,in the afternoon twice as he
breaks of for lunch and then rejoins to again ﬁnally breakoﬀ in the evening.All said and done the IT giants
made every ounce of eﬀort to make the ZERO DUST LAB a success.but the moment the test tube babies
came out of the lab.I mean as the manufactured units in form of CDs,DVDs or harddisks etc..they would
again be exposed to DUST and that`s where it would again go out of control...the dust interacts again..
4. So oﬀ late when I read articles like a recent one where SONY has kept Indian demographics and usage
environments in mind and has introduced the AD-7220S-ID DVD-RW drive with ’dust proof’ technology.
This drive oﬀers 22x DVD read/write speed and has six sponges in the inside of the bottom cover and bezel
and PWB to make it dust-proof; a 20 percent increase in product life is claimed by Sony due to this. The
drive is available in SATA format and supports 48x CD read/write speed and maximum 12x DVD-RAM
5. The sponges might make a fringy & marginal diﬀerence by absorbing dust and keeping the drive clean
but the madhur Milan of the majnu would never fail and the dust would always be there at the end to meet
Anonymous (2009-02-02 03:47:00)
Inspite of the instructions, u chose to write a blog instead of replying to the email, but i can see your hindi is never-
theless as adavnced as it has been since the days of the school lab...
INTEL & BIKE (2009-02-05 18:33)
1. When I ﬁrst got to know of the joint embarking between Intel & OCC ie Orange County Choppers,global
manufacturers of rugged & custom choppers(..we call bikes). I read the whole article once again to believe
it and leaped 15 years back .of course in memoirs.when I got my ﬁrst bike Hero Honda SPLENDOR.This
bike ruled the Indian roads for a good 5-6 years with no stiﬀ competitors around till 2001 when Bajaj PUL-
SAR was launched with the DTSI 150/180cc with the option of a DIGITAL SPEEDOMETER..the ﬁrst of
its kind in the bike segment in INDIAN context.
2. The kind of spark this created to the bike customers was stupefying.In no time Pulsar swept over the
bike segment complete in all aspects. Marketing, sales, roads..colleges, schools, oﬃces..Pulsar made its
comportment every where just because of its Male look(..as advertised) and of course a small contributing
factor was the electronic speedometer which made Bikies like me think then if ever computer will do something
3. So it ﬁrst happened about 2 years back when Intel® and Orange County Choppers got together to
build an Intel® themed masterpiece. They needed a computer that could take all the abuse the bike would
dish out and still be ﬂexible, portable, and powerful enough to power all the systems of the bike.Black
Diamond Advanced Technology (Black Diamond), a technology development ﬁrm specializing in the design
and implementation of rugged electronic systems, provided engineering support to create a fully computerized
Intel® themed motorcycle by Orange County Choppers.The following are the key features of interest :
a. 'Sunlight Viewable Detachable dashboard¨ and fully computerized processes on the motorcycle such as
keyless ignition and electronically controlled kickstand activation.Keyless ignition is replaced by ﬁnger print
recognition software. The ﬁgure shows a pictorial representation of how the dash board looks like.
b. Designed to meet military speciﬁcations to endure shock, vibrations, dirt, water and extreme tempera-
tures). PC features a custom module that allows for easy portability of the computer, which is mounted
between the handlebars on the motorcycle.Portability means you can take the detachable dashboard from the
parking stands to your oﬃce and open Microsoft Word and do some oﬃce work after attaching the keyboard.
c. Rear-mounted cameras that replace standard rear-view mirrors,so web cam time is no more conﬁned to
your desktops and laptops...it has started making presence felt in vehicle infotainment.
d. Audio and video systems integrated with the handlebars and headset in the helmet
e. Wireless connectivity including Bluetooth, Wi-Fi and GPS.
f. Processor details includes 1.0 GHz Intel® Celeron® M processor, 1GB of 400 MHz DDR2 and can run
Windows XP, Vista, CE, Mobile or Linux, packing the power of a desktop PC in a lightweight, handheld
rugged form factor.
Anonymous (2009-02-05 23:08:00)
is it a real bike or some toy from leo company?..and if it is real...it is real coooool....thanks for the info!!!
Fighting LIGHTSCRIBE !!! (2009-02-11 16:46)
1. I bought my laptop few years back and I had exploited all its features including Blue Tooth,WiFi,Web
cam,running high processing softwares to test its 2GB RAM,CD/DVD Writting etc but not LightScribing.
2. This term in easy terms would mean printing on CD/DVD just like you take a printout on paper...will
get more clearer from the picture inset...I had read some theory on this on how it works and what is the
procedure of doing the light scribe but practical always remained a backlog till last week when I got the
opportunity to do some thing on it.
3. LightScribe is an innovative technology that uses a special disc drive, special media, and label-making
software to burn labels directly onto CDs and DVDs. These have a limitation of being in Black & White only
as on date. Because the labels are laser-etched÷not printed÷there’s no ink, no smudging, and no peeling.
Your labels can be whatever you want them to be. Create one-of-a-kind designs with your own photos, text,
and artwork using your label-making software. Or choose from the many free templates available on the net.
4. The ﬁrst thing I required was the light scribe DVD.Now ﬁnding lightscribe DVD in a small town (..I hope
the jalandharite`s don`t mind on that....)is also a problem . Shopkeepers have to be explained N number of
times of what it is ? and still they never understand. You usually get comments like 'kya saaab....matlab
cd pe screen printing ha ha ha....That apart I ﬁnally got one opportunity on leave to visit the IT hub Nehru
Place in New Delhi.
5. At Nehru Place,I got to know of the variety of Light Scribe DVDs available.They range from Rs 400/-
to Rs 1800/- for a set of 10.To ﬁnd out the reason of diﬀerence in price it was not the company or
brand,but something to do with the quality of laser coating on the DVD.The costlier the DVD,the bet-
ter would be the contrast and the cheapest of them would give you a relatively darker burn but would be
good enough to see the image you have burned.So I went ahead with the Rs 400/- to experiment with.
6. Next thing was the software. My laptop came preloaded with Home Vista Basic which made its way to
heaven immediately on arrival since I wanted it to work with Vista Ultimate. So the preloaded Light scribe
HP software was gone and I thought of installing it from the SWSETUP/LSHSI folder.As i started it , I
got the message 'UPDATE SHELL COMMAND¨ property must be set on the command line¨.so
straight I asked god!!!.(Has google become God?)..so came many answers and threads to solutions but
nothing could solve it.So I started looking and experimenting with numerous third party software`s and I
tried 'Sure Thing CD Labeler¨. The name of the software went with the meaning and solved my problem.
Easy Installation, Easy Writing, No Hassles,No DLL`s missing and no message to mess with ''UPDATE
SHELL COMMAND¨.So got my ﬁrst LIGHTSCRIBE as shown in pic.
Mohd Sahid Khan (2009-02-23 08:49:00)
good keep it going anupam
Anonymous (2009-03-06 15:49:00)
I liked it. Good job!
IT ostracized!!!!! (2009-02-26 23:04)
1. Few days back a petition was ﬁled at the Bombay High Court calling for a ban on Google Earth citing
that terrorists used this mapping service to plan attacks on key emplacements in Mumbai, on 26/11. It
reminded me of a similar instance of army wherein few years back Pen Drives were banned following some
breach of security information.
2. ' Mindset¨ comes as the key to such pudden-head and dullard bans. Such Mindset is linked to the low
IQ and literacy level of such decision seekers. I have also read articles wherein similar bans were asked for
WiFi connectivity at various places.Now moving on these lines I have a few sample bans which should also
be taken care of to eliminate security breach:
a. Why not ban manufacturing Vehicles in which the terrorists or the oﬀender moved from the source location
to the destination location quickly?
b. Why not ban mobile phones across India so that they cannot plan further?
c. Why not ban manufacturing or accessing computers in this country owing to which all this is taking place?
d. Why not ban manufacturing Guns/Riﬂes and ammunition?
e. Why not simply ban INTERNET in India?
3. So why just pendrives or google earth? It is indeed staggering the way decisions are being made and
sought in this country. It wouldn`t come as a surprise to me if access to Google Earth is banned in this
region in some time.
4. What we actually need is to ﬁnd a way out to tackle these.elimination is not the solution.
5. The IT quotient of aam aadmi (which indeed hold the majority) needs to actually improve before it gets
too late.Be it the defence or the civil.Till the time the defence General saab knows what can be more lethal
then pen drive,till the time judge saab of the court knows what power IT holds today.what decision will he
be able to make?However big they may be in terms of respectable positions and appointments,they would
still form the TAO group(harayana wala) who still believe ke bhayaa ye computer shamputer kuch na karkey
dega.karna sabko khud padega....!!!!!!!
Fight of the Browser’s : ACID3 TEST (2009-03-05 22:27)
1. I recollect the ﬁrst interaction with the web with the services of Internet Explorer 3.0 some time in
1997.Then there was a alternative of Netscape Navigator 3.0 only.So between the two in those days,there was
sinewy competition and I would appreciate that the choice between the two mattered owing to individual`s
personnel choices. I liked browsing with Netscape Navigator and Ujjwal (my only IT savvy friend then.)
liked it with IE 3.0.
2. So there were no standards then to decide upon which one is actually better. Time graduated to the early
2000`s and in came a lot many browsers each arrogating to be the best amongst lot. These included Amaya,
Konquerer, Phoenix, Galion and the list is endless. Anyone interested in knowing about these unheard names
today may just google and inquire about them...now on way to superannuation!!!
3. Those which endured the decade long ﬁght of the browsers included Safari, Opera, Mozilla to name a few
and few new one`s to include Google Chrome, Flock.
4. Now after a decade of evolution , few standards spranged up to ﬁnally one make adjudicate about which
one is actually better.The standard I am going to mention is ACID3 TEST. Nothing to do with Sulphuric
or Hydrochloric acid.
5. Acid3 is a test page from the Web Standards Project that checks how well a web browser follows
6. When successful, the Acid3 test displays a step by step increasing percentage counter with colored
rectangles in the background. I tried on mine ie Google Chrome and it scored 78/100(Picture In Set).The
percentage displayed is based on the number of sub-tests passed. It is not representing an actual percentage of
conformance as the test does not keep track of how many of the tests were actually started (100 is assumed).
In addition to these the browser also has to render the page exactly like the reference page is rendered in
the same browser.
7. Further to this I inquired about why Chrome scored 78,it was because prior to conduct of test it was
supposed to be set to its original default settings which I did not do. So I surfed few forums on what has
been the score of other browsers. This lead me to conclusion that as on date Chrome scores over others at
least in ACID3 test and being a sincere Chrome user my self...believed the same quickly....thanks for wiki
Nikhil Chauhan (2009-03-07 01:49:00)
Good to know Dude.
Be CAREFUL (2009-03-08 00:14)
1. We all drive our respective vehicles daily from one point to another without agnizing what risk we
are always at. Disregardless of how we drive, what matters most is how others drive.3-4 months back
on way from Gurgaon to Noida I saw this mangled, mutilated remains of a so called Car(INSET). A
small mistake, be it in form of being tired on a long drive or speaking on phone or just driving casually
would lead one`s soul out of this globe.
2. The sole purpose of posting this is to promote the tag 'DRIVE CAREFULLY¨.
Anonymous (2009-03-08 00:46:00)
ultimately it is taqdeer mere bhai!
PictBridge (2009-03-17 16:05)
1. Any time we wish to take a printout of clicked pics from our camera,what do we do?Either insert the
memory stick directly into the card reader of lap top/pc or we connect thru the regular interface cable.In both
the cases,we need to have a computer as a via media.So to kill this form factor,PictBridge has arrived.Whats
PictBridge?...read on.... 2. PictBridge is a technology that was created to allow the user to transfer pictures
from a camera phone (or digital still camera) to a printer without a PC or image-editing software. PictBridge
makes printing digital photos easier and more accessible. A number of manufacturers have direct printing
methods on the market today. The drawback is that some of these direct printing methods are proprietary,
which means that you can only print your pictures when everything is provided by the same manufacturer.Its
formal name is ”Standard of Camera & Imaging Products Association CIPA DC-001 ÷ 2003 Digital Solutions
for Imaging Devices”.
3. PictBridge is typically implemented using Universal Serial Bus ports
and the USB protocol. PictBridge-capable printers typically have a USB Type A receptacle which is then
connected by cable to the USB port of a PictBridge-capable digital camera (typically a Type Mini-B). The
user then uses the camera to select the pictures to print, which the printer then retrieves from the camera
4. The good thing is that it is not just limited to printing from Camera’s,it can be a mobile which is
PictBridge enabled.The limitation to use this is both the devices have to be PictBridge enabled.As on date
most of the high end Canon brand models are supporting this PictBridge.Just like Lightscribe logo the
PictBridge too has its small green label as shown in set. 5. Just a start on the right road.......FUTURE IS
BRIGHT...for now we have to bear with limitations and enjoy what we have.
THE LINK : BJP & OPEN SOURCE!! (2009-03-18 16:25)
1. Rajnitee and IT ?Do they share a relation in our country? Do they meet anywhere in Indian scenario?Have
you ever heard a technical IT buzz word shooting from any of the mantri`s mouth.I am sure in most cases
the answer would be NO.
2. Recently I read this article at the http://infotech.indiatimes.com/articleshow/4272163.cms wherein it
adverted that Mr L.K.Advani has said that if his party comes to power, it will actively promote opensource
software and internet telephony. Now irrespective of whether Mr Advani knows what open source software
is or not,or whether he just recited what he was told to by IT savvy speech writer,the good good news is
that IT is buzzing now in politics.
3. The power of open source software is still lying completely unexploited in our country for most of us don`t
know what opensource has in store for us.All paid softwares ex any Software developer viz Microsoft,Corel
etc to name a few has an equivalent in opensource costing free which unfortunately now one is aware.Did
you still not understand ? Read on for what is open source?
4. Open source software (OSS) is deﬁned as computer software for which the source code and certain
other rights normally reserved for copyright holders are provided under a software license that meets the
Open Source Deﬁnition or that is in the public domain. This permits users to use, change, and improve
the software, and to redistribute it in modiﬁed or unmodiﬁed forms. It is very often developed in a public,
collaborative manner. The term open source software originated as part of a marketing campaign for free
software. A report states that adoption of open source software models has resulted in savings of about $60
billion per year to consumers.(.thanks wiki)
5. So Mr L K Advani`s party seems to be the ﬁrst to realize the power hidden in this.Good!Isn`t it...Now
why open source doesn`t seem to be a success in India?One line answer..may I attempt?........¨because
Microsoft`s Cracked Windows Xp and Vista are available for free in any gali,mohalla of the Hindustan.So
the next motto for a political party would be to crack those crackers!!!!!!!!!!For now its INDIA SHINING!
Pawan (2009-03-20 21:08:00)
Open Source may be a right solution for a country like INDIA. Because of following reasons
1) Need more skilled man power in development of software.
2) Development of software according to the need of customers.
3) No hidden cost like license or update of software.
4) No dependability on support of product develop company.
5) Fully control on source code of software.
Download video from Magazines/Billboard: MMCC (2009-03-21 23:06)
1. Imagination is one key to success today. Had we never imagined things, things would not have come up
as they have today.Today I read this article on Indiatimes.com/ InfoTech Tab about Mobile Multi-Colour
Composite (MMCC) 2D-Barcode.Now it looks like just another IT dictionary term which has a complex
name but a simple function and utility. It goes like this..
2. Ideate(.means imagine) a magazine with an advertisement of a mobile phone manufacturer with a bar
code printed something like inset. From this bar code, can u think of downloading ringtones, product info,
Video? Can you? Puzzled, I am sure. This has no more remained a subset of imaginativeness, it has
become unfeigned today with this technology, which is known as Mobile Multi-Colour Composite (MMCC)
3. The MMCC is a color 2D barcode designed for storing high capacity data on printed media and displays,
tailor made for camera mobile phone applications. Using the MMCC, the user can retrieve digital content to
their camera mobile phone directly from the barcode by capturing an image of the barcode and decoding it
on their mobile. According to the scientists, by taking a photo of the barcode, users can download complex
information, such as videos, voice recordings or text, instantly to their mobile.
4. Why named 2D Bar code ? 2D means ’two dimensional’. 2D barcodes comprise more information than
conventional one dimensional linear barcodes. Conventional barcodes get wider as more data is encoded. 2D
barcodes make use of the vertical dimension to pack in more data. Data is encoded in both the horizontal and
vertical dimensions. As more data is encoded the size of the barcode can be increased in both the horizontal
and vertical directions thus maintaining a doable shape for easy scanning.
5. Advantage of 1D over 2D : Although 1D barcodes hold a more belittled amount of data it is ’spread’
over the whole height of the barcode. The barcode contains a high degree of redundancy. This means the
barcode can be read even with considerable degradation. If your application needs only a few characters (up
to about 15) then a 1D barcode is probably the best solution. Increasing the height of a 1D barcode does
not increase its capacity but it does increase its redundancy thus making it more resistant to abasement and
obliteration and making it easier to scan.
6. In Japan the 2D Barcode has even been placed on Billboards(picture inset).[Source:
The visitor takes a picture of the Barcode on the Billboard and their phone brings up more information about
the deceased person, pictures of them or any other content the family or pre-deceased and now occupant
so chooses. In spain they are being used to contain detailed train maps to make travel easier and most
interestingly in a recent Holland Inovation Fair placed a code on each visitor`s badge and each presentor`s
tent. The visitors didn`t have to exchange business cards if they wanted to learn more about eachother`s
ideas. They simply scanned the other person`s barcode and their information was sent to their cellphone
7. As on date, Bartender comes as one of the leading software`s in creating 2D barcodes.I could not ﬁnd
any thing on the price aspect as to how much it costs today. So next what? Download something from your
news paper or download movie trailers from movie magazines..grrrrrrrr8..Future is bright.....
For now keep waiting till the technology reaches your doorstep.
Anubhav Bhatia (2009-06-01 15:50:34)
I am a student from Symbiosis Institute of Telecom Management.
I want to know more about this. can u also help me with some company with which i can do a research project on
Please write to me
gcf (2010-09-02 19:10:30)
i have it scand whit my mobile: it‘s back on dvd september 10th
IRON KEY : World’s Most Secure Pen Drives (2009-04-07 22:14)
1. Pen drives are dangerous and have even been banned by few organizations including the prestigious
armed forces after one scandal of security leak came to light few years back in navy.Is that the solu-
tion? Now it is like marta kya na karta wali baat..¨i don`t have control over it so better ban it¨.Good
News for those who still desire to use pendrives in a much much safer way then available in the mar-
ket.IRON KEYS have come to take care of the security issue of pendrives.What is IRON KEY? Read
2. The IronKey drives are very small, very portable, and very convenient. They come in conﬁgurations of
1Gb, 2Gb, 4Gb, and 8 Gb`s. IronKey`s Secure Flash Drive is similar to an iPod, as its hardware, software
and online service all rolled into one product. The IronKey Cryptochip uses US government-approved AES,
CBC-mode, 128-bit encryption at the hardware level.
3. All models come in a sleek, stainless-steel, waterproof case that is sturdier and heavier than other USB
drives. The case has been injected with an epoxy compound that blankets the inner workings and keeps them
dry and shock-resistant. Security-wise, the case would be extremely diﬃcult to pry open without destroying
4. IronKey has a password generator that can create passwords up to 99 characters in length at either normal
strength with alphanumeric characters or stronger strength, which includes all keyboard characters. To use
the IronKey ﬂash drive, you need to activate an online account. This is a necessary step to enable certain
services – such as online password backup, device and software updates and to access IronKey’s encrypted
Web-surﬁng service, which uses Mozilla’s Firefox. Besides creating an online username and password, you
are asked to supply answers to three supplemental authentication questions that will verify your identity in
case you ever lose your username or password. Failing to answer the questions accurately will lock you out
of your account permanently.
5. IronKey e-mails an activation code that you must enter in a window to complete your online setup.
IronKey allows you to change personal security information at any time by accessing account settings. If
someone does happen to gain access to your ﬂash drive and they fail to type in the correct password more
than 10 times, IronKey will self-destruct, permanently locking out users and wiping out all the data on the
6. From a speed standpoint, IronKey is fast. Hd Tach tests showed speeds well above the competition:
IronKey’s speed is 31MB/sec. burst speed; an average read rate of 29.6MB/sec., and a 6-millisecond random
access rate. The CPU utilization rate is vastly higher than any other driver on the market by as much as 22
%. SLC memory lasts about 100,000 write cycles and MLC memory lasts about 10,000 writes.
7. Special Solutions USA is an exclusive distributor of IronKey Secure USB ﬂash drives for the Indian
8. More on https://www.ironkey.com/
Anonymous (2009-07-17 02:44:04)
Anonymous (2009-08-13 19:57:17)
Be very cautious when dealing with Special Solutions USA / Special solutions Group.
Anonymous (2009-08-14 23:01:40)
This post has been removed by a blog administrator.
Anonymous (2009-08-23 23:17:51)
I HAVE DEALT WITH SPECIAL SOLUTIONS FOR MANY YEARS AND HAVE FOUND THEM AND THE
OWNERS VERY PROFESSIONAL AND HAVE NEVER HAD A SHIPMENT NOT DELIVERED TO US THE
ABOVE COMMENT IS WELL OUT OF ORDER
special solutions group (2009-08-23 23:20:02)
From Special Solutions: These are slanderous remarks and we would like to know who the anonymous is posting these
remarks about Special Solutions.
If there really was an issue with any of our customers/clients and vendors, they would say who the ﬁrm is on the blog
We know we do not have any dissatisﬁed customers/clients and vendors, By the way regarding vendors, We pay for
all our products 100 % up front prior to shipping.
ANUPAM (2009-08-24 07:08:09)
although i have not had any direct interaction with the subject group but with respect to the proﬁle available and
remarks on them in various forums on the net...they seem to be a very professional.
Anonymous (2009-08-24 16:04:41)
This post has been removed by a blog administrator.
ANUPAM (2009-08-24 22:20:51)
well mr anonymous,pls do not use this blog to exercise your grievances...if u have any thing like u have mentioned
above...pls take something legal...posting here will not serve you any purpose...thanks...
Anonymous (2009-08-29 17:39:37)
This post has been removed by a blog administrator.
Anonymous (2009-09-04 16:01:11)
This post has been removed by a blog administrator.
Anonymous (2009-09-04 16:03:23)
I have dealt with David of special solutions for many years and i must say he is a very profesial person and has done
some great work for our govermnet
ANUPAM (2009-09-04 22:07:03)
i would request the posting comments personnel to at least write some name so that if someone is being blamed or
commented upon...he can just cross check their records...
MICHAEL JAMES (2009-09-09 17:03:05)
SPECIAL SOLUTIONS GROUP HAS WORKED WITH MYSELF AND MY COMPANYS FOR SEVERAL YEARS
AND I HAVE NEVER HAD A PROBLEM WITH HIM OR ANY OF HIS WORKERS THEY DO GREAT WORK
AND OFFER SOME FANTASTIC PRODUCTS I WOULD NOT LISTEN TO A WORD ANYONE IS SAYING I
KNOW HE FIRED A EMPLOYEE IN THE USA DUE TO THEFT AND LIEING TO SUPPLIERS AND TO CUS-
TOMERS AND THIS GUY IS RINGING AROUND LIEING HIS NAME IS BOB WOODS AND HE HAS DONE A
VERY BAD THING PEOPLE WHO LISTEN TO A GUY LIKE HIM ARE AS BAD AS HIM THE COMMENTS
MADE ARE WRONG AND SHOULD BE REMOVED FROM THIS BLOG THIS IS A SLUR AND IS BAD FOR
THE BUSINESS ANUPAN I RECOMEND YOUI REMOVE THE COMMENTS AND GIVE THE BUSINESS A
J HURST (2009-09-09 17:43:21)
who is saying all this crap about SSG these people are my pals come on big boy who are you come tell me how bad
they are to my face you dave is a sound guy and you mess with him you mess with a lot of people this is a great guy
and so are his guys you need to take a look at this woods guy and another guy call craig forshae from a company
called RPG this guy had the balls to take cash oﬀ SSUSA to save his company as its going bust with a lot of dept
and he and woods the pair of u know what are ringing people saying a load of rubbish jockies in my book they should
keep an eye on there backs big time if i was them
ANUPAM (2009-09-09 21:52:20)
since mr anonymous has not come out in open and told the fora about his identity...i assume he is just here to create
confusion and create a bad image of the subject company....thus i m forced to delete objectionable comments as desired
by the fora....regards to all...anupam
rax (2010-11-17 17:06:41)
hi,thanx for such useful information.Secure USB
Rakesh (2010-12-02 22:27:52)
Hi Friend Thank for the useful Info. I want to buy the product and visited the mentioned website ”www.ironkey.com”
but could not ﬁnd and Indian Supplier for the same. I also tried to ﬁnd Special Solutions USA but could not ﬁnd a
Please provide me the link of Special Solutions / other Indian Supplier of the product. Please reply me on my e-mail
id ”rgupta id@rediﬀmail.com”.
ANUPAM (2010-12-02 22:58:44)
hi rakesh!get in touch with dave bale at firstname.lastname@example.org
A Sanghvi (2011-11-24 14:17:07)
We also are suppliers for Ironkey in India. In fact we are suppliers for MXI and Kanguru as well. These are the top
3 manufacturers of Secure USB drives. We are a company promoting only Secure External Storage and are working
on introducing these devices in a big way.
People interested in the product can contact us on email@example.com.
Please visit www.sangv.com for comparison between the various oﬀerings and also for data sheets.
GUIYU : THE CONNECTION WITH E-WASTE (2009-04-14 23:04)
1. Have you ever thought where have all the 486 and Pentium machines vanished from your desktops at home
and oﬃces, what happens after your ink cartridge gets over and is thrown in the garbage, what happens to the
discarded keyboards, mouse`s and all electronic accessories that u reject being obsolete. In 90 % of the cases,
they often end up in GUIYU, which may be the electronic-waste capital of the globe. Guiyu (pronounced
GWAY-yoo), a few hours’ drive northeast of Hong Kong, is by far China’s biggest e-waste scrap heap. The
city comprises 21 villages with City businesses processing 1.5 million tons of e-waste a year. As much as 80
percent of it comes from overseas.
2. China is believed to be the predominant recipient of the world’s e-waste, with a roughly estimated one
million tons of electronic waste being shipped there per year, mostly from the United States, Canada, Japan,
and South Korea. It arrives via container ships through the ports of Hong Kong or that of Pearl River Delta
such as Nanhai. From there it is trucked to informal e-waste processing centers. Guiyu receives more e-waste
than any other area in China. Guiyu began receiving e-waste around 1995, slowly attracting peasant migrant
workers from other provinces to work in processing it. There are an estimated 150,000 e-waste workers in
3. This obscure Chinese rice village is now the e-waste capital of the world - a place where bona ﬁde
mountains of keyboards and circuit boards tower over its inhabitants. The water here is undrinkable - it
has been for years. Most of Guiyu makes their living by trashing outdated Dells with their bare hands. To
access the cooking needs, for example, they roast circuit boards over coal-ﬁred grills. Gold is obtained using
acid strippers, whose sludge is later dumped into the local river.
4. During an undercover visit to Guiyu in December of 2001, representatives of the Basel Action Network,
Seattle, saw and taped villagers manually cracking leaded-glass computer monitors to retrieve the copper
yokes within. The men, women and children of Guiyu also conduct open burning of PVC-coated wire and
cable; they 'grill¨ circuit boards to melt the lead solder to remove chips; and they work with a 75 percent
hydrochloric acid solution to separate precious metals from circuit boards.The amounts of scrap computers,
monitors and printers is staggering, overﬂowing in large piles in the front and back yards of villagers who
work from their homes or other small locations.The acid stripping operations, along with the open dumping
of waste and ash residue into ditches and riverbeds, has rendered the well water and ground water of Guiyu
undrinkable. For the past ﬁve years, water has been trucked in from distant villages.
5. ”If you burn it, you can tell what kind of plastic it is,” said the man, who gave only his surname, Wang.
”They smell diﬀerent. There are many kinds of plastic, probably 60 or 70 types.”Six of Guiyu’s villages
specialize in circuit board disassembly, seven in plastics and metals reprocessing, and two in wire and cable
disassembly.An average computer yields only $1.50 to $2 worth of commodities such as shredded plastic,
copper and aluminum.
6. The biggest obligation lies in the developed countries that export e-waste, instead of doing something
about the problem ,they are just dumping the same in underdeveloped and developing countries. JUST
TRANSFERING THE TRASH AND GETTING AWAY.
7. Perniciousness is only one reason that recycling electronics is costly in the United States. Another is poor
design. U.S. manufacturers haven’t made products to facilitate disassembly. A report advises that investing
$1 more in design costs per computer could save $4 for American recyclers in disassembly costs. Nor have
manufacturers gone very far in ﬁnding ”green” materials to replace toxic ﬂame retardants.
8. So whats the sole purpose of writing this and doing some cut paste from various utilitarian sites like
wiki/ban.org and many others,the intention is to get educated on the subject. Nothing more. It is not in
my or your hands to stop receiving e-waste from the so called developed countries, it is in the hands of
the political big bosses who are busy pheroying jhanda`s of respective parties and are absolutely clueless.
Where`s is the GUIYU town in India?????Any clue`s?
sanjeev (2009-05-01 13:52:00)
the state of obsolete computers is slightly better in india...because the aam aadmi is very hesitant to through a com-
puter at dirt cheap price....u see all your oldies around who are computer savvy and have computers at home...they
will all be running lives on p2 or p3 or may be an old celeron......which are in good condition running and doing the
necessary typing work...it is synonymous to having a diamond.....kyonkee heera hai sadaa ke liye...and so is an old
computer at home..good work anupam....
Recession Laptop (2009-04-30 18:30)
1. Now a days working on making a recession laptop.all by my self.The idea is not original,but the work
is.What is Recession Laptop? Just a Buzz word to make people hear and turn back. Recession is the key
word now a days every where.be it industries, employment, export, import, IT, real estate and so many
2. Recession laptop is actually PC in a brief case..yes.in a easily available SAFARI make suit-
case..GAREEB ka Laptop actually.
3. Will post all all details soon..i hope some one see`s and reads it!!!
Daﬀa (2009-05-15 23:18:00)
Hi, Jall. I love your technology blog. I like the images. Keep Update! Jall. I’ll be back.
Nehru Place : The hub (2009-05-02 08:02)
1. Not so long back I adverted
about the 'Software Lelooooooooo¨ thing in Nehru Place,Delhi vide http://anupriti.blogspot.com/2009/0-
1/software-leloooosoftware-l eloooooout-3.htmlNehru Place is the hub, the google, the god ,the solution for
any computer hardware software freak where every thing related to hardware/software is available at ease at
dirt cheap prices. 2. Today morning I got
an opportunity window of 3 hours to be in Nehru Place exploring the shops selling these computer accessories.
Any time I have been to Nehru Place earlier ,I have always found something new. Few things that evoked my
interest this time are as follows: a. USB to Lan Socket(with driver CD)[means NIC card is over???] b. USB
to Audio Video.[means Sound Card is over???] c. SVGA to Audio Video(without power) d. USB to blue
tooth(.I had seen this one earlier) e. USB vacuum cleaner(enough to handle dust in mother board) f. USB
to table lamp with stand. g. USB cooler fans in various designs h. Windows 7 software(they install if u have
laptop along with drivers from net available on WiF hotspot!!!!!!!!!!!).....truly amazing....Bill.r u
listening? Pics of such sellers In-Set.
3. Plebeian Point about all these items
mentioned is that these all are Chinese items,all are available in a bracket of Rs 100-200 and most im-
portantly no no no Guarantee or Warranty from the moment you leave the shop .If u can, test at the shop.
4. Last time I did not mention about the ink ﬁlling procedure being practiced with loads of suc-
cess for the sellers at least. As shown in the picture in set. That setup is enough for one to
get an ink reﬁlled in the cartridge for Rs 50/-(ﬁfty only) with the help of disposed syringes that
they arrange from the local medical clinics. ...shocking or surprised? In fact to stop this ,HP
and Canon like companies who deal with printers should start reporting matter to the concerned
IT departments to ban and stop this.
5. I m putting up a scanned copy of visiting card of one of these software sellers, not meant to motivate you
to buy from him,but to show you how piracy has made professionals in this ﬁeld. Why is the IT act 2001 in
a state of quiescency here???
Anonymous (2009-06-25 14:32:30)
great thats wat i heard too
for once i thot that they were sellin ”softy”
gosh surely a comp hub
Mohit (2009-06-25 14:36:58)
you can have everything right here in NH ..The piracy hub... &
if someone is good at bargainig ..he/she can have these for min of Rs 30-35...
Anonymous (2009-10-28 17:06:12)
Why ur stomach i aching if they are selling the pirated softwares...we are the only one getting beneﬁt from it.......do
u have enough courage to buy original windows 7 at cost 6000/- when we can get it at 100-200/- rs. in NP.
ANUPAM (2009-10-28 21:16:30)
hi ”stomach ache” anonymous ...thanks for the comment...i did not even need rs 200 for the windows 7...i got it for
free chk the link at http://anupriti.blogspot.com/2009/10/my-house-party-pack-thank-you-m icrosoft.html
RONY (2010-03-10 22:46:38)
this is really india
nishu (2010-04-09 15:56:18)
I love NH & India
rajnish (2010-07-01 19:38:37)
i love my india...ye mera india
Briefcase PC (2009-05-04 22:53)
1. Now this is likely going to be the longest one till date in terms of what I write since a lot of work and
eﬀort has gone into it. The idea had been obsessing me for months now about ﬁtting a PC into a brief case.
I got the mite of this possibility from one of my senior colleagues Baiju last year. Some how I thought with
a year down the lane, with a much better form factor available now a days I would be able to squeeze 'More
in Less¨. So when I got the oﬃcial permission from my honcho in the oﬃce, I was quick in exercising the
2. Where to start from ? So the ﬁrst question came to my mind about where to start from. Whether I
start from selecting the mother board or ﬁrst I select the most lilliputian brief case available in the market
or the smallest monitor or what? So I googled a good deal on if any one can give me lead on this ,but what I
generally got from the web was assembled lot of pc essentials with a cobweb of wires. So I came back round
round to where I was primitively of the search.
3. By now I had started having a feeling of thriftlessness as I had invested or should I appositely say
wasted about 5-6 days on the issue of where to start from? So eventually cogitated to start from the
smallest mother board. So the recent Digit magazine and Amod Sir(big boss of IT related issues in my
circle) suggested that go for the recently launched atom processor based essential series mother board.
So when I ﬁnally got one on my table it looked like in set. A real treat to start with. Ideate a mother board
with processor that encroaches only 7 inch by 7 inch area. So I was happy to start with this and ﬁnally made
it ﬁnal for selection.
4. Some thing about the mother board. Now this one is designed to support Internet-centric computing for
the new ﬂexible Mini-ITX form factor. Following features are inbuilt :
(a) Integrated 45nm Intel® Atom" processor
(b) Energy-eﬃcient solution for home users as well as for unique vertical market needs.
(c) Designed with Intel’s leading edge 45nm Hi-k metal gate processor,
(d) Provides incredible opportunities to communicate, listen, watch, play via Internet connectivity.
(e) 4 USB Drives
(f) Lan port
(h) Regular interfaces for Mouse and Keyboard ie PS/2 etc
5. Bootable pendrive or Hard Disk ? Next in row was the hard disk.I was quiet aye that I would be
able to make a bootable pendrive or a bootable lap top harddisk. So I tangled with various web pages that
claimed to make a bootable pen drive.But.but..but....I could never bring home the bacon. I mean
could not make that. I tried all stunts incl formatting with FAT32,assayed many 3
party software`s but
could not. Eventually I turned discomﬁted and decided to go with an internal SATA drive. But I am still
working on this. I will make it in days to come if any one has been able to make it after googling. That`s
slightly ahead anyway. So for the time being I selected a SATA 160 GB. No hue and cry about the simple
connections with the mother board.
6. Choice of the SMPS : The SMPS was a choice to be made from a sea full of resources. Right from
Chotu and Tambi of Zebronics make who do not have fans but are able to make it thru ﬁns only to the
MICRO ATX cabinet of i-ball ,I called all of them one by one in my oﬃce and then ﬁnally settled with the
iball one with the fan on lower side.I was some how keen on keeping the fan facing down in the briefcase. So
went ahead with it.Although Tambi and Chotu were quiet keen on making it inside my briefcase owing to the
beautiful and very bewitching form factor.
7. Key board : Now was the choice of the keyboard. I had no time wasting in this. I was sure
about the ﬂexible keyboard of Icom worth Rs 350/- only .Now this one is a thing to watch out for those
who have not seen and heard of .I ﬁrst saw it in the hands of Patil Sir.So ﬁrst impression of it carried
for about a year or so. Although I had another option of trying the laser keyboard,but some how the
cost kept me on the back foot.The grey market cost of the same ex secunderabad is Rs 4500/-.So to
be economical for the ﬁrst time,I played safe with the cheap and trust worthy ﬂexible icom Keyboard.
8. DVD Drive : Now what is left? The DVD drive, mouse and the briefcase. So when I embarked
on surveying about the DVD drive.I had a choice between the small 3.5¨ dvd drive of LG/Samsung and
the normal DVD drive. So instead of trammeling and constricting to use of the smaller DVDs I went
ahead with the normal drive size. To be precise I plowed ahead with LG Combo drive DVD-R/RW.
9. Briefcase : So for now I had the masala in form of all the actors and actresses to star in the movie, I
mean the hardware. So now I had to choose a brief case which can take it all. First I surveyed the local make
briefcases available in jalandhar.I got many choices, but some how people around me actuated me to go for
the trademarked ones to obviate any breakage and ensure a strong casing for protection. So the cheapest I
could home on was of make Safari 21¨.Why Safari and why not a VIP? Simply because Safari is a trusted
cheaper brand. Although I could have attempted to ﬁt all in a 17¨ one,but for sake of safety I thought...21¨
is better.I was correct in deciding this as I agnized later.
10. So all at the table now. How to earmark the land to the hardware in the available land space inside the
briefcase ? Tried few combinations and then more combinations and then was ﬁnally able to home on the
layout as shown in the pic inset.
11. Sealing : After the regular slots were made for the motherboard interface, SMPS power supply plug,
SMPS fan, DVD drive, another problem that was standing upright was the case of sealing. How do I seal
the brief case from outside detritus?Should I use the cheap looking tape or should I use the cut pieces
of the briefcase or wax it? I fortunately got in contact with one civil carpenter who prefaced me to a
type of sealing which is actually a gel and when you ﬁll it in the empty space to be sealed, it gradu-
ally takes into the form of rubber overnight. Jet black in color. How does it look like? Shown in set.
So I decided to try this. And I got what I wanted but some how I was dysphoric with the ﬁnal ﬁnish.
12. Monitor : Oh!How can I forget the monitor. No ﬁghts and confusions on that. Actually wanted to go
for a 14¨ TFT since it would encroach lesser area,but some how I found that 14¨ TFT is not available easily
and at the place it is available, it is even costlier then the 15¨ one. Seems like manufacturers have kiboshed
making this size. Since I had ample of space for this one too,I went ahead with a 15¨ TFT LG make.
13. Fitment : How to make the DVD drive, Hard disk, SMPS and the mother board stick to the base of the
briefcase? The ﬁrst thought that came to my mind was to stick all with good quality thick Velcro. But some
how was hesitant in going ahead with this.The second option was screw and nut, a stronger alternative!!So
I opened up the bottom screws from DVD Drive and screwed them again from bottom with the briefcase
base in between, it came out nicely intact and neat. Similarly for the SMPS and the motherboard. For the
mother board one small forethought was to place cut to size small rubber pads to maintain a distinct air gap
between the motherboard bottom and the briefcase. For the hard disk I went for a thick Velcro since it would
be the most prone for changing at times and I have to experiment it replacing with a pendrive!!!!!!!Monitor
was diﬃcult to decide upon w.r.t ﬁtment. Velcro would not have been able to take on the load, bolting is
not possible, ﬁddling with back cover is not advisable..now what? So came a solution from the house
hold queen of my life, my wife. She recommended trying it with a sliding drawer rail ﬁtted on both sides of
the monitor. And....it worked like the rails were made for the monitor to ﬁt in. Problem solved. See
the ﬁtment in set.
14. Extra`s : Just to take care of the additional risk of placing motherboard in open I covered the inside
briefcase with a cut to size transparent acrylic ﬁber sheet screwed on aluminum channels if u can notice in
the pic below with keyboard on top.
15. Ratiocination : All items ﬁtted, ﬁtment done, repair tool kit inside, sealing done, connections made,
the thing of assembling the pc inside a briefcase is over. But that felicitousness from within has not come
since I am still failing at making a bootable pen drive!!!!!!!!!!!!!!!
anand (2009-05-05 07:17:00)
Hi Anupam, Its great.
Pankaj (2009-05-05 09:36:00)
It is really a great eﬀort. Congrats !!! You must send this to the EME Journal and a write up to the Comp Sc dept.
How have u taken care of heating issues?
Your blog is always interesting and I have visited it in the past also. I am in Delhi now and look fwd to meeting you
all when u r here.
Wishing you many more such achievements in future.
Ujjwal (2009-05-06 23:17:00)
Good Job done... I think this should go to some records (like Guiness/ Limca Book).
This is really a fantastic acheivement.
Nikhil Chauhan (2009-05-07 00:20:00)
Bravo! This is fantastic vision and execution.
What are some of the use cases you envision for this?
ANUPAM (2009-05-07 05:42:00)
nikhil...the utility is to be exploited as a test jig in forwards areas or attend to in situ defective computers which
generally are left un attended to during operations and exercises,to save on time etc etc.Besides I have catered it
to allow for general software installations required mostly...thanks for the compli.....aur kuch value addition ho to
sartaj (2009-05-07 12:26:00)
sirji........gr8 work....next time i’m home...am coming straight to take a look!!!!!!!cheers......amazing!!!
Rakesh (2009-05-08 09:28:00)
Its great!!Well done.Keep it up
Mohd Sahid Khan (2009-05-09 09:29:00)
its great at least we have three inventor in our group.Baiju , Patil and U.Good job keep fabricating.Recently Baiju
has lot of innovations something like broadcasting vedio across the net by using remote wireless VOIP gateway.
shweta (2009-05-10 22:27:00)
bhabhi ko time diya itna kabhi
anshuman (2009-05-11 00:06:00)
excellent work done .
i must say it is fandu idea n get a patent
on it fast.
Baiju (2009-05-11 20:51:00)
There was no limit to excitement when i saw your chottu pc .
Really excellent work done . that wasTHE way i wanted to make it .
Well documented eﬀort.Its so nice to hear that someone is doing a professional job.
Keep it up. all the very best.
DAVID NICHOLSAN (2009-09-24 16:27:23)
Thats gr8 work!!u have done the same with good details mentioned here....i m also working on a similar one...will
show u soon..regards...david
Bidisha (2010-05-12 12:33:43)
What an amazing eﬀort !!!
WORK : New Deﬁnition (2009-05-06 15:43)
1. The Center for Disease Control has issued a medical alert about a highly contagious, potentially dangerous
virus that is transmitted orally, by hand, and even electronically. This virus is called Weekly Overload
Recreational Killer (WORK). If you receive WORK from your boss, any of your colleagues or anyone else
via any means whatsoever -DO NOT TOUCH IT!!!This virus will wipe out your private life entirely. If you
should come into contact with WORK you should immediately leave the premises and do the following :
a. Take two good friends to the nearest liquor store and purchase one or both of the antidotes
i. Work Isolating Neutralizer Extract (WINE)
ii. Bothersome Employer Elimination Re-booter (BEER).
b. Take the antidote repeatedly until WORK has been completely eliminated from your system.
3. You should immediately forward this link to friends and save their lives before they get infected with
WORK....thanks manish for fwd!!!
Anonymous (2009-05-06 15:57:00)
ha ha ha.....reali good
HP and VLC at logger heads? (2009-05-09 17:07)
1. One ﬁne evening last week,suddenly my speakers of laptop dozed of permanently...I mean no sound
output.I took it as a regular audio driver conﬂict since I keep installing and uninstalling softwares on my lap-
top.So in next few days...i tried ﬁddling with the drivers....did fresh installations...but kuch kaam na aaaya!!!
2. Since I am addicted to keep the speakers ON for music everytime I am working,I thought the layman’s
idea of formatting would come as the best and easiest solution...so I went ahead and formatted the system
and installed a fresh Vista premium OS.But.......sameproblem stood again.....I thought may be my speakers
have conked oﬀ............which is unlikely otherwise........
3. Today came another close friend of mine Sunil with a similar problem....in his notebook Compaq.He gave
me an astoundingly unbelievable news......that after he called up his HP auth dealer with the problem he got
this answer ........”The laptop will not cover under warranty if its identiﬁed that the diagonse report ﬁnds the
user used the VLC player.”.............
4. Shocking indeed for me..............I have been using VLC Player of and on with media player classic at
times regularly.When I googled on this i got few threads which said the same thing.......these threads include
the following links :
b. http://forum.videolan.org/viewtopic.php?f=14 &t=57589
5. So did i screw my speakers because of VLC ? Pl answer...............any one....?????
6. The extract of one of the threads is reproduced below :
” The Biggest Computer system vendor HP (Hewlett Packard) reporting their laptop customers to not to
use VLC Player.VLC Player is the popular open source video player software among a lot of computer users.
Recently HP laptop users facing a inbuilt speaker problem, which is often getting malfunction across the
users. The oﬃcial HP service center executives advicing the laptop users to stop using the VLC player to
watch, play media ﬁles. They reporting that playing a media ﬁles using VLC Player causing the damage
to the built in speakers.As an additional information the oﬃcial HP service center executives informing the
customers bring the laptop to service for the build in speaker problem that , 'the laptop will not cover under
warranty if its identical that the diagonse report ﬁnds the user used the VLC player.¨ ”
Anonymous (2009-05-12 21:23:00)
dont worry man, service center people will surely replace the speakers. i guaranty you.
Anonymous (2009-06-07 22:16:05)
A friend of mine had the same problem and the HP service center chaps had the same response (i.e. not covered under
warranty). It’s pretty unfair.
USB Bootable Vista (2009-05-11 22:13)
1. For long I have been trying to ﬁnd out and try ....infact have already tried many options on how to make a
pendrive bootable till one day I got in touch with the link http://kmwoley.com/blog/?p=345 #more-345
2. I could not ﬁnd out 50 % of the meaning of the commands that I blindly typed and followed as per the
screen shots available....but ﬁnally I could make one.
3. Simple steps ,no need to worry about screwing up your system......no probs at all...it all goes
smoothly.Extract is produced below for dispersion.
4. Required hardware :
• USB Flash Drive (4GB+)
• Microsoft OS Disk (Vista / Windows 7)
• A computer running Vista / Windows 7
Step 1: Format the Drive
The steps here are to use the command line to format the disk properly using the diskpart utility. [Be
warned: this will erase everything on your drive. Be careful.]
1. Plug in your USB Flash Drive
2. Open a command prompt as administrator (Right click on Start > All Programs > Accessories >
Command Prompt and select 'Run as administrator¨
3. Find the drive number of your USB Drive by typing the following into the Command Prompt window:
diskpart list disk The number of your USB drive will listed. You`ll need this for the next step. I`ll
assume that the USB ﬂash drive is disk 1.
4. Format the drive by typing the next instructions into the same window. Replace the number '1¨ with
the number of your disk below. select disk 1 clean create partition primary select partition 1 active
format fs=NTFS assign exit When that is done you`ll have a formatted USB ﬂash drive ready to be
Step 2: Make the Drive Bootable
Next we`ll use the bootsect utility that comes on the Vista or Windows 7 disk to make the ﬂash drive
bootable. In the same command window that you were using in Step 1:
1. Insert your Windows Vista / 7 DVD into your drive.
2. Change directory to the DVD`s boot directory where bootsect lives: d: cd d:\boot
3. Use bootsect to set the USB as a bootable NTFS drive prepared for a Vista/7 image. I`m assuming
that your USB ﬂash drive has been labeled disk G:\ by the computer: bootsect /nt60 g:
4. You can now close the command prompt window, we`re done here.
Step 3: Copy the installation DVD to the USB drive
The easiest way is to use Windows explorer to copy all of the ﬁles on your DVD on to the formatted ﬂash
drive. After you`ve copied all of the ﬁles the disk you are ready to go.
Step 4: Set your BIOS to boot from USB
This is where you`re on your own since every computer is diﬀerent. Most BIOS`s allow you to hit a key at
boot and select a boot option.
Chinese Mobile - Death or Life :The answer is ﬁnally LIFE (2009-05-13 08:44)
1. While doing a course in Sec’bad many of my colleagues purchased cheap but high in functions chinese
brand mobile phones.There were few reactions in form of a anticipatory ban in few months from date of
purchase since they do not have IMEI (International Mobile Equipment Identity) numbers and posed a
serious security risk. ......but those who chose to buy it were ready for the risk.....then ﬁnally the news came
out in media that with eﬀect from Apr 15 09 this year about 16 million handsets would go out of service ,
as GSM service providers, including Airtel and Vodafone pull the plug on them.
2. The verdict is ﬁnally out.The government has given a go-ahead to GSM operators to provide a new unique
identiﬁcation number to over 16 million China-made mobile phones in the country. Users of these handsets,
which don`t have the 15-digit International Mobile Equipment Identity (IMEI) number, will have to shell out
about Rs 180 to obtain the number. This has been made possible with the help of a new software, developed
by GSM operators` body Cellular Operators Association of India (COAI) and Mobile Standards Alliance
of India.The association has obtained the IMEI numbers from GSMA, the global body that allocates these
3. Thanks TOI InfoTech Tab.
E Waste (2009-05-17 22:29)
1. In an earlier attempt to touch upon the subject when I discussed GuiyU,I did not mention much about
what we are doing in Idia execpt for some remarks at the end and one comment by one reader.
E WASTE (2009-05-17 22:44)
1. I earlier attempted to discuss on this subject when I wrote on Guiyu few weeks back.But I had not
written anything on what India has been doing on the subject matter except for some one liner remark at
the end.But that was because I did not ﬁnd anything of weight anywhere. Recently I found some useful
content at http://india.ewasteguide.info/.
2. This site mentions about K.G.NANDINI ENTERPRISES (KGN) based in Bangalore which is India’s
ﬁrst full integrated electronic waste recycling plant. The Plant is located in Bidadi, next to Wonderla and
has a capacity of 1.0 ton per hour. KGN has taken the license (CFE & CFO) from KSPCB for a capacity
of 7200 MT/annum and does accept all kind of ewaste (printed circuit boards, computers, electrical cables,
electrical transformers, small house hold appliances etc.).
3. In a ﬁrst step hazardous wastes or elements are removed manually. Loading point of the plant is the
shredder. The reduced material is then passing a magnet, FE parts are removed. Afterwards the material
enters the delamination mill, the heart of the process. Very high forces aﬀect the composite materials and
are thereby reduced and delaminated. The material is pneumatically transported from the mill to a cyclone,
is discharged and conveyed to a screening machine. The classiﬁed material is transferred to a battery of
separators; non ferrous metals are separated from plastics. All process steps are connected by conveyors, are
automated and controlled by visualization. A central ﬁlter system, which is equipped with explosion and ﬁre
safety measures, de-dust the entire process. The equipment reﬂects the state-of-the-art technology had has
been developed and provided by swissRTec AG from Switzerland.
4. This is one acchi baat I thought is good to share!!!!
WINDOWS 7 : MY FIRST HANDSHAKE (2009-05-27 12:58)
1. After a long time about 4 months in which I didn’t get much time to work on this and after 3 unsucessful
attempts...i mean 3 infected downloads....I am ﬁnally writing this from the new Beta OS Windows 7......yes
the successor to Windows VISTA!!!!!!!
2. Till now I have been able to load the chipset dvr, graphics card driver,oﬃce 2007 and one F Secure
Antivirus Internet edition for windows 7.No compatability issues and ﬁrst impression is generally OK till
now......one bad thing is shayaad that wondows classic style has been done away with!!!!
3. In a few days more...i will be writing more about whats new and diﬀerent in Windows 7 when compared
WINDOWS 7 : MY FIRST HANDSHAKE-1 (2009-05-27 23:49)
1. In further exploring Windows 7,few more facts that have come to my knowledge include the following:
2. Minimum conﬁguration :
º GHz processor (32- or 64-bit)
º 1 GB of RAM (32-bit); 2 GB of RAM (64-bit)
º 16 GB of available disk space (32-bit); 20 GB of available disk space (64-bit)
º DirectX 9 graphics device with WDDM 1.0 or higher driver
3. Task bar Classic style is out.
4. Sticky notes is a new permanent feature which was earlier an optional gadget in Vista.Once clicked,it gets
a little yellow notepad and one can type short note for own reference and mailing.Pic of sticky note yellow
window from my laptop is shown inset.
5. A lot has been put in renovation and refurbhishment of taskbar.The taskbar at the bottom of the screen
is what one used to launch and switch programs between them. In Windows 7 one can pin any program to
the taskbar so it`s always just a click away, icons can be rearranged just by clicking and dragging. Hovering
over the icons will make thumbnails appear of every ﬁle or window that is open in that program.But the
over all eﬀect is not looking so appealing till now 2 me.
6. Speed for reaching desktop while start and reaching in oﬀ mode while shut down is relatively much much
WINDOWS 7 : MY FIRST HANDSHAKE-2 (2009-05-28 14:52)
1. Continuing further exploring Windows 7 was a good expereince and has started looking promising to me.
2. Windows explorer : Windows Explorer has also been modiﬁed. New commandbar, new left-side pane
containing Libraries, Favorites, etc, new Details Pane, a few new options in ”View” menu like Content and
at last re-sizable Searchbar.
3. Installation did not ask many questions nor did it take much time...may 30-35 minutes...i was on the
4. Desktop context menu is similar to earlier OS but addends 2 new choioces which are :
a Share with
5. Control Panel window has also been redesigned. The left sidebar takes lesser space and resizes itself
whenever any control panel item is opened in the window which provides more space.
6. Calculator is a thing that I have left for now for it needs to be worked on with few examples with new
features.For now I would just add that PROGRAMMER and STATISTICS are two new menu options that
have been added.
7. Outlook Express is not seen till now and has been done away with!!!!
8. More will be added as I explore more!!!!!!!
WINDOWS 7 : MY FIRST HANDSHAKE-3- THE PASSWORD RESET DISK
1. When you protect your Windows 7 user account by assigning a password to it, you have the option of
creating a password hint.(NOTHING NEW). Windows 7 displays the password hint if you enter an incorrect
password. If you didn`t save a password hint, or if you can`t remember the password even with the help
of the hint, you can reset your password÷but only if you have created a password reset disk(THE NEW
THING). I used to earlier do this with a GATE CRASH CD.You can create this disk on either a USB ﬂash
drive or a ﬂoppy disk, but not on a CD. Don’t think you will ever lose or forget your password? It might
sound unlikely, but it can happen, especially in an environment that requires you to change your password
on a regular basis. Creating a password reset disk is a simple precaution that might save you a lot of grief.
2. To create a password reset disk:
a. Connect a USB ﬂash drive, or insert a disk into your computer’s ﬂoppy disk drive.
b. In Control Panel, click User Accounts and Family Safety, and then click User Accounts. Then in the
Tasks list, click Create a password reset disk.
c. The Forgotten Password wizard starts.
d. On the Welcome page, click Next.
e. On the Create a Password Reset Disk page, select the USB ﬂash drive or ﬂoppy disk drive you want to
use, and then click Next.
f. On the Current User Account Password page, enter the password you use to log on to Windows 7, and
then click Next.
g. When the progress bar displays 100 % complete, click Next. Then on the Completing the Forgotten
Password Wizard page, click Finish.
3. To reset your password by using a password reset disk:
a. On the Windows 7 Welcome screen, enter a blank password into the password box, and then press Enter
or click the Go button. Windows informs you that the user account name or password is incorrect.
b. Click OK to return to the Welcome screen, and then click the Reset password link that appears below
the password box. The Password Reset wizard starts.
c. On the Welcome page, click Next.
d. On the Insert the Password Reset Disk page, select the USB ﬂash drive or ﬂoppy disk drive you want to
use. Insert the password reset disk into the drive, and then click Next.
e. On the Reset the User Account Password page, enter a new password and password hint, and then click
f. On the Completing the Forgotten Password Wizard page, click Finish.
WINDOWS 7 : MY FIRST HANDSHAKE-4 - THE SNIPPING TOOL (2009-05-29 22:21)
1. This one is surely going to be one of the most HIT feature of Windows 7.This feature allows users to
capture , edit and share information of web and local pictures (images).Snipping allows you to send the
capture image/text to anyone using the option listed on the menu options.This allows user to save the
selected portion in any of the formats PNG,GIF,JPEG & MHT.
2. To explain it in a simpler way.What we used to earlier till Vista when we wanted a screen shot.Four steps
- Press print screen
- Go to Paint Brush
- Do paste
- Save in desired format
3. This is now replaced by one click on the snipping tool...all steps done in one click.No print screen,no opening
of paint brush,no paste,no saving.So time saved is time gained.
Harjot Singh Pelia (2009-05-30 14:45:21)
nice to see someone amongst us doing something useful.
anyway. though not exactly the same feature however a similar feature did exist in oﬃce 2007 - OneNote. you can
directly take screen clippings from the screen or print the entire page to OneNote instead of the printer.
You can also take snapshots of a part of the page too.
anyway good job done ....pl keep us updated and keep up the good job.
ANOTHER FIRST HANDSHAKE : OFFICE 2010 (2009-05-31 23:16)
1. After a week long handshake with Windows 7 and some interaction with my microsoft acquaintance who
told me further about release of beta version of Oﬃce 2010.So being on leave allows me to explore this also.So
I downloaded the same today and for the ﬁrst time the software installed on Windows 7 smoothly in about
20 minutes.....i don’t know why it took so long.
2. The beta release of the software is known as Technical Preview Oﬃce 2010.
3. A quick glance on all of the packages in form of Word,Powerpoint etc gave a glance of new features and
few new menu’s,though not yet explored look good.....will give some insight in days to come
GSM vs CDMA & Open Market Handset (2009-06-02 23:20)
1. In recent times, another ﬁeld that has been buzzing vibrantly apart from IT is the world of mobiles and
tele-communications. I have somehow always endeavored to be updated on computers and IT...but this
ﬁeld is also a very concerning ﬁeld to dig and poke into.
2. So the ﬁrst thing of interest to me was to know as to why in India, CDMA has not been such a huge
success as in west.Why GSM has been given the lead in handsets. Why is it that a CDMA subscriber has a
limited choice of handsets and a GSM subscriber has a variety to choose from? To be with stats, of the 376.12
million mobile subscriber base(ex INDIA only) only 97.77 million use CDMA network.(Pic Inset courtesy :
3. CDMA services were launched in the year 2002 in India with the sole intention of acquiring a sizeable
subscriber base by allowing the customers to aﬀordable devices with minimum features like color screen and
FM Radio. In order to attain this aim,the OEMs then introduced handsets that could be used only with their
networks. More distinctly I remember RELIANCE doing the brunt of the job. But that was in 2002.Over
last seven years, the times have commuted, the customer`s desires have changed, the technology has changed,
the psych of the intended customer has changed for better. He has become ready to shelve out some money
for more features and why not? With the introduction of handsets like Nokia 5800,LG Cookie and Samsung
Pixon, the customer is likely to be enticed!!!!!!!!!!!
4. Those customers who got into the CDMA tag over the years have had no problem with the services prof-
fered, the price of the calls, all is OK except for the problem that they have to persist in with the same handset
for so long as there is no choice in the CDMA segment. But not now..OEMs of the handsets have started
coming up with new generation handsets which support both GSM and CDMA in one. The most common
handset manufacturers that come ﬁrst to mind include NOKIA,SAMSUNG,LG,VIRGIN,MOTOROLA and
now more promising Indianised manufacturers include FLY,GEE PEE,X FONE,LEMON,MAGICON(I am
certain u have heard none of them)
5. So the good thing about the CDMA subscribers is the introduction of OMH ie Open Market Handset
started by the CDMA development group which is an international body comprising CDMA Operators,
manufacturer`s and application providers. This body enables full boasted CDMA devices to be used in any
OMH compliant operator network. Thus the Bandhan of constraining to one operator and OEM is no more
THE ’G’ Family : 0G to 4G (2009-06-05 00:10)
1. The 'G` (0G,1G,2G,2.5G,2.75G,3G,4G) family that has now become, originally started with mobile tele-
phone service MTS in the US in 1946 (ie 0G) followed by Analog Communication standards in 1980s(ie 1G).
One of the largely used 1G based service in earlier 80s was NMT (Nordic Mobile Telephone) that was used
in Nordic countries, Switzerland, Netherlands, Eastern Europe and Russia.
2. 2G (or 2-G) is short for second-generation wireless telephone technology and these were commercially
launched on the GSM standard in Finland in early 90s. Three elemental beneﬁts of 2G networks were :
(a) Phone conversations were digitally encrypted.
(b) More eﬃcient on the spectrum allowing for far greater mobile phone penetration levels
(c) 2G introduced data services for mobile, starting with SMS text messages.
The main 2G standards are:
• GSM (TDMA-based)
• IS-95 aka cdmaOne , (CDMA-based, commonly referred as simply CDMA in the US
• PDC (TDMA-based), used exclusively in Japan
• iDEN (TDMA-based), proprietary network used by Nextel in the United States and Telus Mobility in
• IS-136 aka D-AMPS, (TDMA-based, commonly referred as simply TDMA in the US
3. 2.5G is considered to be a way between 2G & 3G cellular wireless technologies. The term ”second and a
half generation” is used to describe 2G-systems that have implemented a packet switched domain (Packet
switching is a network communications method that groups all transmitted data, irrespective of content,
type, or structure into suitably-sized blocks, called packets.) in addition to the circuit switched domain(a
circuit switching network is one that establishes a circuit between nodes and terminals before the users
may communicate, as if the nodes were physically connected with an electrical circuit.) This got famously
known as GPRS and was able to provide data rates from 56 kbit/s up to 114 kbit/s.
4. 2.75G actually meant to refer the EDGE technology ie Enhanced Data rates for GSM Evolution,as
the name suggestsallows improved data transmission rates as an extension on top of standard GSM. EDGE
can carry data speeds up to 236.8 kbit/s. There is also something known as evolved EDGE which is a
further extension over EDGE wherein Peak bit-rates of up to 1Mbit/s and typical bit-rates of 400kbit/s are
5. 3G is the third generation of telecommunication hardware standards and general technology for mobile
networking, superseding 2.75G. This would be able to provide even higher transmission rates that would
range from a minimum speed of 2Mbit/s to a maximum of 14.4Mbit/s for stationary users, and 348 kbit/s
in a moving vehicle.
6. 4G is the short term for fourth-generation wireless, the stage of broadband mobile communications that
will supplant the third generation (3G). While neither standards bodies nor carriers have concretely deﬁned
or agreed upon what exactly 4G will be, it is expected that end-to-end IP and high-quality streaming video
will be among 4G’s distinguishing features. Fourth generation networks are likely to use a combination of
WiMAX and WiFi.
7. I was curious to know about all the G`s and have written in brief of what I have understood very clearly
and read from Wiki and other good sources.Thanks Wiki again!
Buy a Keyboard : Get a Computer (2009-06-06 23:43)
1. When you buy a
computer,you buy a keyboard : LOGIC UNDERSTOOD. 2. When you buy a Keyboard,you get a com-
puter : LOGIC NOT UNDERSTOOD. 3.
Let me explain Para 2.Asus has come up with a EEE Keyboard which is actually a PC with a typical QW-
ERTY keyboard,minus NUM PAD.In place of the numpad ,we get a 5 inch,800 x 400 resolution touch screen.
4. Keyboard is equipped with a
Intel Atom Processor,16 GB SSD,1 GB Memory,VGA & HDMI OUTS,a few USB Ports and support for
WiFi and Blue tooth.
5. Cost : Approx 24K to be launched in June 09 : INDIA
PAPER BOOKS CONVERGE TO E-BOOKS : KINDLE DX (2009-06-07 16:25)
1. We have been hearing often in our oﬃces, in the forums, in various visionary speeches from bosses about a
paperless oﬃce. I heard this word for the ﬁrst time in late 90’s when the company I was working in, the CEO
gave a mention about a paperless oﬃce. The word induced internal laughs amongst most of the audience of
how is it possible?
2. Slowly over a period of time, now 10 years, the thing doesn’t look inconceivable. To add to the various
options available today in form of e-mails, web sites, mobiles etc.....the latest IN thing is KINDLE DX from
Amazon. The gadget is shown in the pic inset.
3. Recently read about the same in the June issue of Digit. It also mentioned about how the biggest library
of the world ie British Library is putting in lots of eﬀort in digitizing books available presently on its shelves.
It has put up four giant scanners, working for last 2 years with the help of a 21 MP camera clicking all the
way while a robotic arm turns them.
4. The conﬁguration of this KINDLE Dx is as follows :
- Slim: Just over 1/3 of an inch, as thin as most magazines
- Carry Your Library: Holds up to 3,500 books, periodicals, and documents
- Beautiful Large Display: 9.7” diagonal e-ink screen reads like real paper; boasts 16 shades of gray for
clear text and sharp images
- Auto-Rotating Screen: Display auto-rotates from portrait to landscape as you turn the device so you
can view full-width maps, graphs, tables, and Web pages
- Built-In PDF Reader: Native PDF support allows you to carry and read all of your personal and
professional documents on the go
- Wireless: 3G wireless lets you download books right from your Kindle DX, anytime, anywhere; no monthly
fees, no annual contracts, and no hunting for Wi-Fi hotspots
- Books In Under 60 Seconds: You get free wireless delivery of books in less than 60 seconds; no PC
- Long Battery Life: Read for days without recharging
- Read-to-Me: With the text-to-speech feature, Kindle DX can read newspapers, magazines, blogs, and
books out loud to you, unless the book’s rights holder made the feature unavailable.
Google & Bing (2009-06-11 15:58)
1. Most of you must have come across a new search buzz known as BING launched by Microsoft.I have binged
a few times but have recurred back to Google most of the times since it is a habit as on date.Although best
wishes to BING....since the more these two ﬁght..the better it is for us.
2. An interesting site that compares these two is http://www.bingandgoogle.com
3. This site would give the search results from both the sites on one page.Like wise MELIORATE ie mysite
name appears on second and third number in GOOGLE and yet to ﬁnd a place at BING.....
Google and Bing : Bade miyaaan Chotey Miyaan (2009-06-11 16:09)
1. Most of you must have come across a new search buzz known as BING launched by Mi-
crosoft.I have binged a few times but have recurred back to Google most of the times since it
is a habit as on date.Although best wishes to BING....since the more these two ﬁght..the better
it is for us. 2. An interesting site that compares these two is http://www.bingandgoogle.com
3. This site would give the search results from both the sites on one page.Like wise MELIORATE ie mysite
name appears on second and third number in GOOGLE and yet to ﬁnd a place at BING.....
My DIGIT Webinar (2009-06-12 22:37)
1. Digit,the IT magazine is presently celebrating its 8th Anniversary Carnival and has launched many events
including webinars,daily online contests,workshops across the country.
2. I was part of one WEBINAR on Security of PC today.It was a ﬁrst for me,although this would be a
regular feature for most of my IT savvy friends The word makes the meaning of the term understandable
ie a Seminar held on web.It included a presentation run by a Digit rep and about 25 invitees logged in to
discuss on the several issues related.A screen shot just for info.
3. Overall a new thing and experience.
Salman (2009-06-19 19:40:38)
Nice blog keep it up
H.A.M.R : Storage Futurity (2009-06-20 23:46)
1. In the last 15 years of my interaction with various modes of storage medias right from the days of ﬂoppy
drives,tape drives,CDs,DVDs and now Blue Ray’s,we have all witnessed as to how the storage is shrinking
and shrinking and shrinking...(reminds of the ascent of dharmender paaji saying daru peeing and peeing and
peeing...from Sholay)...khair this is not the intented aim here.
2. A new buzz word in the future storage trends has come up in the name of H.A.M.R....briefed below.
3. Heat-assisted magnetic recording ie HAMR is a technology that magnetically records data on high-stability
media using laser thermal assistance to ﬁrst heat the material. HAMR takes advantage of high-stability
magnetic compounds such as iron platinum alloy. These materials can store single bits in a much smaller
area without being limited by the same superparamagnetic eﬀect that limits the current technology used
in hard disk storage. The only catch being that they must be heated to apply the changes in magnetic
orientation. HAMR was developed by Fujitsu in 2006 so that it could achieve one terabit per square inch
4. Seagate Technology said it had successfully demonstrated the principles behind HAMR, the name for the
technology that could form the basis of Seagate’s next-generation hard drives. The successful demonstration
doesn’t mean that the technology is right around the corner as the roadmap calls for HAMR to be introduced
in about ﬁve or six years.
5. If the technology lives up to its promises, however, then HAMR could blow away the ”superparamagnetic
limit” by about a factor of 100, according to Seagate. The company hopes to read and write 50 terabits (6.25
terabytes) of data in a square inch using low-cost manufacturing techniques.
6. Thanks Wiki and Seagate for info.
Salman (2009-06-21 09:55:56)
ANUPAM (2009-06-21 10:25:30)
thanks salman...will see ur site sooon
Storage Technology - Graduating Trends (2009-06-21 22:09)
1. Recently I was asked to write a paper on Trends in Storage Technology for an internal oﬃce maga-
zine.Although have been aware of the trends in a hazzy manner but it gave me an opportunity to revise
the entire lot and infact made myself cognizant of many new things all set to arrive in near future.Relevant
extract as would be making the reader wise on subject matter is produced below.
2. Many diﬀerent forms of storage, based on various natural phenomena, have been invented. So far,
no practical universal storage medium exists, and all forms of storage have some drawbacks. Therefore a
computer system usually contains several kinds of storage, each with an individual purpose. The two primary
storage technologies are magnetic and optical.
3. The primary types of magnetic storage are:
(a) Diskettes (ﬂoppy disks)
(b) Hard disks
(c) High-capacity ﬂoppy disks
(d) Disk cartridges
(e) Magnetic tape
4. The primary types of optical storage are:
(a) Compact Disk Read-Only Memory (CD-rfruROM)
(b) Digital Video Disk Read-Only Memory (DVD-ROM)
(c) CD-Recordable (CD-R)
(d) CD-Rewritable (CD-RW)
5. MEMS : One technology that promises to store more information than disk drives is micro electrome-
chanical systems. MEMS have electrostatic actuators ÷ electrically-driven springs and levers ÷ that can
move components like storage media and read/write heads tiny, precise distances. It involves recording bits
by heating the tips to melt tiny pits in a plastic storage medium, similar to burning a CD. The presence of
a pit represents a 1 and the absence a 0. The device reads bits by sensing changes in temperature. When a
tip moves across the surface and falls into a pit, more of the tip is in contact with the surface, which causes
it to dissipate heat more quickly.
6. Holographic Storage : Holographic storage devices have the potential to both hold much more data
than magnetic technologies and access it much faster. Holograms are made by bouncing a laser beam oﬀ
an object and having a second laser beam intersect the reﬂected light. The laser beams interfere with each
other, producing a unique pattern of bright and dark areas that can be captured in storage media like light-
sensitive plastics or glass composites. The resulting hologram can be illuminated by shining the second laser
beam on the media at the same angle as when the hologram was recorded.
7. Blu Ray : Blu-ray Disc (also known as Blu-ray or BD) is an optical disc storage medium de-
signed/created by Sony to supersede the standard DVD format. Its main uses are for storing Playsta-
tion 3 games, high-deﬁnition video and data storage with 50GB per disc. The disc has the same physical
dimensions as standard DVDs and CDs. The name Blu-ray Disc derives from the blue-violet laser used
to read the disc. While a standard DVD uses a 650 nanometre red laser, Blu-ray uses a shorter wave-
length, a 405 nm blue-violet laser, and allows for almost six times more data storage than on a DVD.
8. Network Storage : Network storage is a generic term used to describe network-based data storage, but
there are many technologies within it. Direct Attached Storage (DAS) is a storage device that is directly
attached to a host system. The simplest example of DAS is the internal hard drive of a server computer,
though storage devices housed in an external box come under this banner as well. DAS is still, by far, the
most common method of storing data for computer systems.
9. Molecular Switches : Storing a bit in a single molecule is about as small as you can get. Certain
molecules can be used to store data because they can be switched back and forth between two stable states
that can represent the 1s and 0s of digital data. One of these is rotaxane, which contains a thin, thread-
like section with a ring that moves freely around it. The ends of the thread section are thicker, preventing
the ring from slipping oﬀ. Researchers have found ways to move the ring from one end of the thread to the
other and the ring will stay where it is placed.
10. Nanotechnology, shortened to ”Nanotech”, is the study of the control of matter on an atomic and
molecular scale. Generally nanotechnology deals with structures of the size 100 nanometers or smaller, and
involves developing materials or devices within that size. Nanotechnology is very diverse, ranging from novel
extensions of conventional device physics, to completely new approaches based upon molecular self-assembly,
to developing new materials with dimensions on the nanoscale, even to speculation on whether we can directly
control matter on the atomic scale. Breakthrough Nanotechnology Will Bring 100 Terabyte 3.5-inch Digital
Data Storage Disks
11. Storage-speciﬁc operating system : Just as a computer operating system makes a computer usable, a
storage-speciﬁc operating system will make storage devices and their associated networks operate in a usable
manner. Powerful storage networking switches may provide the platform for the storage-speciﬁc operating
system.Moving intelligence away from servers and storage systems into interconnected switches in the core of
the network could solve interoperabliity problems that are inherent in heterogeneous enterprise environments
and administration tools and allow complex infrastructures to be managed as a single, scalable entity.
12. Storage Virtualization: Virtualization improves storage manageability by separating the presentation
of storage to the server operating system from the actual physical devices. Virtualization consists of taking
several physical storage devices and joining them to appear as one logical unit to manage. This represents a
collective pool from which users can request any amount of disk space. The users will thus be able to access
storage without knowing where a device is, and how it is conﬁgured.
13. H.A.M.R : Heat-assisted magnetic recording ie HAMR is a technology that magnetically records data
on high-stability media using laser thermal assistance to ﬁrst heat the material. HAMR takes advantage
of high-stability magnetic compounds such as iron platinum alloy. These materials can store single bits in
a much smaller area without being limited by the same super paramagnetic eﬀect that limits the current
technology used in hard disk storage. The only catch being that they must be heated to apply the changes
in magnetic orientation. HAMR was developed by Fujitsu in 2006 so that it could achieve one terabit per
square inch densities.
14. R.A.I.D & M.A.I.D : RAID is an acronym to describe a Redundant Array of Inexpensive Disks, a
technology that allowed computer users to achieve high levels of storage reliability from low-cost and less
reliable PC-class disk-drive components, via the technique of arranging the devices into arrays for redundancy.
On the other hand we have MAID, an acronym to describe Massive Array of Idle Disks ,a system using
hundreds to thousands of hard drives for near-line data storage. MAID is designed for Write Once, Read
Occasionally (WORO) applications. In a MAID each drive is only spun up on demand as needed to access
the data stored on that drive. This is not unlike a very large JBOD but with power management.
Anonymous (2009-07-11 18:36:43)
very informative. Keep it up! - rinkoo
Hi Tech Door Bell : Is it required? (2009-06-22 16:20)
1. IT is venturing into all Gali’s and Muhallah’s at global level.It is no more conﬁned to certain sectors.Well,I
am writting this one because it made me laugh all the way!!!may be I am being foolish but I am still laughing
while I am writing this.
2. I recently came across this good tech info site ie http://www.emmexcorpio.blogspot.com/
that introduced me to the subject heading.The picture explains it all...yes!!!this is a door bell...
3. It made me laugh because I directly connected it
with the INDIAN RESIDENCES.The doodh wala,the safaiwala,the milk man,all friends and relatives,the
surprising visitors,we have all encountered and will keep encountering till eternity in India atleast.So I was
wondering what thier reactions would be like if they read all that. 4. But anyway the idea is good and is
based on simple database query run fed by the owner of the house or oﬃce
Salman (2009-06-23 19:25:05)
really awesome blog keep it up
Hi Tech Door Bell : Is it required? (2009-06-22 16:20)
1. IT is venturing into all galiyaan and muhallah’s of
Are you secure at your friendly neighbourhood CYBER CAFE ? (2009-06-26 15:27)
1. This one comes after I have read a wonderful article in the DIGIT Carnival issue Jun 09 on Cyber café
Security. This article covered how few Cyber Cafe`s with notorious intentions can play with crucial, critical
and conﬁdential information of the user who might have accessed his e-mail accounts or would have booked
a ﬂight ticket with his credit card or might have done some personal work on the cyber cafe`s PC.In the
following paragraphs I would just go over the preventive measures in brief as outlined in that article. Genuine
Informative CREAMY INFO THAT IS!!!!!!!!
2. PORTABLE WEB BROWSER : A portable web browser as the name suggests would be able to allow
you to take bookmarks and passwords with you while not writing any information on the host computer.
This allows to bypass key loggers who would be expecting that all that you type would be logged in one
separate ﬁle unknown to the user. So this feature of the portable browser would allow you to access your
accounts without typing and thus preventing from leaking your crucial info. But at the same time you have
to be aware that PENDRIVE would be equal to your most precious thing in life..so don`t ever try and
attempt loosing it.Mozzilla,Opera have these free softwares ready for download at the click of a button and
Chrome is working still!!!!!
3. Another thing about the key logger software`s available in the market, yes they include OPEN SOURCE
TYPE ALSO...so all the more vulnerable the user becoming a quarry. Key logger can be of two types :
a. Hardware Type ÷ By using a small chip in the keyboard which makes by passing impossible.As shown
in the ﬁgure below,we see a normal CPU rear from back and another PC with the malicious chip placed in
between the cable.
b. Software Type ÷ Can be activated with the help of a Trojan or with the help of a simple installation.
4. A software based key logger can either keep a record of what is being typed or would be able to take
periodic screen shots while the user is using the PC.All this being sent to a remote server without the
knowledge of the bechara user.Hai na kamaaal ke baat!!!!!!!!!!
5. VIRTUAL KEYBOARD : Although the endeavor of the cyber cafe PC user should be to ensure that
in no circumstance, credit card details should be typed,but if at all it is marta kya na karta wali baat,then
use of virtual keyboard should be exploited. This would be available as Start > Accessories > On Screen
Keyboard.Although there are ways and means to even break this,but then there would never be a guarantee
of sort.after all U R ON THE WEB BHAISAAAB...every thing is accessible.
6. I would like to mention one more thing here..VIRTUAL KEYBOARDS/ON SCREEN KEYBOARDS
are not a guarantee for ensuring safety. There are key loggers which are even conﬁgured to log only details
from on screen key boards. There is a solution to this also and that is OBFUSCATION.
7. OBFUSCATION : This basically allows key loggers to log a certain combination of keys,while keying in
diﬀerent combination. There are some programs that are targeted at diﬀerent obfuscation algorithm and thus
by pass typing in the meat thing. Obfuscation is actually the deliberate hiding of the software’s behavior,
is used by malware authors as well as legitimate software developers. They both use code obfuscation
techniques to keep curious souls from understanding how their software works and what it is doing to the
computer on which it runs.A complex thing in itself but who needs to know that..aaam khao..not to worry
of guthli!!!!!!!!!!!How to use it?Pl BING or Google.
8. Another important thing to be ensured is to protect your USB drive from Viruses.The ﬁrst thing to
do when you plug in your USB Drive into a public computer is to identify and disable malicious processes
running. Process Explorer is a good utility for doing this.This is actually like windows task manager but
with few more good options to work on. A Screen Shot from my lap top shown below.
9. Securely deleting data : Last but not the least.ensure using a good software that ensures that no
trace of activity on the used computer is left behind.I recommend using ERASER and Free Commander
..tried and tested.....
NOW CHIP IN BATHING SOAP!!!! (2009-06-27 22:14)
1. I was really amazed to read this one in TOI today wherein I came to know that in few remote villages of
south India,some panic occured after they found a chip resembling a pen drive in their toilet soaps.
2. This was prominent in a village near Bajpe and as rumours spread that the chip was a bomb or was
inserted to make blue ﬁlms, the villagers made a beeline to the police station. Police investigated and found
that the chip was installed for collecting data. A team from Hindustan Lever Limited was conducting studies
related to Lifebuoy soap and its usage in the village.
3. 'There was nothing harmful in it. A chip was installed in the soaps as a part of the research. The
team had visited about 28 houses. A representative from UK, Julian Collins had explained the villagers in
detail about the project. The only mistake was that they had not obtained permission from the district
administrator to conduct the research,¨ he added.
4. Though most of the houses had signed a consent letter for the use of the soap, on seeing the chip, they
panicked. The company`s documents, however, showed everything was above board.Meanwhile, Sumathi,
Project co-ordinator of the company said, 'Hindustan Lever Limited was conducting a two-year project to
study children`s health in connection with the use of Lifebuoy soap.
5. Thus chip was a data-collection card which entered data about the children`s health in relation to the
number of times they used the soap.All documents regarding the research project are clear and the company
had obtained permission from the superintendent of police and about 30-40 people were working on the
6. Wonder what else is in store when this can be claimed to be the begining of some sort in the name of
7. Some extract taken from http://www.punemirror.in
UNIQUE IDENTIFICATION PROJECT : UID (2009-06-28 16:01)
1. We all know how the launch of PAN Cards and Voter ID Cards in the initial period say about 7-8 years or
may be slimly earlier created discombobulation amongst the aam janta. Photos clicked, Data base created
and then all got inter amalgamated and I got somebody else’s pan card with a diﬀerent pic and altogether
diﬀerent address with the age of my grandfather endorsed in BOLD.The thing and the vision seems to have
2. Now on top of this Sarkaar plans to make a Unique Identity Card.Since the sarkaar never wanted to take
a chance this time ,the onus of the culmination of the project has been given to INFOSYS and the over all
coordinator is none other then Mr Nandan Nilekani,the co chairman of infosys.
3. The UID (Unique Identity) project is one of the most aspirational projects of the UPA government. The
UID programme will provide an identity card to every citizen to establish citizenship and address security
4. The identity cards purported will be smart cards which will carry information of each and every individual,
his/her ﬁnger biometrics as well as a photograph. A unique National Identity Number will be assigned to
each individual including those below 18 years of age.
5. The government will spend around $6 billion on developing smart cards apart from a gigantic citizen
database. Karnataka has reportedly been chosen as the pilot state to carry out the project.
6. The broad idea is to get all the births, deaths, marriages, passport data, bank account data, ration card
data into one database. This will help all these oﬃces to just tap into the central database as and when
required and update their accounts.
7. In year 2000, Tata Consultancy Service was assigned with the task of studying the feasibility of this
project. It came up with the report which said that the government would have to earmark around Rs
10,000 crore in three to four years, to implement it.The project would also require completely new software,
capable of handling detailed information on at least one billion data entries.
8. This proposal that took almost a decade to become a project. And now the government is reportedly
looking at a three-year term to complete the entire programme. I am slightly positive about this deadline
being met as the project is in the hands of INFOSYS.
9. Info from http://infotech.indiatimes.com and http://www.ciol.com
Anonymous (2009-06-28 17:20:10)
how do u search all this man?
Anonymous (2009-08-01 14:04:05)
How do you help Nandan Nilekani in making the project successful ? Can we join the project voluntarily ?
ANUPAM (2009-08-01 14:52:44)
nandan has now become a one man army anyway!!!
Check your ANTIVIRUS’es Loyalty : EICAR Way (2009-07-03 23:07)
1. The world of bloggers is increasing at an astonishing pace and there are lots and lots of good of them
with loads of beneﬁcial and estimable info. Recently I came across one good one that introduced me to ”The
European Institute for Computer Anti-Virus Research” (EICAR).
2. Now this was able to provide me a real cool trick that of testing the reliability of the antivirus being run.
I tested the same on two computers. One with a antivirus loaded and the other one badly infected. I will
now share the cream instead of minting words.
3. It is just a matter of simple cut & paste.Just do the following steps and the matter of how reliable your
antivirus is will be taken care of.
(a) Open Notepad and paste the code given below
X5O!P %@AP[4\PZX54(Pˆ)7CC)7 } $EICAR-STANDARD-ANTIVIRUS-TEST-FILE! $H+H*
(b) Save the notepad with the name eicar.com
4. If ur Anti-Virus is powerful , it will stop u from saving .. Or atleast trap it few seconds after saving.
5. That`s it!!!!!So simple.So my infected computer was able to save the same and the F - secured one caught
the moment I tried saving it and deleted it too!!!!!!!!Screen shot in set
6. Thanks EICAR and http://www.technotips24x7.co.cc/
USB DHAMAAAL!!! (2009-07-04 22:40)
1. The world of USB based gadgets is in for some real surprising things.Two of the recent ones that surprised
me really are mentioned below.
2. USB Beverage chiller : The name says it all.
• Works w/ Soft Drinks, Coﬀee, Tea, and More
• High Eﬃciency - Works in Just a Few Minutes after Plugging into USB Port
• Draws Power Directly from USB Interface
• Plug and Play (No Driver Required)
• On Board Button to Switch from Warm to Chill
• Weight : 440 gm
• USB Cable length : 1.1 m
3. USB Mini Fridge : Again the name says it all.The features include :
• Powered entirely via your computer`s USB port
• Internal blue LED illumination
• Keeps one 12oz can of beverage chilly cold
• No batteries required
4. Where are we heading this way?
Techsense (2009-07-05 02:12:41)
AMD : The Launch of ISTANBUL (2009-07-06 22:47)
1. I really wonder whats going to be the end of MOORE’s Law.Where did the thing start from and whats
going to be the conclusion or is their really going to be any?First it was the pentium, then pentium 2,then
3 ,then 4,then Core 2 duo,dual core,then it was Quad Core and now comes the launch of SIX PACK ABS
.....sorry..I mean Six Core Processor,the ﬁrst of its kind from the AMD,to be known as the ISTANBUL
Processor.Why so named is still a question?
2. The good thing is that these processor can simply be used to replace and upgrade the existing lot of Quad
Core processors ie the Opteron Series without investing again into the motherboard and making it obsolete.
3. Istanbul comes with a powerful DDR2 memory architecture and the AMD virtualisation technolgy.Just
to be clear these are 6 distinct physical cores, just as the Shanghai processors contained 4 distinct physical
cores. Each core comprises 512K of L2 cache and 128k of L1 cache. The L3 is a 6MB cache shared by the
4. This also comes as an answer to the Intel’s ”Nehalem” Xeons.I assume that with the launch of IS-
TANBUL,now the quad series of the AMD is heading for a conclusion and a farewell from the exisiting
motherboards since Istanbul can simply ﬁt into the same slot as the Quad core’s.
5. So next after Istanbul will be ?????.......Afghanistan!!!!ha ha ha....long and fast lives the MOORE’s Law.
KYPS : HELPS AVOID BEING VULNERABLE!! (2009-07-08 16:20)
1. In an earlier post when I had discoursed how much prone are you at any cyber cafe or at some other non
friendly computer when u surf web on a holiday outside or when u dont have your own laptop,how prone
you become to keylogger!!I had given out given out few suggestions in form of using mobile/portable browser
etc. that was at http://anupriti.blogspot.com/2009/06/are-you-secure-at-your-friendly .html
2. Not a new thing but I tried this for the ﬁrst time yesterday ie KYPS that stands for Keep Your Password
Secret.Now for the understanding of this I will write a small step by step instruction.
How to avoid typing username and password at the outside or malicious looking cyber cafe computer.?
(a) Register at http://kyps.net/home/
(b) Get a set of codes at your email id
(c) Register those username/passwords site that u intend using sometime later at some other computer.
(d) Now when u wish to access the email account at the cyber cafe you simply have to log into the site of
KYPS and site will help you reach and access the e-mail without using the username and password,but by
using the one time codes that I had mentioned earlier.
(a) You register your email id firstname.lastname@example.org at KYPS.
(b) Once you register,a set of codes will be mailed to you.Qty will be decided as per your choice.Say 80.
(c) These codes will look some thing like :
100 9?nRQuJ8p 110 DzobNpk?M 120 Xg1Z2kXsL 130 maXXcACKV
101 x0Ivy4XsB 111 jcK8p7JRl 121 WqJ6GXDz4 131 XfjKVH65p
102 ilKzybBE0 112 /nvspLbmr 122 VoaX7yI1 132 5ILuG5ddN
103 tXaRNJwk? 113 lcMEO?GN? 123 MjpXow3CI 133 vBbKpkXiT
104 lAJNJnfcZ 114 Lf?U7Zzyn 124 VX71za0+J 134 KGXkxsVc
(d) You go to a Cyber Cafe.Log into the KYPS site with your e-mail id.
(e) Select which e-mail you would like to access.
(f) Once selected, KYPS will ask you the equivalent code of 100 ie 9?nRQuJ8p
(g) and you log into the email page to access your mails.
(h) DONE.That’s it.
The only risk you build here is that since you rely on KYPS which has your info in their server but they
claim is never stored.So one risk closed is one risk open......thats the funny side of SECURITY
ramesh kumar (2009-07-10 22:22:14)
is it worth the risk?risk never gets over once u r on the web!!!
E-WASTE : DEPOSIT & GET PAID (2009-07-10 23:01)
1. In an earlier post I discussed about the consequences of e-waste and how few organisations were involved
in controlling the issue.
2. Recently I came to know of this site at www.techshop.in/e-cycle which claims to recyle e-waste in a
real economical manner.They pay you for the trash that you deposit.More details mentioned below.
3. MGA & Associates is a major organisation for the recovery & recycling of electronic equipments and
components based strategically in the deep sea port area of Kandla India. MGA & Associates plans & carries
out the collection, transportation, processing & recovery of all base materials from electronic equipments.
They oﬀer an environmentally sound and compliant route for organisations for their end of life and obsolete
electronic equipments & components with the best available techniques. All MGA & Associates processes and
daily operations are backed up by ISO 9001 and ISO 14001Quality & Environmental management systems
certiﬁed by Bureau Veritas.
4. MGA & Associates was formed in 2003 by a group of dedicated & professional individuals with over 60
years of collective experience in recovery and recycling of electronic equipment and components and is one
of the largest professional processors of this type of equipment.
5. Your e-waste can be sent or deposited in person against which you get the coupons at the following
(a) Polytela e-Commerce PVT. LTD.
25, Gaurav Industrial Estate, Bail Bazaar,
Kurla (W), Mumbai 400070.
Tel.: +91 9920213743 , +91 9323699901
Fax: +91 2264501259 E-mail: support@TechShop.in
(b) MGA & Associates
Plot No. 262/263, Sector 4, Kandla Special Economic Zone,
Gandhidham - 370 230, Gujarat, INDIA.
Tel.: +91 2836 252225, +91 2836 253930
Fax: +91 2836 252522 E-mail: email@example.com
(c) Logix Express
37/1945 Om Karam CHS ltd. Gandhinagar. Bandra E. Mumbai. 400051.
Tele: 022 26510708/26510687.
Contact Person: Mr. Abhishek.
8908/2 Multani Dnada. Opp. Rangoli Guest House.
Tele: 011 32617289.
Contact Person: Mr. Govind.
Block No. 71 to 76, Sagar Estate Part 3.
Opp. Ekta Hotel. Sarkhej Bavala Road.
Sarkhej- Ahmedabad. 380210.
Contact Person: Govind.
Tele: 079 26890419.
C/o Fast Freight Courier
1-10-9/3, Airport Road, Opp. IBP Petrol Bunk,
Contact Person : Mr. Anil Reddy
Contact Person: Mr. Silverraj.
C/o Ever Green Logistics
6, 4th Cross, 5th Main,
S R Nagar, Bangalore-560027.
Contact Person : Mr. Ravi
Survey no 755, Kalpana warehouse.
Opp. Hotel Ram kamal, Pune Nagar Road.
Katkewadi, Wagholi, Dist. Haveli
Contact Person: Mr. Raja Ram.
Ground Floor, Swagat Complex.
Contact Person: Jayendra.
6. GOOD WORK...SO FREE PUBLICITY!!
Anonymous (2010-05-30 15:21:52)
Wonderful. I am going to reproduce it with your permission
Anonymous (2010-05-31 09:45:58)
EYE-FI : GETs YOUR CLICK UPLOADED (2009-07-11 00:02)
1. What’s the route from the moment you click any pic from your digital camera or your camera phone
to the time you upload the selected few.It involves clicking the pic followed by Booting-up your computer,
plugging in your camera, uploading pics to the hard drive and ﬁnally choosing what to send to the web
!!!that has started becoming annoying now...since the number of pics a camera freak clicks is huge....so he
generally shams it out and let them remain in the stoarge media by default.
2. SOLUTION : EYE-FI Memory Card. The Eye-Fi camera memory card (Pic in set) not only
provides memory as usual for your pictures, but uploads the snaps as you take them.
3. The procedure involves just sync the card to a hard drive or Wi-Fi network, and getting it plugged into a
digital camera and start snapping away. Pics are then routed to the hard drive or to one of 17 photo vendors
(like Facebook or Flickr.) The card’s software deftly handles scaling and compression while privacy settings
at the individual sites allow you to ﬁlter what gets published. The software handles scaling and compression
as well as privacy settings.
4. The Wi-Fi chip uses 70 percent less power than competing products, allowing it to be comfortably nestled
in a standard SD card.
5. Thank you http://www.technovelgy.com
Widi Septyono (2009-07-13 21:44:42)
Maybe if you are interested in my blog, please give comments and I will soon reply
PC IN A FLOWER VASE : ECS’s MING VASE (2009-07-14 23:09)
1. One Taiwanese computer maker has come up with a novel way to camouﬂage a computer made for your
living room: give it the shape and color of a Ming Dynasty vase. 2. Elitegroup Computer Systems (ECS) put
the small blue and white vase-shaped computer on display by a large-screen LCD TV at Computex Taipei
2009, to the eﬀect that it really looked like Chinese art work rather than a gadget. 3. Inside the shapely
plastic covering includes (a) Home media computer complete (b) A Blu-ray Disc player oﬀering full 1080p
high-deﬁnition video quality (c) Intel Atom N230 microprocessor (d) Nvidia Ion graphics chips and a (e)
2.5-inch hard disc drive. (f) Bottom of the vase reveals plugs for an HDMI cable, an Ethernet cable and USB
ports. 4. See all this in the pictures in set....really amazing!!!
HDD DOCKING STATION (2009-07-20 22:03)
1. In a typical IT savvy home,one would expect a desktop and a laptop today.So do Ihave that.I got my
present desktop about 6 years back and have been since upgrading as and when I ﬁnd an opportunity to
make up with the race of not being left in obsolesence.Thus today I have about 6 IDE/sata based hard disks
at my home that bear the back up and conﬁne themselves to the shelves till they are required.
2. Once required,I attach them with the easily available USB to SATA or USB to the typical IDE port.Now
when I do this,the table that I work on becomes a horde of wires with keyboard, mouse,power cable of
this conversion kit
ging bank intermingling with each other.To make this neater a new thing that I recently came across is
the HDD DOCK STATION.More below :
3. The plug-n-play ready, high speed HDD Docking Station provides the user with ﬂexibility, portability and
performance. The unit supports both 2.5¨ and 3.5¨ SATA drives up to 1TB in size. The docking station is
also hot-swappable using the USB2.0 and eSATA interfaces so it can be moved from computer to computer
with ease for all your backup needs. If data integrity is your habit, then the HDD Docking is the perfect
solution for you. 4. The dock is compatible with Windows and supports HDD upto 1 TB. 5. Thanks
DATA STORAGE IN BACTERIA : ASTONISHING-MUST READ (2009-07-26 22:32)
1. I had read about this about 2 months back but could not get any thing rock solid about what is the
concept like actually?Although still not much detail is available,the crux from various sites is reproduced
below for one to just imbibe the idea.
2. Artiﬁcial DNA with encoded information can be added to the genome of common bacteria, thus preserving
the data. The technique was developed at Keio University Institute for Advanced Biosciences and Keio
University Shonan Fujisawa Campus. So now what would happen to those USB ﬂash memory ”thumbdrives”
which is claimed as being small!!
3. The technology aims at the succesful development of a DNA memory utilizing living organisms. The
researchers proposed a method to copy and paste data within the genomic sequence of a living organism,
Bacillus subtilis. Since microbs such as the Bacillus subtilis are very small and they keep gene information for
generations, they can be applied for extremely smaller-size, larger-volume memory media that can store data
for a longer period of time, compared to electronic or magnetic media including CD-ROM, ﬂash memoryand
4. According to researchers, up to 100 bits of data can be attached to each organism. Scientists successfully
encoded and attached the phrase ”e=mc2 1905” to the DNA of BACILLUS SUBTILIS, a common soil
bacteria.The Bacillus itself creates new copies of the data every time it reproduces itself, thus making it an
ideal archival storage system.
5. While the technology would most likely ﬁrst be used to track medication, it could also be used to store
text and images for many millennia, thwarting the longevity issues associated with today’s disk and tape
storage systems – which only store data for up to 100 years in most cases.It is also claimed by the inventor
that unlike optical/magnetic storage, data would be safe for thousands of years!!!
6. However, DNA sequences gradually change as their generations advance and that has been a hurdle in
the research of biotic memory media. Changes in the DNA arrangements would make recovery of the stored
data impossible, provided that no error correction techniques found at magnetic or optical storage media is
available. The research group said its latest development indicated a possible resolution for this problem.
7. The technology proposes a method to copy and paste data within the genomic sequence of a living
organism, Bacillus subtilis, thus acquiring versatile data storage and the robustness of data inheritance.
Two or more diﬀerent DNA molecules which carry the encoded data were duplicated into multiple genomic
areas for data storage. The encoded data is then retrievable by complete genome sequencing and searching
for duplicated coding regions using multiple alignments of all the possible decoded bit-data sequences of the
genomic DNA. Therefore, even if the recorded information is partly destroyed, the original correct information
can be restored.
8. Thanks http://www.technovelgy.com
rinkoo (2009-07-28 19:58:53)
WHO ESPIED MY COMPUTER? (2009-08-02 15:33)
1. How many times would you be able to know who logged in or who used ur computer in your absence?NOt
much most of the times!!!An easy to ﬁnd out the details is a one liner solution......
2. So,here is the trick for that ..Simply type as given below in the RUN bar ie
Start - Run - TYPE eventvwr.msc
3. All details of login will be in front of your eyes.SIMPLE!!!!!!!
4. Thanks http://www.technotips24x7.co.cc/
FREE UPGRADATION - ONLY A TRICK!!! (2009-08-02 15:50)
1. This trick comes for those who wish to upgrade their processors in the respective computers for
free.......(only the name) 2. Start -> run -> type regedit.exe -> press ok 3. In registry editor -> HKEY
LOCAL MACHINE\HARDWARE\DESCRIPTIONlashSystem\CentralProcessor\0 4. On right Pane Se-
lect ProcessorNameString and change the value to Pentium 5 or as you desire!! Note: For those PC bugs
only who just use the machine and don’t worry of whats inside?Of course,they can be content with the
name they give....viz an old celeron be renamed to QUAD CORE......and so on!!!! 5. Thanks again to
SSDs vs HDDs : WHO is GOOD? (2009-08-05 00:59)
1. Oﬀ late few notebook manufacturer’s have been seen promoting their product for being the ﬁrst to
introduce SSDs. Now at the ﬁrst glance they really seem to be promising since they oﬀer less energy
consumption, less weight, no mobile parts and also oﬀer better speed in some ways than regular hard disk
drives. But the question is whether they are strong enough to deliver the performance through out their life
span. This puts a question mark????????????
2. If you have just bought a shiny new SSD, it isn`t likely to continue performing at blazing speeds after
some usage. An empty drive will always perform better than one written to. The good news is that after
an initial dip in performance, SSDs tend to level oﬀ. Even if they do drop in performance over time –
undercutting a manufacturer`s claims – consumer ﬂash drives are still vastly faster than traditional hard
drives, because they can perform two to ﬁve times the input/output operations per second of a hard drive.
Why does performance drop?
3. Unlike a hard disk drive, any write operation to an SSD requires not one step, but two: an erase followed
by the write. When an SSD is new, the NAND ﬂash memory inside it has been pre-erased. But, as data
is written to the drive, data management algorithms in the controller begin to move that data around the
ﬂash memory in an operation known as wear leveling. These algorithms are used to more evenly distribute
data across ﬂash memory so that no one portion wears out faster than another, which prolongs the life of
whole drive. Even though wear-leveling is meant to prolong the life of the drive, it can eventually lead to
performance issues. SSD performance and endurance are related.
4. Generally, the poorer the performance of a drive, the shorter the lifespan. That`s because the management
overhead of an SSD is related to how many writes and erases take place. The more write/erase cycles there
are, the shorter the drive`s lifespan. Consumer-grade Multi-Level Cell (MLC) memory can sustain from
2,000 to 10,000 write cycles. Enterprise-class Single- Level Cell (SLC) memory can last through 10 times the
number of write cycles of an MLC-based drive.
What Matters ?
5. ALGORITHM : A read-modify-write algorithm in an SSD controller will take a block about to be written
to, retrieve any data already in it, mark the block for deletion, redistribute the old data, then lay down the
new data in the old block.
6. Some manufacturers use algorithms that combine writes to more eﬃciently use NAND ﬂash memory
space; others use cache to store writes in order to lay them down more eﬃciently.
7. BUGS : Bugs Can Cause Slow-Downs, Too Intel`s X25-M SSD had a ﬁrmware bug that led to ma-
jor fragmentation problems that dropped throughput dramatically . But what`s clear is SSDs need more
development to address these long term performance issues.
8. Thanks PC WORLD!!!
Being BUSYYYYY (2009-08-15 10:05)
For last few days...have not been able to upload anything new since i have been busy with a real task on
hand......will get back soon....!!!
WiMAX - THE POWER (2009-08-27 22:29)
For so long ....may be about two weeks I have not been able to upload any posts on this blog...courtesy an
opportunity to slightly dig deep into WiMAX...and I am really happy to have ﬁnally got deeper into this.I got
to know about various Wireless Technologies and terms viz OFDM, MMDS, LMDS, Blue tooth,WiFi,EVDO,
the ’G’ family, HSPA, 802.16M, 802.20, Cable modem, broad band over power line, LTE, FTTH, spectrum
bands, base stations, CPEs, NOCs, EDGE,Gateways,Back haul links,Security aspects of WiMAX.....a lot of
learning...gr8888...will share brief on all these aspects in days to come....
Use KEYBOARD for MOUSE (2009-09-01 07:26)
1. This one is a small worth a look trick which you can use to impress anyone.This trick allows you to move
your mouse pointer using your keyboard ie Numeric keypad.
2. Press your left alt+shift+numlock in your keyboard to enable this feature.
3. Now press ok.
4. Use the keys 1, 2, 3, 4, 5, 6 7, 8, 9 of numeric keypad to move the mouse pointer.
5. To perform mouse click use the key 5
6. To perform double click use + sign.
7. To disable this feature click on NumLock.
8. Got this one from http://informativetipz.blogspot.com/
http://www.emailtheweb.com (2009-09-01 07:42)
1. Now even this one comes as a handy tool when you expect your friend to click a link for access to a
webpage.Now your friend may not be able to access the webpage for reasons like site not working that time
or site been crushed by the twin menace of malicious spam and malicious web pages and your email is crying
to be heard.
2. Now who on earth is worried about that page that did not open except you.I know none...except you....since
it is you who wish your link to be clicked
Instead of holding your breath waiting for your recipients to visit the web links you email to them, send the
web to them with EmailTheWeb.com
E mail a Web Page : http://www.emailtheweb.com/ (2009-09-01 07:53)
1. This one also comes as a pretty handy tool when u expect your friends to open a web page by clicking the
link you had sent to them on e-mail.It may open....and it may not open....the thing is ensured and guaranteed
if u use the feature given at http://www.emailtheweb.com/
2. A few advantages this will be able to ensure are :
- will saves your recipients time by not making them click a link to read your web page. For busy people,
this improves the likelihood that they will read the linked web page.
- All scripts and dynamic elements of a web page is stripped out. This protects your recipients from popups
and other annoying activity that may be malicious.
- Allows you to email a page to someone who doesn’t have access to the the web page (either because the
page was dynamically generated or the page is password-protected.)
- Today’s web is more dynamic than ever and web pages are changing all the time. By emailing the entire
web page, you ensure that your recipient is seeing the same web page as you÷even if the original web page
- Many people need to have a archive record of a web page and use.
3. I have tried the same and ﬁnd it pretty okay.....you need to have a new account or you can simply access
the same using your Google/Gmail account.
xB BROWSER (2009-09-04 23:34)
1. xB Browser is a free and open-source anonymous web browser in the world which is just a click away from
anonymous surﬁng right now! With xB Browser you can securely and anonymously surf the internet, and
bypass ﬁrewalls and website censorship. 2. The main advantage compared to other anonymous web browsers
is that xB Browser requires no conﬁguration or technical knowledge in order to achieve anonymity. xB
Browser is open-source so you can feel safe knowing what goes into our code. Additionally, it is even portable
on a USB stick . 3. xB Browser was previously known as Torpark. It does not store a cache on the user hard
drive, nor does it store cookies, so there is no mess to clean up with eraser programs. xB Browser also has
advanced features such as SSL MD5 RSA certiﬁcate vulnerability detection, DOM object and ﬂash cookie
protection,cross-site scripting attack prevention, user-agent cloaking, and java proxy control. xB Browser
also detects and disables malicious browser addons that are hidden in the windows registry. 4. I recently
downloaded the same from http://download.cnet.com/windows/3055-2144 4-10660326.html?tag=pdl-redir
and I am really impressed with the same......the only thing I got perturbed was with the speed.Having ridden
on chrome for over a year...the speed is not a match.It is about 45 Mb in size...isn’t that heavy...well any
way...CHROME rules still.
xB Browser - Makes you anonymous (2009-09-04 23:45)
1. xB Browser is a free and open-source anonymous web browser in the world which is just a click away from
anonymous surﬁng right now! With xB Browser you can securely and anonymously surf the internet, and
bypass ﬁrewalls and website censorship.
2. The main advantage compared to other anonymous web browsers is that xB Browser requires no conﬁgu-
ration or technical knowledge in order to achieve anonymity. xB Browser is open-source so you can feel safe
knowing what goes into our code. Additionally, it is even portable on a USB stick .
3. xB Browser was previously known as Torpark. It does not store a cache on the user hard drive, nor does
it store cookies, so there is no mess to clean up with eraser programs. xB Browser also has advanced features
such as SSL MD5 RSA certiﬁcate vulnerability detection, DOM object and ﬂash cookie protection,cross-site
scripting attack prevention, user-agent cloaking, and java proxy control. xB Browser also detects and disables
malicious browser addons that are hidden in the windows registry.
4. I recently downloaded the same from http://download.cnet.com/windows/3055-2144 4-
10660326.html?tag=pdl-redir and I am really impressed with the same......the only thing I got perturbed
was with the speed.Having ridden on chrome for over a year...the speed is not a match.It is about 45 Mb in
size...isn’t that heavy...well any way...CHROME rules still.
INTEL vs THE SEVEN SAMURAIs (2009-09-11 22:36)
1. The old story of 'MUTTHI MEIN TAQAT” has come up with a new version in the 21
century in the
form of SEVEN SAMURAI
2. Dysphoric with Intel`s dominance in the sector, the conglutination of processor designers and manufactur-
ers has teamed up to develop a revolutionary new microprocessor. The coalition is led by the recent merger
of NEC, Renesas , Hitachi, Toshiba, Fujitsu, Panasonic and Canon. Nickname for the group: THE SEVEN
3. The new microprocessor will be based on innovative energy-saving software. The ﬁnal, commercial CPU
will run on solar cells; it will be smart enough to use only as much power as is needed for the data being
processed at the time; and it will remain switched on even during power cuts. A prototype is reported to be
running at 30 percent of the power of current CPUs and remains ON even when mains power is cut. This
new standard, along with the CPU is likely to be introduced in 2012.
4. Come on ..come on brains of the world.ﬁght more with each other for consumers like us who wish to
get the best!!!!!!!!!!!
5. Thanks www.thinkdigit.com and http://www.osnews.com
SATA 1.0 vs SATA 2.0 vs SATA 3.0 : The hunger for speed (2009-09-11 22:49)
1. Today technology runs faster then u blink. Today when someone has not even come to terms from
IDE TO SATA 1.0 and when mostly have not even heard of SATA 2.0,in comes with a bigul siren SATA
3.0.YESSSSS!!!!with a whooping 6 Gb/Sec, and a range of new features for bandwidth intensive users, a much
rapider future lies ahead. SATA 3 is bound to increase the interface speed but to fully realize its potential
the viscera of a hard drive need to get quicker.
2. SATA 3 introduces changes including ”a new Native Command Queuing (NCQ) streaming command to
enable isochronous data transfers for bandwidth-hungry audio and video applications, better power man-
agement, and the connection mechanism for compact devices with connectors designed for the smaller 7mm
optical drives in laptops and a Low Insertion Force connector for 1.8-inch drives.
3. Thanks Digit again!!!!
PRINT A BATTERY : PRINTABLE BATTERY (2009-09-11 23:22)
1. Before I get into the meaning lemme tell you that this is again astonishing discovery.you can take a print
out of something as shown in ﬁgure and use it as a battery..I mean as a source of power.....read ahead to
2. A new type of low-power battery that does not require a case and is thin enough to be printed on paper
is all set to venture on ur laps and desktop tables.The power source relies on an undisclosed mixture of
chemicals to produce 20 milliamp-hours at a terminal voltage of 1.5 volts for every square centimetre that is
printed. The battery material is roughly 0.5 millimetres thick and would, if mass-produced, cost just a few
cents per square inch, according to Israeli-based company Power Paper.
3. The subject battery has been developed by a team led by Prof. Dr. Reinhard Baumann of the Fraunhofer
Research Institution for Electronic Nano Systems.
4. As this is a printable battery so the characteristics of this battery diﬀer signiﬁcantly from those of
conventional batteries. As the name suggest it must have very less weight.It weighs less than one gram on
the scales, is not even one millimeter thick and can therefore be integrated into bank cards.It’s voltage is 1.5
V, which is general.The battery weighs less than one gram on the scales, is not even one millimeter thick
and can therefore be integrated into bank cards, for example. The battery contains no mercury and is in
this respect environmentally friendly. Its voltage is 1.5 V, which lies within the normal range. By placing
several batteries in a row, voltages of 3 V, 4.5 V and 6 V can also be achieved.
5. It is composed of diﬀerent layers: a zinc anode and a manganese cathode, among others. Zinc and
manganese react with one another and produce electricity. However, the anode and the cathode layer
dissipate gradually during this chemical process. Therefore, the battery is suitable for applications which
have a limited life span or a limited power requirement, for instance greeting cards
6. The new battery consists of three diﬀerent layers. It has conventional zinc manganese-dioxide components
as anode and cathode. Sandwiched in between, the cell’s chemical power source remains a closely guarded
7. Paper Power claims the material is non-toxic and non-corrosive, making the battery safe to use without
casing.”Technically it will work like any other battery, but you can cut the battery into any size and shape
for your product.”
8. Thanks www.newscientist.com,Digit.
HOW IS UR FAVORITE USB MADE? (2009-09-11 23:40)
WORTH A DEKKKO
EXTERNAL DRIVES : ARE THEY REALLY FAST? (2009-09-21 19:38)
1. When one goes for buying a external hard disk,how important is for him/her to give due importance to
speed that is mentioned as spec....like 7200 rpm and 5400 rpm?Does it really matter in this case?
2. Well not much and as a matter of fact the diﬀerence is ZERO = NULL = NIL.The faster the hard
drive ,the better : this generally stands true for the internal drives that remain connected to IDE/SATA.In
most of the cases pertaining to external drives the interface of connectivity is none other then USB which
is signiﬁcantly slower equated to SATA/eSATA/IDE on any day.USB drives at the most support a transfer
speed of 33-37 MB/s...and thats all...whether u connect a 5400 rpm or a 7200 rpm..
SUBMARINE COMMUNICATIONS : IT HAS BEEN TOUGH (2009-09-21 21:33)
1. Ever wondered how the internet and communications right from telgraph days has been working across
the globe?Everi one knows the technology behind these terms...but ever wondered how the same has been
estabilished.I will not dig deep...the pictures below will make it amply clear...one pic shows the layout of
submarine wires in the year 1901 and the other shows the OFC layout in the year 2005.......it would have
taken amazing human eﬀort.....salutes to the manpower that had been behind all the tough work.....HATS
2. Wanna get some light on the cost aspects? Cables with 10Gbps bandwidth were laid at a cost of $27000
per KM...thats right...per KM.....now do the calculations for the approx length.......
LIGHT PEAK TECHNOLOGY : INTEL (2009-09-24 16:17)
1. Your internet connection at home and oﬃce would be happy biting at 10 or 100 Mbps, how about being
able to get upgraded to 100Gbps over the decade! yes...INTEL has thrown some light on this vide the new
Light Peak technology that uses light instead of electric signals to transmit data, meaning faster speeds,
smaller cables, and less signal loss. The subject technology is already in use in data-centers, but has not
been able to gate crash into mainstream computing yet.
2. In the coming year Intel plans to release this technology for use in consumer devices and mainstream
computing, for the ﬁrst time giving people the taste of transfer speeds up to 10Gbps. Light Peak is the
code-name for a new high-speed optical cable technology designed to connect electronic devices to each other
while allowing high bandwidth starting at 10Gb/s with the potential ability to scale to 100Gb/s over the
3. Light Peak consists of a controller chip and an optical module that would be included in platforms
supporting this technology. The optical module performs the conversion from electricity to light and vice
versa, using miniature lasers and photo detectors.
4. Since this as optical technology, multiplexing multiple connections over a single cable will be much simpler,
and thus a single cable cold be used to connect your computer to multiple ”peripherals, workstations, displays,
disk drives, docking stations, and more.”
5. Light Peak is designed to be cheap, and in fact claims to be smaller and cheaper than current telecom
modules. The Light Peak optical modules are up to 120 times smaller and up to 30 times cheaper than
current telecom modules! The optical ﬁbres used in it are in fact nearly as thin as human hair, and use
LASER chips called VCSEL (Vertical Cavity, Surface Emmiting LASER) which are a mere 250 microns by
6. Comeeeeeeeeee ON....what r we heading for in next 50 years....our generation is the lucky one to see all this
quick transition from ﬁles,postman to emails and Light peak transfer rate.No other generation other then the
present one would see this diﬀerence....kids today are born without seeing a postman in their galiiiii....born
with computers and laptops in hands of ma and pa..
7. Thanks DIGIT & www.engadget.com
MORRO : THE MICROSOFT SIDE OF ANTIVIRUS (2009-09-24 22:29)
1. Impregnable news is coming in that Microsoft is ready to launch its free anti-virus software called Morro for
personal computers. This is a huge competition in making for security software leaders like Symantec Norton
Antivirus and McAfee Anitvirus software.To address the growing need for a PC security solution tailored to
the demands of emerging markets, smaller PC form factors and rapid increases in the incidence of malware,
Microsoft Corp. plans to oﬀer this to the new consumer security oﬀering focused on core anti-malware
2. Code-named 'Morro,¨ this streamlined solution will be available in the last quarter of 2009 and is likely
to allow comprehensive security from malware including viruses, spyware, rootkits and trojans.
3. The surprising news is that Microsoft isn’t bundling Morro with Windows.Currently in beta testing, it
was available for download to the ﬁrst 75,000 people in the United States, Israel, People’s Republic of China
4. Morro¨ will take advantage of the same core anti-malware technology that fuels the company`s current line
of security products, which have received the VB100 award from Virus Bulletin, Checkmark Certiﬁcation
from West Coast Labs and certiﬁcation from the International Computer Security Association Labs.
5. 'Morro¨ will be available as a stand-alone download and oﬀer malware protection for the Windows XP,
Windows Vista and Windows 7 operating systems. When used in conjunction with the ongoing security and
privacy enhancements of Windows and Internet Explorer, this new solution will oﬀer consumers a robust,
no-cost security solution to help protect against the majority of online threats.
6. Microsoft in an open source mooood!!!!!!!!!!
SECURITY ESSENTIALS : NO MORE ”MORRO” (2009-09-30 20:22)
1. So it has been launched ﬁnally after a long wait...a few debates...a few hues and a not so lots of pub-
licity....the microsoft antivirus ”SECURITY ESSENTIALS”. I downloaded it today and saw thats it is veri
light at least as on date and has been able to capture the regular worms and malwares that were present in
2. One problem for most of the Hindustani’s......it only works on genuine microsoft windows....since prior
to installation it checks if you have a genuine windows...if NOT ..then it comes out in between installation
without procedding ahead....
DUAL SCREEN CAMERA : SAMSUNG ST 550 & ST 500 (2009-09-30 20:34)
1. Earlier I had discussed about one dual screen laptop....then we all know about big touch screens on mobiles
in so many versions,shapes and sizes.Ever wondered what purpose would a dual screen serve in a typical
digital camera.Just scroll down and see the pics to get the concept...i am sure u will appreciate it!!!!
2. Delivering an unrivalled user experience, the 1.5 inch LCD screen located on the front of the camera now
allows consumers to take ﬁrst-rate photos by themselves in addition to the one who is busy clicking.
3. Thanks http://www.samsung.com/sg/news/newsPreviewRead.do?news seq=14419
THE FUTURE OF OSs : MICROSOFT VERSION (2009-09-30 22:08)
1. Microsoft’s involvement in playing a key role in the ﬁeld of future operating systems can be gauged from
the fact deciphered below in successive paragraphs.
2. So when Microsoft tries working on the futuristic versions of operating systems...the sur-
prise is that windows does not come in the discussion....windows is out...yessss!!!it is terms like
MIDORI,SINGULARITY,BARRELFISH,HELEOS.....the names must be sounding french to people like
me....just read ahead!!!
3. Midori based on their Singularity operating system research project is an experimental operating system,
in which all code, even device drivers, and the kernel itself are written in managed code, making the operating
system much safer. The operating system also has a large focus on concurrency.Midori is in incubation, which
means it is a little closer to market than most Microsoft Research projects, but not yet close enough to be
available in any kind of early preview form to users.
4. Barrelﬁsh, an OS written speciﬁcally for multicore environments. It hopes to improve the performance of
boxes with such chips by creating a network bus and calls itself a multi-kernel operating system. Its focus is on
leveraging the increasing number of cores in desktop processors. The mainstream operating systems today,
Windows, and Linux, have both been designed for single-core computers, with multi-processing support
added on later.
5. The Barrelﬁsh project instead tries to redeﬁne the entire operating system keeping in mind that multi-core
is here is stay. Today we have dual-core, quad-core, and even hexa-core, but given a decade, we may be
looking at hecto-, kilo-, or even mega-core computers! These will require a rethinking of the very organization
of the operating system.
6. Barrleﬁsh does just that. It treats the multi-core processor environment as a collection of networked
processor cores, and applies the concepts used with distributed computing to manage the execution of the
computer’s processes. This has the eﬀect of making the system much more scalable. An interesting part of
this approach is also
that the processor cores need not be homogeneous! The multiple kernels could all be running on processors
of diﬀerent architectures, one kernel might be executing on an ARM, while another on a x86, and a third on
7. Heleos, another research OS in MS labs and their latest revelation, takes the concept of heterogeneous
multiprocessing further, and introduces ”satellite kernels”.It explains that current operating systems are
designed with a homogeneous running environments in mind. For this reason, an operating system is written
for either an IA64, or an x86, or a PPC, or an ARM platform, however it cannot leverage all of them.
Our computers however are no longer homogeneous. We have CPUs and GPUs of diﬀerent architectures,
each with multiple cores. The GPU is highly optimized for a vector processing, and has an architecture
which vastly diﬀers from that of the CPU, with a completely diﬀerent instruction set and performance
8. The Helios project introduces satellite kernels, which essentially presents the developers with a ”sin-
gle,uniform set of OS abstractions across CPUs of disparate architectures and performance characteristics.”
This satellite kernel is a micro-kernel, and runs all other services and drivers in individual processes.
9. With Singularity and Barrelﬁsh both available as open source releases, it seems Microsoft might just be
headed for a more open future.
10. Thanks DIGIT and Microsoft for the updates.
RADIATION EFFECTS & UR MOBILE - QUANTIFIED (2009-10-01 20:22)
1. We all hear about how the radiations emitted from our mobiles keep eﬀecting us on the wrong side..but
what are the speciﬁcations laid down for quantiﬁcation of these eﬀecting variables? What are these variables
?How much do they eﬀect us? Do separate mobile handsets eﬀect us in diﬀerent ways?Are their any safe
limits in these? What are the available standards?
2. The ﬁrst and the most signiﬁcant variable is the Speciﬁc absorption rate (SAR) , a measure of the rate
at which energy is absorbed by the body when exposed to a radio frequency (RF) electromagnetic ﬁeld.
It is deﬁned as the power absorbed per mass of tissue and has units of watts per kilogram. SAR is usually
averaged either over the whole body, or over a small sample volume (typically 1 g or 10 g of tissue). The
value cited is then the maximum level measured in the body part studied over the stated volume or mass.
3. SAR is used to measure exposure to ﬁelds between 100 kHz and 10 GHz. It is commonly used to measure
power absorbed from mobile phones and during MRI scans. Few speciﬁcations of good and bad mobiles as
found rated from TOI site at their INFOTECH tab are shown below with details :
SAMSUNG IMPRESSION : GOOD
Maximum radiation: 0.35 Watts per kilogram (W/kg) (based on reported radiation level when held up to
SAR when held at the ear: 0.35 W/kg
SAR when worn on the body: 0.83 W/kg
MOTOROLA RAZR V8 : GOOD
Maximum radiation: 0.36 W/kg
SAR when held at the ear: 0.36 W/kg
SAR when worn on the body: 0.86 W/kg
SAMSUNG SGH-T229 : GOOD
Maximum radiation: 0.38 W/kg
SAR when held at the ear: 0.38 W/kg
SAR when worn on the body: 0.69 W/kg
MOTOROLA MOTO VU204 : WORST
Maximum radiation: 1.55 W/kg
SAR when held at the ear: 1.55 W/kg
SAR when worn on the body: 0.58 W/kg
BLACKBERRY CURVE 8330 : WORST
Maximum radiation: 1.54 W/kg
SAR when held at the ear 1.54 W/kg
SAR when worn on the body 0.99 W/kg
4. United States: The FCC requires that phones sold have a SAR level at or below 1.6 watts per
kilogram (W/kg) taken over a volume of 10 gram of tissue while European Union specify SAR limits within
2 Watts/kg taken over a volume of 10 gram
5. So next times some one asks you or even mentions about radiation eﬀect of mobiles on health..just make
the aspect more clear of weather of not his/her mobiles in meeting the S.A.R norms or not?
6. Thanks Wiki,Tech gadgets and TOI.
MY WINDOWS 7 HOUSE PARTY PACK : THANK YOU MICROSOFT
1. Two months back I had registered to host a house party on the occasion of launch of WINDOWS 7 ...the
next generation windows OS after answering a few FAQs on Windows 7 without realising that I would end
up as a winner of the signature edition of the house party pack including the original Windows 7.I got the
conﬁrmation from microsoft two weeks back......still then I had thought of it being some spam mail....till I got
the tracker ID from DHL....so since last two weeks have been waiting to get that pack of Windows 7....and
ﬁnally today I got the pack today......and it looks like this .......grrrrrrrrrrrrrrrrrr8...thanks Microsoft for the
dabba.....so happy to use a genuine edition of a Windows OS for the ﬁrst time!!!!!ha ha ha!!!!that to on my
name direct from the US of A.
anand (2009-10-06 06:55:19)
Amsang (2009-10-07 23:37:08)
in the ﬁrst photo who is the one on the left
NIKON S1000PJ : DIGITAL CAMERA WITH INBUILT PROJECTOR
1. The thing that was till now thought of as futuristic has ﬁnally arrived...and that too at a reasonable and
worthy price....the title says it all...DIGITAL CAMERA with a inbuilt PROJECTOR.
2. The ﬁrst one to attempt this and allowing the consumers to exploit this is NIKON...vide model NIKON
S1000PJ as shown in pic and video below.
IEDig.com (2009-10-18 12:26:27)
I would like to invite you to join blogging Social Networking
which helps you to get more visitors to your blogs and you get the chance
to meet other celebrity bloggers.
1 MBPS BROAD BAND CONNECTION : HUMAN RIGHT IN FINLAND
1. If there was any further proof needed of how much the Internet is aﬀecting human lives and can help
enrich it, just look towards Finland. The country has become the ﬁrst in the world to make broadband
Internet access a human right, making us consider whether we should move there or not.
2. The Ministry of Transport and Communications has stated that starting next July, every person in
Finland will have the right to a one-megabit broadband connection. That`s right, 1Mbps. And here in India,
we start jumping around when the same is oﬀered for upwards of Rs. 1,500.
3. The biggest kicker, though, is that in another six years, the Finnish government wants to make 100Mbps
speeds the mandatory minimum for all its 5.5 million citizens. Granted, that`s a small population, but it
still throws a poor light on almost all other governments across the world.
4. And yes, some variations of the above will be allowed if connectivity can be managed on mobile phone
5. It`s unfair to compare India to Finland, given the gross discrepancies, but doesn`t this make your blood
boil? There`s hardly any broadband penetration in India, Internet speeds are a joke and let`s not even get
started on 3G.
6. Thanks Indiatimes.com for the info
KINDLE : WELCOME TO INDIA (2009-10-25 20:34)
1. Kindle has ﬁnally reached the shores of Hindustan.For those of you,who are puzzled of what KINDLE is
all about what be able to judge a fair idea from the pics below.An e book storage and reading device.
2. Capable of wirelessly downloading books, magazines, newspapers and personal documents ,the Kin-
dle screen has no backlight, so it doesn’t give
out the glare a normal screen would. The navigation is fairly simple and all the text content is custom
3. The device features a 2,50,000 word dictionary that can be accessed independently to look
up a word, or from within text. It can also play MP3 but the quality of sound takes rating
this on the back foot.The battery life that comes due to the electronic ink display. On a single
charge it can last up to two weeks without the wireless network on. And 2-4 days with wireless!
4. Indian users can avail of a catalogue of 2,80,000 books, each downloaded in about a minute over 3G GSM
or EDGE. There are no data charges for downloading a book, the service for which is provided globally by
AT &T and its international partners.
5. Kindle is weighs around 290 grams, almost the weight of advanced mobile phones. The display speciﬁca-
tions include 6' diagonal E-Ink® electronic paper display, 600 x 800 pixel resolution at 167 ppi, 16-level gray
scale. The Kindle oﬀers 2Gb of Memory Storage though 1.4Gb would be available to the user and they dont
have to connect it to a PC if they need to transfer ebooks because it has inbuilt 3G connectivity & Wi-Fi
6. However, the Kindle does not have any sort of content ﬁltration or rating system, so there is the risk of
mature content being easily accessible to minors. So, will the Kindle tinkle in India? Well a few things go
against it. First is the price tag .sources put it at about Rs 20,000/-.
7. Thanks www.thinkdigit.com and www.amitbhawani.com for info.
RDM : Rival for BLU RAY? (2009-10-25 22:09)
1. Even before Blu ray product’s have been able to reach the consumer,a new rival by the name of RDM(...in
short for Royal Digital Media) has come out with HD VMD(Versatile Multilayer Disc) and CH-DVD(China
Blue High-deﬁnition Disc) – all set to tittupp into town to challange BLU Ray. Royal Digital Media has
introduced its bona ﬁde Blu-ray rival... while casually forgetting to name it. These ”high-deﬁnition discs”
will be able to store up to 100GB and will boast military-grade encryption. RDM’s format ”will transform
perceptions of high-deﬁnition,” as it is able to ”display the next generation of high-deﬁnition: 1920p.”
2. DreamStream is the ﬁrst company to implement a 2,048-bit encryption in consumer media. AES encryp-
tion, used in Sony’s Blu-ray discs, relies on only a 128-bit system.
3. For consumers, RDM’s increase in storage capacity allows for a single disc to hold approximately four
hours of video content at 1920p resolution.
4. Because RDM’s system is based on inexpensive red laser technology, their players are expected to sell for
much less than Sony’s, which routinely sell for hundreds of dollars. The retail prices for RDM’s players and
discs are expected to ”equal those of the traditional DVD format, greatly undercutting Blu-ray,” .
5. RDM’s technology can be implemented into existing DVD production processes through the integration
of a proprietary software and ﬁrmware system. The only potential hardware modiﬁcation is, ”at most, the
simple replacement of a single chip,” said Levich. As such, existing DVD manufacturers will be able to
integrate RDM’s technology with only minor modiﬁcations to their production processes.
6. RDM’s players are backwards compatible and able to read traditional CDs and DVDs. Moreover, an
innovation in data processing enables RDM’s players to ”drastically enhance the playback quality of regular
DVD content,” said Diebel.
7. The incorporation of DreamStream’s encryption into RDM’s system will thwart the piracy of digital
content. The content of RDM’s discs will only be able to be read by RDM’s players. Thus, ensuring that the
content cannot be copied and illegally distributed. Will it really?....so many claims till date on such issues
have been found cracked a day after launch.well for now ALL THE BEST for the new BLU ray rival.
8. Thanks http://dreamstream.info
D-ROLL : No end to imagination (2009-10-26 21:23)
The tashan of modern gadgets which apart from being fashionable are getting smaller, slimmer ,sleaker and
smarter day by day . And the latest creation to catch eye is 'D-roll¨ or 'digital roll,¨ the new device works
like a regular laptop, but rolls up to be a side bag or even a backpack for easy transportation. Designed like
an artist`s tube, the D-roll Laptop features a roll up OLED screen and a slide out keyboard, together with
a mouse and a detachable webcam that can be worn on your wrist when not attached to the system. The
mouse and web camera can also be used as the end caps for the laptop case, while the straps double as ports
to plug in your USB devices.
Green Dam Youth Escort : What’s that? (2009-11-06 06:25)
1. The title suggests that it has got something to do with college unions doing thier bit contribution in saving
some water or ﬁghting over some water dam issue.But its nothing like that.It is the name of a ﬁrewall which
is a ﬁrst of its kind oﬃcial government imposed content-control software developed in the People’s Republic
of China (PRC). Under a directive from the Ministry of Industry and Information Technology (MIIT) , it is
mandatory to have either the software, or its setup ﬁles accompanied on a compact disc or pre-installed on
all new personal computers sold in mainland China, including those imported from abroad.
2. The ﬁrewall software is to be made a mandatory pre-requisite for new computers sold in the country,
as a meaure to help stamp out pornography and other vile elements on the Web. The move thus has been
widely criticised by industry groups and oﬃcials as rash, politically intrusive, technically ineﬀective and
commercially unfair.Few of the features of the software are enumerated below :
• Designed to work with Microsoft Windows operating systems,the software is speciﬁcally aimed at
restricting online pornography but could be used for other purposes.
• Green Dam Youth Escort automatically downloads the latest updates of a list of prohibited sites from
an online database, and also collects private user data.
• Green Dam recognizes pornographic images by analyzing skin-coloured regions, complemented by hu-
man face recognition. The software is incapable of recognizing pictures of nudity featuring black- or
red-skinned characters but sensitive enough to images with large patches of yellow that it censors
promotional images of the ﬁlm Garﬁeld: A Tail of Two Kitties.
• The software’s misrecognition of ”inappropriate contents” in applications including Microsoft Word can
lead it to forcefully close those applications without notifying the user, and so cause data losses.
• The software runs only on Microsoft Windows x86, so Microsoft Windows x86-64, Mac and Linux users
are ignored. Even on Microsoft Windows, the software is known to interfere with Internet Explorer
and Google Chrome, and is incompatible with Mozilla Firefox.
• Some computers sold in China already come with parental-control software, but it isn’t government-
3. The latest good news for the chinese people is that for the time being the compulory shipping and
installation by the user has been put on hold.
4. Thanks http://www.circleid.com and oﬀ course wiki like always!!!!
LAPTOP Face Recognition falls FLAT!!!! (2009-11-26 08:00)
1. Now this is one interesting thing to read.All those claims by Saif Ali Khan in his ad promoting one company
for face recognition feature introduction had made its way out of the IT World.....well....so it seems!!!!read
2. Experts from Bkis Internet Security in Vietnam have proven how easy it is to defeat this.In front of
technology experts, authors and press representatives from diﬀerent countries participating in an internet
security conference, Bkis experts demonstrated the vulnerabilities in Face recognition function on Asus,
Lenovo and Toshiba laptops. Even when set at the highest security level, the laptop could not prevent Bkis
expert Mr Nguyen Minh Duc from breaking into the system. With some technical tricks, Duc in turn logged
onto Asus, Lenovo and Toshiba computer at the amazement and continuous applause from the audience.
Everyone was really surprised to see how a famous and trusted security technique could be broken so easily.A
Pic is shown below from actual demo loc.In some cases,even the owners of Facebook proﬁle photo could be
printed and used.
3. What the researchers found is that the technology just isn’t that hard to fool. Even photographs that
have previously been digitized and distributed, like those on Web pages or transmitted through videophone
conversations, will do the job.The model exploits the ﬂaw in image processing. In other words, it uses a
photo of a person instead of his/her real face. It works because the algorithms will process in eﬀect digital
information.Provided those conditions, an attacker might take some photos of one user within the system,
perform some image editing, regenerate 'special pictures¨ and penetrate into the system. 4. Now the worry
point is that Biometric data, including facial recognition, is increasingly being built into passports, drivers
licenses and other forms of ID. Australia and Germany both use facial recognition to control access and
determine identity at border crossings, and the U.S. and other countries are moving in that direction.
So....ab kya hogaaaa? 5. Thanks http://www.examiner.com,http://www.bkis.com and Chip magazine.
Darin (2009-11-30 20:25:30)
Certainly the tested implementations of facial recognition have their issues and it’s good to know about them. That’s
a far cry, however, from saying that ALL implementations have the same weaknesses. There’s a very strong version
from Sensible Vision/Dell Computers, for example (NOT evaluated by the researchers...interesting), that not only
has very strong photo resistance, but also a very straight forward second factor feature that all but resolves the issue
It also takes a bigger picture look at security by locking the desktop automatically when you walk away...a wide open
desktop being a much bigger threat than a brute force photo attack since ”hacking” an already open machine doesn’t
require any skill, eﬀort or time at all...just physical proximity!
Of course no solution is perfect or ever will be. Given enough time and physical access, absolutely any security can
by bypassed. It’s really a matter of picking the right tools to make this as diﬃcult as possible given the threats likely
to be faced while still keeping the computer easy (or at least not too much more diﬃcult) to use in the process.
Full disclosure - I have worked for Sensible Vision for quite some time now. We’ve successfully used this technology
for several years already to protect security critical PCs in hospitals, banks - even a maximum security prison. The
new consumer Dell platform is based on the same technology.
Here is a link to our online response to this testing. http://www.sensiblevision.com/company/releases/2-24-09.htm
ANUPAM (2009-12-01 10:33:33)
thanks for the invaluable comments darin
Google Binged!!!! - My 100th Post (2009-12-13 01:00)
1. For so many days wanting to upload some post but just could’nt ﬁnd anthing so interesting before I read
2. From the time Bing was introduced and pitted against arch rival Google,there have been talks and forums
across proving each others superiority over each other.Now for the ﬁrst time some one Big has come up with
this.....it follows down..please read!!!
3. A Mozilla oﬃcial today advised Firefox users to the extension that adds Microsoft’s Bing to the list of
the browser’s search engines after Google’s CEO downplayed consumers’ privacy concerns.
4. Citing a clip from a CNBC broadcast shown below, during which Google chief executive Eric Schmidt
discussed online privacy, During the interview, Google chief executive Eric Schmidt was asked: ”People are
treating Google like their most trusted friend...should they be?” It was Schmidt’s answer that motivated
Dotzler to show users how to drop Google, Firefox’s default search engine, for rival Bing.
”IF YOU HAVE SOMETHING THAT YOU DON’T WANT ANYONE TO KNOW, MAYBE YOU
SHOULDN’T BE DOING IT IN THE FIRST PLACE,”SCHMIDT TOLD CNBC. ”IF YOU REALLY NEED
THAT KIND OF PRIVACY, THE REALITY IS THAT SEARCH ENGINES, INCLUDING GOOGLE, DO
RETAIN THIS INFORMATION FOR SOME TIME AND IT’S IMPORTANT, FOR EXAMPLE, THAT
WE ARE ALL SUBJECT IN THE UNITED STATES TO THE PATRIOT ACT AND IT IS POSSIBLE
THAT ALL THAT INFORMATION COULD BE MADE AVAILABLE TO THE AUTHORITIES,”ADDED
5. Asa Dotzler, Mozilla’s director of community development, then on provided a link to the Firefox extension
that adds Bing to Firefox’s search engine list.
6. Google chief executive Eric Schmidt would be now trying to undo his statement in some form but the
arrow has been shot..and the dent on the google is seen..so googler`s Be ware now on!!!!!!
7. Thanks http://www.computerworld.com
Y2K Bug!!!!Do u remember the time? (2009-12-28 22:12)
1. I was just wondering about the time when the much-hyped Y2K crisis had come in with a long, sustained
roar and went out with a mewl.While the world excogitated dire predictions of massive global infrastructure
failures – everything from elevators to air traﬃc control systems was rumored to be vulnerable , the specter
of a total paralysis of business operations resulting from cascading Y2K failures galvanized organizations
into a frenzy of activity. For many CIOs, the unprecedented size and scope of addressing Y2K problems was
the biggest project of their careers.
And then it was over. On Dec. 31, 1999, the world held its breath and nothing happened. Jan. 1, 2000
came in just like any other day. There were no major failures to report anywhere.
2. Today after 10 years....I feel the time has just rolled like a ball....so quickly we are a decade ahead of that
night....the night that was a wakeup call for every one who felt that there is no need of IT then....the night
that showed how heavily we r banked on the IT......
3. Thanks to http://www.computerworld.com for making me remember that.
BIDI makes LCD touchscreen A PASSE past (2009-12-30 07:49)
1. This is deﬁnitely going to be some thing new for most of the readers.....the following article makes the
present touchscreen a PASSEE by introducing the BIDI.
2. The BiDi Screen is an example of a new type of I/O device that possesses the ability to both capture images
and display them. This thin, bidirectional screen extends the latest trend in LCD devices, which has seen the
incorporation of photo-diodes into every display pixel. Using a novel optical masking technique developed at
the Media Lab, the BiDi Screen can capture lightﬁeld-like quantities, unlocking a wide array of applications
from 3-D gesture interaction with CE devices, to seamless video communication.The BiDi Screen uses a sen-
sor layer, separated by a small distance from a normal LCD display. A mask image is displayed on the LCD.
When the bare sensor layer views the world through the mask, information about the distance to objects in
front of the screen can be captured and decoded by a computer. 3. This allows a typical LCD screen working
by interpreting hand gestures, without touching the screen.This allows viewers to control on-screen objects by
waving their arms in the air without touching the screen, let alone a mouse or keyboard.Although users can
touch the screen to activate controls on the display but as soon as they lift their ﬁnger oﬀ the screen, the sys-
tem can interpret their gestures in the 3-D.
4. ”This is a level of interaction that nobody’s ever been able to do before,” New Scientist quoted Ramesh
Raskar at the Massachusetts Institute of Technology Media Lab, as saying.The screen - dubbed BiDi, short
for bi-directional - allows users to manipulate or interact with objects on the screen in three dimensions.
5. It will also function as a 3D scanner, he adds. ”If you spin an object in front of screen, the software
will stitch together a 3D image.”The new system uses an array of optical sensors that are arranged behind
a grid of liquid crystals, similar to those used in LCD displays. They physically control how much light
passes from the display’s backlight.In the new system a regular grid of hundreds of pixels spread across the
screen use their liquid crystals to create a tiny hole that acts as a pinhole camera lens, focusing an image
of the scene in front onto a thin translucent ﬁlm a few centimetres behind the LCD. 6. Those images are
detected by a camera inside BiDi, allowing the device to know what is happening before it. 7. Thanks
http://infotech.indiatimes.com and http://web.media.mit.edu/ mhirsch/bidi/
2010 (2010-01-01 06:38)
This number is not to be connected with any Microprocessor or any IT equipment......this comes to wish you
all a VERI
HAPPY NEW YEAR 2010
HP in the racists scoooop!!! (2010-01-08 06:34)
1. Phenominal is the pace at which the IT Sector is growing and Interesting are the ways in which few errors
happen one of which I am mentioning down.....
2. The issue has attracted worldwide attention this month, when a US Black man known as ”Black Desi”
posted a YouTube video that showed his HP webcam built in to its new computers refusing to track his face
but on the other hand it could do so just ﬁne for his white friend Wanda.Titled ”HP computers are racist”,
the YouTube video quickly attracted more then 500,000 hits and showed Black Desi’s webcam working as it
should when his work colleague ”White Wanda” stepped in front of the camera, but when ”Black Desi” got
in front, no face recognition took place.
3. What does HP have to say about it?
”We thank Desi, and the people who have seen and commented on his video, for bringing this subject to our
attention,” it said in a blog on its help page.
”The technology we use is built on standard algorithms that measure the diﬀerence in intensity of contrast
between the eyes and the upper cheek and nose. We believe that the camera might have diﬃculty ’seeing’
contrast in conditions where there is insuﬃcient foreground lighting,” the blog added.
4. So what would have happened is like this !!!!!HP would have conducted all QC tests in their labs which
in all probablity would have involved only the whites......HP by now mut have enrolled few Blacks for better
QC of their products in their labs......well that was just in good humour....
5. To errrrrr is human.....and to IT errrrr is HP.
DUAL SCREEN LAPTOP : Another attempt by (2010-01-08 07:25)
Charge cell phones by using Radio-Waves (2010-01-10 10:44)
1. Here comes another ﬁrst from NOKIA...no more charging from your mobile chargers...no more that last
minute search to ﬁnd that hidden mobile charger....now charge from a mixture of 78.03 % nitrogen, 20.99 %
oxygen, 0.94 % argon, 0.03 % carbon dioxide, 0.01 % hydrogen, 0.00123 % Neon, 0.0004 % helium, 0.00005
% krypton, 0.000006 % xenon or more simply AIR!!!!!!
2. Nokia says that in a few years time, they will be able to charge cell phones by utilizing close radio waves.
This conniving and shaking up technology could lead to brobdingnagian reductions in energy demand if
every cell phone could pull a charge of juice out of thin air.
3. Researchers at the Nokia Research Centre in Cambridge in the UK are working hard on a technology that
can harvest small amounts of energy from ambient radio and TV waves. The cell phone would pick up radio
wave frequencies as low as 500 megahertz up to 10 gigahertz, which includes television broadcasts, microwave
ovens, mobile phones, wireless LAN, bluetooth, GPS, and two-way radios. In theory, two circuits would be
capable of receiving and then converting the free energy to an electrical current to charge the battery of a
4. Hopefully, it would be enough energy to keep the phone charged in standby mode; although at ﬁrst it
won`t be adequate to charge the phone while in use, or to full battery capacity. So far, the device can collect
up to 5 milliwatts of power, and the short term goal is to collect 20 milliwatts of power, which is just enough
to keep the phone charged in standby mode. Ultimately, 50 milliwatts of power would be ideal and could
help slowly recharge the battery.
5. This technology could be applied to other electronic equipment as well. Radio waves could be used to
charge MP3 players, handheld devices, Kindles, portable game players, etc. Nokia isn`t relying on this type of
technology alone to power their phones, they are also looking at integrated solar cells to work in conjunction
with this new development. Deployment of this feature in Nokia phones is still at least 3 years away. We`ll
be standing by with our waning cell phones waiting for word.
6. Thanks http://technochest.com
When EARS Speak!!! (2010-01-11 19:25)
1. Do you any of the following :
(a) That your ears make sound?
(b) That these are know as otoacoustic emissions?
(c) That this has a biometric angle?
(d) That any two persons always have diﬀerent otoacoustic emissions?
2. I am sure most of you don’t because the exploitation of this fact has been recently discovered.Although it
has been known from quite some time, that our ear makes sounds of its own, sometimes due to a scientiﬁc
principle called otoacoustic emissions1, other times in protest to the loud music we listen to. In either case,
the sounds are too weak to detect using normal microphones.Although scientists knew about these sounds
since the 1940s, it was only with improvements in microphone technology in the 1970s, that it became
possible to detect these otoacoustic emissions (OAE).
3. Recently though it has been suggested that such sounds may in-fact be used for biometric security devices
of tomorrow. The variations in each person’s OAE can be used as a metric for determining one’s identity.
The technology is as simple as a microphone!
4. A good enough microphone embedded in any device can be used to detect these sounds, and accordingly
conﬁrm ones identity, and be eventually used by banks to conﬁrm the identity of a person over the phone,
or by the phones themselves before they allow someone to make a call!
5. So for example,as on date when u speak to a customer service at a bank...u r supposed to tell you
DOB,Phone number or street address for veriﬁcation before you actually demand a solution to your account
query...not so will be required in near future...wherein your phone set will be able to detecty the sound in
your ear and verify your identity...nothing to memorise....plain simple unique identiﬁcation.
6. Otoacoustic emissions can be clinically important as they are the basis of a simple, non-invasive, test for
hearing defects in newborn babies and in children who are too young to cooperate in conventional hearing
7. The good thing is that dead people do not emanate otoacoustic emissions.So unlike Hollywood
movies...wherein a cut thumb or extracted eye have broken the identity procedures...this one won’t....
The ALT key Combos (2010-01-13 07:22)
Nothing new for those who are conversant with the special characters used in combination with the ALT
key.Following is a small summary i could manage from technochest...for those of you who do not understand
the use of such characters......they are of crucial signia in the world of PASSWORDS......got that!!!!!!
Alt +0162 = ¢ , Alt +0163 = £ , Alt +0165 = ¥ , Alt + 0128 = C
Alt +0169 = © , Alt +0174= ® , Alt + 0153 = " , Alt + 0161 = ¡
Alt +0177 = ± , Alt +0191 = ¿ , Alt +0215 = × , Alt + 0247 = ÷
Alt +0190 = ¾ , Alt +145 = æ , Alt + 155 = ¢ , Alt + 156 = £
Alt + 157 = ¥ , Alt +159 = ’ , Alt + 171 = ½ , Alt + 172 = ¼
Alt + 225 = ß , Alt + 230 = µ , Alt + 241 = ± , Alt + 0134 = f
CHINA & GOOGLE (2010-01-16 07:55)
1. The long tug of war between these two respective giants is ﬁnally coming to an end...and the end means
the end of GOOGLING in china.The fact that any person can choose to access anything at any time, and
usually at no cost is too uncomfortable an idea for the Chinese thinking tank and they have been busy
implementing moves and measures to constrain people’s access to the internet for about last two years that
i have read across in various articles and snips.
2. I can see the smile on the Bing’s face now....no Googling means more chance of a Binging
and likely revival of few earlier search engines...remember AltaVista generation about 10 years back.
3. Now China’s logic behind this!!!!!we all
know when we google what happens...i had given on post at http://anupriti.blogspot.com/2009/12/goo-
gle-binged-my-100th-p ost.html .This reason is valid though.Extract produced from Google’s blog at
http://googleblog.blogspot.com/2010/01/new-approach-to-china. html is reproduced below : Like many
other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December,
we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China
that resulted in the theft of intellectual property from Google. However, it soon became clear that what at ﬁrst
appeared to be solely a security incident–albeit a signiﬁcant one–was something quite diﬀerent.
First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty
other large companies from a wide range of businesses–including the Internet, ﬁnance, technology, media and
chemical sectors–have been similarly targeted. We are currently in the process of notifying those companies,
and we are also working with the relevant U.S. authorities.
Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts
of Chinese human rights activists. Based on our investigation to date we believe their attack did not achieve
that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account
information (such as the date the account was created) and subject line, rather than the content of emails
Third, as part of this investigation but independent of the attack on Google, we have discovered that the
accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in
China appear to have been routinely accessed by third parties. These accounts have not been accessed through
any security breach at Google, but most likely via phishing scams or malware placed on the users’ computers.
4. Who’s is correct then? It is just a matter of perspective and convenience of the mind.
Microsoft choose to stay in China: Why not? (2010-01-17 07:06)
1. Just a day after I mentioned that Bing will be seen smiling on Google’s exit from the dragon land, Microsoft
have released a oﬃcial statement on this. Brief Extract from http://infotech.indiatimes.com/News-Inte-
rnet-We will stay in China Microsoft/articleshow/5448256.cms reproduced below :
Microsoft Corp has no plans to pull out of China, its chief executive has said, playing down concerns about
recent cyber attacks and censorship raised by rival Google Inc.
The company’s stance indicates the world’s largest software maker is not likely to support its ﬁerce rival in
its battle with China and rebuﬀs broad US political backing for Google.
”There are attacks every day. I don’t think there was anything unusual, so I don’t understand,” Microsoft
CEO Steve Ballmer told Reuters after a meeting on modernizing government services at the White House.
”We’re attacked every day from all parts of the world and I think everybody else is too. We didn’t see anything
out of the ordinary.”
SHARING DESKTOPS REMOTELY (2010-01-17 07:43)
1. Of the many tools that exists today for desktop sharing including standard Windows Remote Desktop
Connection...i recently found one which is relatively very easy...the name is TEAMVIEWER.A very light soft-
ware about 2.56 Mb only,easy to install,no complex conﬁgurations,no IP setup problems,easy interface.....just
login like you log in a regular e-mail id account with a password.
2. I recently used it for trial with my friend across the another part of the continent.The result was quick
and very smooth.
3. The same is available for download at http://www.teamviewer.com/index.aspx .There is a paid version
too with more features....but for general viewing and sharing,the unpaid will work fully to your requirements.
Harjot Singh Pelia (2010-01-25 11:33:25)
hi a few queries:-
1. privacy issues
2. what all is shared by default
4. how is traﬃc routed
5. copyright issues if any
pl cc copy of the reply to my mail id also
ZUNE 120 GB (2010-01-18 21:44)
1. For those of you who are hearing this name for the ﬁrst time,lemme tell you what it is in brief? ZUNE is
a Microsoft entertainment platform and portable media player on the lines of Ipod by Apple on a larger
scale in terms of screen, capacity, features. etc. Of the various models of Zune, ZUNE120 measures 4.3
inches high by 2.4 inches wide. I will give some brief on this since i got this one recently.
2. Main menu has the following scroll down as shown in screen shot from my ZUNE.
- Market Place
3. Further brief on few of these of interest are enumerated below
Market Place allows browsing, previewing & downloading music directly from Microsoft’s Zune Marketplace
online store. Marketplace submenu further allows choosing between browsing Songs, Albums, and New
Releases, or search for speciﬁc music by keying in a few letters. Songs can be previewed for 30 seconds
with the option to add them to your virtual cart or purchase and download immediately. By signing up
for Microsoft’s Zune Pass music-subscription service (a free 14-day trial is available).....still to be availed by
ZUNE is WiFi enabled and allows keying in the passwords if required vide Zunepad.
Radio : An interesting part of my ﬁrst few days of interaction with ZUNE was non running of FM stations
till the time I got link to this thread ie http://vasudevg.blogspot.com/2007/12/zune-fm-radio-tip.html
that involved simply changing country from preset US to Europe
Video format : The only problem that I faced was that the horde of movies that I possess do not run directly
on this.One needs to convert them to zune/ipod format with easy to use Windows Media Encoder....time
consuming but worth it when we play it here on the ZUNE......I converted Sivaji Rajinikanth(...my fav)
with a third party software Cucusoft...but was labelled with trial version watermark throughou(screen shot
down)....rest was quiet ok....then converted with windows media encoder...and worked perfectly ﬁne....gr8
output in video and sound....
Ports : Only two including one to ear phone and the other to USB for interface with PC for sync and
Capacity : 120 GB...thats awesome for storage!!!!!
4. Any one across with any diﬃculty or query on Zune player can just leave his/her problem....will get back
asap.......thats a promise for while.....
Anonymous (2011-01-04 16:32:33)
Google vs Bing : On Data retention policy change (2010-01-19 21:44)
know of this recently while i read at http://www.bing.com/community/blogs/search/archive/2010/01/19
/updates-to-bing-privacy.aspx on the subject.
2. In case of Bing,the amount of time IP addresses are stored from searchers is 18 months which the claim
now to reduce to 6 months. Generally, when Bing receives search data ,the following things undergo action
First, steps to separate the account information (such as email or phone number) from other information
(what the query was, for example).
Secondly , after 18 months another additional step of deleting the IP address and any other cross session
IDs associated with the query.
3. Under the new policy, all the steps will continue as were applied previously except that now IP address
will be completely removed at 6 months, instead of 18 months. Rival Google had cut retention time to 9
months from 18 in August 2008.Notwithstanding, Microsoft executives arrogates their initiative go much
further than Google , because Microsoft intends deleting all parts of the IP (Internet Protocol) address after
six months, while Google still retains part of the address after its self-imposed nine-month cut-oﬀ point.
4. Thanks http://microsoftontheissues.com
ROOT WEB DIRECTORY VERIFICATION (2010-01-29 07:56)
Gina (2010-01-30 06:35:32)
I’m trying to add a stuf like this to my root web diretory
Could you help me whit this ? Is for Mcafee site advisor to verify my site.
I can’t ﬁgure it out...
ANUPAM (2010-01-30 07:45:35)
hi gina...m working on it...likely it is that we have to insert this in the HTML edit tab of the settings section...will
Gina (2010-01-31 20:12:07)
I’ve try it too, it’s not working in HTML...you have to put in in ”root web directory”
But metatab from google may be inserted, and it’s working
ANUPAM (2010-01-31 21:09:34)
hi gina,how do we insert metatab from google?please guide!
Gina (2010-02-02 21:44:57)
This post has been removed by the author.
Gina (2010-02-02 23:51:54)
sorry for the post before :)
now hope it helps :)
IP Spooﬁng : Legal Acceptance in India? (2010-02-01 07:47)
1. I have been reading about this term for many years,have known about what it is through various sites,read
about types of IP spooﬁng incl Blind Spooﬁng,Non blind spooﬁng etc.One question that started me
trying reach out details of this term was ”WHY IS IT AVAILABLE?”What is the aim intended in spooﬁng
an IP?Is it solely MALICIOUS?
2. Indian IT Act 2000 followed by amendments ie IIA 2006,IIA 2008 have not mentioned any thing on
this surprisingly!!Is it legal to use this for any reason?Recently I tried one third party software for this
to check out eﬀectivity of this.As per the option available in this software I conﬁgured this to chang-
ing IP address every 8 minutes.Then after it started I checked out my IP address from 4 sites including
whatismyip.com,whatismyipadress.com etc.And yes!!! one minute I was shown in USA and the other
minute I was in Netherland followed by Russia,China etc.If a script kid like me can do this what can a
professional person intended with malicious intention can do.
3. Remember the Mumbai Blast episode wherein the email sent to the police were tracked only with the
help of IP address.God forbid,he knew of such tricks what would have we tracked out?
4. I will request any reader to just add his views or enlighten me on this!!
CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!! (2010-02-03 22:55)
1. The earlier mention on IP Spooﬁng and the pleothra of options and techniques available for at-
tack,hack,sniﬀ,crashing a network etc are well known for not reaching out to the origin of the person or hacker
with the malaecious intention. DARPA (...please google or bing if u wish to know more on DARPA)has
ﬁnally come out with the 'Cyber Genome Program` which will allow any digital artifact either in form of a
document, or a piece of malware - to be poked into its very origins.
2. In in principle, it appears that almost any data ﬁshed from a relevant network, a computer, a pen drive,
someone’s phone or whatever is to be studied much as like a human genetic material. The code or document’s
relationships with other ”digital artifacts” will be revealed, perhaps its origins, and other info of interest to a
Pentagon admin defending military networks or a military/spook investigator tracing online adversaries.In
other words, any code you write, perhaps even any document you create, might one day be traceable back
to you - just as your DNA could be if found at a crime scene, and just as it used to be possible to identify
radio operators even on encrypted channels by the distinctive ”ﬁst” with which they operated their Morse
keys. Or something like that, anyway.
3. The concept is a cyber-equivalent of human ﬁnger-prints or DNA. The project will thus seek to develop
a digital genotype as well as any inferred or observed phenotype in order to determine the identity of such
digital artifacts and thus the users who left them behind.
4. DARPA is now looking for technologists to develop and use the cyber-equivalent of DNA to target
the people behind cyber attacks. They are looking for geniuses in the ﬁelds of Cyber Genetics, Cyber
Anthropology and Sociology and Cyber Physiology who can jointly work out the practical solutions to
this project.The research involves creating lineage tree for digital artifacts, gaining better understanding of
software evolution, and automatic analysis of social relationships between users and malware. Each of these
researches will jointly develop the cyber equivalent of ﬁngerprints or DNA.DARPA believes that this can
identify the best-of-the-best hackers.
5. Thanks http://www.theregister.co.uk
Who’s Who? : Terminology world of Portable Computers (2010-02-05 17:25)
1. The have been a pleothra of terms related to small portable computers in form of Laptop, Leaptop,
Netbook, Notebook, Smartbook, Tablet,UMPC, Air Book etc all of which represent the segment that mass
of the people call or refer to just as Lap Top’s.But there exists a diﬀerence between all of these.....I have
tried to extract out the thin line diﬀerence that exists between these all terms : - Laptop : Main
Purpose : Device that serves either as a desktop replacement or a portable gaming rig. Characteristics :
Large screen,full QWERTY Keyboard. - Net Book : Main Purpose : Device which is small and light
weight device meant basically for internet and the cloud for the people on the move. Characteristics : Small
Size,Light Weight,Long Battery Life. - Notebook : Main purpose : Used basically for documents and
presentations. Characteristics : Sleek and Lightweight,large screen - Smart Book : Main purpose : Hybrid
between smart phone and notebook with range of connectivity options. Characteristics : Long battery
life,Light weight. - Tablet : Main Purpose : Is like a digital slate with a full touc hscreen surface and no
keyboard. Characteristics : Basically a large touchscreen - UMPC : Main purpose : Stands for Ultra Mobile
PC,a tablet with a sliding keyboard. Characteristic : Low processing power. - Air Book : Main purpose
: Macintosh AirBook by Apple which is positioned as the ultraportable in Apple’s MacBook Family and
was introduced at the Macworld Conference & Expo on January 15, 2008. Characteristic : 13.3-inch glossy
LED backlight TFT LCD widescreen display, 1280 x 800 pixel resolution and integrated nVidia GeForce
9400M graphics processor with 256 MB of DDR3 SDRAM shared with main memory - Leap Top : Just a
laptop branded by HCL India it has trademarks for the term leaptop. 2. I actually got confused in these
thin boundary diﬀerences...but thats the way it is in the market of brands. 3. Thanks DIGIT and Wiki.
TRACE INDIA (2010-02-07 19:44)
1. I came across this relatively good Data Base site in which someone has attempted to ensure most of the
important things are traced to an area if not the street address.For eg when u enter a mobile number in the
search query,u will get to know the city and the state from which the number belongs to or like pincodes
of India are traceable to exact area identiﬁcation or even vehicle numbers are traceable to the city....nice
attempt but still looking for more in depth query geneartion...i m sure they are working on it...meanwhile
enjoy what they oﬀer now.Few links are given below :
MOBILE NUMBER LOOK UP at http://www.indiatrace.com/trace-mobile-number-location/trace-
VEHICLE NUMBER LOOK UP at http://www.indiatrace.com/trace-vehicle-location/trace-vehicl
PINCODE LOOK UP at http://www.indiatrace.com/trace-pin-code/trace-pin-code.php
STD/AREA CODE at http://www.indiatrace.com/trace-std-code /trace-std-area-code.php
IP ADDRESS LOCATION at http://www.indiatrace.com/trace-ip-address/trace-ip-number.ph p
REVERSE DNS LOOKUP at http://www.indiatrace.com/trace-reverse-dns/trace-reverse-dns .php
Even TRACES PEOPLE at http://www.indiatrace.com/trace-people/trace-people.php
2. Thanks http://www.indiatrace.com/index.php
NVIDIA : Optimus technology (2010-02-13 07:40)
1. nVidia has come up with the OPTIMUS TECHNOLOGY for the mobile PCs ie Laptops, Notebooks etc.
This technology selects and switches the graphics processor for an application, depending upon the type of
application. It automatically swops between an integrated graphics and the discrete graphic card based upon
whether the application running needs a brawny 3D chip, or not. This helps the device in oﬀering improved
performance in applications when required, while saving on battery by reducing power drain in applications
that can do without 3D support.
2. Notebooks with nVidia technology as on date include Asus UL50Vf, N61Jv, N71Jv notebooks.
3. Thanks http://www.thinkdigit.com/
WEB 2.0 SUICIDE MACHINE (2010-02-15 07:46)
1. An unheard term till now....WEB SUICIDE...what does it connote?
2. We all r slowly becoming addicted to internet for some use or the other... 85 % of internet surﬁng
being used for social networking..can u believe that!!!a number of identities on various social network-
ing sites..orkut..facebook..twitter ,myspace,linkedin and the list is getting endless....and most
of us are getting into habit of remaining online 24 hours...checking e-mails every 10-15 minutes or even
less..frequently scraping to all friends....uploading pics on sites....and some one has realized that by doing so
we all are missing on real people....parents,kids,wife and neighbours etc etc...thus has originated the concept
of WEB SUICIDE......simply register with this site and u will kill,remove traces of each and every footprint
u ever had on these sites....the name of the site is http://www.suicidemachine.org/
3. Extract from site ”Liberate your newbie friends with a Web2.0 suicide! This machine lets you delete all
your energy sucking social-networking proﬁles, kill your fake virtual friends, and completely do away with
your Web2.0 alterego. The machine is just a metaphor for the website which moddr is hosting; the belly
of the beast where the web2.0 suicide scripts are maintained. Our service currently runs with Facebook,
Myspace, Twitter and LinkedIn! Commit NOW!” 4. Well to some extent the intent is correct that we r
slowly loosing on realizing the importance of physical world,but removing urselg from web.....hmmm!!!!!i m
still a long way...how abt you?
Steganography : Hide in a JPEG/BMP (2010-02-16 21:15)
1. Steganography is the art and science of writing hidden messages in such a way that no one,apart from
the sender and intended recipient, suspects the existence of the message, a form of security through obscurity
while Cryptography is the practice and study of hiding information.
2. The advantage of steganography, over cryptography alone, is that messages do not attract attention
to themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion,therefore,
whereas cryptography protects the contents of a message,steganography can be said to protect both messages
and communicating parties. 3. Just for how it works..i tried one free Steganography software ”Invisible
Secrets” that allows one to encrypt and hide ﬁles in other ﬁles (carriers) which are not suspect of encryption
(JPG, PNG, BMP).The link I downloaded from can be accessed by clicking here. 4. Now this is a small
1.8 MB software good enough to do the job.The ﬁle u see below of golden temple is just not a jpeg,it consists
of a text ﬁle with a message...the password to access the text ﬁle is 12 34....for those of u who r interested to
experiment 5. The scope of utility involves
provisioning solutions to the following queries of any user across : (a) Are you afraid that someone else
can see your sensitive and secret data stored on your computer ? (b) Are you afraid that hackers or other
people can penetrate your system and ﬁnd your valuable information ? (c) Your wife, boss and kids can
see what you used the internet for? (d) You have many passwords in your mind or spread all over your
computer and you can’t organize them? (e) You want to send a secure email to your friend or partner and
you want nobody to read or to access it? (f) You want to password protect certain applications to be used
only by you? Do you want them not to be visible in the Start Menu, but still have quick access to them?
(g) You want to delete an email or a ﬁle but you think someone else can restore it and use it against you ?
(h) You want to combine ﬁle encryption with steganography (hide ﬁles and folders) to better protect your
documents and emails? (j) You want to hide ﬁles on your computer so that nobody ﬁnds them? 6. Thanks
How to avoid an infected USB/PEN Drive? (2010-02-17 07:52)
1. The most common way for a virus to infect a healthy PC is through USB/Flash drives. Common viruses
such as ’Ravmon’ , ’New Folder.exe’, etc spread through USB/ﬂash drives . Invariably, anti virus programs
are unable to detect them and even if they do, in most cases they are unable to delete the ﬁle, only quarantine
it. Following are a step by step easy to do instruction
(a) A window appears similar to the one shown below.
(b) Don’t click on Ok , just choose ’Cancel’.
(c) Open the Command Prompt by typing ’cmd’ in the run box.
(d) In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
(e) This will display a list of the ﬁles in the Flash drive or Hardisk. Check whether the following ﬁles are
there or not
(iii) New Folder.exe
(vi) or any other .exe which may be suspicious.
(f) If any of the above ﬁles are there, then probably the USB drive is infected.
(g) In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only,
Archive, System and hidden ﬁle attribute from all the ﬁles.
(h) Now just delete the ﬁles using the command del ﬁlename. example del Ravmon.exe. Delete all the ﬁles
that are suspicious. To be on a safer side, just scan the USB drive with a latest anti-virus program like
McAfee or TrendMicro’s PCCillin to check whether it is free of virus or not. Now remove the drive and
plug it again. In most of the cases, the real culprit turns out to be the ”Autorun.inf” ﬁle which mostly gets
executed when someone clicks Ok in the dialog window which appears above. Thus the infections invariably
spreads...but not if u take these precautions as mentioned above.
2. Thanks http://www.howtodothings.com
SVCHOST.EXE vs SCVHOST.EXE (2010-02-18 21:51)
1. Two approximately similar names but with poles apart function and reason to exist.If ever you have tried
cleaning or accessing an infected pen drive you must have come across these names in the ﬁle names list.I
would just try and make the diﬀerence clear in brief below.
2. SCVHOST.EXE is a process which is registered as W32/Agobot-S virus. This Trojan
allows attackers to access your computer from remote locations, stealing passwords, Internet
banking and personal data. This process is a security risk and should be removed from your
3. SVCHOST.EXE is located in the System32 folder and is an built-in part of Windows OS. It cannot be
stopped or restarted manually. This process manages 32-bit DLLs and other services. At startup, Svchost.exe
checks the services portion of the registry and constructs a list of services that it needs to load. Under normal
conditions, multiple instances of Svchost.exe will be running simultaneously. Each Svchost.exe session can
contain a grouping of services, so that many services can be run depending on how and where Svchost.exe is
started. This allows for better control and debugging.
4. I hope this amply makes the diﬀerence clear
Intel® Core" i3 Processor & Server 2003 (2010-02-23 07:36)
1. Strange are the ways sometimes when we get troubled by the PC.In an attempt to upgrade one of the
PCs to Intel® Core" i3 Processor,I found a problem I never thought of. 2. Now just to give u a small
brief,I have a small oﬃce complex with about 15 computers on Server 2003 which was running ﬁne till one
day when i just decided to upgrade my server machine to Intel® Core" i3 Processor.I bought the combo
pack of this processor with its motherboard for about 11k,i assembled it and started with the setup of server
2003.....started nicely but this would never install completly in my ’N’ number of attempts and would hang
halfways.....then i thought like Murphy is acting ﬁne with me and their is some problem with the processor
motherboard hardware...so replaced the same pack with a new one..but the problem persisted....i contacted
the local dealer,surprised with the problem he himself attempted the same but met with the same end.....
3. I changed my installation CDs ,still met with the same problem...ﬁnally I could arrive that there may be
some compatibility issue between server 2003 & Intel® Core" i3 Processor.........and reverted back to core
2 duo,the earlier one. 4. I would request readers to augment their comments, if any, with such a problem
being faced anywhere else.
Claudia Lawrence (2010-03-06 02:24:10)
Hi, ur blog is really nice & informative, while reading it I truly like it. I just wanna suggest that u should submit
your blog in this website which is oﬀering very unique features at cheap prices there are expert advertising team
who will not only provide the adspace but also promote ur blog & aﬃliate ads through all over the networks which
will deﬁnitely boost ur traﬃc & readers. Finally I have bookmarked ur blog & also shared to my friends. hope u have
a wonderful day & !!happy blogging!!.
Agha (2011-05-04 11:28:37)
use 2003 32 bit server with Service Pack, it will solve ur problem. Thanks
kamal kant (2011-05-07 13:55:36)
I have hp laptop pailion g6 with core i5 processor 4gb of ram.When i install window server 2003 standard 64bit it
gives me error in blue screen 0x0000007b like this.can i install window 2003.please reply
Thanks in advance.
ANUPAM (2011-05-13 23:26:57)
@KAMAL perhaps the lone solution is uptodate patch of server 2003,the one generally ﬂoating in the market is not
updated with the SP3.....i had this similar problem...could be solved only after i updated it with the latest SP....as
recommended by AGHA.....
The Journey from MB to GB : Pen Drives (2010-03-05 22:53)
1. I bought my ﬁrst pen drive in the year 2004 at a price of Rs 42oo/- and the capacity was a whoooping 256
MB....yeah that was so high those days.....today i came across a link to Kingston that has recently launched
the world`s ﬁrst 256GB Pen drive.The new pen drive is DataTraveller 300 USB Flash Drive.
2. I know the next thing that comes to mind is what about the cost?......the cost is just Rs 48000/-(i heard
this is approx).
3. Thanks http://www.newtechnology.co.in
Search Web by FACE recognition - Work is ON!!!: ONE ALBUM (2010-03-07 21:06)
1. Microsoft Israel Innovation Labs is currently working on ONEALBUM ,a project under development,
that uses face-recognition technology to search for photos
2. ”OneAlbum” scans faces that regularly appear in a user’s OneAlbum photo collection, then searches his
social networks (Facebook,Orkut, Windows Live and others) for more photos of these people. It then
automatically ﬁnds relevant photos in other albums on the Internet and brings them to the user’s album,
and shows them side-by-side with his photos. Not only facial recognition, but OneAlbum also involves
event-matching technology by analysing the people, dates, colours, and textures in a set of photos and will
recognise these photos as being taken in on the same event.
3. Little confusing in the ﬁrst reading.....what I understood is like one will be able to ﬁnd a same persons
photo when u bing(.. google)....so u put ur photo in the search bar and press enter...there u r......u see all
content results of same person.....diﬃcult to believe but....will be available soon in coming years!!!!
4. Thanks http://www.liveside.net
OS CARD : For now just an idea sirjeeeeeeee!!! (2010-03-11 22:19)
1. Recently I came across this interesting idea article which introduced me to the OS Card.....yess...the
operating system card....read on for some interesting info
(a) The ”OS Card” would be inbuilt with a independant operating system that is installed or ﬂashed onto
a PCI-E card for computers.
(b) Complete operating system such as Windows/solaris/ubuntu etc would come preloaded one of these
cards. Instead of booting and running your OS from your local hard drive, it would run most of the OS from
the PCI-E card.
(c) The card would be read only, protecting vital system ﬁles from malware such as trojans or viruses. A
small number of system ﬁles that would require read and write functions would be copied to your local hard
drive where they could be modiﬁed and read by the card.
2. What would this do? For amateurs it would make installing an operating system much easier. Instead of
having to deal with CDs, DVDs and serial numbers a person would simply buy the card and put it in their
3. The best thing to be curbed is that this would be able to put a serious incision in piracy of operating
systems. Furthermore, it would free up a considerable amount of space on your hard drive.
4. The OS Card could come with it’s own independent CPU and Memory (RAM), which would completely
remove the need for an operating system’s system requirements. This would most likely speed up all other
processes and events being run on the computer now that system processes are now no longer hogging PC
resources.As on date some info on related product at http://www.gi-de.com
5. What an idea sirjeeeeeeee@ http://www.creativitypool.com
LIQUID COOLING IS IN - FOR CPUs & GPUs (2010-03-15 08:09)
1. I heard about water cooling concept in servers speciﬁc to data centers some years back.With induction of
i3 and continuing high end series, water cooling kits are no more visualization and futuristic components of
enthusiast and fancier machines. Now water cooling is all set to reach your desktops.Thus with the execution
levels of the core components increasing, keeping the heat levels under control has no more remained as a
challenge. 2. The Aquagate Max is the ﬁrst Enthusiast System Architecture (ESA) simpatico liquid cooling
kit which allows some amazing features . With multicontrol connected sensors located all around inside the
case the architecturte design eliminates the need to manually check that it works properly.Together with the
Cooler Master Cosmos ESA case it allows the advantage of being able to mount the liquid cooling kit inside
the system case with no external parts. More from ﬁgure below
3. Thanks http://www.coolermaster.com
Secure ur Wireless media (2010-03-17 22:04)
Secure ur WiFi (2010-03-18 07:47)
GOOGLE ﬁnally is OFF from China (2010-03-24 08:40)
1. In my earlier post at this,this and this,the subject matter was under decision making....ﬁnally the
result is out....Monday night, the cyberspace gargantuan shut its Chinese site and repositioned its search
engine services to unexpurgated Hong Kong after two months of confrontation with Beijing over censorship
and alleged hacking attacks.
2. The decision has its set of PROs & CONs....this will allow opportunity for others to make an attempt
to compete with google which has largely overshadowed the cyber space to a large extent with discussions
like one discussed for Data retention policy between Google and Bing.This is going to make China lesser
dependent on Google for a large number of things which unknowingly we all have become used to.This will
disallow google to retain data as per their existing policies from the complete area of CHINA unlike others
who are happily allowing them to retain all data and surﬁng habits.....now for the CONs....Chinese will not
be able to search with the precision they used to(...although will be a temporary phase...they may come up
with something better....)...is that the only CON??????I feel it is worth it!!!!!!!!!
3. Indian Sarkaaar....pls let your IT IQ refresh........thanks http://images.smh.com.au and
Consequences of Google’s China Exit (2010-03-24 09:14)
1. This is a uncoiled lift from http://www.theatlanticwire.com.I thought worth putting it in here.For
original post please click here.
2. The post has shown the following 4 consequences of exit :
(a) Cripples the Work of Chinese Scientists
A Nature News survey of Chinese scientists found that 84 percent of them thought losing access
to Google would 'somewhat or signiﬁcantly¨ hurt their work process. Like their American
counterparts, Chinese researchers use Google and Google Scholar to ﬁnd papers and related
'Research without Google would be like life without electricity,¨ one Chinese scientist toldNature... If events
do continue in that direction, truly global enterprises like science could suﬀer as information becomes harder
÷ even if only moderately ÷ to exchange.
Puts the Onus on China to Liberate the Internet
Puts the Onus on China to Liberate the Internet
, says Leslie Harris, president of the Center for Democracy and Technology: ”[We applaud]
Google for following through on its commitment to protect human rights and for its continued
eﬀort to enable China’s people with unﬁltered access to robust sources of information from all
over the world. Whether the Chinese people will be able to take advantage of Google search
now rests squarely with the Chinese government.”
(c) Fully Exposes China’s Censorship
Fully Exposes China’s Censorship, writes Dan Nosowitzat Fast Company: ”Google almostexpects China to
block the crap out of the redirect. They’ll even be creating a new siteto monitor exactly how much of their
new services are being forcibly blocked by the Chinese government, updated daily. Google is also showing a
little concern about the future of its 600-person sales staﬀ in China, and issuing a bit of a challenge to the
Chinese government: if they shut down the redirect to Google HK, Google will have to lay oﬀ a percentage of
its sales team, as they’ll not be needed.”
(d) Cleanses Google’s Reputation
Cleanses Google’s Reputation, cheers Preston Gralla at Computer World: ”China will become the world’s
largest Internet market, and in taking this step, Google is endangering its standing there. True, it only has a
relatively small market share at this point, but that would have changed over time, and even a relatively small
market share of a large market means a lot of revenue. It’s rare that a tech company — or any company, for
that matter — takes a stand this principled, and Google should be congratulated for it. Other tech companies,
notably Apple and Microsoft, should follow suit, although all signs point to them continuing to cooperate with
3. Thanks http://www.theatlanticwire.com
MOZZILA Firefox & GERMANY (2010-03-24 21:27)
1. In another notable policy implementation involving IT aspect and signifying the importance of browser
,German government and administration has suggested computer users not to use Firefox and run an alter-
native browser instead, because of a critical security demerit. It has recommended that PC users stop using
Firefox till Mozilla releases a ﬁx. 2. The advice is based on studies and recommendations of BurgerCERT,a
division of German Federal Oﬃce for Security in Information Technology. The reason why Germany is evok-
ing such ostensibly forceful action is based on the presence of a critical vulnerability in currently available
versions of Firefox that could be exploited by hackers to launch malicious code on users’ computers. 3. For
its part, Mozilla has acknowledged the security vulnerability, and has released the latest version of its Firefox
web browser ahead of schedule because of security vulnerabilities found in earlier versions.Firefox 3.6.2 was
due to launch at the end of March, but is already available to download from the Mozilla website. 4. Any
advises or thoughts from the MOD(IT) INDIA.....none!!!!!! 5. Thanks http://www.computerweekly.com
DANGEROUS PASSWORDS (2010-03-24 21:58)
1. According to a recent study,most dangerous passwords used across the cyber fora and continents are listed
Tops the list.The study reveals that ’123456’ is the most ordinarily used password. Imperva found that
nearly 1 % of the 32 million people it studied were using ”123456” as a password.
The second most vulnerable password is 12345
Stands at a proud 3rd position
The fourth most vulnerable password is the word ’Password’ itself
Another easy one for remembrance and breaking.
Stands at 6th position
The seventh most compromising password is 12345
Rockyou is followed by 1234567 at No 8
the last one as per study....
2. How many of you have or had from the list?be carefullllllllllllllllllllllll
3. Thanks Imperva and TOI.
CLEAR PLAY & DVD PLAYERs : E-CENSOR (2010-03-25 07:49)
1. A new technology that can CENSOR ALL POTENTIALLY UNSAVORY SCENES of a movie, making
it watchable with children at home is all set to introduce it self to the parents.It invariably happens across
the homes when one family sits down to watch a movie on a DVD thinking there`s nothing up ahead likely
to cause embarrassment, only to ﬁnd the stars undressing and making the set of family watching the movie
2. ClearPlay (patented) comes to the rescue in all such cases.This is an advanced parental control feature
that allows ﬁltering of regular DVD movies. ClearPlay is a technology that allows the users to skip over or
mute undesirable content such as profanity, graphic violence, and adult content.
3. A ClearPlay-enabled DVD player is required, along with what are called Filter ﬁles. These ﬁles, which
are created by ClearPlay editors, will know where the possibly unwanted content is located, even to the exact
frame. This allows the ClearPlay DVD player to block oﬀensive or undesirable content during playback of
the DVD. The choice is also made available to watch the ﬁlm in its original form, by turning the ﬁltering oﬀ.
4. ClearPlay allows users to customize what they want to skip. There are twelve categories of content that
can be ﬁltered and with four diﬀerent levels (none, implied, explicit and graphic).These categories include:
Violence, Sex, Nudity and Vulgarity. You will also see a list, before the movie starts, of possibly questionable
content that ClearPlay will not remove depending on the movie, scene and/or situation.
5. Thanks http://technochest.com
WiFi at home : Take precautions (2010-03-28 07:19)
1. Accessing WiFi at home is no more limited to tech geeks as the simple conﬁguration has made it accessible
to even a layman who hardly has any know how of how it works and what are the dangers ﬂoating around if
he goes with the default settings.The two year back case of a hacker emailing from an open WiFi account
in Mumbai reﬂects the deep dangers associated with such mishaps.Following are a set of desirable conﬁg
changes any WiFi account holder at home and oﬃce whould take care of while conﬁguring.....
Step 1: Change the default password Step: 2: Change the default IP address Step 3: Disable the DHCP
service DHCP (Dynamic Host Conﬁguration Protocol) enables remote computers connected to the router to
obtain an IP address and join the network without needing to know the IP and router address information.
This is a simple and eﬀective way of keeping intruders away. As far as possible, set up the computers on
your network with static IP addresses. If you still want to use DHCP to make your own conﬁguration easier,
restrict the number of DHCP IP users to the number of computers on your network. For example, if you
have ﬁve laptops running on the network, limit the DHCP IP addresses to 5 from the default 50. Step
4: Restrict the network mode Step 5: Change the default SSID Step 6: Opt for WPA2 or PSK security
over WEP Step 7: Enable the MAC Filter Step 8: Use the router`s ﬁrewall Step 9: Use Internet Access
Policies Step 10: Disable remote administration Step 11: Switch oﬀ the router when not in use Step
12: Disconnect the Internet when not needed Step 13: Position your router carefully Step 14: Update
the router ﬁrmware Step 15: Scan for signal leaks from time to time 2. Also check out here.Thanks
DATA RECOVERY FROM RAM? (2010-03-31 22:44)
1. If any one can just throw some light or post a link to any matter that exists on the web pertaining to
limitations/possibilities of recovery of data from RAM inside a computer?
david nicholson (2010-04-01 07:21:34)
i m sure this will help,check out at http://tdistler.com/2008/02/21/data-in-ram-can-be-recovered-a fter-power-oﬀ
HOW TO HYPER LINK IN COMMENTs AT BLOGGER? (2010-04-01 07:50)
1. I was recently commenting at a blogpost and wanted 2 place a hyperlink..but could not ﬁnd any option
while right clicking or from any where.Thus googled and found this simple two step procedure here 2.
7 years of Indian Cyber Law (2010-04-07 23:14)
1. While reading a recent article by Rohas Nagpal @ 7 years of Indian Cyber Law..i came across these cases
which have been brieﬂy but adequately discussed at length in the article by the author ie Rohas Nagpal.
Must read .just for updated info..
- Avinish Bajaj vs State of Delhi
- Firos Vs State of Kerala
- Syed Asifuddin vs State of Andhra
- SBI vs Rizvi Exports
- State vs Mohd Afzal
- Is ATM a computer
- P.R.Transport agency vs UOI & others
2. For another link on similar info ,pls click here.
3. Thanks http://www.asclonline.com & Mr Rohas Nagpal,President Asian School of Cyber Laws
Computer EASTER EGGs (2010-04-15 06:59)
1. Whats an easter egg post doing here? Well even this has an IT context.In the computer world this refers
to an un documented lineament that is in a program that the makers of that program placed in the program
for additional fun and credits. Easter Eggs are in no way destructive to any software or hardware within the
computer and are usually meant for fun. For example an interesting computing easter egg is given below
- Type ”=rand(200,99)”(without quotes) into the MS word and watch as around 567 pages get ﬁlled with
random text!! 2. Thanks http://www.computerhope.com & Digit magazine subscriber edition.
EAVES DROPPING RISK : EMR (2010-05-03 23:12)
1. Imagine someone sitting in a van outside a person’s house can read the EMR that is emanating from
the user’s laptop computer inside the house and reconstruct the information from the user’s monitor on a
diﬀerent device. Diﬀerent devices have diﬀerent levels of susceptibility to Tempest radiation. A handheld
calculator gives oﬀ a signal as much as a few feet away, and a computer’s electromagnetic ﬁeld can give oﬀ
emissions up to half a mile away. The distance at which emanations can be monitored depends on whether
or not there are conductive media such as power lines, water pipes or even metal cabinets in the area that
will carry the signals further away from the original source.
2. This problem is not a new one; defence specialists have been aware of it for over twenty years.Information on
the way in which this kind of ”eavesdropping” can be prevented is not freely available. Equipment designed
to protect military information will probably be three or four times more expensive than the equipment
likely to be used for processing of non-military information.Until recently it was considered very diﬃcult
to reconstruct the data hidden in the radiated ﬁeld, and it was therefore believed that eavesdropping on
digital equipment could only be performed by professionals with access to very sophisticated detection and
decoding equipment. As a result, digital equipment for processing information requiring medium or low level
protection, such as private and business information, is not protected against eavesdropping of this kind.
3. The EMR that is emitted by electric devices contains the information that the device is displaying or
storing or transmitting. With equipment designed to intercept and reconstruct the data, it is possible to
steal information from unsuspecting users by capturing the EMR signals. The U.S. government originally
began studying this phenomenon in order to prevent breaches in military security. The government was using
the technology to their advantage during WWII and realized that they needed to protect themselves against
others using the same tactics against them. The name Tempest, or Tempest radiation originated with the
U.S. military in the 1960s as the name of the classiﬁed study of what was at the time called ”compromising
4. Today the phenomenon is more commonly referred to as van Eck phreaking, named after Wim van
Eck, the Dutch computer scientist who brought it to general attention in 1985 when he published his paper
”Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?,” in which he demonstrated
that the screen content of a video display unit could be reconstructed at a distance using low-cost home-built
equipment - a TV set with its sync pulse generators replaced with manually controlled oscillators.
5. Van Eck phreaking is a major security concern in an age of increasing pervasive computing. High-security
government agencies are protecting themselves by constructing safe rooms that through the use of metallic
shielding block the EMR from emanating out of the room or by grounding the signals so that they cannot
be intercepted. It is possible, though costly, for individual users to shield their home computer systems from
6. Thanks http://www.webopedia.com
I M IN ”CHIP”- MAY MONTH EDITION 2010 (2010-05-11 06:48)
1. Don’t get me wrong for those of you who read only I M IN ”CHIP”...i m not inside the regular chip...but
have been able to ﬁnd space in MAY edition of the Chip - India’s Most Trusted Guide To Gadgets And
Technology.Scanned copy attached.
2. Thanks CHIP
Bidisha (2010-05-12 12:37:08)
Your family and friends must be really proud of you!
Thanks for uploading it here, I could read both your aritcles and will follow this corner. Though not able to make
complete meaning out of everything; surely get the gist.
wimpy (2010-05-12 20:55:26)
thats how i tracked you
hi buddy this is vikrant here.
mail me firstname.lastname@example.org
ANUPAM (2010-05-12 22:24:22)
vikrant sir!!!i got a mail domain failure from the email u mentioned....pls psot ur email again here
wimpy (2010-05-17 20:22:23)
sorry buddy! try this email@example.com
even better call 9418760446
SHADOWS IN THE CLOUD (2010-05-31 15:02)
1. First time I heard this term...i thought its abt some movie...some crime thriller or may be some novel or
book...but when I actually came to know about this...it was exploring a whole new world....this is abt a 60 pg
brief on how cyber security can compromise you and your organisation secrets....wonderfully compiled...easy
to understand...easy english....gr88888 ...
2. I got the copy from SCRIBD at http://www.scribd.com/doc/29493199/Shadows-in-the-Cloud-20100
3. Must read for IT Security enthusiasts!!
XINGYUN : World’s Fastest Computer (2010-06-07 11:12)
1. ”Experts say one second of its work may take a whole day for a dual-core personal computer”
2. Such is the astonishing ..or I say beyond imagination power of this oﬃcially disclosed SUPERCOM-
PUTER named ”Xingyun” from China that runs at more than one quadrillion (one thousand million million)
calculations per second.
3. XINGYUN is now the server of 'Dawn 6000` which has been jointly developed by Dawning Information
Industry Co. Ltd, Chinese Academy of Sciences Calculation Institution and the South China Supercomput-
ing Centre. It has been developed for DNA sequencing and for cloud computing.
4. Perhaps there is no end to improvement.....tomorrow will come up with much much higher speeds then
XINGYUN......wait and watch.....
Prisoners all set to est BPO : A ﬁrst from Cherlapally Central Jail (2010-06-08 23:59)
1. In a country where media,politicians,government, bureaucrats,actors,sportsman etc etc and most of the
citizens are busy baking power and minting money,this is one news that could do HINDUSTAN proud.
2. In a bold & really unique experiment,likely to be the ﬁrst of its kind in our country,there will soon be
BPO units with the inmates as employees. This is a unique development and Cherlapally Central Jail in
Hyderabad@Andhra Pradesh is the ﬁrst prison throughout the country to have such a unique facility in its
premises.These BPO units will have educated convicts serving out their terms. A public-private partnership
was signed up between the prison authorities and the Bengaluru based IT ﬁrm, Radiant Infosystems.As
many as 250 inmates will be enrolled in the BPO unit and they will be later shortlisted according to their
qualiﬁcations. Most of the inmates are matriculates and graduates. The shortlisted inmates will then be
given training by experts and then absorbed by the BPO company into their Jail unit. For starters, the
convicts working there will not have any access to phones as in the case of a normal call centre. They will
be mostly involved in bank-related data entry and transfer work.
3. ”We found that large number of convicts are willing to work on computers. So, I thought these prisoners
can made use of and they can be put on computer-based jobs,” said Gopinath Reddy, Director General For
Prisons, Andhra Pradesh.
4. This is really positive contribution I feel....although a percent of readers may tend to opine about QoS
etc...but...worth a start and Idea....
5. Thanks Voice & data and http://news.oneindia.in
Anonymous (2010-06-14 11:23:46)
nice info to start my morning.....
What material Laptops are Made of? (2010-06-09 09:30)
1. Ever wondered what a typical laptop is made up of and where does all that material source to.......read
on...it is interesting to know the eﬀort......
China: ABS, PMMA, Epoxy, PVC, Polyoxymethylene, PP, SBR, elastomer, PET, Magnesium Germanium,
Russia: Steel, Ferrite, Ruthenium
South Korea: Glass, Cadmium
Canada: Aluminium, Uranium
South Africa: Cadmium, Chromium, Platinum, Manganese
Japan: Stainless Steel, Selenium
Brazil: Silicon, Tantalum
2. Thanks http://www.sourcemap.org
Securelist.com : Informative attempt by Kaspersky Labs (2010-06-09 09:44)
1. Kaspersky has come up with the launch of a veri informative site on IT security with lots of articles and
updates on various types of viruses/malwares etc.You can access the same by clicking here.
2. One interesting section by the name of ”Internal threats” is available which should prove popular in future
and also ”Kaspersky Security Bulletin”.
Google and Caﬀeine : The Secret Link (2010-06-11 23:14)
1. A little over year ago ,Google unveiled a 'secret project¨ of 'next-generation architecture for Google`s web
search' which was supposed to include crawling, indexing, and ranking changes. While the biggest visible
changes in Microsoft`s relaunched search engine, Bing, was user-interface related, Google`s secret project
was supposed to be only infrastructure related and proposed no UI changes. 2. Thus after an year of
the unveiling,Google is now getting faster and more comprehensive with a new Web indexing system called
”Caﬀeine.As per the Google Blog Post’s , the project now stands on completion stage and now ”provides 50
percent fresher results for Web searches”.
3. The old indexing architecture was based on several layers, some of which were refreshed at a faster rate
than others; the main layer would get updated every couple of weeks.To refresh a layer of the old index,
entire web was analysed, which meant there was a signiﬁcant delay between when we found a page and made
it available to the user. With Caﬀeine, the web is analysed in small portions and search index is updated on
a continuous basis.Thus more improvement on existing setup....that I say ”there is no end to improvement”
4. Thanks http://www.trustedreviews.com
Google and Caﬀeine (2010-06-11 23:14)
1. A little over year ago
Where does your Website Rank in the web? (2010-06-12 14:15)
1. An interesting free info site for to see what you have done with your website and what you need to do to
increase performance of traﬃc and readers to your website is listed below. The site uses a combination of
tools to solve issues or tweak your best techniques used in your web design and content.
2. The name of the site is http://truxtertech.com/siteworth.
Mobiles & Brain Cancer : WHO Speaks. (2010-06-12 17:59)
1. In an earlier post at http://anupriti.blogspot.com/2009/10/radiation-eﬀects-ur-mob ile-
quantiﬁed.html,wherein the sad and bad eﬀects of using mobiles on brain and health,the quantiﬁed SAR
ie speciﬁc absorption rate were discussed.There is good news for those who always feared using mobile
phones for standing at a risk to gain brain cancer in the long run.The WHO study on links between mobile
phone use and certain types of brain cancer has proved inconclusive.The researchers said that even though
there could be possible health risks from heavy mobile phone use, nothing conclusive has been found as yet.
2. The long ten year study of about 13,000 people focused on both healthy users of mobile phones and those
with two types of brain cancer - glioma and miningioma tumors. There were suggestions of an increased risk
of glioma, and much less so meningioma, in the users with highest decile (10 per cent) of cumulative call
time, in subjects who reported phone use on the same side of the head as their tumor. Strangely though,
the study declares these 10 per cent to be people who use their phone to call for more than 30 minutes a
day. These stats seem seriously doubtable. Going by it, almost everyone we know is in that 10 percent.
3. However, the study has been criticized, as biased, because mobile phone companies provided 25 percent
of the funding.Actually...now it is more then 15 years when the world has been actively using mobiles...more
so in india in last 10 years....had it been the other way...how much of the human populi in the world would
have been eﬀected by now....
4. More at http://www.who.int/mediacentre/factsheets/fs193/en/
”GOOGLE STREET VIEW” - FIGHTING PRIVACY ISSUES (2010-06-16 21:03)
1. Ever heard of google’s street view application...m sure many of you must have...for those who have not
heard of it...in brief it refers to a technology featured in Google Maps and Google Earth that provisions
isometric views from various positions along many streets in the world. Launched on May 25, 2007 the
application displays images taken from a ﬂeet of specially adapted cars. Areas not accessible by car are
sometimes covered by Google tricycles. On each of these vehicles there are nine directional cameras for
360° views at a height of about 2.5 meters, GPS units for positioning and three laser range scanners for the
measuring of up to 50 meters 180° in the front of the vehicle. There are also 3G/GSM/Wi-Fi antennas for
scanning 3G/GSM and Wi-Fi hotspots.
2. No about the ﬁghting issue that i have reﬀered in the subject topic.Now whether it is a facility for the world
base users to utilize viewing live views of streets world vide or it is an attempt to log in to the private data of
the users across.....yess...I repeat it is the private data of the users avaiable from the open WiFi signals from
their home computers and laptops.The intresting thing is that Google has accepted this collection of data
from unencrypted wireless networks....and they have put the blame on a masoom software engineer.Google
says the massive furore over Wiﬁ snooping by Street View cars was all the fault of one software engineer.In
an interview ,CEO Eric Schmidt said the whole aﬀair came about because a software engineer inserted
unauthorised code into the Street View system software. The man is now under investigation internally by
the company as per posts on google blog.
3. Now what ever answer that google may come up with in form a mistake or simply putting the blame
on that software engineer(...where was the Software Testing deptt and QC then otherwise?),the point that
I intend putting accross is that just take care of envryting your WiFi router.Google has at least accepted
the fact and mistake and they are taking measures to rectify it...but it will not be always like that.....there
are so many mis adventurists present all around that looking around that unencrypted wireless networks for
misuse.....just read this post again to avoid becoming a target like others.
4. Thanks http://tech.blorge.com & http://en.wikipedia.org/
WiFi Ampliﬁed 10 times : Here comes WiGig" (2010-06-16 22:40)
1. WiFi,the term that has revolutionised our lives at home with ease of access and mobile internet connectivity
is all set to receive a major boost in speed when the 60GHz frequency band comes into operation. Wi-
Fi Alliance® conﬁrmed an alliance with WiGig" to expand the current WiFi band range. Current
WiFi technologies will remain, with the new 60Ghz range coming in to compliment these already existing
technologies. 60 GHz device connectivity will be an exciting enhancement to the capabilities of today’s Wi-Fi
technologies. It will expand the utility of Wi-Fi, used by hundreds of millions of people every day.The goal
- to bring 7Gbps wireless connectivity to users!!!!
2. How does this happen? Basically transfer speeds that are ’turbo boosted’. Today maximum data transfer
speeds are in the region of about 150 Mbps. Bringing in this new technology will boost that ﬁgure to
anywhere between 1 Gbps to 7 Gbps. That is about 10 times faster than the norm today. On the ﬂipside,
higher frequency waves don’t have the range of current lower frequencies, and the 60 Ghz band travels in a
straight line, meaning one would need line of sight between two devices to transfer data.
3. Estimates are that this technology will be available in devices that have dual-band or tri-band capabilities,
in approximately two years. These devices will most likely have the ability to switch between the current 2.4
Ghz or 5 Ghz, and the 60 Ghz band.
4. Thanks http://www.new-technology-world.com & http://wirelessgigabitalliance.org/
’Microrings’ - Ultimate Wireless Communication (2010-06-16 22:51)
1. Researchers based in Purdue University have developed a miniature device capable of converting ultrafast
laser pulses into bursts of radio-frequency signals, a step toward making wires obsolete for communications
in the homes and oﬃces of the future.Such an advance could enable all communications, from high-deﬁnition
television broadcasts to secure computer connections, to be transmitted from a single base station, said
Minghao Qi, an assistant professor of electrical and computer engineering.The team fabricated tiny silicon
”microring resonators,” devices that ﬁlter out certain frequencies and allow others to pass. A series of the
microrings were combined in a programmable ”spectral shaper” 100 microns wide, or about the width of a
human hair. Each of the microrings is about 10 microns in diameter.
2. Thus a single base station would be sort of a computer by itself, perhaps a card inserted into one of
the expansion slots in a central computer. The central computer would take charge of all the information
processing, a single point of contact that interacts with the external world in receiving and sending informa-
tion.”There is no end to improvement......as i say.....just when we thought WiFi is the end of home trouble
shootings for easy connectivity...this goes many steps ahead.....
3. Thanks http://www.new-technology-world.com
INTEL : UPCOMING PROCESSOR’S (2010-06-18 23:13)
1. At an earlier post here, I had discussed about the upcoming OSs incl Barrelﬁsh,Midori,Helios etc likely
to be introduced by Microsoft in near future.....now some thing from leaked (which valve actually faltered
.no one knows?) source on the net about processors from INTEL,three quad-core Clarksﬁeld processors,
the i7-720QM, i7-820QM and i7-920XM, clocked at 1.6GHz, 1.73GHz and 2GHz can be expected by the end
of this year
2. Low voltage chips including 25W 2.26GHz Core i7-660LM,1.46GHz Core i7-680UM and 1.33GHz Core
i5-560UM with an overall aim to enhance the battery life while end Dec 2010 will see high-end Core i7-680UM
that starts at 1.46GHz and speeds up to 2.53GHz and a 1.33GHz / 2.13GHz Core i5-560UM, plus a 25W
2.26GHz Core i7-660LM low-voltage chip will also see the year 2010. All these will have on-die Intel HD
3. Another 32nm ”Huron River”is likely to make it to the user shores by early 2011 which will single handedly
handle WiMAX, WiDi and Intel Bluetooth alongside new concept dubbed Zero Power ODD which promises
a power-saving sleep mode for optical disks drives.
4. Thanks http://www.theinquirer.net
PANOPTICLICK : Your Browser Finger Print (2010-06-25 21:19)
1. The development and growing interest in hacking and retrieving info from browsers has been gaining
signiﬁcant importance today when security is BAAP of all priorities in any IT ﬁeld.Today surfers are warned
that even with cookies deleted and disabled,advanced ﬁngerprinting techniques could be used to identify
them.In an attempt to check and test browsers,THE ELECTRONIC FRONTIER FOUNDATION has
come up with a site at http://panopticlick.eﬀ.org/ which tests your browser to see how unique it is based on
the information it will share with sites it visits.
2. Check out at http://panopticlick.eﬀ.org/
Why not leapfrog 3G TO 4G? (2010-06-27 10:17)
1. It has actually been veri long hearing about Indian Government trying/deciding to start the 3G Spectrum
allocation. Finally few decisions have been made in last few weeks and something has been done in a limited
capacity.Now till the time this limited capacity becomes ready to take on fully operational 3G Services
across India,3G will be without doubt an obsolescent and old technology at global level.The amount of
infrastructure,investment,time and loads of eﬀort that will be sucked in by this 3G setup is likely to go in
waste considering the thirst everywhere to be at par with the latest in communication.3G may look good
today when we are not aware of 4G Technology.For those who are interested to know about ’G’ family in
brief,pls click here.
2. So,still when the exhaustive details on spectrum auction are awaited,why not leap frog to 4G thus
vamoosing the extraordinarily delayed 3G for attaining higher data speeds to ﬁnally allow users in India to
experience the ”state of art speeds”.
COWS & DATA CENTRES : LINKED!!!! (2010-07-03 21:40)
1. Cows and data centers ???Whats the link.......any guesses....strange you may ﬁnd but this has come from
HP who feel that both entities are connected...read on for the link///
2. According to HP Labs, the estimate dairy cow produced is about 55 kg of manure per day, and thus 20
metric tons per year. The manure that one dairy cow produces in a day can generate 3.0 kilowatt-hours
(kWh) of electrical energy.A medium-sized dairy farm with 10,000 cows produces about 200,000 metric tons
of manure per year. This farm can fulﬁll the power requirements of a medium sized 1 megawatt (MW) data
center.The heat generated by the data center need not be wasted. Instead, it can be used to break down
animal waste which results in the production of methane.Methane can then be used to generate power for
the data center.HP Labs researchers say that this symbiotic relationship allows the waste problems faced by
dairy farms and the energy demands of the modern data center to be addressed in a sustainable manner.
3. Actually HP should have not just come up with the idea...with the strong hold they have in the market..it
would have more suited them to actually attempt the same on ground rather then advising and making
statistical data of the dung!!!!
4. Thanks http://www.informationweek.in
Intel meets Car : Makes it SMART CAR (2010-07-07 18:01)
1. In an earlier post here about Intel’s Bike,I discussed about how Intel had plans to get IT into Bike.Now
they have gone a step further.....I mean from Bike to Car...yess..they have graduated to Car.
2. Intel is currently working on a smart car that will register desired information about the speed, steering,
braking while also recording video footage from the outside.This would work well enough as a black box
since all the information can be used in case of crashes and if possible, even thefts. Safety features like an
on-board camera system, sensors to monitor the road condition, distance sensors to warn the driver of closing
in distances and mobile control to lock or unlock the car.
3. Thanks http://www.newlaunches.com
IT meets HIGH TECH TAPS : Renshui Faucets (2010-07-08 19:36)
1. Water Taps with in-built chips , the Renshui high-tech faucets, allows customised control of the ﬂow and
temperature of the water . All it takes is a simple touch and one can change these parameters to prepare a
perfectly tailor-made lovely bath.The water`s temperature is also displayed on the cool body of this faucet
that`s totally diﬀerent in style and form.
2. With a simple touch, one can go from hot to cold water, on or oﬀ. Another great feature is the intelligent
light, which shows the water`s temperature to cut down the risk of scalding accidents. All these features
come wrapped in a contemporaneous design that will add sleek , style in additions to reducing your wallet
3. Thanks http://www.trendir.com/
MOST AMAZING TECHNIQUE TO TRANSFER DATA:SLURP (2010-07-08 22:21)
1. This is by far the most amazing thing I have seen in recent years....we have all seen ways to transfer
data from one PC to other including bluetooth,wiﬁ,cable and so on.....but this one involvesslurping up
(extracting) information and squirting out (injecting) pointers to digital objects. Hence, information can
be transferred from machine to machine without any kind of wired or unwired connection.It will be really
clear when you see the above video.....you use a dropper like object to pick up a folder from one desktop
to other......AMAZZZZINGGG!!!!!! [EMBED] 2. This clever innovation comes in from a former MIT Media
Lab student, Jamie Zigelbaum. 3. Thanks http://zig.media.mit.edu/Work/Slurp
SAMSUNGs GALAXY BEAM - Projector meets Mobile (2010-07-09 20:48)
1. Imagine one single mobile handset oﬀering the following features : (a) Miniprojector at 640 x 480 pixel
resolution. (b) 3.7-inch Super-AMOLED (Active-Matrix Organic Light-Emitting Diode) (c) An 8-megapixel
camera. (d) Can be used as a wireless access point. (e) FM. (f) Wi-ﬁ. (g) Bluetooth 3.0 (h) GPS (j)
Inbuilt 16 GB storage (k) TV out (l) MP3,MPEG4,WMV,DivX & H.264 (m) Touchscreen (n) 3G/EDGE
Connectivity (o) 530 hours Stand By (p) 7 hours talktime
2. Thats Samsung Galaxy Beam to be launched on 17th July 10
3. More at www.samsunghub.com
Augment your regular desktop with a FACE RECOGNITION feature (2010-07-10 22:19)
1. Face recognition technology although has been compromised earlier on various times and occasions which
have been mentioned at this blog here,here and here.But again things are improving with more
complex algorithms being used for processing and allowing a person to Log In.Now suppose an online exam
is being conducted which requires students to login with their accounts; anybody could login with anybody`s
account as long as they knew their username and password.So for regular window OS users,Luxand Blink
allows an alternative to traditional Windows login and a solution to problems. It provides its users with a
diﬀerent way to login to Windows: through Facial Recognition.
2. Luxand Blink is a free application comptable with 32 bit version of Windows Vista and Windows 7.
The download size of the application is 8MB and installs in a standard way. A webcam is required to be
installed in the computer...(did I need to tell that?)
3. So just look into a webcam for a moment, and you`ll be logged into your account before you notice.
Blink! employs advanced face recognition technologies to provide automatic, quick and reliable login to one
or many computer users. It uses its advance image recognition algorithms to recognize our face. Such is
the competence of this application, that whether the lighting is diﬀerent or our hair are diﬀerent, Luxand
Blink will still recognize our face and log us in.So a regular old desktop becomes ready with the FACE
4. Thanks http://www.luxand.com/blink/
How Google detects Invalid clicks? (2010-07-10 22:35)
More often then not,most of the registered Google Ad sense users are always tempted to increase their
clicks on the ad to generate some monetary beneﬁt....this one comes specially for all those who try tricks of
trade....believe it or not their are none... Google is tooooooooo smart...read down below and links below :
1. IP Address If those clicked on their own ads multiple times from the same IP address means you will sure
get banned. 2. Sabotaged by third party Sometimes, you may also be sabotaged. A third party may decide
to do a series of illegal clicks on your advertisements for the purpose of getting you banned. If you notice any
suspicious clicks of this nature, Google encourages you to report it to them. 3. CTR The normal CTR ratio
must be in between 0.5 % ÷ 15 %. Anything more then 15 % will be ﬂagged. 4. Cookies Few Adsense users,
use the trick by using the dynamic IP address but it falls ﬂat as cookies in computer can be used to track
our cookies and help identify the invalid clicks. 5. Physical Location Google has many software and bots to
trace. They will trace the IP address of the small town and city. So do not click your own ads in diﬀerent
internet cafe and also in friend`s home. If you do this, your account will ﬂagged. 6. Fake Web Traﬃc Fake
web traﬃc is anything that generates false impressions on your Google AdSense advertisements, including
participating in link farms or link exchange directories. 7. Search Engine Ranking If you got many clicks
without the help of search engine ranking, social media traﬃc means Google will easily smell it. More veri
useful info here at https://www.google.com and http://www.ambabo.com
Increasing Laptop Bty Life : Few ways (2010-07-19 07:15)
1. Hibernate: Hibernating the laptop is always a tidier option than putting it on standby, or shutting it
down. This is because the laptop`s hibernate mode saves it in the state it was hibernated in, and does not
require the laptop to reboot all applications, thereby using much less power.
2. Get some extra RAM: Whenever a laptop runs short of RAM memory it end up shifting to the virtual
memory which results in hard disk use, which is a much less eﬃcient option in terms of power consumption.
Putting in extra RAM does use more power, so don`t get too much extra, but when compared to the use of
virtual memory it`s a more eﬃcient option.
3. Apply energy saving options on the OS
4. Bring down the brightness of the screen
5. Shut Down External devices: Most USB devices and other external devices like external hard drives
or USB lights or even USB mice should be switched oﬀ and removed if not in use.
6. Shutdown background apps
7. Amend battery cycle: For a healthy Lithium-ion based battery, it is always suggested to keep the
electrons that are present inside in motion occasionally. That means it`s never a good idea to keep you
laptop plugged in or on charge all the time as the electrons lose their ability to store energy. One should let
it discharge fully and charge it completely at least once a month to keep the battery as good as new.
8. Switch-oﬀ unused wireless radios
9. Try to reduce multitasking: When using the laptop on battery power, one should try as much as
possible to use one application at a time, and should ideally shut one application completely before opening
another, to reduce consumption of both processing and battery power.
10. Defrag on regular intervals
User Mapped-Section open??? (2010-07-26 21:14)
1. Regular users of Torrents might have seen something like the title disturbing them and stopping them of
their downloads....i m one of them...so i tried and checked up few forums...tried doing force start etc...nothing
worked....then tried disabling the antivirus for a while.....and it worked.....
2. So...simply just disable the antivirus for the time u wish to download....so lose some...gain some....
IPAD WORLD & VARIETIES (2010-08-12 22:23)
1. Ever wondered about how many variants of IPAD exists from various companies apart from ap-
ple....many....and i mean really many....few of which i recently read in DIGIT
NOTION INK ADAM
1. Hard working hackers have recieved more then 700,000 pounds from thousands of
bank accounts in Britain using a malicious software which claimants say is the deadli-
est,brutaliest(whats this???)trojan attack ever seen....
2. More then 4,000 online banking customers have found themselves as unwanted customers
of this deal by hackers which empties their accounts while showing them fake statements so
the crime goes undetected.This trojan is being termed and guessed as a variant of the Zeus
trojan banking virus called Zeus v3. This is capable of collecting data such as passwords and
even transfers money out of accounts automatically.
3. Beware ...nothing of this scale has happened till date in INDIA...why....because poor dont
have much money and the rich keep and talk cash
1. Ever seen your account with minute details of each and every penny/cent/paise in your account...I m
sure many of you wouldn’t have....how does it matter if its Rs 22323.45 or Rs 22322.12.....a diﬀerence of
some paise ...we generally account for it against rounding oﬀ....but now on be ware...u may just be a salaami
target....better known as Saalami Attack
2. An example of this also known as penny shaving, is the mal practice of stealing money repeatedly in
extremely small quantities, usually by taking advantage of rounding oﬀ to the nearest money unit viz cent
or paisa in ﬁnancial transactions. It would be done by always rounding down, and putting the fractions of a
cent into another account. The idea is to make the change small enough that any single transaction will go
3. IT comes with a whole lot of things...u get some,u loose some.....be ware.For more info click here, here
4. Thanks http://www.cyberpolicebangalore.nic.in and http://en.wikipedia.org
Windows Systernals (2010-08-23 21:58)
1. I had not heard and read about this very low key but very powerful utility site which helps one manage,
troubleshoot and diagnose Windows systems and applications incl so many unheard functions and utilities
that one can go on and on exploring all.....the complete Windows systernals Suite can be downloaded by
2. Another related site named Sysinternals Live is a service that enables to execute Sysinternals tools
directly from the Web without hunting for and manually downloading them.
3. Must see and must try site.....click here to hit direct.
BILL GATES & Khan Academy (2010-08-25 21:55)
1. I m a follower of Bill Gates on twitter and have come to know of this khan academy thru this......
2. When every one looks forward to learning from Bill Gates on so many aspects of IT education.....where
do u guess his 11 year old son looks up-to for his education.....he follows Salman Khan...no no...not the
Bollywood Dabanggg...he is another Salman Khan....click here to know more.....
3. Khan turns out thousands of videos from a converted walk-in closetin his Silicon Valley home (shown in
this pic below) ...................gr888888888 work...and imagine the amount of eﬀort that he has put in single
4. This site at http://www.khanacademy.org/ has 1600 plus videos for school level maths,chemistry and
science and many more subjects.....more news ....click here
Man in the Browser Attack : New dimension of cyber attack (2010-09-02 19:20)
1. The name is interesting though and so is the working behind....MITB (Man in the Browser) attacks are
designed by fraudsters to infect a web browser with malware which can result in mmodiﬁed web pages and
transactions that are largely transparent to both the user and the host application.Trojans incl Silent
Banker,Sinowal etc are pre programmed by fraudsters to activate when the user browser accesses a speciﬁc
website such as their online banking portal.The activated trojan can then track the online session and perform
real time interception etc that can lead to illegal money transfers,identity theft and further compromise on
the users personal info. 2. The Man-in-the-Browser attack is the same approach as Man-in-the-middle
attack, but in this case a Trojan Horse is used to intercept and manipulate calls between the browser and its
security mechanisms or libraries in real time.A MitB attack will be successful irrespective of whether security
mechanisms such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place. 3. Thanks
ScareWare : One more WAREior in the family (2010-09-02 19:58)
1. Adware,spyware,malware....and now one SCAREWARE.Imagine this...u r surﬁng innocently(???) on the
web via your home/oﬃce PC,an advertisement appears on the web-page, trying to convince you that your
computer is at risk and you must download the anti-virus to clean it. Once you click on the advertisement,
a software trigger gets activated and you get caught in an unnerving loop impossible to abort. A scanner
window will appear with red-letter warnings listing viruses purportedly infesting your hard drive. A series
of dialogue boxes will follow giving you choices that all lead to the same screen: a sales pitch. Make the
purchase, and you get a bogus inoculation. Try to cancel it, and you’ll get repeated oﬀers. It’s like stepping
into quicksand. The more you try to get out of it, the deeper you sink.....this is Scareware..the latest new
generation way to get ur PC infected...although its ﬁrst origin dates to sometime in 2004...its now that this
is getting ﬁrm roots via increased strength of web surfers who are naive about security. 2. In brief, the
scareware trickery ensnares internet users in the following steps:
• Criminals buy blocks of advertisement space on websites, intermittently slipping in a tainted adver-
• Just visiting a webpage with a tainted ad causes a fake warning box to appear.
• Clicking ”OK” or ”Cancel” launches the same thing: a ”free scan.”
After you’ve been lured into a fake ”free” scan of your PC:
• The bogus scan will purport to ﬁnd a virus infestation.
• Ensuing boxes steer the user to activate ”Personal Antivirus,” on left.
• The activation prompts take the user to a shopping cart.
• Declining to place an order triggers endless fake scans.
3. Thanks http://fanaticmedia.com
TABNAPPING : A new generation Cyber Crime (2010-09-02 21:25)
1. Another new term in the cyber crime is ”Tabnapping” a combination of ”tab” and ”kidnapping” that could
be used by phishers to dupe users into giving up passwords by secretly changing already-open browser tabs.
All browsers on Windows and Mac OS X are vulnerable.It is thus a computer exploit,a kind of phishing attack,
which persuades users to submit their login details and passwords to popular Web sites by impersonating
those sites and convincing the user that the site is genuine. Eg . An open tab of Facebook for instance may
be a false window. But very few of us may notice. As a result, we readily log in our username and password
when prompted, only to fall to phishers.
2. Aza Raskin is the person behind coining this term,this 1984 born genius is an active phishing re-
searcher.It is unlikely that Browser makers will patch this up soon the risk does not emanate from security
vulnerabilities per se.
3. However, every major browser has a ﬁlter of some kind designed to weed out malicious sites and sites
suspected of being infected with attack code. Those ﬁlters, assuming the blacklists underlying them are
current and accurate, would block tabnapping attacks.
4. Thanks http://www.standardmedia.co.ke & http://www.couponsherpa.com
E-Waste & Indian Policy (2010-09-06 07:40)
1. In my earlier blog posts at here,here & here ,issues of e-waste and its repurcussions were men-
tioned.....now seems like Indian govt has attempted to wake herself up and ﬁnd a solution.In a recent develop-
ment,Directorate of Revenue Intelligence (DRI) seized some containers in Chennai containing large quantity
of such waste. The imports were made despite a prohibitory order in this regard. The containers were full
of outdated computers and electrical waste. On further investigation, it was found that containers carried
hundreds of tonnes of e-waste sourced from Australia, Canada, Korea and Brunei in violation of norms.
2. E-waste is being dumped in the country by developing nations using loopholes in domestic rules which allow
NGOs and educational institutions to import such gadgets freely on the pretext of donations. onscious of the
fact that huge shipments of e-waste generated in developing countries are ﬁnding convenient burial ground
in India, the government had through a public notice on May 13, 2010 prohibited educational and other
institutions from importing second hand computers, laptops and computer peripherals, including printers,
plotters, scanners, monitors, keyboards and storage units. The step was short of a complete ban on such
3. The government is now looking at banning the import of used computers and other electronic waste -
coming primarily from developed nations such as US, Australia, Canada and parts of Europe - after several
cases of e-waste smuggling came to light recently. A decision is likely to be taken at the Economic Intelligence
Council meeting scheduled for this month to be chaired by ﬁnance minister Pranab Mukherjee.
4. Thanks http://timesoﬁndia.indiatimes.com
New Gen BIOMETRICS : PALMSECURE from FUJITSU (2010-09-13 07:52)
1. Quiet often we seen biometrics ﬁngers,palm,eyes,retina being chopped oﬀ in Hollywood movies for gaining
illegal access to control rooms and secure areas by the bad man...so we used to think like there is no end
and no permanent solution to this....now comes a solution to this problem wherein not the ﬁngerprint or the
palm print is taken as authentication model....it is the veins inside that exist inside the palm that matter
and should match...now these veins should also be ﬂowing blood to authenticate the logger.
2. Fujitsu provides a highly reliable biometric authentication system based on palm vein pattern recognition
technology. PalmSecure" features industry-leading authentication accuracy with extremely low false rates,
and the non-intrusive and contactless reader device provides ease of use with virtually no physiological
restriction for all users.Applications include :
• Physical access control / Time and Attendance
• User authentication to PCs or server systems
• Government / Commercial identity management systems
• OEM terminal devices (POS, ATMs or information kiosks)
• Other industry-speciﬁc applications
3. More about this here.
ORDER OF VOLATILITY OF DIGITAL EVIDENCE (2010-09-15 21:04)
1. Not all information-based evidence is the same! Evidence can be organized into an 'order of volatility¨
meaning how long it will stick around for you to collect until it automatically is lost.
2. Dan Farmer & Wietse Venema created the below table of evidence volatility, which is commonly referenced
by forensic professionals. For example, information stored on a CD-R or some optical storage media can last
for about 10-100 years depending on the brand used. Information stored in a computer`s main memory, by
contrast, will last for only tens of nanoseconds before it is wiped out by the computer`s normal processing.
TYPE OF DATA
Registers, peripheral memory, caches, etc.
Nanoseconds or less
Floppies, backup media, etc.
CD-ROMs, printouts, etc.
Tens of years
3. Very critical from forensics point of view.....most people would want to turn a computer oﬀ (or at the
very least unplug it from the network) when they realize an incident has occurred. However, as noted in the
chart above, one will lose evidence in main memory and 'network state¨ information (which other systems
the computer is connected with and what information they are exchanging) with such an approach. Even
shutting down a computer the 'normal¨ way (Start / Turn Oﬀ Computer / Turn Oﬀ in Windows XP) can
delete evidence, as Windows performs a number of housekeeping tasks in the shutdown process, such as
closing opened ﬁles and clearing out the temporary disk cache.
4. Thanks Peter C. Hewitt (Read from Browser Forensics).
Cyber Warfare : It has started (2010-09-16 13:47)
1. I have been recently digging deep into reading ”Tracking Ghostnet”& ”Shadows in the cloud”.Crisp,to
the point,full of information,a must read for all IT Security savvy personnels.This is where I got to read about
”The May 2007 DoS Attacks on ESTONIA”.Brief about this Estonia Case below :
2. Subject attacks on Estonia capitallyy known as Estonian Cyberwar or Web War 1, refers to a series of
cyber aggresses that began April 27, 2007 and deluged websites of Estonian organizations, including Estonian
parliament, banks, ministries, newspapers and broadcasters, amid the country’s row with Russia on some
relocation issue of the Bronze Soldier of Tallinn.Most of the attacks that had any inﬂuence on the general
public were distributed denial of service type attacks ranging from single individuals using various low-tech
methods like ping ﬂoods to expensive rentals of botnets usually used for spam distribution. Spamming of
bigger news portals commentaries and defacements including that of the Estonian Reform Party website also
3. Subsequent to the incident, a criminal investigation was conducted and On 24 January 2008, Dmitri
Galushkevich, a student living in Tallinn, was found guilty of participating in the attacks. He was ﬁned 17,500
kroons (approximately US $1,640) for attacking the website of the Estonian Reform Party.So surprisingly,after
so much of damge had been done,so much of ministeries websites were defaced,the followup resulted in a single
conviction of a Russian Living in ESTONIA.Imagine....one single person from Russia was found responsible
for the cyber havoc that Estonia had to face.
4. The net and the cyber world is still in the stage of nascency and there is lots coming ahead for sure in
future...like the events surfaced in the movie ”Live Free or Die Hard”.Every one across the globe today has
realized the potential of Cyber warfare.....and the power is immense....anyone who is clear....stands as ONE
MAN ARMY.....as cited through one eg above.
ZERO DAY EXPLOIT : ??? (2010-09-18 22:45)
1. While reading an article on Browser Forensics,came across this term ”0-day” exploit....whats it all
2. A zero day exploit is a malevolent computer attack that takes capitalizes on a security hole before the
vulnerability is known. This means the security issue is made known the same day as the computer attack is
made. In other words, the software developer has zero days to prepare for the security breach and must work
as quickly as possible to develop a patch or update that ﬁxes the problem.This occurs on or before the ﬁrst
or ”zeroth” day of developer awareness, meaning the developer has not had any opportunity to distribute a
security ﬁx to users of the software.
3. Zero day exploits may involve viruses, trojan horses, worms or other malicious code that can be run
within a software program. While most programs do not allow unauthorized code to be executed, hackers
can sometimes create ﬁles that will cause a program to perform functions unintended by the developer.
Programs like Web browsers and media players are often targeted by hackers because they can receive ﬁles
from the Internet and have access to system functions.While most zero day exploits may not cause serious
damage to your system, some may be able to corrupt or delete ﬁles. Because the security hole is made
known the same day the attack is released, zero day exploits are diﬃcult to prevent, even if you have
antivirus software installed on your computer. Therefore, it is always good to keep a backup of your data in
a safe place so that no hacker attack can cause you to lose your data.
4. Thanks http://www.techterms.com/
Root Kits : Hidden Undetected Threats (2010-09-18 22:57)
1. Malwares,trojans,adwares,spywares,virus,wormwares etc etc....protection vide Internet security editions by
so many OEMs...and now rootkits(its not actually a recent development....)...has been in the threat making
for about 10-12 years..but now the term is getting serious....so what actually are rootkits?
2. Rootkit is the term given to a group of utilities that hackers can misrepresent to keep access into a
computer system once they have hacked into it. It gives them admission rights to ﬁnd out usernames
and passwords, allow strike against remote systems, remain hidden by erasing history from the system
logs, and overabundance of various surreptitious tools.Rootkit is a combination of two words, 'root¨ and
'kit¨. Root means supreme & Kit means a group of programs or utilities providing access to a user to
retain a constant root-level contact to a terminal. The presence of rootkit ideally remains untraceable.
3. So more simply,they are a set of programs
that can hide not only themselves but also other viruses, spyware, keyloggers and network traﬃc from normal
antivirus and spyware removal software! Yes, a rootkit can infect your computer and take full control of it!
You look inside a folder which contains rootkit ﬁles but you will see nothing. Why? Because the rootkit has
told it to tell the user there are no ﬁles here. That is why, they are so dangerous and hard to detect...... 4.
BlackLight,RKDetector 2.0,RootkitBuster 1.6,RootkitRevealer 1.71 & Rootkit Unhooker 3.0A are few of the
rootkit removal tools available...google for further details 5. Thanks http://www.rootkitonline.com/
Browser Forensics - Not Simple (2010-09-19 13:26)
1. Just read one book by Peter C.Hewitt on Browser Forensics.An eye opener for anyone....the amount of
info that stands compromised whilst using any browser is astonishing.....
2. Now in a normal routine maintenance when I used to clear my browser History,cookies and cache....when I
used to remove unnecessary ﬁles using utilities like Glary Utilities,Cc Cleaner and Tuneup utilities....i
used to think that there r no traces left...before I was introduced to Mandiant’s Webhistory, Pasco,
Galleta and IE Passview.
3. I checked up ﬁrst with Mandiant’s Webhistory....an 8 MB ﬁle...simple to install
is a program that allows an investigator to collect, display and analyze web history data using Mandiant
Intelligent Response (MIR) technology. It seeks to provide a customizable yet simplistic interface to view
and navigate voluminous amounts of web history data. Perhaps the most powerful feature is the ability to
correlate and provide multiple views of the data (including graphical and timeline) through the Analyzer
and Web Proﬁler tool, in the hopes that investigators can come to well-informed conclusions about the data
4. So after I cleaned up my PC using every utility....and scanned the PC with this software....the result was
like nothing has been removed...all what I had accessed in last few days stands out in a compiled tabulated
form ready to be saved as a Excel ﬁle for record.So what exactly allows this info extraction in spite of
assurances from utilities available.The most recent versions of Windows store information about the pages
viewed by the browser in a ﬁle called index.dat. One of the index.dats, in turn, contains information pointing
to other ﬁles used in the browsing session. Windows has 3 types of index.dat ﬁles, for the cache, history and
cookie ﬁles, respectively.Obviously, viewing all 3 types will give us the best understanding of what browsing
took place. So....its not simply erasing ur history that could save you at some time......there is much much
Shadows in the Cloud : Cyber Espionage (2010-09-30 11:24)
Uploaded a Presentation on this recently been my fav article to read on Scribd.....
Shadows in the Cloud
CLEANERS & FOOTPRINTS (2010-10-07 17:14)
1. Oﬀ late I have been experimenting with few software’s which claim to do a 100 % cleansing action
of removing every browsing marks and history of any kind on your computer that u use for work and
surﬁng.These incl the following :
- CyberScrub Privacy Suite v 5.1 - PC Tools Privacy Guardian v4.5 - Webroot Window Washer 220.127.116.11
- MilEraserSetup XP2k - Privacy-eraser - Notrace-setup - Eraser 18.104.22.1683
2. Among these I have no doubts of who is leading?....CyberScrub Privacy Suite v 5.1 & PC Tools Privacy
Guardian v4.5.Though CyberScrub Privacy Suite v 5.1 does leave Chrome traces and does’t have Chrome
included in its list of browsers......It does a pretty neat job by giving options of wiping that include Navy
Staﬀ Oﬃce Publication (NAVSO PUB) 5239,Russian Gost,Brouce Schneier algorith and many others with
options of selecting passes......on the other side ie PC Tools Privacy Guardian v4.5...includes chrome as a
option to be selected with similar wiping algorith options.....
3. Try you must.......all of them to know the real diﬀerence or simply follow the recommendations......
Security Enabled Hardware :INTEL - McAfee Merger (2010-10-08 17:54)
1. 'Security is more eﬀective when enabled in hardware¨ provisions for something in the pipe known as
Security Enabled Hardware.Howzzz that???? There has been a lot of speculation about the rationale behind
Intel’s recent acquisition of McAfee....well if u r not aware of this Intel`s proposed $7.7billion purchase of
McAfee that comes as the most magnanimous takeover deal in the chip giant`s 40-odd-year history....u better
be now....although there is no product roadmap to speak of yet.
2. McAfee technology deeply desegregated into Intel products would mean adding security functional-
ity into Intel`s chip. But would this pushing security into silicon be able to negate the increasingly
sophisticated and dynamic threats from cyber crime? Though components of security could be sig-
niﬁcantly enhanced if chips were designed integrating this way. What about updates,patches etc 
3. Security in the 21st century is about being dynamic, responding to the ever-changing threat landscape
in real-time, which you can do with a cloud-based system powered by a network of threat intelligence sen-
sors and reputation-based technologies that stop threats before they even hit the device. Pushing security
down to the hardware level makes it very diﬃcult to be reactive, agile or fundamentally secure. 4. Thanks
My routine surﬁng on net invariably includes few video downloads,uploading videos to you tube and other
sites sometimes,convert various available audi video formats to compatible formats with the help of so many
convertors available accross,ﬁddling with audio formats,burning CDs & DVDs with videos and data ﬁles....in
a typical scenario all this would be done on arange of softwares of diﬀerent companies.....came across this
absoutely free software ie FREE STUDIO...one single window solution to evri task as mentioned above and
much more....and yes it is absolutely free...try it must...
ALL izz WELL!!!!!inside this- Check out FREE STUDIO (2010-10-08 21:56)
My routine surﬁng on net invariably includes few video downloads,uploading videos to you tube and other
sites sometimes,convert various available audi video formats to compatible formats with the help of so many
convertors available accross,ﬁddling with audio formats,burning CDs & DVDs with videos and data ﬁles....in
a typical scenario all this would be done on arange of softwares of diﬀerent companies.....came across this
absoutely free software ie FREE STUDIO...one single window solution to evri task as mentioned above
and much more....and yes it is absolutely free...try it must...
RISK MANAGEMENT : Beware while u update with Patches (2010-10-08 22:09)
1. A zero-day exploit as discussed at an earlier post in this blog .....Some thing more to it...
2. A good extract straight lift from Infosecurity-magazine.com
”For a vendor, developing the update is not the part that takes time ÷ testing is. We have more than 600
million downloads when we publish an update. If we 'just¨ break 10 % of the systems the update is installed,
it would be a huge denial of service. So testing is the name of the game. How well is an unoﬃcial patch
tested?Often the vendor publishes workarounds (at least we do). This should be part of your risk mitigation
strategy. Would the workaround be acceptable to buy you time?
How far do you trust the author of the unoﬃcial update? How big is the risk that the update comes with
pre-installed malware? The question immediately comes up: Why should we trust a vendor? Well, you
bought or downloaded the software at the ﬁrst hand ÷ so, you decided to trust the vendor at the beginning.
What do you do once the vendor releases an update? Can you de-install the unoﬃcial update?
Basically, it is a risk management decision, which should include at least the questions I raised above. Do
not just run for the unoﬃcial update ÷ to me it should be really the last resort, if even!”
3. A good site to follow : Check out http://www.infosecurity-magazine.com
Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla
1. I am sure we all endeavor to keep the antivirus updated,keep the OS patch updated,keep cleaning reg-
istries,keep cleaning browser history at regular intervals,keep ensuring regular complete scan of the precious
PC Machine that we own....we all do this to ensure that we r safe while we browse...now read further to ﬁnd
out how it all goes in vain even with the best and leading browser company......
2. Antivirus company Webroot have identiﬁed an information extracting trojan, which alters a Firefox
ﬁle, so that the browser stores passwords automatically.The trojan is named as Trojan-PWS-Nslogm and
is capable of stealing usernames and passwords stored by both Internet Explorer and Firefox browsers.By
default, whenever Firefox detects that login credentials are submitted through a Web form, it oﬀers to
remember them for future use.When this happens, the user is presented with several options which include
”Remember”, ”Never for This Site” or ”Not Now”. If they choose remember, the browser stores the username
and password in a local database.Since it’s easier to steal credentials from this database instead of injecting
the browser process and grabbing them as they are submitted, the author of this trojan thought it would
make more sense to have Firefox remember all passwords without asking users for conﬁrmation.To achieve
this, he created a routine to patch the nsLoginManagerPrompter.js ﬁle in the Firefox installation by adding
new code and commenting out some already existent lines.”The Trojan then scrapes information from the
registry, from the so-called Protected Storage area used by IE to store passwords, and from Firefox`s own
password storage, and tries to pass the stolen information onward, once per minute,” Andrew Brandt, a
malware researcher at Webroot, explains.
3. The password stealer installs itself in the c:\windows\system32 folder as a ﬁle called Kernel.exe. The
captured data is send to a command and control server via a deprecated ActiveX control called msinet.ocx.
4. So kya solution hai?...whats the solution to this?...simply stop using internet....just joking...solution being
worked out still at FIREFOX labs.Thanks http://news.softpedia.com
Stuxnet : A Milestone in Malicious Code History (2010-10-11 22:19)
1. Stuxnet,the internet worm,intent of which was thought to eﬀect Iran’s nuclear programme has now taken
a U Turn towards HINDUSTAN....
2. American cyber warfare expert Jeﬀrey Carr has assured the GoI,that China the originator of this worm
which has terrorised the world since Mid 2010. Ascribing the break down of ISRO’s INSAT 4B satellite a
few months ago ,Carr said it is China which gained from the satellite failure. Although he re aﬃrms that the
conclusions are not deﬁnite.Invariably the eﬀected systems are loaded with a Siemens software which have
been speciﬁcally targetted to which Siemens has released a detection and removal tool.Siemens recommends
installing the Microsoft patch for vulnerabilities and disallowing the use of third-party USB sticks.It is further
contemplated that incorrect remotion of the worm could cause irrepairable damage.
3. Jeﬀrey Carr says ”The satellite in question (INSAT 4B) suﬀered the power ‘glitch’ in an unexplained
fashion and it’s failure served another state’s advantage – in this case China,” he said.The connecting link
between INSAT 4B and Stuxnet is that the Siemens software is used in ISRO’s Liquid Propulsion Systems
Centre ie S7-400 PLC and SIMATIC WinCC.Something about Stuxnet...these attack Windows systems using
four zero-day attacks and targets systems using Siemens’ WinCC/PCS 7 SCADA software. It is initially
spread using infected USB ﬂash drives. Once inside the system it uses the default passwords to command
the software.Few intretsing things about this :
- Half a megabyte in size
- Written in diﬀerent programming languages (including C and C++)
- Digitally signed with two authentic certiﬁcates which were stolen from two certiﬁcation authorities (JMicron
and Realtek) which helped it remain undetected for a relatively long period of time. - Capabable to upgrade
via peer to peer.
- Eric Byres, an expert in maintaining & troubleshooting Siemens systems, expects that writing the code
would have taken many man-months.
4. Stuxnet is a threat aiming a speciﬁc industrial control system such as a gas pipeline,satellite systems &
power plants. The ultimate goal of Stuxnet is to sabotage the facility by reprogramming programmable logic
controllers (PLCs) to operate as the attackers intend them to, most likely out of their working and identiﬁed
boundaries.This worm represents the ﬁrst of many milestones in malicious code history ,it is the ﬁrst to exploit
four 0-day vulnerabilities, compromise two digital certiﬁcates, and inject code into industrial control systems
and hide the code from the operator. Whether Stuxnet will usher in a new generation of malicious code
attacks towards real-world infrastructure,overshadowing the vast majority of current attacks aﬀecting more
virtual or individual assets÷or if it is a once- in-a-decade occurrence remains to be seen.Stuxnet is of such
great complexity requiring signiﬁcant resources to develop÷that few attackers will be capable of producing
a similar threat, to such an extent that we would not expect masses of threats of similar in sophistication
to suddenly appear. However, Stuxnet has highlighted direct-attack attempts on critical infrastructure are
possible and not just theory or movie plotlines.The real-world implications of Stuxnet are beyond any threat
we have seen in the past.
5. When is India actually going to work for itself rather then performing across the globe...y is the world
telling us that we are eﬀected here...even in the case of SHADOWS IN THE CLOUD...we were told by the
Shadow server foundation that our institutes have been compromised inspite of the fact that we have all it
takes to take the IT world by storm...but we are all working for ourselves...and not for own country...cream
is ﬂowing out and getting outsorced..IT IS ACTUALLY SAD THAT THE WORLD KNOWS INDIA’S
POTENTIAL BUT THE INDIANS DONT KNOW THIER OWN.....
Biggest release of Patch update by MICROSOFT (2010-10-12 07:27)
1. Patches by MS to be released today are said to be the biggest and largest batch of updates by Microsoft
since Oct 2003.According to Microsoft, this batch will be the LARGEST in its history with no less than 16
security updates designed to address a total of 49 vulnerabilities in Windows, Internet Explorer, MS-Oﬃce
and the software giant’s .NET Framework.
2. All this eﬀort and size of the patches by MS reﬂects how vulnerable each one of us remains to the
hacking and leak of personal info in wrong hands....the batch of updates will include Windows 7 critical
updates,updates for Internet Explorer, MS -Oﬃce 2010.And all those happy using the pirated copies of OS
across remain as vulnerable as they are already....
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:41)
1. First watch this video and then read few lines on what CYBERTECTURE is?
2. A state of art technological concept that appropriates a emblematic relationship between the urban fabric
and technology. It excogitates both hardware of built environment and software system and technologies
from micro to macro scales of development.I am sure the video would have opened thinking horizons to what
mroe can be done with this.....wish to read more....click here
3. Click for more at http://www.jameslawcybertecture.com/
Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:55)
1. First watch this video and then read few lines on what CYBERTECTURE is?
2. A state of art technological concept that appropriates a emblematic relationship between the urban fabric
and technology. It excogitates both hardware of built environment and software system and technologies
from micro to macro scales of development.I am sure the video would have opened thinking horizons to what
mroe can be done with this.....wish to read more....click here
3. Click for more at http://www.jameslawcybertecture.com/
CANURE : 100 on ACID3 Test (2010-10-15 19:57)
1. Last year in March 09,I wrote on my acquaintance with ACID3 and then CHROME scored the highest
among the then present browsers.....now here comes a little known CANURE and u believe it or not...whats
the score?...100 on 100......perfect 100....m sure worth a try...when chrome is scoring about 80 in 100 ,this
claims getting 100/100 in Acid 3 Web Tests and 145/160 in HTML 5 Test.
2. Download here.
Is ur Account Hacked ?- Common ways u get compromised. (2010-10-16 07:43)
1. There is no doubt on the fact that Google users are growing phenomenally.....and with this growing rise
also comes the phenomenal rise and ways to get compromised or become a botnet.Thus a Google Account
is also valuable for spammers and other unknown citizenry looking to impair you with ur personal info and
data on ur pc and account inbox. It`s not so much about your account, but rather the fact that your circle
of relatives and friends see your Google Account and mails from it as reliable.
2. Nothing new about this but the most common ways hackers can login to your Google password are:
• Password re-use: You sign up for an account on a third-party site with your Google username and
password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access
to your Google Account.
• Malware: You use a computer with infected software that is designed to steal your passwords as you
type ('keylogging¨) or grab them from your browser`s cache data.
• Phishing: You respond to a website, email, or phone call that claims to come from a legitimate
organization and asks for your username and password.
• Brute force: You use a password that`s easy to guess, like your ﬁrst or last name plus your birth
date ('ujjwal3008¨), or you provide an answer to a secret question that`s common and therefore easy
to guess, like 'dosa¨ for 'What is your favorite food?¨
3. Another common error that we all unknowingly is that we keep the password same for multiple accounts
on yahoo,gmail,blumail and so on.......put on ur thinking caps......if one account linked to other user
name is compromised ....then in a way all are....
Stuxnet : Some more good info (2010-10-16 08:06)
1. Recently,after i mentioned Stuxnet on Meliorate...I found some more good info and FAQs at
CaaS : CRIME WARE AS A SERVICE at oﬀer now (2010-10-18 18:05)
1. Bhaigiri...Supari..khokha...and similar terms have been till date used in reference with the crime
world...now come to terms like Software as a Service(SaaS), Hardware as a service(HaaS) ,Platform
as a service(PaaS) etc and the list is all set to become endless with cloud computing...whats the relation
here?????..it goes 2 merge these two separate worldsie CRIME & IT....the earlier terms mentioned pertain
to the world of crime and the later once refer to the vast possibilities and power knocking the users....thus
refers to Crimeware as a Service(CaaS)
2. The controverting side is the world of hackers & cyber criminals who seem to exploit their technical
tools to great eﬀect. However, even for newbie hackers eager to join this world don`t need to possess the
required levels of technological expertise. CaaS (Crimeware-as-a-Service) pulled out of some distant Cloud
can provision the necessary tools, be they Virus/Worm Creation Kits, Denial of Service (DoS) applications
or more simply estabilishing a botnet.A recent research proved they can be just a mouse click away! Kits
were easily located to build a variant of 'Indra` Malware, as well as a manifestation of Badboy , providing
the user with the power to create their own version to send on to their targets.
3. Granted these are not examples of cutting-edge malware, but they do however still pose a threat to
the unprepared and unsuspecting organisation. As amazing as it may seem, even today there are large
organisations who permit access to sites, and allow the download of Malware Construction Kits ÷ and even
more worrying, there are still pockets of companies who do not maintain their anti-virus or patches in an
4. Crime is going to be a inherent part in the cyber world and the cause of worry is that unlike army and
mil est in the real world...no concrete eﬀort and source is there to resist these evil forces.We are still acting
to a situtaion when need of the hour is to be more then PROACTIVE.....
5. Thanks http://www.infosecurity-magazine.com/
Service Packs & Infection Rates (2010-10-19 22:19)
1. First it was windows XP..then it was SP1(Service Pack 1)...followed by SP2,SP3 ...further by Vista
SP1,SP2 and now Windows 7...how the upgrades in these packs have been reducing the infection rates is
brieﬂy reﬂected as per stats from Microsoft Security Intelligence Report.
- Infection rate for windows XP with SP3 is less then half of that for SP2 and less then a third of SP1.
- Windows Vista SP2 has a lower inefction rate then SP1 which is about 50 % lower then Windows Vista
- In case of Server Operating SystemS,the infection rate for windows server 2008 with SP2 is about 20 %
less then the predecessor ie Windows Server 2008 RTM.
2. Thanks http://www.microsoft.com/security/sir/
Collection of Forensic Softwares : TUCOFS (2010-10-20 21:56)
I found this good link with a identiﬁed set of softwares for various OSs and lot many links to other web-
sites..worth a look if u have some interest in DIGITAL FORENSICS
Check out this link at TUCOFS - The Ultimate Collection of Forensic Software
Crack 14 Character passwords in Seconds : Objectif Sécurité (2010-10-26 07:57)
1. There have been articles and forums on the powerful high speed GPU (video card) processors being able
to easily provision cracking passwords very apace.A new technology steps here to rule the roast and allow
password cracking upto 14 characters in seconds.....this is called Objectif Sécurité ,by a Swiss security
company,which uses rainbow tables on SSD drives.Seemingly it is the hard drive access time and not the
processor speed that slows down cracking speed. So using SSD drives can make cracking faster, but just how
fast? This technique has a phenominal capacity that could crack passwords at a rate of 300 billion passwords
a second, and could decode complex password in under 5.3 seconds.
2. A real time demo of cracking is available on line at Objectif`s free online XP hash cracker.Just visit the
link and see urself by mentioning the hash in the text box.....astoundingly simple....
3. Thanks http://www.objectif-securite.ch/en/products.php
Image Ballistics : Incredible IT (2010-10-31 16:20)
1. In a typical crime or a murder case anywhere involving a pistol or a ﬁring weapon,the forensic or the
investigating personnel’s involved can make out the make and model of the ﬁring weapon with the help of
the bullet found on site.The ﬁeld dealing with this is known as ballistics.Now sync this with the ﬁeld of
IT....now imagine that u have shot a photograph or are analyzing some pic and you wish to know which
camera was used to shoot that pic.......can u ﬁnd out???????Yes....the answer is yesss!!!the ﬁeld is known as
2. In a recent case,i read about a rave party being organized at outer skirts of a city with about a 200 plus
people ,all collegites and similar age group....all of them had a blast and a few with some wrong ideas caught
hold of a girl...drugged her and made some obscene mms and clicked some pics...next day it was uploaded
on the you tube and the social networking sites.....now how to ﬁnd the culprit?pretty diﬃcult when about
a 200 plus strength of personnel’s have to be inquired.....the answer is Image Ballistics....the investigating
agency got hold of the pics...came to know which model the pics were clicked from...yes the answer was
a famous Nokia Model mobile.....so the owners were now limited to 8 out of the 200 plus strength...there
mobiles checked and the simple recovery software’s were enough to ﬁnd out the culprit......imagine....isn’t it
 3. I checked up the state of pics clicked from my
camera years back and all answers were correct.....few Nikon,few sony.......one easy and free tool for such
investigation is JPEGSNOOP.Simple to download,very small size and great analysis report.....
4. To know more click here......
VIRUS in Boot Sector in Hard Disk fresh from OEM!!!! (2010-10-31 21:08)
Have recently heard of this in reputed makes and model of Top list hard disks OEMs.Would like to know if
some has ever encountered this or has any form of info on this?
OPERATION CISCO RAIDER (2010-10-31 22:24)
1. Counterfeiting is not new....since we were born we have been seeing dupli’s and counterﬁets of
Reebok,nike,hmv etc...the list is actually endless....this endless list is now augmented with IT inventory....to
cite you an example which has rocked the nations across is about OPERATION CISCO RAIDER.
2. Relevant original EXTRACT FROM http://www.coastnetwork.com is produced below :
” Cisco made a decision a decade ago to manufacture product in China as a way of cutting production costs.
A great deal of Cisco manufacturing is now done overseas, speciﬁcally in China. What has happened is that
many of the companies that do the outsourcing for Cisco now run an extra shift and sell the now counterfeit
hardware out the back door. After all, they have the manufacturing capability, the expertise and the full
blessing of Cisco. The result? More and more counterfeit Cisco hardware is now showing up on American
shores. Part of the problem is that China does not have strong intellectual property protection laws. This is
a situation that Cisco and many other companies are still struggling to solve and one that does not promise
to be resolved soon.
Warning signs of a possible counterfeited item:
If you are getting discounts of 40-55 % oﬀ the list price for brand new hardware, i.e. sealed boxes, then
it is a red ﬂag. The largest of Cisco`s customers ÷ the Bank of Americas, Ford Motor Company, United
Airlines, AT &T, etc. get these discounts. You don`t. If it is any consolation, even dealers do not get the
top corporate discounts.
While it is ﬂattering and tempting to receive big discounts for new Cisco hardware, it is also unrealistic and
should be treated with the utmost caution.
Ask what the retail price is and compare it to the price you are being quoted. If you are getting a 15-25 %
discount from the list price for new/sealed hardware, then you are being quoted a fair and realistic price.
Expect a reasonable discount, however; too big a discount often spells trouble.
Another sign to be aware of is the receipt of unsolicited email from unknown dealers oﬀering you Cisco
hardware at very good prices. This warning is doubly true if the email or company originates from mainland
3. Thanks http://www.coastnetwork.com/counterfeitcisco
6$ is all to shut down a Cloud Client site!!!! (2010-11-01 08:34)
1. CaaS,as mention at an earlier blog post here,has come up with a new success(or is it failure?) story.Now
this goes like this.....invest $6 and take down any client’s server with the help of Amazon’s EC2 cloud
2. The cloud-based denial-of-service attack was part of a presentation : Cloud Computing, a Weapon of Mass
Destruction? An onsite demo during the presenatation by Bryan and Anderson involved entering a name and
credit card number, the experts created a handful of virtual server instances on Amazon’s EC2. They started
with only three virtual servers, uploaded their prototype attack tool, called Thunder Clap, scaled up to 10
servers, and then took their client’s company oﬀ the Internet.Security consultants David Bryan of Trustwave
and Michael Anderson of NetSPI said that they encountered nothing to stop them, like no special bandwidth
agreements and no detection mechanisms for servers taking malicious actions. Their Thunder Clap program
uses cloud-based services to send a ﬂood of packets toward the target company’s network. They reported that
they can control the software directly or through a command left on a social network.Bryan and Anderson
launched the attack to test their client’s network, a small business that wanted its connectivity tested.
According to DarkReading, Bryan said, ”A threat agent could potentially run extortion schemes against a
company by attacking for a couple of hours – and then telling the company that, if you don’t pay me, then
I will attack you again.” Amazon reportedly failed to reply to complaints by the security consultants.
3. This can provision customised Botnets availability on rent, giving ”would-be attackers a criminal ’cloud’
from which to buy services.”......seems like it is still tooo early to rely 100 % on CLOUDS!!!!!!
4. More on this here.......
Intel opens ﬁrst chip plant in China?? (2010-11-01 18:01)
1. The article at this post here informs in detail about the location,capacity of the ﬁrst Intel chip set plant
in China.The new plant fulﬁlls Intel’s total investment commitment in China to $4.7 billion. Intel has also
established an assembly and test site in Chengdu as well as R &D centers and labs in Beijing, Shanghai and
elsewhere in China, it said.
2. What made me took a second read on this article was that since about last 6 years,whatever Motherboards
and Chipsets from intel I have bought and seen in various machines....all chip sets have a common imprint
of MADE IN CHINA since then....so if this is the ﬁrst plant being set up in china....where were the earlier
ones being made or printed???????
Adobe ﬂash Player hit!!!! (2010-11-01 18:45)
1. A critical vulnerability has been exposed in Adobe Acrobat 9.4 and earlier 9.x versions for Windows and
Macintosh operating systems & Adobe Flash Player 10.1.85.3 and prior versions for Windows, Macintosh,
Linux and Solaris operating systems; Adobe Flash Player 10.1.95.2 and earlier versions for Android; and the
authplay.dll component .
2. This exploit (CVE-2010-3654) could cause a crash and provision attacker into the drivers seat to take
control of the aﬀected system.
3. Adobe has released recommendations of how to avoid becoming a target on the subject matter but is still
working in labs to ﬁnd a ﬁx.....click here for more
Bredolab grabs Attention (2010-11-01 19:11)
1. A 27-year-old Armenian man has been charged as being the mastermind behind the Bredolab botnet, a
network of millions of compromised computers worldwide.Main features of this trojan botnet are enumerated
below for info :
• Users of computers with viruses from this network will receive a notice of at the time of next login with
information on the degree of infection.
• Bredolab, known for spreading spam and rogue antivirus, is thought by some experts to have infected
at least 30 million computers.
• Spread via drive-by attack websites and spam email attachments.
• Infecting machines with a backdoor that downloads additional malware without the victim’s knowledge.
• Sends out spoofed password reset messages to Facebook users in an attempt to spread malware and
infect users of the social network.
• Has the power to obtain information on the user’s computer including the ability to copy, change or
delete ﬁles and other information,”
• Pushdo botnet uses Facebook to spread malicious email attachment: A phony message warns users
that their Facebook password has been reset.
• Majority of infections are in the U.S. and the U.K. and many Western European countries.
• Discovered by the Dutch High Tech Crime Team in the late summer.
• Capable of infecting 3 million computers a month. The botnet network used servers hired in the
Netherlands from a reseller of LeaseWeb, which is the largest hosting provider in the Netherlands, and
one of the largest hosts in Europe.
• Able to constantly change its appearance to avoid detection by traditional antivirus signatures. Like
other botnets, the Trojan communicated with the command-and-control server using encrypted mes-
Mozilla @ Prone again!!!! (2010-11-02 07:54)
attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the
appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory
corruption, as exploited in the wild in October 2010 by the Belmoo malware.
2. Thanks http://www.us-cert.gov
MICROSOFT & Failures!!! (2010-11-02 22:08)
1. For a IT giant like MicroSoft,this would not sync well,but for Microsoft,the year 2010 has seen more of
closures of major projects launched with lots of promises and fanfare but somehow unfortunately it did not
go the way microsoft desired tooo...and so had to be shut down in the same year....the list goes like this with
some details in few lines ....
• February 2010 saw Microsoft announcing discontinuation of ”Xbox Live service for original Xbox con-
soles and games.
• April 2010, Microsoft conﬁrmed stopped working on tablet project, codenamed Courier which was
touted to be an Apple iPad rival.
• September 2010, Microsoft announced that the Windows Live Spaces blogging service will be Terminate
gradually in favour of WordPress.com.
• May 2010, Microsoft announced halt on the Response Point phone system.
• June 2010 saw Microsoft announcing discontinuation its new generation of smartphones.
• September 2010, Microsoft announced closure of Vine, a service built to help keep friends and family
in touch during emergencies.
2. Thanks TimesofIndia
Get Paid to Hack GOOGLE (2010-11-04 17:31)
1. Google has made it oﬃcial now vide which Google willl pay $500 and $3,133 to people who discover
security vulnerabilities in its websites and online applications.......Google calls the program ”experimental,”
but says it gives security researchers new incentives to report Web ﬂaws directly and in real time to Google’s
security team thereby improving upon zero day exploit matters.
2. This provisions Google a chance to ﬁx the vulnerabilities before it is exploited the way it should be. So, in
order to qualify, security researchers must privately disclose new ﬂaws to Google ﬁrst before they go public
with their research. Thus depending on the extent and scale of vulnerability made known to google,so will
be the prize money awarded....And Google says that participants shouldn’t use automated tools to search
Removing METADATA from JPEG & IMAGE FILES (2010-11-04 18:14)
1. Invariably we all ﬁnd various images from the net for our routine use,download them,modify them and
use them in our sites and posts....but are we authorised to do so?...coz each jpeg and image ﬁle by a digital
camera holds info in form of metadata and in few cases...the images may be copy right which may inadver-
tently rule against the user....so what to do to ensure safe...simple ...remove metadata from the image....but
how?...here comes jhead for your help.Read and follow the instructions below :
- Press Start & Run or Windows key + R to open Run menu, type cmd.exe and press OK
- Type cd\ [To reach root directory]
- Type C:\md removemetadata [To create a new directory by the name removemetadata]
- Type C:\cd removemetadata [To reach the directory and Copy all pictures whose metadata is to be removed
to this directory ]
- Download the program ﬁle jhead.exe to C:\removemetadata
- Type cd removemetadata
- To remove all metadata of all JPEG ﬁles in ”this dir, type: jhead -purejpg * and press enter
2. So doing this small,boring but important function will avoid case study like the mumbai case mentioned
at an earlier post.
3. Another easy way is to simply take a screen shot of the image and paste it in paint brush.But this would
be cumbersome to do when the images are in bulk quantity.To download JHEAD...click here
Full stop from being tracked online :An attempt from FIREFOX (2010-12-05 18:50)
1. Firefox is working on a system which will provision web surfers to stop from being tracked online.We all
know how behemoths viz Google,Facebook and a plethora of OWMs use such information to sell targeted
adverts and make money without ever asking the consent of the user.Such a move would be welcomed by
privacy campaigners who have long complained that Google & Facebook are taking indecorums with the
information .Currently these information seeking companies make use of ’cookies’ that automatically save
themselves onto users computer when they surf the web, and then keep a track of the browsing history.This
data is then sold on to advertisers who put highly lucrative targeted ads on the individual’s screen, depending
on what internet pages they have recently been looking at.
2. Vice president of engineering at Mozilla,Mike Shaver,summed up the plan by saying the aim was to ”put
the user in control but not overwhelm them”.And this would not only be a welcome step being used against
information thefts but also actually be a booon for users who have been taken on a ride for so long on which
they never ever desired to also......
Operation Pay Back & LOIC (2010-12-28 22:29)
A good one to read about the link between Mega D Botnet,Operation Pay Back with the aid of LOIC @
Case of Albert Gonzalez : The Largest Online Fraud in U.S. History (2011-01-29 10:44)
1. This case that I recently read in brief pertains to an interesting online fraud case against Albert Gonzalez.I
have made it in a sequential point to compress the complete story for easy reading and grasping : 
(a) Albert started using computers at an early age, and while in high
school, managed to hack into the Government of India’s website[ :( ]. Sadly, he was not charged at this
stage and only warned to stay away from computers for six months. (b) At the age of 19, he started his own
group of hackers, named ShadowCrew, which traﬃcked over a million credit card numbers for use in online
fraud. When the FBI ﬁnally managed to shut the group down, Albert was charged. However, he worked
with the investigators and gave away vital information on his cohorts and did not need to serve a sentence.
(c) Still on,Albert after two years worth of hardwork(????) compromised on sensitive data including 45.6
million credit and debit cards. (d) TJX Companies notiﬁed the authorities of their data leakage. Albert
had the abilities to crack and hack his way through, but the low security measures didn’t help TJX. Albert
was able to install his malware and sniﬃng software onto the networks of TJX and all the stores operating
under them, even outside of the United States. TJX discovered the breach in December of 2006 and was
under the belief that they had only been losing data for the past six to seven months, dating back to May
2006. After further investigation, they found that they were losing sensitive data since 2005. Albert had
already moved on to bigger and better operations by the time TJX had even started discovering the extent of
their security breach. (e) Gonzalez and his accomplices used SQL injection techniques to create malware
backdoors on several corporate systems in order to launch packet sniﬃng (speciﬁcally, ARP Spooﬁng)
attacks which allowed him to steal computer data from internal corporate networks. (f) During his spree he
was said to have thrown himself a $75,000 birthday party and complained about having to count $340,000 by
hand after his currency-counting machine broke.(ha ha ha.....wow!!!!anyway) (g) Gonzalez had three federal
indictments: - May 2008 in New York for the Dave & Busters case (trial schedule September 2009) - May
2008 in Massachusetts for the TJ Maxx case (trial scheduled early 2010) - August 2009 in New Jersey in
connection with the Heartland Payment case. (h). On March 25, 2010, Gonzalez was sentenced to 20 years
in federal prison. 2. For details of the case with many links please visit HERE
FBI : A Parent’s Guide to Internet Safety (2011-01-29 11:00)
A must read guide from The Federal Bureau of Investigation (FBI), an agency of the United States
Department of Justice for all the parents in the world, advising & trying to make them understand the
complexities of online child exploitation.....please click HERE
Trojan.Spy.YEK : The Corporate Spying Tool (2011-01-29 11:26)
1. The Stuxnet trembles and quakes are still not over and unlikely to be forgotten for some years.After the
stuxnet storm ,each one from the corporate sector IT bosses to IT admins in individual capacities,every one
was trying to be careful of any sign of outside intrusion . These days when some e-threat comes along and
sniﬀs for critical data, it could mean billions & trillions of money IN/OUT in seconds. 2. Trojan.Spy.YEK is
unlike a regular Spying Trojan that looks for documents and archives that may hold private information
but also sends it back to the attacker. 3. Trojan.Spy.YEK has both spying & backdoor features with an
encrypted dll in its overlay, this Trojan is easily saved in windows\system32\netconf32.dll and once injected
in explorer.exe nothing can stop it from connecting (whenever necessary) to a couple of easy pings & sharing
all with the attacker. 4. The backdoor component helps it register itself as a service so as to receive and
follow instructions from a command and control center, while the spyware component sends away data
about ﬁles, operating system, while also making screenshots(trying to make a user freindly hand guide for
later action...isn’t it so caring?????) of the ongoing processes. 5. Some of the commands it is supposed to
execute are: sending the collected ﬁles using a GET request, sending info regarding the operating system and
computer, taking screenshots and sending the results, listing the processes that run on the system and sends
them away, ﬁnding ﬁles with a certain extension. Shortly put, it uploads all the interesting data on a FTP
server without the user`s consent. 6. The fact that it looks for all that it is linked to archives, e-mails (.eml,
.dbx), address books (.wab), database and documents (.doc, .odt, .pdf etc) makes Trojan.Spy.YEKa prime
suspect of corporate espionage as it seems to target the private data of the companies. 7. This infection will
change the registry settings and other important windows system ﬁles. If Trojan.Spy.YEK is not removed it
can cause a complete computer crash.Some Trojan.Spy.YEK infections contain trojan and keyloggers which
can be used to steal sensitive data like passwords, credit card, bank account information etc. 8. On top of
that, the Trojan can run without problems on all versions of Windows® from Win 95® to Seven®.
BitDefender : Tips for Safe Shopping on Mobile Devices (2011-01-29 11:44)
A small piece of advice by BitDefender on security aspects while using new generation mobile devices.Pls
IE users stand vulnerable again : Warning from MICROSOFT (2011-02-01 20:43)
1. This one is a real eye (....or more simply account) opener of so many IE Web browser users across the globe
and this one comes straight from the horses mouth....ie MICROSOFT which has warned that the approx
900 million users of its Internet Explorer Web browser are at risk of having their computers commandeered
and their personal information stolen by hackers.Microsoft has issued a ’critical’ security alert over a newly-
disclosed ﬂaw that impacts all versions of the company’s Windows operating system, including Windows
XP (SP3), Windows Vista, Windows 7, Windows Server 2003 and Windows Server 2008 (R2). 2. The
trouble is meant primarily for users of IE only since no other major web browser available supports MHTML
ﬁles.Microsoft also adds that the bug is inside Windows, (else who is going to use IE??????).Till date/hr as of
now no hackers have been reported to exploit the vulnerability. 3. An attacker could construct an HTML link
designed to trigger a malicious script and somehow convince the targeted user to click it. When the user clicks
that link, the malicious script would run on the user’s computer for the rest of the current Internet Explorer
session.Such a script might collect user information (e.g. email), spoof content displayed in the browser, or
otherwise interfere with the user’s experience. 4. For the otherwise already loosing users at a quick pace,this
release would pacen up the loosing percentage of IE users across. 5. Thanks http://www.smh.com.au
AMD comes up with FUSION (2011-02-01 21:05)
1. A small mention made earlier at this blog about ISTANBUL,an AMD launch...now comes up with the
next gen processor known as FUSION. 2. The ’Fusion’ family will utilize a single-die design that combines
multi-core CPU (x86) technology with a powerful DirectX 11-capable graphics and parallel processing engine.
The APUs will also include a dedicated high-deﬁnition video acceleration block and a high-speed bus that
transmits data across diﬀering types of processor cores within the same design and will include power-saving
features enabling all-day battery life. 3. More about FUSION here
Win32.Hlux : January 2011 ” King of worms” (2011-02-06 19:46)
1. Email-Worm.Win32.Hlux was talk of the E-town in January across the webosphere. This mail worm
spreads via emails containing malicious links that prompt users to install a bogus Flash Player, supposedly
to view an e-card. The link leads to a dialog window that asks if the user agrees to download a ﬁle. Irrespective
of the response, the worm sets about to penetrate the system. In addition to propagating via email, Hlux
also has bot functionality and adds infected computers to a botnet before connecting to its command center
and executing its commands, which are primarily directed at sending pharmaceutical spam. 2. Kaspersky
Lab also detected a Trojan dropper masquerading as a key generator for the company’s products. The old
adage ”There’s no such thing as a free lunch” is particularly ﬁtting here as the dropper goes on to install
and launch two malicious programs. One of them steals program registration data and passwords for online
games. The second is a backdoor that also has keylogger functionality. 3. Kaspersky Lab also found the
mass distribution of malicious short links on Twitter. After a number of redirects, the attention-grabbing
links led users to a page promoting a rogue AV program. 4. Apart from these two hardworkers(?????..i mean
mal hardworkers) in january,the other shining star in the E-crime world is AdWare.Win32.WhiteSmoke.a
which if clicked, will download a program that demands payment to rectify errors it supposedly detects on
the system. 5. More detailed report on http://www.kaspersky.com
DRIVE BY ATTACK (2011-02-06 20:03)
1. A small and easy to infer article on DRIVE BY ATTACK here
2. Thanks http://www.bitesofapple.com
DATA STORAGE IN BACTERIA : 9,00,000 GB stored in 1 gm of Bacteria
1. Earlier discussed here & here in my 2009 posts when the study,the concept and experiments were
on test bench have now touched reality.... 2. A team of undergraduates and instructors from the Chinese
University of Hong Kong (CUHK) has found a way to store a whole lot of data onto living bacteria cells
through a process they call 'massively parallel bacterial data storage.¨ And in addition to storing huge
amounts of data, they have also ﬁgured out how to store and en/decrypt data onto living bacteria cells.
 3. The team has managed to squeeze more than
931,322GB of data onto 1 gram of bacteria (speciﬁcally a DH5-alpha strain of E.coli, chosen for its extracted
plasmid DNA size) by creating a massively parallel bacterial data storage system. Compared to 1 to 4GB per
gram data density of conventional media, the 900,000GB per gram ﬁgure the team has returned is genuinely
stupefying ie like to ﬁt the equivalent of 450 2TB hard disks (900TB) on a single gram of E.coli bacteria. 4.
A small ppt straight from the team can be seen here.
5. Thanks devilsduke.com for the pic
Anonymous (2011-04-12 04:06:24)
Its funny. What if we decided to store all of mankinds planet secrets into bacteria and send it into space. Than
somehow mutates with another organism creating artiﬁcial life and than creating a race that will destroy the planet...
Just some out of reality thinking... =]
INTERNET KILL SWITCH???? (2011-02-09 20:34)
1. Recent events in Egypt and the debate over the 'Cyber Security and American Competitiveness Act of
2011¨, has introduced the cyber world with a yet another jargon term 'INTERNET KILL SWITCH¨.Whats
this all about and what does this mean.....crux in brief as i understood after going through few good infor-
mative sites....read onnnnn!!!!! 2. The term would give US the best tools available to swiftly respond to a
signiﬁcant CYBER threat.Thus if the U.S. detected a serious cyberthreat at some point of time, this switch
would enable the US President to instantly shut down any infrastructure connected to subject infrastruc-
ture.It is not a mandate to be able to shut down the entire Internet but rather authorizes the president to
order turning oﬀ access to 'critical infrastructure¨ . 3. Our interest here is to look at just one dimension
of the issue ÷ the technical feasibility; the political and policy aspects, we`ll leave to others. 4. Thanks
MALWARE & AUTORUN : LOVE BIRDS OF PROPOGATION (2011-02-09 20:40)
1. All the family members of trojans,malware and adwares few of which are mentioned above have one
similarity in form of a common propagation method. They all ab”use” the autoplay feature of Autorun,
many by creating or manipulating Autorun.inf ﬁles on network drives and removable media, so that when
a user connects, the malware is automatically executed on their system. Newer operating systems, like
Windows Vista and Windows 7, have made changes to the way Autorun is conﬁgured (Windows Vista) and
how it works by default (Windows 7). These changes appear to have had a signiﬁcant diﬀerence in the ability
for autorun-abusing malware to successfully infect these newer operating systems, especially for Windows 7.
2. More interesting details here 3. Thanks http://blogs.technet.com & Microsoft Malware Protection
The Gawker case : EXPERIENCING A HACK (2011-02-13 20:00)
1. A six-letter password in lower-case text takes a hacker’s computer just 10 minutes to crack. But make
those letters upper-case and it takes 10 hours for it to randomly work out your password. Thus simply
upper-casing your password can minimise a hacker’s chance of ﬁnding out your account.Add numbers and/or
symbols to your password and the hacker’s computer has to work for 18 days.Despite widespread warning,
50 per cent of people choose a common word or simple key combination for their password.The most used
passwords are 123456, password, 12345678, qwerty and abc123. 2. I read about the Gawker case recently
wherein the subject media ﬁrm Gawker urged subscribers to change their passwords after its user database
was hacked and more than 1.3 million passwords were stolen.Now imagine some one like Yahoo or Google
requesting one ﬁne day on a similar line....won’t our heart come out???? 3. The exact Gawker announce
ment goes like this 'Our user databases appear to have been compromised. The passwords were encrypted.
But simple ones may be vulnerable to a brute-force attack. You should change your Gawker password and
on any other sites on which you`ve used the same passwords. We`re deeply embarrassed by this breach.
We should not be in the position of relying on the goodwill of the hackers who identiﬁed the weakness
in our systems. And, yes, the irony is not lost on us.¨ 4. The problem emanated when Gawker recently
launched a multi-site redesign thatthat failed spectacularly, leading visitors to blank pages. The culprit was
fail you no longer have websites, you have, well, nothing.The problem with Gawker`s redesign is that it uses
5. Now we all have seen it personally as we sometimes
tend to have the same password for multiple accounts on the web.....this could be a simple fall like a pack of
cards...one point failure leads to the complete fort coming down.....so guys...take care....change ur passwords
for better and stronger security.....
NOKIA & MICROSOFT : A MERGER TO READ ABOUT (2011-02-15 20:59)
1. In todays shrinking world when we hear of merger of giants...its part of normal breaking news which
hardly puts together rolling eyeballs 7 pop ups ....But this one is slightly diﬀerent or if not diﬀerent it is
really BIGGGGGGG.This is about merger of fantabulous phone hardware NOKIA and the operating system
giant MICROSOFT coming toether to produce and try beating the phones across?
2. The deal which was in the rumour rounds already went much ahead of the expectations.....in eﬀect, Nokia
is handing over its future - in smartphones at least - to Microsoft and Windows Phone 7. That means Good
bye & Happy journey Symbian . So can the combo really become the third horse in the race, giving Apple and
Android a run for their money ?I have my doubts.... 
3. Crux of the acquisition pointwise listed below : - Nokia to embrace Windows Phone as its principal
smartphone. - Nokia to contribute its expertise on hardware design, language support. - Both would closely
collaborate on joint marketing initiatives . - Bing would power Nokia`s search services(nobodys guess!!!) -
Nokia Maps would be a core part of Microsoft`s mapping services. 4. Just to mention,a year earlier when
this merger was being talked about, was once declared an april fools rumour. And now about a year later it
is on oﬃcial Microsoft site.Thanks Microsoft site for info
NOKIA should have merged with GOOGLE : Google CEO (2011-02-16 20:02)
This comes straight after the earlier post news spread across about the merge of Nokia & Mi-
crosoft......When asked about Nokia’s choice of Windows Phone 7 as its smartphone system, Schmidt
said ”Google would have loved to see Nokia pick Android instead. Google tried to convince Nokia to choose
Android, and it can still make that decision in the future”.....(ha ha ha....Google still has hopes of a future
revertive action by NOKIA....and who knows...it may just happen..we are just the readers!!!!!)
Easy Upgrade from USB 2.0 to USB 3.0 :Transcend’s USB 3.0 Express Card Adapter
1. Transcend has come up with a USB 3.0 Express Card Adapter, an easy-to-install add-in that allows
users to speedup their notebook with blatant ﬂying speed of USB 3.0 technology.The new USB 3.0 Express
Card Adapter comes with 2 high-speed USB ports that fully support Super Speed USB 3.0 standard with
bandwidth of up to 5 GB/s. In addition to this, its quick and easy 2 install, the card enables speed enthusiasts
to experience data transfer rates up to ten times faster than USB 2.0 with optimized power eﬃciency. 2.
Transcend’s PNU3 USB 3.0 Express Card Adapter is fully compatible with Windows 7 and comes at an
aﬀordable price of approx Rs 1900 with 2 years Warranty(check out Nehru Place rates before buying) 3.
Be veri careful : Recent cases of duping online in DELHI (2011-02-19 09:29)
1. Inspite of regular discussions,regular readings of various advisories,the tongue(greed) of lust for more
money doesnt stop.. & it keeps looking for opportunities and thus keeps succumbing by loosing more ....In
a recent case both pertaining to saadi own dilli...two understandably IT educated pers were robbed of a
high value money transaction...how????brieﬂy mentioned below : - New Palam Vihar Resident case :
The case pertains to the resident of New Palam Vihar at New Delhi, India, Mr Dalbir Singh who recently
recieved the typical e-mail of winning a lottery of ‘ 14 Crore ( $ 37,000 approx) in the UK.Mr Dalbir Singh
contacted the accused for ascertaining the lottery amount and was convinced to pay Rs 17 Lakh for exchange
purpose as foreign currency had to be converted to rupee.Mr Dalbir Singh instantly transferred money from
his account to the account of the fraud.Since that day of transfer Mr Dalbir Singh has been only recieving
CONDOLONCES from all his friends and relative circle around.A very typical case of cyber lottery fraud.....
- E-mail Scam Tricks Student of JNU : This case pertains to the a Jawaharlal Nehru University (JNU)
student who was recently defrauded oﬀ Rupees 3 lakhs when he fell for a malicious e-mail scam.Initially
an e-mail came to the student apparently from an institution called Global Watch Institute, asking him for
being present in dual seminars on the topic: Racism and Human Rights the Institute was holding one each
in Madrid and New York.The student stated that the ﬁrst message came to him on December 17, 2010.
And, according to him, since his ﬁeld of study had a connection with the topic, he responded stating he was
interested.The e-mail also promised about bearing the entire cost of the student’s trip. However, over time
the fraudsters started asking for money from him to take care of certain expenditures such as booking his
hotel at Madrid along with health insurance asserting that they’d all be refunded when he’d arrive in New
York.The student, believing the e-mail, wired the money, but neither heard of any seminar nor a trip abroad,
he stated. Indeed, all the things written inside the electronic mail was false.Worryingly, the above mentioned
e-mail fraud, according to security specialists, is an edition of the 419 scam, which’s also called Advance-fee
Fraud.They (specialists) outline that the method of operation in these malicious e-mail campaigns involves
duping a victim with fake pledges about certain huge reward to such an extent that he acquiesces to remit
money. For example, in the current instance, the scammers tricked the student into transferring cash after
promising falsely about arranging his presence at the seminars abroad.This is more organised form of the
frauds and scams that are happening all across..... 2. A Netizen need to know that they cannot win a lottery
unless they have not invested money on it.Please always take care of what you do on the net specially when
u r doing some kind of ﬁnacial transaction 3. Thanks http://www.hindustantimes.com/,http://ww-
ANDROID & GOOGLE : AT LOGGER HEADS???? (2011-03-02 19:29)
1. This news is bound for only one thing.....a ﬁrst big dent on Google’s untouched Kingdom in the cy-
ber world.There is a reported discord among the Android developers who are irked at Google`s Android
Market policies.They have formed the Android Developers Union to protest the policies.The new union
has compiled a list of seven demands including renegotiation of the 32pc 'Google Tax` on app sales, pub-
lic bug tracking, algorithmic transparency and increased payment options.They threaten Google that if
these demands are not met they will cease development and move their eﬀorts to rival platforms. 
2. ”If the demands are not met, we will move our applications
to alternative marketplaces or the web, cease Android development in favour of other more open platforms,
we will dissuade other developers from developing Android projects, and we will work tirelessly to counter
any of Google’s hypocritical claims about openness in the media.” 3. This seems to be the ﬁrst kind of
big set back to google who may ﬁnd loosing an edge in its battle for the smartphone operating system and
applications market vis-a-vis Apple and Microsoft.The seven demands of the android union can be seen
here... 4. This writeup does not reﬂect my views of standing against anyone or supporting anyone but wishes
to inform the readers only for info........
QUALITIES OF A GOOD ANTIVIRUS (2011-03-13 20:16)
1. Each Antivirus software in the web market today claims as the First and the topmost rated antivirus
amongst all.Each has a claim that says ”We check what others don’t”.A large percentage of typical user
have actually got no way to check out who is the actual one...Who is the BEST? They then generally select
the one that is based on the recommendations of their social circle and the convincing factor generated by
the site of the product or simply put...it can ba random selection at last. In fact in my quest to search
the best one amongst all....the number of QRs that one needs to check for one antivirus is a long one.Few
of the qualities that should not be missed at all are brieﬂy enumerated below. WEST COAST LABS
ANTI-VIRUS: The West Coast Labs Checkmark certiﬁcation for antivirus eﬀectiveness. WCL stands as
a global leader in research, testing and certiﬁcation for information security products and services. They
have market-leading technology and testing facility in the UK, USA and india.Their services are being used
by the leading global brands to create market advantage and by large business enterprises for obtaining
crucial technical insight into product performance.WCL provides an authoritative and independent service,
delivering sound, meaningful technical information on which critical business decisions can be made.More
at http://www.westcoastlabs.org/ ICSA CERTIFIED : The ICSA is an independent organization that
has a set criteria for certifying antivirus software. AV COMPARATIVES : Anti-Virus Comparative
test conducted in 2010. Overall scores are presented as Advanced + (A+), Advanced (A), Standard, and
Tested. SCOPE OF PROTECTION :Does the product protect from every threat? This rating evaluates
the breadth and depth of security from the software. While most security solutions tout 'multi-layered¨
protection, '360 degree¨ defense and/or even '100 %¨ security, some are certainly more thorough than others.
The best antivirus solutions will include traditional protection from viruses, worms, Trojans and spyware,
but should also include defense from keyloggers, phishing scams, email-borne threats and rootkits. While
antivirus programs are by no means full-blown internet security suites, they should protect from as many
threats on as many fronts as they can. EFFECTIVENESS : How eﬀective is the application at protecting
your computer from harmful viruses and other malware? This rating combines various tests and certiﬁcations
to determine how well the software performs. Antivirus is speciﬁcally designed to protect your computer, so if
it doesn`t do that well, what good is it? All the features, bells and whistles, or sleek interface can`t make up for
poor performance. We look at results from the industry-standard security software testers and professional
security organizations to ﬁnd the most eﬀective software available and evaluate overall eﬀectiveness. In
general, our highest ranked programs are also the most eﬀective. HACKERS : Anyone trying to take
control of your computer for malicious purposes. PHISHING : These criminal scams attempt to obtain your
identifying information by disguising as legitmate sources (like your bank, eBay, or facebook). ACTIVEX :
Several Microsoft programs use ActiveX controls for good, but these components can also be taken advantage
of. USER PROFILES : The software includes distinctive interfaces or features for particular users (often
beginners or advanced users). SELF-DEFENSE : The software monitors itself and the computer, eﬀectively
protecting from intrusions or unauthorized changes. SCHEDULING : The ability to schedule speciﬁc scans
to occur at a speciﬁc time or interval. HISTORY/REPORT LOGGING : The software keeps a record
of the performed tasks and results for future reference or reporting. SILENT / GAMER MODE :
The ’gamer’ mode allows you to use the computer in full-screen mode (for games, presentations, or videos)
without interruptions from the security software. LAPTOP / BATTERY SAVING MODE : The
software can be set to delay scans or intensive processes for later in order to increase battery life. LINK
SCANNER : An integrated web tool that monitors web links and prevents/warns users from clicking on
malicious sites. BOOTABLE RESCUE CD:In the event of a complete system crash, you can use the
bootable rescue disc to preempt the OS and clean the system. FREE VIRUS SCAN ONLINE: The
security manufacturer oﬀers a free virus scan online (often with incentive to purchase their products for
removal capabilities). AUTOMATIC DEFINITION UPDATES: The program automatically updates
virus deﬁnitions or DAT ﬁles. A virus deﬁnition is basically the formula that the software uses to determine
if a ﬁle is infected by a speciﬁc virus. MANUAL DEFINITION UPDATES: You can manually check
for virus deﬁnition updates. SCHEDULED UPDATES: Updates can be scheduled to run at a speciﬁc
time or interval. PULSE/PUSH UPDATES: Small, regular updates are initiated by the manufacturer
as needed to deliver important updates. ROLLBACK : The ability to revert to a previously working state
if the most recent update causes a problem. MANUAL SCANNING : Manual Scanning is the ability to
start a scan of your hard drive at any time. QUICK & DEEP SCAN : Manual and/or scheduled scans can
either be quick (scan most important areas) or deep (full scan of computer). OPTIMIZED SCANNING
: The software is conﬁgured to scan eﬃciently, only scanning areas and ﬁles that have changed since the
last scan. SCAN INDIVIDUAL FILE(S) : The software can scan an individual ﬁle for viruses. This
is often available by right-clicking on the ﬁle and choosing to scan. EXCLUDE FILES : The software
allows the user to designate certain ﬁles, folders, or drives NOT to include in the virus scan. SCAN
COMPRESSED FILES : Scans zipped (.zip) or other compressed ﬁles that are usually obtained through
emails or downloaded from the web. QUARANTINES INFECTED FILES : If a ﬁle is suspected of
being infected with a virus, it moves the ﬁle to a ”quarantine” area where you cannot accidentally access it.
AUTO-CLEAN INFECTED FILES : The anti-virus program will automatically clean or ﬁx ﬁles that are
infected. SCAN USB (AND OTHER EXTERNAL DRIVES) : The software is capable of scanning
external drives for viruses. PASSWORD PROTECT SETTINGS : Prevents the Anti-Virus settings
from being modiﬁed by other users. ADJUSTABLE SECURITY LEVELS : Security can be customized
and set to a particular level of potency. VULNERABILITIES : Microsoft and third-part software vendors
are constantly providing security patches or other updates. Some software takes a proactive approach and
helps you stay on top of the most recent updates. COOKIES : Though not typically malicious, cookies
are little chunks of code stored on your computer from web sites. SCRIPTS : Script Blocking technology
monitors Java and VBS scripts and alerts users of virus-like behavior. They stop these viruses before they can
infect a system without needing virus deﬁnitions. SPAM : Spam is unwanted email, whether it’s annoying
advertisements or a link to a virus. AUTO USB DETECT: Most antivirus software can scan USB drives,
but some automatically detect when an external drive is plugged in and will block malware from automatically
running. VIRUS SIGNATURES: Traditional virus detection is based on identifying malware by matching
it with known viruses. BLACKLISTING : Setting a ﬁle or website on the ”blacklist” means that it should
never be allowed. WHITELISTING : Setting a ﬁle or website on the ”whitelist” means that you trust
it and don’t need the security software to scan/block it. HEURISTICS : Proactive virus blocking is
possible with behavioral analysis, ﬁle emulation, and/or generic signature detection. REAL-TIME : Real-
time protection means that the software protects you from viruses automatically, while the data is being
accessed. SECURITY NETWORK : This security approach involves the software manufacturer gathering
anonymous information about your system in order to beneﬁt everyone. If a virus is found on your computer,
they can quickly ﬁnd the cause and update deﬁnitions for all users. ON-ACCESS SCANNING : Your
ﬁles are scanned when you receive them and when you try to access them. ON-DEMAND SCANNING
: You can determine which ﬁles and when to scan for viruses. It’s like manual scanning but you can be more
speciﬁc and scan a ﬁle at a particular time. Simply right-click on the ﬁlename. ADWARE : Though not
always harmful, these annoying programs cause advertisements to display on your computer without your
permission. EASE OF INSTALLATION : How easy is the product to download, install, and setup? This
rating is determined by install speed and simplicity. Security software shouldn`t be a chore to install, and
should have you protected as soon as possible. From download to install, to the ﬁrst scan; implementing
antivirus software should be quick and easy. EASE OF USE :How usable is the product? The Ease of Use
rating reﬂects how easy the product is to use, run, and maintain. Antivirus software is complex stuﬀ, but
shouldn`t require a degree in computer security. The best security programs have all the features security
experts want, but are just as easily used by a beginner. Everyday computer users want a security solution
that they can install and forget about; software that doesn`t require constant maintenance or have annoying
interruptions. The best antivirus software is ﬂexible enough to do exactly what you want to (even if that
means running by itself). FEATURES : Does the software include additional beneﬁts? Whether for added
security or simple convenience, more features usually means better software. A well-rounded feature set
takes a security solution from good to great. More than bells and whistles, added features provide security,
usability and performance beneﬁts. UPDATES : Are timely updates delivered eﬀectively? This rating is
based on the frequency and versatility of virus database updates. Security software is only as good as its
latest update. Viruses are being identiﬁed and added to signature databases all the time, so it`s important
that your virus deﬁnition list updates accordingly. Modern antivirus software are equipped with automatic
updates that perform regularly enough that you get faster updates that don`t slow down your system. The
best security providers even 'push¨ updates to you as soon as they`re available. HELP & SUPPORT :
Does the product oﬀer additional support and helpful resources? This rating is based on the quantity and
usefulness of additional product support. The best software doesn`t require reading an in-depth manual to
use, but still has one available. For speciﬁc questions, troubleshooting, and additional help, the best antivirus
manufacturers provide superior product support online and oﬀ. Additional support for software may come
in the form of assistance over the 24x7 phone, email, live chat, or through a number of additional resources
(knowledgebase, FAQs, tutorials). BACKDOOR : A special type of trojan (often called remote access
trojan or RAT), they essentially give control of your computer to a hacker. THREAT DETECTION
includes : Virus,Worm,Trojan,Spyware,Malware,Rootkit. BROWSER EXPLOITS :malicious code that
takes advantage of an internet browser vulnerability to make the browser do something you don’t want
(freeze, crash, change settings, etc.) OS EXPLOITS: Malware that is designed to take advantage of
a vulnerability in the Windows Operating System. KEYLOGGERS : A virus designed to track and
monitor user keystrokes, often used to steal passwords, credit card numbers, etc. INBOUND EMAIL
PROTECTION : The anti-virus software scans ﬁles received through incoming emails on a POP3 account.
OUTBOUND EMAIL PROTECTION : The software scans outbound email attachments so you don’t
spread viruses to others. INSTANT MESSAGING PROTECTION : The anti-virus software scans ﬁles
received through instant messaging (MSN Messenger, AIM, Yahoo Messenger). P2P/FILE SHARING
PROTECTION: The software protects from malicious ﬁles downloaded and/or accessed from peer-to-
peer ﬁle sharing programs. REGISTRY STARTUP PROTECTION : The software provides protection
before the OS loads, or has the ability to scan registry ﬁles. DIALERS : Malicious program that takes control
of your computer and uses it to dial expensive phone numbers. SUPPORTED CONFIGURATIONS:
Does it incl compatibility with Windows 7 (32 bit),Windows 7 (64 bit),Windows Vista (32 bit),Windows
Vista (64 bit),Windows XP (32 bit),Windows XP (64 bit) 2. Thanks http://www.toptenreviews.com/ and
for those who want a pdf click here to access http://www.scribd.com/doc/50645603/Qualities-of-a-Good
How to Disable/Enable Use of USB Storage Devices in Windows (2011-03-15 13:18)
1. How often in oﬃce and home, we desire to lock our USB drives from not being used by the regular circle
around to avoid any compromise on data.I m sure its many a time....either we resort to keeping the 3 level
regular strong password option or try out some third party USB Blocker option or more simply leave to
GOD and trust.But their is a way out from this...and a real easy one to atleast defy the circle with a small
trick....it goes this way.....
2. The situation to block the USB will fall in either of the categories : (a) USB storage device is not installed
in system (b) USB storage device is already installed in system CASE -1 : USB STORAGE DEVICE
IS NOT INSTALLED IN SYSTEM - Type %windir %\inf in Explorer address bar or RUN dialog box
and press Enter. It’ll open ”inf” folder. - Now look for following 2 ﬁles: usbstor.inf usbstor.pnf 3. Now to
change their user permissions setting Right-click on each ﬁle and select ”Properties”. Goto ”Security” tab
and select the desired user or group in ”Group or user names” list which you want to restrict from using USB
drives. Now in ”Permissions for Users” list, click on ”Deny” checkbox next to ”Full control” option and then
click on OK.
NOTE : - In Windows Vista, click on ”Edit” button after selecting the user or group
in ”Group or user names” list and then again select the same user or group in new di-
alog box. Now you can click on ”Deny” checkbox. 4. That’s it. Now users will not be
able to install any USB storage device in system. CASE 2 : IF THE USB STORAGE DE-
VICE IS ALREADY INSTALLED IN SYSTEM 5. Type regedit in the run taskbar and reach
at : HKEY LOCAL MACHINE\SYSTEM\CurrentControlSetackslashServices\UsbStor 
6. In right-side pane, change value of ”Start” to 4 7. Now whenever a user will attach a USB storage device
which is already installed in system, Windows will not detect it and it’ll not be shown in My Computer.
NOTE: If you want to revert it back to default, then change the value of ”Start” to 3.
The weak password problem : Now solved???? (2011-04-03 21:48)
1. We are part of the ﬁrst phase of IT revolution across the globe where every thing is happening....methods
to secure...methods to hack....stronger and powerful servers....patching vulnerabilities....ﬁghting mal-
ware....analysing stuxnets genre...and what not....every thing is happening.....now the following text (org from
http://lanl.arxiv.org/abs/1103.6219) opens another dimension to make the passwords secure..... ”Vulner-
abilities related to weak passwords are a pressing global economic and security issue. We report a novel,
simple, and eﬀective approach to address the weak password problem. Building upon chaotic dynamics,
criticality at phase transitions, CAPTCHA recognition, and computational round-oﬀ errors we design an
algorithm that strengthens security of passwords. The core idea of our method is to split a long and secure
password into two components. The ﬁrst component is memorized by the user. The second component is
transformed into a CAPTCHA image and then protected using evolution of a two-dimensional dynamical
system close to a phase transition, in such a way that standard brute-force attacks become ineﬀective. We
expect our approach to have wide applications for authentication and encryption technologies.” 2. Thanks
The weak password problem : Now solved???? (2011-04-03 21:55)
1. We are part of the ﬁrst phase of IT revolution across the globe where every thing is happening....methods
to secure...methods to hack....stronger and powerful servers....patching vulnerabilities....ﬁghting mal-
ware....analysing stuxnets genre...and what not....every thing is happening.....now the following text (org from
http://lanl.arxiv.org/abs/1103.6219) opens another dimension to make the passwords secure..... ”Vulner-
abilities related to weak passwords are a pressing global economic and security issue. We report a novel,
simple, and eﬀective approach to address the weak password problem. Building upon chaotic dynamics,
criticality at phase transitions, CAPTCHA recognition, and computational round-oﬀ errors we design an
algorithm that strengthens security of passwords. The core idea of our method is to split a long and secure
password into two components. The ﬁrst component is memorized by the user. The second component is
transformed into a CAPTCHA image and then protected using evolution of a two-dimensional dynamical
system close to a phase transition, in such a way that standard brute-force attacks become ineﬀective. We
expect our approach to have wide applications for authentication and encryption technologies.” 2. Thanks
Revenge : YouTube Style (2011-04-04 22:16)
1. Now this one is really good....we already know that IT has revolutionized our lives in so many as-
pects...all aspects like banking,oﬃce work,exchanging mails
,blogging.....making a social networking iden-
tity....keeping updates etc etc...but how many thought out the way to take REVENGE in such a eﬀec-
tive manner that the culprit bows down...and pleads GUILTY....GUILTY..... 2. An original lift from
http://www.securitynewsdaily.com is putup below for details..... 'A computer thief in Boston learnt the
hard way that performing an embarrassing victory dance is not the best way to celebrate your crime. After
his MacBook Air laptop was stolen two months ago, Bentley University freshman Mark Bao took digital
revenge, accessing a cloud server on which his computer`s data was stored to identify the culprit who`d taken
his computer, Gawker reported. According to messages posted on Bao`s Twitter account, Bao used the
backup server Backblaze to download the thief`s Safari Web browsing history and Facebook proﬁle.
The sweet revenge, however, came when Bao found a video the thief had made of himself dancing to the
Travis Porter song 'Make it Rain.¨ Bao uploaded the video to YouTube with the title 'Don`t steal computers
belonging to people who know how to use computers.¨ The video, posted on March 19, quickly became a
viral hit, and has been viewed more than 376,000 times. 'Come on, if you`re about to record a video of
yourself dancing on a stolen laptop, at least be good at dancing!¨ Bao wrote on Twitter on March 19. From
here, the story of savvy techie versus celebrating crook takes an unexpected turn. Embarrassed that his
dancing routine was made public and open to ridicule, the thief returned Bao`s laptop to the police and
wrote an email to Bao expressing his regret and asking for the video to be taken down. In an email the thief
wrote to Bao, which Bao then posted on Reddit.com, the crook said, 'I know I am in no position for asking
you for favors but Can [sic] you please put down the videos that you have put up of me. I know what I did
was wrong and if I was a diﬀerent person ﬁne leave it up but I do have two Professional jobs that iif [sic]
something like that gets leak I can get in more [sic] trouble and be more embarrass [sic] as well.¨
3. So what does the episode mean.we should all start taking backups in cloud.or do we start using
Backblaze or..or..or what?....the best way to keep out from this .is to KEEP A CLOSE TAG OF YOU
LAPTOP.. Thanks http://www.securitynewsdaily.com
Beware of ’Radioactive’ Emails (2011-04-05 07:51)
1. Japan has been struck with the worst ever crisis in all aspects of human lives,infrastructure dam-
age,economy slowdown and sadly the list goes on.....now to add to worries this is being exploited by criminals
seeking access to your personal online information. 2. Spam emails titled, 'Japan Nuclear Radiation Leak-
age and Vulnerability Analysis,¨claiming to have a detailed reports on the nuclear radiation being emitted
from the Fukushima-1 nuclear power plant are being circulated across under the false origin from Oﬃce
of Nuclear Security and Incident Response with the U.S. Nuclear Regulatory Commission.The alleged nu-
clear report is included in a Microsoft Excel ﬁle attached to the email. 3. Now anyone actually wanting
to know what course of events took place might be allured to open the Excel ﬁle, but the ﬁle is corrupted.
Opening it exposes users to a bug that allows a hacker to remotely exploit an Adobe Flash vulnerability
and execute malicious code on the victim`s computer.Rest can be easily then taken control by the back end
criminal..... 4. Now aren’t we seeing a number of cases coming up in form of hacker trying to remotely
exploit an Adobe Flash vulnerability .......too many have come up in past 2-3 years.......infact the case of
SHADOWS IN THE CLOUD & TRACKING GHOSTNET were largely based on this......so whats the
message.....BEWARE...keep yourself updated of such spams.....keep your antivirus updated
HOW DO U FIND IF YOUR PC IS HACKED?- PART 1 (2011-04-27 20:47)
1. We all keep ourselves worried over issues pertaining to our PC security including issues like if or not it is a
zombie or if the same is already a compromised one etc. But how would you ﬁnd the answer to these......call
an expert and pay from your pocket? NO....the answer is MS it self...yesss!!....Microsoft Windows has a
series of commands with the help of which a normal PC user would be able to ﬁnd out the answers..... 2.
Following are the list of commands which would be used WMIC Command - C:\> wmic process - C:\>
wmic process list brief - C:\> wmic process list full - C:\> wmic startup list full - C:\> wmic QFE list full
- C:\> wmic process list brief /every:1 The net Command - net localgroup - net localgroup administrators
Openﬁles Command - C:\> openﬁles /local on Netstat Command - C:\> netstat ÷nao - C:\> netstat -s -p
icmp - C:\> netstat -na 2 Find Command For more details on these commands...click here....
HOW DO U FIND IF YOUR PC IS HACKED?- PART 2 (2011-04-27 20:52)
1. WMIC stands for Windows Management Instrumentation Command-line It lets administrative users
access all kinds of detailed information about a Windows machine, including detailed attributes of thousands
of settings and objects. WMIC is built into Windows XP Professional, Windows 2003 and Windows Vista.
C:\> wmic process 2. When you run this command, the output may not be an easy to understand format
but the same can be formatted in several diﬀerent ways, but two of the most useful for analysing a system
for compromise are the ”list full” option, which shows a huge amount of detail for each area of the machine
a user is interested in, and the ”list brief” output, which provides one line of output per report item in the
list of entities, such as running processes, autostart programs and available shares. For example, we can
look at a summary of every running process on a machine by running: C:\> wmic process list brief 3. That
command will show the name, process ID and priority of each running process, as well as other less-interesting
attributes. C:\> wmic process list full 4. This command shows all kinds of details, including the full path of
the executable associated with the process and its command-line invocation. When investigating a machine
for infection, an administrator should look at each process to determine whether it has a legitimate use on
the machine, researching unexpected or unknown processes using a search engine. 5. Beyond the process
alias, users could substitute startup to get a list of all auto-start programs on a machine, including programs
that start when the system boots up or a user logs on, which could be deﬁned by an auto-start registry key
or folder: C:\> wmic startup list full 6. A lot of malware automatically runs on a machine by adding an
auto-start entry alongside the legitimate ones which may belong to antivirus tools and various system tray
programs. Users can look at other settings on a machine with WMIC by replacing ”startup” with ”QFE”
(an abbreviation which stands for Quick Fix Engineering) to see the patch level of a system, with ”share” to
see a list of Windows ﬁle shares made available on the machine and with ”useraccount” to see detailed user
account settings. 7. A handy option within WMIC is the ability to run an information-gathering command
on a repeated basis by using the syntax ”/every:[N]” after the rest of the WMIC command. The [N] here is
an integer, indicating that WMIC should run the given command every [N] seconds. That way, users can
look for changes in the settings of the system over time, allowing careful scrutiny of the output. Using this
function to pull a process summary every 5 seconds, users could run: C:\> wmic process list brief /every:1
Hitting CTRL+C will stop the cycle. More good examples here
HOW DO U FIND IF YOUR PC IS HACKED?- PART 3 (2011-04-27 20:55)
1. While WMIC is a relatively new command, let’s not lose site of some useful older commands. One of
my favourites is the venerable ”net” command. Administrators can use this to display all kinds of useful
information. For example, the ”net user” command shows all user accounts deﬁned locally on the machine.
The ”net localgroup” command shows groups, ”net localgroup administrators” shows membership of the
administrators group and the ”net start” command shows running services. 2. Attackers frequently add
users to a system or put their own accounts in the administrators groups, so it’s always a good idea to check
the output of these commands to see if an attacker has manipulated the accounts on a machine. Also, some
attackers create their own evil services on a machine, so users should be on the lookout for them. More
HOW DO U FIND IF YOUR PC IS HACKED?- PART 4 (2011-04-27 20:59)
OPENFILES COMMAND 1. Many Windows administrators are unfamiliar with the powerful openﬁles
command built into Windows. As its name implies, this command shows all ﬁles that are opened on the
box, indicating the process name interacting with each ﬁle. It’s built into modern versions of Windows, from
XP Pro to Vista. Like the popular ls of command for Linux and Unix, it’ll show administrators all open
ﬁles on the machine, giving the process name and full path for each ﬁle. Unlike lsof, however, it doesn’t
provide many more details, such as process ID number, user number and other information. 2. Considering
the volume of information it gathers, it’s no surprise that the openﬁles command is a performance hog.
Thus, the accounting associated with openﬁles is oﬀ by default, meaning users can’t pull any data from
this command until it is turned on. This function can be activated by running: C:\> openﬁles /local on 3.
Users will need to reboot, and when the system comes back, they will be able to run the openﬁles command
as follows: C:\> openﬁles /query /v 4. This command will show verbose output, which includes the user
account that each process with an open ﬁle is running under. To get an idea of what malware has been
installed, or what an attacker may be doing on a machine,users should look for unusual or unexpected ﬁles,
especially those associated with unexpected local users on the machine. 5. When ﬁnished with the openﬁles
command, its accounting functionality can be shut oﬀ and the system returned to normal performance by
running the following command and rebooting: C:\> openﬁles /local oﬀ
HOW DO U FIND IF YOUR PC IS HACKED?- PART 5 (2011-04-27 21:01)
NETSTAT COMMAND 1. The Windows netstat command shows network activity, focusing on TCP
and UDP by default. Because malware often communicates across the network, users can look for unusual
and unexpected connections in the output of netstat, run as follows: C:\> netstat ÷nao 2. The -n option
tells netstat to display numbers in its output, not the names of machines and protocols, and instead shows
IP addresses and TCP or UDP port numbers. The -a indicates to display all connections and listening ports.
The -o option tells netstat to show the processID number of each program interacting with a TCP or UDP
port. If, instead of TCP and UDP, you are in interested in ICMP, netstat can be run as follows: C:\> netstat
-s -p icmp 3. This indicates that the command will return statistics (-s) of the ICMP protocol. Although
not as detailed as the TCP and UDP output, users can see if a machine is sending frequent and unexpected
ICMP traﬃc on the network. Some backdoors and other malware communicate using the payload of ICMP
Echo messages, the familiar and innocuous-looking ping packets seen on most networks periodically. 4. Like
WMIC, the netstat command also lets us run it every N seconds. But, instead of using the WMIC syntax of
”/every:[N]”, users simply follow their netstat invocation with a space and an integer. Thus, to list the TCP
and UDP ports in use on a machine every 2 seconds, users can run: C:\> netstat -na 2
HOW DO U FIND IF YOUR PC IS HACKED?- PART 6 (2011-04-27 21:03)
1. Most of the commands I have discussed so far spew a lot of output on the screen, which could be hard
for a human to look through to ﬁnd a speciﬁc item of interest. But, Windows comes to the rescue. Users
can search through the output of a command using the built-in ﬁnd and ﬁndstr commands in Windows. The
ﬁnd command looks for simple strings, while ﬁndstr supports regular expressions, a more complex way to
specify search patterns. Because the regular expressions supported by ﬁndstr go beyond the scope of this
tip article, let’s focus on the ﬁnd command. By default, ﬁnd is case sensitive - use the /i option to make
it case insensitive. 2. The ﬁnd command also has the ability to count. Invoked with the /c command,it’ll
count the number of lines of its output that include a given string.Users often want to count the number of
lines in the output of a command to determine how many processes are running, how many startup items
are present or a variety of other interesting tidbits on a machine. To count the lines of output, users could
simply pipe their output through ﬁnd /c /v ””. This command will count (/c) the number of lines that do
not have (/v) a blank line (””) in them. By counting the number of non-blank lines, the command is,in
eﬀect, counting the number of lines. 3. Now, with the ﬁnd command, users can look through the output of
each of the commands I’ve discussed so far to ﬁnd interesting tidbits. For example , to look at information
every second about cmd.exe processes running on a machine, type: C:\> wmic process list brief /every:1 |
ﬁnd ”cmd.exe” Or, to see which autostart programs are associated with the registry hive H KLM, run: C:\>
wmic startup list brief | ﬁnd /i ”hklm” To count the number of ﬁles open on a machine on which openﬁles
accounting is activated, type: C:\> openﬁles /query /v | ﬁnd /c /v ”” Whenever counting items in this way,
remember to subtract the number of lines associated with column headers. And, as a ﬁnal example, to see
with one-second accuracy when TCP port 2222 starts being used on a machine, along with the process ID
using the port, run: C:\> netstat -nao 1 | ﬁnd ”2222” THANKS www.amazingit.blogspot.com
McMurdo station & more DATA CENTRE Locations (2011-05-16 21:47)
1. We all keep reading on issues like heating when we discuss data centres......now with the problems that
datacenters have with cooling, the Antarctic is perhaps the ideal site for such a facility....i thought that
was a joke before i ﬁrst read about this and saw the pics on site at here 2. The station’s datacentre is
dedicated to supporting scientiﬁc work and running the station - with 64 servers and more than 2PB of
storage connected to hundreds of desktops by a gigabit Ethernet network.McMurdo Station is the telecoms
hub for science projects, ﬁeld camps and operations in western Antarctica funded by the National Science
Foundation (NSF).To provide these services, it has a central telephone exchange and a wide spectrum of
network, radio-frequency and satellite-communication systems.At the South Pole, every day up to 100GB of
science data is transferred from the station to the US via satellite-communication links in support of multiple
NSF-funded science projects. 3. Thanks DIGIT.
INSPIRED FROM INDIA : CHINAs ATTEMPT ON TAKING ON CORRUPTION
1. In recent last few months,a lot has been happening in India in form of anshans,demonstrations,dharna’s
to bring back the black money freezing in swizz banks and to reduce corruption...so far so good...the spark
happened and is now gradually bowing to the Government which ensure and loves STATUS QUO.....atleast
thier wasy of working conﬁrms this....instead of supporting the movement...they took the key persons involved
head on and now in another about a week or so we will be back to STATUS QUO... 2. But China’s
esurient Internet users are taking a leaf from India’s anti-corruption drama by opening websites so citizens
can confess, sometimes in pitiless detail, to buying oﬀ oﬃcials.Several Chinese confess-a-bribe websites,
including ”I Made a Bribe” (www.ibribery.com), have been inspired by an Indian website ”I paid a bribe”
(ipaidabribe.com)......china ranks 78th in the corruption list whereas we list at the 87th rank...m sure
it is much worse.....apna nahee to kisi aur ka to bhala hoga........jai ho INDIAAAAAAAAAA 3. Thanks
BULLET PROOF HOSTING (2011-06-13 15:06)
1. Bulletproof hosting refers to a technique wherein web hosting ﬁrms permit their customers appreciable
leniency in the kinds of material they may upload and distribute. 2. Many service providers have ”Terms
of Service” that do not allow certain materials to be uploaded/distributed, or the service to be used in a
particular way, and may suspend a hosting account, after a few complaints, to minimize the risk of their IP
subnet being blocked by anti-spam ﬁlters using Internet Protocol (IP) based ﬁltering. Additionally, some
service providers may have ethical concerns that underpin their service terms and conditions. 3. Bullet Proof
Hosting allows people who want to promote their product, service on their web site by sending Commercial
and Bulk Emails. As well known, Email Marketing has emerged as one of the most eﬀective and economical
marketing tool. It gives you the power to broadcast your message to millions of prospects across the world
and it works! 4. This leniency has been taken advantage of by spammers and providers of online gambling
or pornography.Case in point is the case of ”McColo ISP takedown in November 2008”.McColo was one of
the leading players in the so-called ”bulletproof hosting” market ÷ ISPs that will allow servers to remain
online regardless of complaints. 5. Thanks http://bulletproof-server.net/
SYMANTEC SPOTS ONE INTERESTING E-MAIL CAMPAIGN (2011-06-13 15:24)
1. A fresh spam outbreak has been detected online that’s drawing attention widely and eﬀects users with
e-mails laced with malicious software. Reportedly, there’s one web-link embedded in the spam messages
supposedly providing details, while the same messages try to pull down a .zip ﬁle attachment.The interesting
aspect regarding the new spam mail relates to the inclusion of a password that the recipient earlier used.Now
if I see a passowrd which at one point of my cyber surﬁng I had used it is bound to stirr up doubts of
it being actually genuine.Once i donwload this zip ﬁle ,the eventual aim is achieved ie downloading the
inevitably malware. 2. Reportedly, the malware as mentioned above has been identiﬁed as Trojan.Zbot
or Zeus a Trojan which tries to grab secret data after compromising an end-user’s PC. Further, it may
take down updates and conﬁguration ﬁles online, according to Symantec. 3. Additionally the e-mail ids
and their corresponding passwords within the above unsolicited electronic mails, arrive from one prominent
social gaming website, known internationally and currently being most widespread inside Asia. 4. Hence,
Symantec advises all those who think they’ve fallen prey to compromised accounts to scan their PCs with an
AV program followed with resetting all vital passwords, particularly online banking passwords. Additionally,
they must also keep a watch over their accounts should they suspect any fraudulent operation. 5. Thanks
FLIRT BOTS (2011-06-13 15:56)
1. I am sure most of you at at some point of time in your cyber surﬁng would have come across
chat/messenging softwares like MSN or yahoo to mention a few....now although pretty old technique but
thought of mentioning it here in my blog of how many of us succumb to the meanly desires of hackers via
FLIRT BOTS.....u heard it correctly they are known as FLIRT BOTS.... 2. Here’s how Flirt Bots work:
- The Bot strikes up a conversation in a chat room - The Bots use a series of easily conﬁgurable ”dialogue
scenarios” with pre-programmed questions and discussion topics to compile a report on every person it meets
E.g.: firstname.lastname@example.org says: ”hey, whats up?” and further to this conversation they are invited to visit
a website which could be used for any variety of malicious activity. E.g.: email@example.com says: ”Ok go
to http://??????.??/?????? and accept the invite on the page baby” 3. In this case the victim is sent to a
website ”?????????.com” and is asked to provide personal information including credit card details in order
to view the ”webcam.” 4. The site can be used for many things - to host malicious downloads, or to try
to sell you Fake AntiVirus software. The URL can do and host whatever the ”bot master” speciﬁes it to
be .Frequently cyber-criminals collect a database of personal information and sell it to the highest bidder
or anyone who will pay 5. These ”Flirt Bots”, were ﬁrst reported as a proof of concept by PC Tools in
FLIRT BOTS (2011-06-13 16:03)
1. I am sure most of you at at some point of time in your cyber surﬁng would have come across
chat/messenging softwares like MSN or yahoo to mention a few....now although pretty old for the regu-
lar security guys, but thought of mentioning it here in my blog of how many of us succumb to the meanly
desires of hackers via FLIRT BOTS.....u heard it correctly they are known as FLIRT BOTS.... 2. Here’s
how Flirt Bots work: - The Bot strikes up a conversation in a chat room - The Bots use a series of easily
conﬁgurable ”dialogue scenarios” with pre-programmed questions and discussion topics to compile a report
on every person it meets E.g.: firstname.lastname@example.org says: ”hey, whats up?” and further to this conversa-
tion they are invited to visit a website which could be used for any variety of malicious activity. E.g.:
email@example.com says: ”Ok go to http://??????.??/?????? and accept the invite on the page baby” 3.
In this case the victim is sent to a website ”?????????.com” and is asked to provide personal information
including credit card details in order to view the ”webcam.” 4. The site can be used for many things - to
host malicious downloads, or to try to sell you Fake AntiVirus software. The URL can do and host whatever
the ”bot master” speciﬁes it to be .Frequently cyber-criminals collect a database of personal information and
sell it to the highest bidder or anyone who will pay 5. These ”Flirt Bots”, were ﬁrst reported as a proof of
concept(Evidence that demonstrates that a business model or idea is feasible.) by PC Tools in 2007.Thanks
MAKE incognito YOUR DEFAULT SETTING (2011-06-13 18:38)
1. We all know how to browse hidden ie Pages you view in this window won’t appear in your browser
history or search history, and they won’t leave other traces, like cookies, on your computer after you close
the incognito window. Commonly it is known as ”incognito” or ”privacy browsing”.......an avid user of
chrome ....I always had to open the browser and then select ”New Incognito Window” to work...but not
till today....a simple amendment in the target setting of properties of chrome shortcut will always make
you open the incognito window......simply append ”–incognito” at the end of the link address as shown
below : C:\Users\???????\AppData textbackslashLocal\Google\ChrometbackslashApplication\chrome.exe
–incognito 2. More clearly ...right click on the chrome shortcut on the task bar or on the desk top and click
properties.In the target text box append ”–incognito” to what is already there deﬁning the location of the
chrome browser.... 3. Thats it......
Your VOICE to charge your MOBILE (2011-06-13 21:38)
1. Amazing as it may sound reading.....but here is the way thats gonna please us all to get resolved on issues
of mobile charging...so many times it has happened that on our way out either we think the mobile is fully
charged or when we talk too much on phone.....or just when one small query will resolve us of a standing
problem...the mobile goes oﬀﬀﬀ......problem : MOBILE BATTERY IS DRAINED ....no more.....please read
ahead for brief details on the subject.... 
2. The new technique developed by Korean engineers for turning sound into electricity - technology that
could allow cell phones to be charged while users chat(...bak bakk).Thus Phones equipt with the technology
could generate power from any kind of background noise ÷ meaning the phone could be charging even when
you`re not speaking directly into the phone. The need to carry around an outlet charger could be supplanted
by time spent listening to music, or perhaps even the sound of the wind roaring past your car window.The
technology is made possible by tiny strands of zinc oxide that are sandwiched between two electrodes. As a
sound-absorbing pad atop the device vibrates to ambient noise, causing the zinc oxide wires to compress and
release. This movement is what generates the electrical current.A prototype has already converted sound of
about 100 decibels into about 50 millivolts of electricity. That`s not enough to charge a phone, but it`s an
encouraging test, and researchers are optimistic that the technology could soon be developed into something
more powerful. 3. Thanks http://blogs.forbes.com/ and http://inhabitat.com
ANDROID APPLICATIONS CLONED : Developers make it spam (2011-06-27 21:44)
1. The latest to add on to the growing web of spams is repackaged android applications.....though till now
most of the descried repackaged applications are not reported to have any malicious code in them and also
like the genuine ones they are also made available for free. These eﬀected applications have the same module
as the original, but include an advertisement module ,thus developers of these apps try making money oﬀ
the clicks on the advertisements.  2. The thing is
easy on part of the developers since it is easier on thier part to just ﬁddle with original Android apps which
are written in Java and are, therefore, easily cloned..... 3. Thanks www.f-secure.com
JAVA SE DEVELOPMENT KIT NOT FOUND!!!! (2011-08-19 22:42)
1. On way to experiment with android application with the stand SDK toolkit....i got messed up with the
installation procedure so much that i thought of just leaving it..... in spite of all java installed i got this
2. I read all trouble shoots of on JAVA site.....some diverted me to registry editors and what not.......till i
got the correct answer...simply click BACK and then NEXT again......khatam...thats the end of it.....
IBM developing PCs that may run 30 times faster (2011-08-21 12:44)
1. A one-atom-thick layer of carbon has currently become the focus of interest of IBM
and the U.S. military to build computers that function at near the speed of light. 
2. The focus is actually based on GRAPHENE, the thinnest and toughest material ever produced, that
conducts electricity, a breakthrough that opens the door to its use in digital electronics 3. Some key ﬁnding
on GRAPHINE : - Graphene is the basic structural element of some carbon allotropes including graphite,
charcoal, carbon nanotubes and fullerenes. - Graphene conducts electricity 30 times faster than silicon –
approaching the speed of light - Until recently, use of graphene was limited to development of more-eﬃcient
batteries and foldable touch screens. - Nokia, the world`s largest maker of mobile phones by volume, is
investigating the material`s potential use in cell phones, touch screens, and printed electronics. - Graphene`s
ﬂexibility and strength is astonishingly 300 times tougher than steel - may lead to the Nokia Morph, the ﬁrst
foldable phone. - 'With a graphene battery the same amount of weight and volume as a current one, you
could drive 300 miles instead of 100,¨ said Yuegang Zhang, a principal investigator at the lab. - Graphene has
the ideal properties to be an excellent component of integrated circuits. Graphene has a high carrier mobility,
as well as low noise, allowing it to be used as the channel in a FET. 4. Thanks Wiki and electroiq
Now Aerial cyber attack!!!!r u safe anyway? (2011-08-21 13:40)
”Imagine sitting in a cofee house with your laptop and chatting with your dear friend.....and then calling
a friend on your phone and then paying your bill and moving out for ur regular work” 1. Now imagine
some thing u never imagined.....all what you chatted and all what you spoke on phone in the cafe house
is compromised....all saved at a location unknown to you.... 2. Two security professionals proved as much
at the Black Hat cybersecurity convention in Las Vegas.This has been made possible after investing a few
thousand bucks, a tool box and some technical skill like these two security professionals,Richard Perkins and
Mike Tassey have done.These two guys have assembled a small, unmanned airplane that is capable of some
truly remarkable and potentially disastrous hacks. 
3. Perkins is a security engineer supporting the U.S. government and Tassey is a security consultant for Wall
Street ﬁrms. But after work, the long-time buddies would take oﬀ their cyber attack prevention hats, put
on their evil hacker thinking caps, and build their airplane in Perkins’ garage. 4. The plane can wreak lots
of havoc. - For instance, it can ﬂy over a Starbucks (SBUX, Fortune 500) and steal the personal information
of everyone connected to the coﬀee shop’s free Wi-Fi network. It can intercept your cell phone conversations
and even reroute your calls to another number. It can trace the location of speciﬁc people and follow them
home. - Perkins and Tassey spent a total of just $6,190 to build the plane. They made a point to keep
it relatively cheap and to buy components that were readily available to prove that literally anyone could
make one.”You don’t need a Ph.D. from MIT to do this,” said Perkins. ”There are no custom parts, it was
fabricated using hand tools, and very little coding is required. All you need is dedicated people.” 5. Thanks
touched........20,000 (2011-08-22 11:31)
 thanks 2 all visitors.....
CHINA CAUGHT ON WRONG FOOT in its own MARCH (2011-09-03 19:22)
1. Across the globe ,across all the cyber attacks investigated one thing that comes out common is the source
of attack ie CHINA.As always China has been always denying all claims and has been doing reverse pro-
poganda of actually deep rooted spooﬁng and involvement of other countries.But recently it was caught on
the wrong foot in front of the international nietizens.... 2. Below is the extract straight from FEDERAL
COMPUTING WEEK penned as China provides smoking gun against itself in cyberattacks by John Breeden
” But now, thanks to China itself, I have proof that the People`s Liberation Army does attack the United
States, and likely does so on a regular basis.
China`s claims of innocence have come crashing down because of an apparent mistake in editing in a docu-
mentary on the country`s own state TV that should never have gone live. The PLA presentation demonstrated
its military capabilities. Amid all the tanks and planes, the propaganda piece showed a mere four seconds
inside the group’s cyber warfare center.Without narration, one has to think that the cybersecurity part of the
piece was only put into the video by accident, a technical background shot placed between segments for a bit
of extra color. However, those four seconds are both telling and damning to the Chinese lie that they don`t
attack the United States.
Here is the incredible part: During those four seconds, we clearly see a Chinese soldier use a drop-down list
to choose from preset target websites around the world. Then he actually attacks a website in Alabama.
In this case, the website was setup to support Falun Gong, a spiritual movement outlawed in China that
practices meditation and a philosophy that emphasizes moral responsibility.
Even though all the targets shown in the four-second video were Falun Gong sites around the world, the fact
that they were in a drop-down menu is telling and appalling. You don`t set up drop-down menus with attack
buttons unless you plan to use them. And the Chinese military did push the attack button in the video, so
apparently it has no problem pulling the trigger.
So to all you people who wanted to know where my smoking gun was, watch the video. It`s clear to me that
we are under attack from China right now.
It`s time for China to own up to what it is doing. Or it`s time for the United States to do something about
it.” 3. The video link is shown below for info of all.Watch it carefully!!!!
4. Thanks http://fcw.com
HDFC CLEAN BOWLED by Hidden SQL Injection Vulnerability (2011-09-03 20:12)
1. Howoften do we ﬁnd ourselves getting irritated with the constant reminders from banks to change pass-
words every 15 days...to include few small cases,few caps,few numbers and few special characters and more
often then not 40 % of the account holders forget keeping a tab on what was the last password.....Inspite
of heavy claims by most of the banks that they have the highly secured banking netwrok here comes a
boomrang for HDFC...inspite of ample number of warnings by zSecure , a ﬁrm committed in providing
comprehensive and cost-eﬀective Penetration Testing services Networks, Servers and Web application,HDFC
had no inkling of what they were warned about and what was supposed to be done....simply banking on
some third party solution and getting into a SURRENDER SITUATION.....the story goes like this HDFC
was warned about Hidden SQL Injection Vulnerability by the ﬁrm ZSECURE.The subject vulnerability was
discovered on 15-July-2011 and was reported on 17-July-2011 (reminder sent on 24-July-2011). The HDFC
Bank`s team took around 22 days to respond to our e-mail and their ﬁrst response came on 08-August-2011
with a message:
'Thank you for sending us this information on the critical vulnerability. We have remediated the same.'
After their e-mail, we again checked the status of said vulnerability and found that the vulnerability was still
active on their web portal. We immediately replied to their email with additional proof of vulnerability and
asked them to ﬁx the same asap. Later on, after 2 days we again received an e-mail from their team with a
'We have remediated all the vulnerability reported on our website. Also we have got the application vulnera-
bility assessment performed through one of our third party service provider and they conﬁrmed that there are
no more SQL Injection vulnerability.'
Their above response left us with an unexpected surprise. We were not able to believe that such a big organi-
zation doesn`t have proper vulnerability assessment in place because we already reported the vulnerability to
them and even after conducting vulnerability assessment from a third party (as claimed) they were not able
to ﬁnd the active vulnerability in their web-portal.Thereafter, we sent complete inputs about the vulnerability
to their security team and ﬁnally the vulnerable ﬁle was removed from HDFC`s web-server. 2. The story goes
on to conﬁrm how much vulnerable we all are to such holes.Not blaming the bank singly,but the policies and
the measures supposed to be taken and adopted have no ﬁrm policies on date.It is entirely left to the third
party dependency solution....its high time for all banks to constantly take measures and keep itself updated
to all new vulnerabilities hanging around...... 3. Thanks http://www.zsecure.net
CYBER SECURITY : ACTIVE ATTACKS (2011-09-20 20:57)
An active attack involves probing the netwrok to discover individual hosts to conﬁrm the information gathered
in the passive attack phase.A lsit of tools i recently read are listed below for info.These are small but great tools
for experimenting....m doing it on a VMware machine...... arphound arping bing bugtraq dig dnstracer dsniﬀ
ﬁlesnarf ﬁndsmb fping fragroute fragtest hackbot hmap hping httping hunt libwhisker mailsnarf msgsnarf
nbtscan nessus netcat nikto nmap pathchar ping scanssh smbclient smtpscan tcpdump tcpreplay thcamap
traceroute urlsnarf xprobe2
XSS and CSS : Whats the diﬀerence ? (2011-09-20 22:33)
I often used to read XSS and CSS being read in the same context when i knew that CSS stands for Cascading
Style Sheets.There has been a lot of mixing up of Cascading Style Sheets (CSS) and cross site scripting. But
actually when people are speaking of CSS in context of Cross site scripting what they actually mean is XSS
only....its the same.....
DEEP FREEZE : A way to protect ur system!!! (2011-09-20 22:57)
1. Deep Freeze, by Faronics, is an application available for the Microsoft Windows, Mac OS X, and SUSE
Linux operating systems which allows system administrators to protect the core operating system and con-
ﬁguration ﬁles on a workstation or server by restoring a computer back to its original conﬁguration each
time the computer restarts.The other interesting salient features are mentioned below : - Deep Freeze is a
kernel-level driver that protects hard drive integrity by redirecting information being written to the hard
drive or partition. - Leaves the original data intact. - The directed information is no longer referenced once
the computer is restarted, thus restoring the system to its original state at the disk sector level. - Allows users
to make ’virtual’ changes to the system, giving them the appearance that they can modify core ﬁles or even
delete them, and even make the system unusable to themselves, but upon reboot the originally conﬁgured
’frozen’ state of the operating system is restored. - To make changes, a system administrator must ’thaw’
the protected partition by disabling Deep Freeze, make any needed changes, and then ’freeze’ it again by
re-enabling Deep Freeze. These changes become part of the protected partition and will be maintained after
restarts. 2. Deep Freeze can also protect a computer from harmful malware, since it automatically deletes
(or rather, no longer ”sees”) downloaded ﬁles when the computer is restarted. The advantage of using an
application such as Deep Freeze antivirus / antimalware is that it uses almost no system resources, and
does not slow your computer signiﬁcantly. The disadvantage is that it does not provide real-time protec-
tion, therefore an infected computer would have to be restarted in order to remove malware. 3. More at
DEEP FREEZE : II (2011-09-20 23:04)
In continuation with the earlier post here....would like readers to read this for info and value addition
Common Malware Symptoms (2011-09-25 20:43)
If you are malware hit....u r likely to see one or few or all of these symptoms:
Your programs and ﬁles are suddenly missing.
Homepage of your web browser has changed.
Search results are being redirected.
You start ending up at websites you didn’t intend to go to.
New icons & programs appear on the desktop that you did not put there.
Your desktop background has changed without your knowledge.
Your programs won`t start.
Your security protection have been disabled for no apparent reason.
You cannot connect to the internet or it runs very slowly.
Strange or unexpected toolbars appear in your web browser.
Takes longer to start and runs more slowly than usual.
Computer shows strange error messages or popups.
Freezes or crashes randomly.
Computer is performing actions on its own.
You cannot access security related websites.
maxcomputer (2011-10-04 12:34:56)
Wonderful! you are so right and I needed to hear this. maxcomputer.info
When malware prevent you surﬁng internet : MALWARE REMOVAL -1
nVidia GeForce GPU cracks six character password in four seconds (2011-10-10 20:26)
1. An nVidia GeForce GT220 graphics card, which costs about £30, is capable of cracking strong passwords
in a matter of hours. Security experts were able to crack a 6 character password in 4 seconds, a 7 character
password in less than 5 minutes, and 8 character password in four hours.So guys ...have mentioned it so many
times earlier...even a password upto 14 character in length has been shown easy to crack when i discussed
at a post here about one year back....so better take care of ur passwords...small case with few caps and
special characters with numbers upto a length of 10-15 should do it for the time being....things r getting
nasty in the hacking world.....take care.... 2. more about this at...here...here...here....here...
HIBERNATION MODE : HOW SAFE FOR YOU? (2011-10-11 22:26)
1. How often while using your PC u use the hibernation mode?I am sure that after reading the text below
u r hardly going to use it owing to the serious compromise of your info of what you do and when you do
? 2. Ok.what do we mean by hibernation mode?......it simply means that via using this mode we are
basically creating a snapshot of the contents of the computers RAM which is then saved to the root of the
hard drive as 'hiberﬁl.sys¨!!!!This would now mean that the then current running applications and other
data in RAM will be written to the hard disk. 3. For example, if we went into the hibernation mode
with our browser still open...then textual strings such as the last Google search performed or text from
an open web page will be written to hard drive as the computer 'hibernates¨. 4. The Windows hiberﬁl.sys
also become an issue while using encryption software such as TrueCrypt. If a Windows system is placed
into hibernation mode without unmounting encrypted containers or volumes then the encryption keys used
to access these containers will likely be left in RAM in plain-text. RAM will then be saved to the hard
drive in the hiberﬁl.sys. This means that we will be leaving the keys (passwords) to all of your private
containers and volumes free for the ﬁnding. 5. Ok...if at all we get hold of the hiberﬁl.sys.is it going to be
that easy to read all that hex dec info?...no certainly not.here come sandmen project for assistance..now
whats SANDMEN PROJECT..pls google..in short it is a library which assists in parsing data from the
hiberﬁl.sys. Disable Hibernation mode on Windows XP: º Right-click empty area on desktop º
Choose 'Properties¨ º Select the 'Screen Saver¨ tab º Click 'Power.¨ º Select the 'Hibernate¨ tab º
Uncheck 'Enable hibernation¨ Disable Hibernation mode on Windows 7: º Open 'Control Panel¨ º
Click 'Power Options¨ º Click 'Change plan settings¨ for you current power plan º Click 'Change advanced
power settings¨ º Expand 'Sleep¨ º Expand 'Hibernate after¨ º Enter '0' for 'Setting:¨ to set hibernate to
'Never¨ 6. Thanks http://www.anti-forensics.com
anti-forensics (2011-10-26 11:33:55)
Thank you for the reference Anupam :) I do a lot of business in India (non-forensics), very hard workers.
WIRESHARK Troubleshoot (2011-10-22 23:19)
1. The most common trouble that comes up ﬁrst time users of Wireshark is that CAPTURE INTER-
FACE drop down shows the NPF not running and thus the interface list shows NIL..... 2. The small work
to be done is that you need to install and then run WinPcap.So after you have installed Wireshark
and u have a shortcut of the application on the desktop...just right click the Wireshark and run as the
DUQU : FROM THE GEN STUXNET???? (2011-10-30 23:10)
1. Do u remember the gr8 STUXNET...who hit the cyber theatres about a year back?....i call it gr8 since
that was the ﬁrst piece of trojan which the experts called with words like marvelous,the world’s ﬁrst ’open
source weapon’.....the code which shocked the experts...though it was meant to target Siemens industrial
software and equipment running Microsoft Windows....but the percentage aﬀected was enough to do the
early damage and show the trailor of what can come ahead....now comes another in the oﬀering which
Researchers from Symantec say is likely written by the same authors and based on the same code.This is
known as DUQU.....also coming to be known as 'Son of Stuxnet¨ and a 'precursor to a future Stuxnet-like
attack.¨ 2. But another analyses by security researchers from Dell suggest Duqu and Stuxnet may not be
closely related after all. That`s not to say Duqu isn`t serious, as attacks have been reported in Sudan and
Iran. But Duqu may be an entirely new breed, with an ultimate objective that is still unknown.'Both Duqu
and Stuxnet are highly complex programs with multiple components,¨ Dell says. 'All of the similarities from
a software point of view are in the 'injection` component implemented by the kernel driver. The ultimate
payloads of Duqu and Stuxnet are signiﬁcantly diﬀerent and unrelated. 3. The security vendor Bitdefender
has also cast doubt on the supposed Duqu/Stuxnet link in its Malwarecity blog. 'We believe that the
team behind the Duqu incident are not related to the ones that released Stuxnet in 2010, for a number
of reasons,¨ BitDefender`s Bogdan Botezatu writes. While a rootkit driver used in Duqu is similar to one
identiﬁed in Stuxnet, that doesn`t mean it`s based on the Stuxnet source code. 4. Now till date,DUQU was
reportedly seen infecting machines in and around IRAN......but now the Symantec version reported is that
a server machine in aamchi Mumbai is eﬀected by this new VIRUS!!!!!!!Indian authorities seized computer
equipment from a data center in Mumbai as part of an investigation into the Duqu malicious software that
some security experts warned could be the next big cyber threat. Two workers at a web-hosting company
called Web Werks told Reuters that oﬃcials from India’s Department of Information Technology last week
took several hard drives and other components from a server that security ﬁrm Symantec Corp told them was
communicating with computers infected with Duqu. 5. So DUQU is here in INDIA.......and I m sure with the
high percentage of pirated software users in India....we r the most vulnerable to such kinds of threat.....be
updated...buy genuine....keep taking updates to avoid being EXPLOITED by EXPLOITS.................. 6.
BACKTRACK 5 : How to use ? (2011-10-30 23:24)
Recently uploaded a step by step with screen shot on how to use and beneﬁt from BACKTRACK 5 on a
virtual lab platform.....
IFRAME: http://www.scribd.com/embeds/69619754/content?start page=1 &view mode=slideshow
SOME MORE ON DUQU (2011-10-31 20:50)
Some more good info and FAQs on DUQU.....AT
RED PHONE : ENCRYPTED VOICE FOR ANDROID!!! (2011-10-31 21:52)
Here is something every android user would lov to use....AIM IS TO LISTEN AND SPEAK ON YOUR
ANDROID HANDSET WITH INBUILT ENCRYPTION OF RED PHONE APPLICATION.......isn’t it
gr888888!!! ” RedPhone provides end-to-end encryption for your calls, securing your conversations so that
nobody can listen in. It’s easy to use, and functions just like the normal dialer you’re accustomed to.
RedPhone uses your normal mobile number for addressing, so there’s no need to have yet another identiﬁer
or account name; if you know someone’s mobile number you know how to call them using RedPhone. And
when you receive a RedPhone call your phone will ring just like normal, even if it is asleep. ” Got this info
from http://www.anti-forensics.com/blog.More at http://www.whispersys.com/index.html
DUQU’s MICROSOFT LINK!!! (2011-11-02 20:21)
1. While as on date the security and anti virus teams and experts across the globe are racing to ﬁnd
and unlock the details on DUQU,some useful information on the subject bug has been released by Mi-
crosoft,which says that hackers exploited a previously unknown bug in its Windows operating system to
infect computers with the Duqu virus.”We are working diligently to address this issue and will release a
security update for customers,” Microsoft said.But on the other hand the odds are that Microsoft won’t
patch the Windows kernel bug next week that the Duqu remote-access Trojan exploits to plant itself on
targeted PCs. 2. Meanwhile,Symantec researchers said they consider hackers sent the virus to targeted
victims via emails with infected Microsoft Word documents attached. If a recipient opened the Word docu-
ment and infected the PC, the attacker could take control of the machine and reach into an organization’s
network to propagate itself and hunt for data, Symantec researcher Kevin Haley told Reuters. 3. Thanks
http://itknowledgeexchange.techtarget.com and http://www.computerworld.com
Our Browsing History Is Leaking into the Cloud!!!! (2011-11-02 21:29)
1. You do it on INCOGNITO mode or the PRIVACY mode or keep removing cookies to ensure that you are
not being tracked or u think like your browsing history does not exist....this is going to shock you.....watch this
video ”DEFCON 19: Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud”....click
down to see....
IFRAME: http://www.youtube.com/embed/BK E3Bjpe0E
2. The summary goes like this.... - 350 services get at least 1 % of your browsing activity - 33 services
get at least 5 % of your browsing activity - 16 services get at least 10 % of your browsing activity 3.
Any solutions for avoiding......yes...the video itself gives you the solution ....and as on date millions have
already adopted it...now that includes me tooo.....download the plugin for your respective browser from
DISCONNECT URSELF (2011-11-15 21:20)
1. The issue of privacy browsing is a growing worry for internet users including me.Various attempts
in form of third party utilities,browsers oﬀering incognito/privacy mode have been made and are being
made in the current webosphere.In the search for handling these issues I recently came across this
plugin...DISCONNECT.ME at http://disconnect.me/ 2. Next is straight lift extract from the site : If
you`re a typical web user, you`re unintentionally sending your browsing and search history with your name
and other personal information to third parties and search engines whenever you`re online.
Take control of the data you share with Disconnect!.
From the developer of the top-10-rated Facebook Disconnect extension, Disconnect lets you:
º Disable tracking by third parties like Digg, Facebook, Google, Twitter, and Yahoo, without requiring
any setup or signiﬁcantly degrading the usability of the web.
º Truly depersonalize searches on search engines like Google and Yahoo (by blocking identifying cook-
ies not just changing the appearance of results pages), while staying logged into other services ÷ e.g., so you
can search anonymously on Google and access iGoogle at once.
º See how many resource and cookie requests are blocked, in real time.
º Easily unblock services, by clicking the toolbar button then services (and reloading current pages)
÷ e.g., so you can play games on Facebook.
To learn more about online privacy and protecting yourself and ﬁnd out when additional browsers are
supported, subscribe to the Disconnect Newsletter at http://disconnectere.com/.
Disconnect is open-source software ÷ you can get the code at http://j.mp/dsource.
º The scary installation warning is explained at http://j.mp/dinstall (the text refers to Facebook Dis-
connect but also applies to Disconnect).
º Click the 'd¨ button then the 'Depersonalize searches¨ checkbox to turn search depersonalization
on (or back oﬀ in case you have trouble getting to Google or Yahoo services).
º Search depersonalization isn`t yet implemented for international Google domains ÷ google.fr, google.co.jp,
º Yahoo has to be unblocked while you`re logging into Flickr or Delicious but can be blocked again af-
º Unblocking Facebook isn`t possible while Facebook Disconnect is running ÷ that extension will be
autoupdated to be compatible with Disconnect in the next few days.
º You should unblock Google and Yahoo before disabling or uninstalling Disconnect ÷ doing so will
restore your cookies to their original state.
3. I have started using it without issues till now....download this at http://disconnect.me/
4. Thanks disconnect.me
DISCONNECT.ME in Incognito mode (2011-11-15 21:26)
I asked the site owner at disconnect.me of how to use this plugin while surﬁng in privacy/incognito mode
since I use incognito all the time...its default....i got this reply
Hey Anupam, you have to explicitly enable extension to run in
incognito mode in Chrome. Right- or Ctrl-click the ”d” button, pick
”Manage extensions...”, click the arrow next to Disconnect, and check
the ”Allow in incognito” box.
THREATS TERMINOLOGY & GLOSSARY : PART 1 (2011-11-24 22:50)
1. The term VIRUS is still used in talks amongst the victims of so many threats which are relatively unknown
to the normal user.Here I am putting down the commonly known present day threat terminology.I am missing
out on the regular ones that include Malware,adware,spyware,spam etc....
BACKDOOR 2. A remote administration utility which bypasses normal security mechanisms to secretly
control a program, computer or network. These utilities may be legitimate, and may be used for legitimate
reasons by authorized administrators, but they may also be misused by attackers. A backdoor is usually
able to gain control of a system because it exploits vulnerabilities, bugs or undocumented processes in the
system’s code. A Variation: The IRC Backdoor 3. There also exist IRC backdoors, which are controlled
via bots hidden in speciﬁc invite-only IRC channels accessible only to the attacker; these bots serve as the
client component of the traditional client-server backdoor arrangement. BLUE TOOTH WORM 4. A
platform-speciﬁc type of worm that propagates primarily over a Bluetooth network. This type of worm
is almost always designed to function on mobile devices, which make more use of Bluetooth connectivity
than computers. BOT 5. A malicious program that, on being installed onto a computer system, allows
the attacker to enslave the system into a network of similarly aﬀected systems known as a botnet. The
individual computers in a botnet may also be referred to as a bot or a zombie. BOTNET 6. A portmanteau
formed from the words robot and network, a ’botnet’ is a network of infected computers that can be remotely
controlled by an attacker, usually via a command-and-control (C &C) server. Each infected computer may be
known as a bot , a zombie computer , or a zombie . BROWSER HELPER OBJECT (BHO) 7. A type of web
browser plug-in speciﬁcally designed for use with the Microsoft Internet Explorer browser. A Browser Helper
Object (BHO) executes automatically every time the browser is launched and provides functionality that is
not built-in to the browser. CROSS SITE SCRIPTING 8. A type of attack in which malicious scripts are
injected into a legitimate website in oder to be served to subsequent site visitors. Cross site scripting (XSS)
attacks can result in a variety of eﬀects, including hijacked web browsing sessions, stolen session cookies,
information theft and more. As more people become increasingly dependent on web-based services, XSS
attacks are becoming increasingly common. DENIAL OF SERVICE 9. A type of Internet-based attack
that aims to deny legitimate users access to a service (for example, a website or a network) by overloading
a relevant computer resource or network device. The most common type of Denial of Service (DoS) attack
takes the form of a massive amount of requests being sent from a host machine to the target, for example,
a government website server. ICMP Flood 10. The attackers sends out a ﬂood of ICMP ECHO packets
to the target, swamping CPU usage and eﬀectively rendering the target unusable until the ﬂood is ended or
the target is reset or restarted. Peer to Peer attack 11. Attacker exploit bugs in peer-to-peer servers and
redirect clients from the peer-to-peer server to the target server instead, ﬂooding the target with thousands of
connections and overwhelming its resources. Application level ﬂoods: A DoS attack carried out via particular
applications, most commonly Internet chat systems. The most common kind of ﬂood is an IRC ﬂood, which
is carried out on the popular IRC chat system. DISTRIBUTED DENIAL OF SERVICE (DDOS)
12. A type of attack conducted over the Internet, using the combined resources of many computers to
bombard, and frequently crash, a targeted computer system or resource (e.g., a program, website or network).
GENERIC DETECTION 13. A new type of sophisticated detection that is being increasingly used by
antivirus programs to identify programs with malicious characteristics. Unlike more traditional detections
(also known as signature-based or single-ﬁle detections) a Generic Detection does not identify a unique or
individual malicious program. Instead, a Generic Detection looks for broadly applicable code or behavior
characteristics that indicate a ﬁle as potentially malicious, so that a single Generic Detection can eﬃciently
identify dozens, or even hundreds of malware. POLYMORPHIC VIRUS 14. A virus that mutates, or
modiﬁes, its own code at various intervals. The changes in code typically occur each time the virus replicates,
or infects a new machine. Detection and disinfection of a polymorphic virus can be very challenging, as
mutating code makes traditional signature-based detection methods ineﬀective. Nowadays, many antivirus
programs instead use heuristic analysis to identify polymorphic viruses. POLYMORPHISM 15. The act of
a virus ’mutating’ parts of its code at various intervals in order to evade detections. By constantly changing
its code, a virus ensures that each iteration of its code looks diﬀerent from the preceding one, making it
impossible for traditional signature-based antivirus programs to identify the two iterations as one and the
same virus. These so-called ’mutating viruses’ can be divided into polymorphic and metamorphic viruses.
Polymorphic Versus Metamorphic 16. A metamorphic virus works performs its mutation routine
diﬀerently. Rather than using encryption to obfuscate its virus body, a metamorphic virus ’rearranges’
entire chunks of actual code between iterations in order to create a seemingly diﬀerent virus. The changes in
code are directed by a metamorphic engine and despite the alterations, do not aﬀect function - that is, the
virus is still able to perform the same malicious actions through each iteration. Fortunately, the major code
changes performed by a metamorphic virus require a high degree of technical skill from the virus author,
and there are very few such viruses in the wild so far. ZERO DAY 17. A type of attack that exploits a
recently publicized vulnerability or security loophole, before program vendors or the security community are
able to develop a patch for the vulnerability. The period between the public announcement of a vulnerability
and the ﬁrst release of a patch ﬁxing the vulnerability is also sometimes referred to as ”zero hour” ÷ even if
the actual timespan is longer than an hour. Dealing With Zero-Day attacks A zero-day attack can be very
destructive, as vulnerable systems generally have few defenses against it.
COOKIES & TYPES ? (2011-11-27 21:58)
1. How often we blame it on cookies for tracking,invading our privacy.......but whats these cookies all
about?How many types exist?Are all of them dangerous?What can I do to avoid them? All answers ahead
in my posts ahead....
2. A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to
send state information to a user’s browser and for the browser to return the state information to the origin
site.The state information can be used for authentication, identiﬁcation of a user session, user’s preferences,
shopping cart contents,or anything else that can be accomplished through storing text data.Cookies are
not software.They cannot be programmed, cannot carry viruses, and cannot install malware on the host
computer . SESSION COOKIE A session cookie only lasts for the duration of users using the website.
A web browser normally deletes session cookies when it quits. A session cookie is created when no Expires
directive is provided when the cookie is created. PERSISTENT COOKIE A persistent cookie will outlast
user sessions. If a persistent cookie has its Max-Age set to 1 year, then, within the year, the initial value set
in that cookie would be sent back to the server every time the user visited the server. This could be used
to record a vital piece of information such as how the user initially came to this website. For this reason,
persistent cookies are also called tracking cookies or in-memory cookies. SECURE COOKIE A secure
cookie is only used when a browser is visiting a server via HTTPS, ensuring that the cookie is always encrypted
when transmitting from client to server. This makes the cookie less likely to be exposed to cookie theft via
eavesdropping. HTTP ONLY COOKIE The Http Only session cookie is supported by most modern
browsers.On a supported browser, an Http Only session cookie will be used only when transmitting HTTP
PARTY COOKIES A ﬁrst-party cookie either originates on or is sent to the Web site you are currently
viewing. These cookies are commonly used to store information, such as your preferences when visiting that
site. THIRD PARTY COOKIES Third-party cookies are cookies being set with diﬀerent domains than
the one shown on the address bar.For example: Suppose a user visits www.example1.com, which sets a cookie
with the domain ad.foxytracking.com. When the user later visits www.example2.com, another cookie is set
with the domain ad.foxytracking.com. Eventually, both of these cookies will be sent to the advertiser when
loading their ads or visiting their website. The advertiser can then use these cookies to build up a browsing
history of the user across all the websites this advertiser has footprints on. ZOMBIE COOKIE A zombie
cookie is any cookie that is automatically recreated after a user has deleted it. TEMPORARY / SESSION
COOKIES A temporary or session cookie is stored only for your current browsing session, and is deleted from
your computer when you close your browser. UNSATISFACTORY COOKIES Unsatisfactory cookies
are cookies that might allow access to personally identiﬁable information that could be used for a secondary
purpose without your consent. 3. Thanks www.allaboutcookies.org and http://www.f-secure.com
CONTROL COOKIES TAKING CONTROL FROM UR BROWSERS (2011-11-27 22:12)
1. In my earlier post here about cookies and types,I had mentioned about types and some relevant
details.Now this one mentions about the steers and control available in prominent browsers to disable cookies
digging into ur privacy !!! Google Chrome Go to ’Tools Menu’ Click on ’Options’ Click on ’Under the
Hood’ ’Cookie Setting’ should be selected. Once done select ’Block all Cookies’ Now all cookies should be
blocked on your Google Chrome To clear existing cookies: Go to ’Tools Menu’ Click on ’Options’ Click on
’Under the Hood’ Under ’Privacy’ section select ”Show Cookies’ A new window should open called ’Cookies’
In here you can see all the cookies within your Google Chrome Browser. Click on ”Remove All” to remove all
traces of cookies If you wish to only remove a certain cookie, simply highlight and click ”Remove” Firefox
Go to ’Tools’ in the menu bar Click on ’Options’ Click on ’Privacy Tab’ Disable the box that says ’Accept
Cookies From sites’ To clear existing cookies: Go to ’Tools’ in the menu bar Click on ’Options’ Click on
’Privacy Tab’ Click on ”Clear Now” Select ”Cookies” Click on ”Clear Private Data Now” Internet Explorer
(IE) 9.0+ Go to ’Tools’ in the menu bar which should drop down then click on ’Internet Options’ Click
on ’Privacy’ Tab on top Move the slider up to the ’Block all Cookies’ button Important Notice: Blocking
all cookies may prevent you from entering alot of sites. The next two Internet Explorer privacy levels, High
and Medium High, may be more suitable. To delete existing cookies: Go to ’Tools’ in the menu bar which
should drop down then click on ’Internet Options’ Click on ’General’ tab which should be under ’Browsing
History’ and click ’Delete’ 2. Thanks http://www.allaboutcookies.org
Cookienator : Option to control cookie menace (2011-11-27 22:26)
1. Cookienator is a tool that will helps us remain anonymous from search engines such as Google and other
web-usage trackers such as Doubleclick or Omniture.This a simple program that will leave most of cookies
alone but will remove the ones that put your privacy at risk. The best part about this is the size and ease of
installation.....It is lightweight; it’s a single executable, when run, it will tell you how many cookies it would
like to remove. It is available for free to download and is available in two forms : msi windows executable
and a zip ﬁle 
2. More at http://codefromthe70s.org/cookienator.aspx
Windows 8 Developer Preview : Pre Beta Version for Developers (2011-12-01 07:10)
I recently downloaded the Windows 8 Preview Developer edition from http://msdn.microsoft.com/en-
us/windows/apps/br229516 and then tried running it as a virtual machine.Found the following issues : -
does not run on VMWARE 7 - runs on VMWARE 8 - Donno y...but runs at a pathetic speed on
VMWARE 8 inspite of a good resourceful machine with upto 1.5 GB of RAM. - Even on installation on
VMWARE 8...doesnt show the NIC card so it has no access to Internet.So no updates. - Runs at a horse’s
pace in VIRTUAL BOX. - No NIC issues in virtual box.
LogMeIn HAMACHI (2011-12-02 22:04)
1. The law of market keep seeing ﬁghts to be at par with each other ie DEMAND & SUPPLY.Today when
security in IT is a burning issue,we have so many utilities ﬂoating that there is no way one can be trusted
blind foldly.Here come another security utility that actually stands out to work in a direction not taken up
by so many prominent software security utillities in market.This is HAMACHI 2. Hamachi is a nice ,free
2 try,tool that connects two computers via the internet by creating a virtual private network (VPN) and
protecting it with proven industry-standard encryption algorithms.This will ensure that all communications
between the two PCs at a time are safe from the spying eyes.It easily sets up in 10 minutes, and enables secure
remote access to network, anywhere there’s an Internet connection.The basic advantage that immidiately
stand out are : - LAN over the Internet - Arrange multiple computers into their own secure network, just
as if they were connected by a physical cable. - Files and Network Drives - Access critical ﬁles and network
drives. - Zero-conﬁguration - Works without having to adjust a ﬁrewall or router. - Security - Industry
leading encryption and authentication. - Cost Eﬀective - Free for non-commercial use. 3. It features a
simple interface that enables to create personal safe networks in just a couple of steps. Also the connection
is conveniently protected by an AES-256 algorithm.The problem lies that it supports only chat....and not
yet what we desire most ie ”FILE SHARING”.A new,nice attempt to take on security but still a long way to
go.... 4. Thanks https://secure.logmein.com
Snake oil Cryptography (2011-12-02 23:01)
1. While reading a post about unhackable codes here , I came across a interesting term know as SNAKE
OIL CRYPTOGRAPHY......as Alex Gostev, chief security expert at Kaspersky Labs, dismissed ENIGMA-
DS ”snake-oil cryptography,”....so found out in brief from wiki...where else!!! In cryptography, snake oil is a
term used to describe commercial cryptographic methods and products which are considered bogus or fraudu-
lent. The name derives from snake oil, one type of quack medicine widely available in 19th century United
States.Distinguishing secure cryptography from insecure cryptography can be diﬃcult from the viewpoint of a
2. Thanks WIKI
Windows 8 Developer Pre BETA : How to get full screen on a VM? (2011-12-03 14:04)
In continuation with my earlier post here about windows 8 Pre Beta edition,one thing that bugged me
for a while was not getting the display across full screen in spite of choosing ”view full screen” from drop
down.The answer to this goes like this ..SIMPLY CHOOSE A HIGHER RESOLUTION AND U WILL GET
IT.... Simple to get till u know!!!!!!!!!!!
”LIKE” Button in Facebook : Tracks u!!! (2011-12-03 21:54)
1. Internet users tap Facebook Inc.’s ”Like” and Twitter Inc.’s ”Tweet” buttons to share content with friends.
But these tools also let their makers collect data about the websites people are visiting. 2. These so-called
social widgets, which appear atop stories on news sites or alongside products on retail sites, notify Facebook
and Twitter that a person visited those sites even when users don’t click on the buttons, according to a
study done for The Wall Street Journal.Few things about these widgets : - Proliﬁc widgets - Already added
to millions of web pages in the past year. - The widgets, which were created to make it easy to share content
with friends and to help websites attract visitors, are a potentially powerful way to track Internet users. -
They could link users browsing habits to their social-networking proﬁle. - For example, Facebook or Twitter
know when one of their members reads an article about ﬁling for bankruptcy on MSNBC.com or goes to
a blog about depression called Fighting the Darkness, even if the user doesn’t click the ”Like” or ”Tweet”
buttons on those sites. - A person only needs to log into Facebook or Twitter once in the past month.
The sites will continue to collect browsing data, even if the person closes their browser or turns oﬀ their
computers, until that person explicitly logs out of their Facebook or Twitter accounts. - Facebook places a
cookie on the computer of anyone who visits the Facebook.com home page, even if the user isn’t a member.
3. Thanks http://online.wsj.com
Edited: December 3, 2011