blogger to e-book

245
From Blog to Book. ’http://anupriti.blogspot.com/’

Upload: anupam-tiwari

Post on 28-Nov-2014

451 views

Category:

Documents


0 download

DESCRIPTION

Here is one sample of how i created my complete blog with more then 200 posts into a E-Book...that to in not more then 4 min....for free from http://blogbooker.com

TRANSCRIPT

Page 1: Blogger to E-Book

From Blog to Book.

’http://anupriti.blogspot.com/’

Page 2: Blogger to E-Book

2

Page 3: Blogger to E-Book

Contents

1 2008 13

1.1 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

SPAM UNSUBSCRIBED IS SPAM SUBSCRIBED (2008-12-26 22:36) . . . . . . . . . . . . 13

MIAN BV KE JHAGDEY (2008-12-26 22:37) . . . . . . . . . . . . . . . . . . . . . . . . . . 13

HOW 2 DELIVER GOOD PRESENTATIONS? (2008-12-26 23:08) . . . . . . . . . . . . . . 13

BALANCE is DIFFICULT (2008-12-27 00:12) . . . . . . . . . . . . . . . . . . . . . . . . . 14

Ghazal maestro in making (2008-12-27 00:42) . . . . . . . . . . . . . . . . . . . . . . . . . . 14

TUNE UP 2009 UTILITIES (2008-12-27 00:53) . . . . . . . . . . . . . . . . . . . . . . . . . 15

MURPHY’s LAW : JALANDHAR 2 AMRITSAR & BACK (2008-12-28 14:56) . . . . . . . 15

RFID (2008-12-28 21:51) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

3D TELEVISION (2008-12-29 21:54) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2 2009 19

2.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

IPTV - TRIPLE PLAY or QUADRUPLE PLAY? (2009-01-01 21:35) . . . . . . . . . . . . 19

WHY BLOG? (2009-01-02 07:55) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

MPEG vs H.264 (2009-01-03 21:26) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

DUAL SCREEN LAPTOP : LENOVA (2009-01-06 22:39) . . . . . . . . . . . . . . . . . . . 21

Get Flummoxed : Futuristic Laptops (2009-01-08 15:05) . . . . . . . . . . . . . . . . . . . . 22

DOES DEMOCRACY MEAN FREE 2 STRIKE? (2009-01-09 14:49) . . . . . . . . . . . . . 26

Software Leloooo....Software lelooooo (2009-01-12 14:05) . . . . . . . . . . . . . . . . . . . . 27

Google & Carbon Dioxide : The relationship most of us don’t know (2009-01-13 18:22) . . . 28

HOLOGRAPHIC TEXT Messages (2009-01-17 23:23) . . . . . . . . . . . . . . . . . . . . . 29

COMPRESSION.... has a LIMIT? (2009-01-19 22:11) . . . . . . . . . . . . . . . . . . . . . 29

THE NAME IS RAJNIKANTH (2009-01-20 22:14) . . . . . . . . . . . . . . . . . . . . . . . 30

DETRITUS...(I mean dust) vs IT (2009-01-30 20:14) . . . . . . . . . . . . . . . . . . . . . . 32

2.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

INTEL & BIKE (2009-02-05 18:33) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

3

Page 4: Blogger to E-Book

Fighting LIGHTSCRIBE !!! (2009-02-11 16:46) . . . . . . . . . . . . . . . . . . . . . . . . . 35

IT ostracized!!!!! (2009-02-26 23:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

2.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Fight of the Browser’s : ACID3 TEST (2009-03-05 22:27) . . . . . . . . . . . . . . . . . . . 38

Be CAREFUL (2009-03-08 00:14) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

PictBridge (2009-03-17 16:05) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

THE LINK : BJP & OPEN SOURCE!! (2009-03-18 16:25) . . . . . . . . . . . . . . . . . . 43

Download video from Magazines/Billboard: MMCC (2009-03-21 23:06) . . . . . . . . . . . 44

2.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

IRON KEY : World’s Most Secure Pen Drives (2009-04-07 22:14) . . . . . . . . . . . . . . . 46

GUIYU : THE CONNECTION WITH E-WASTE (2009-04-14 23:04) . . . . . . . . . . . . 50

Recession Laptop (2009-04-30 18:30) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

2.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Nehru Place : The hub (2009-05-02 08:02) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Briefcase PC (2009-05-04 22:53) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

WORK : New Definition (2009-05-06 15:43) . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

HP and VLC at logger heads? (2009-05-09 17:07) . . . . . . . . . . . . . . . . . . . . . . . . 65

USB Bootable Vista (2009-05-11 22:13) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Chinese Mobile - Death or Life :The answer is finally LIFE (2009-05-13 08:44) . . . . . . . 68

E Waste (2009-05-17 22:29) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

E WASTE (2009-05-17 22:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

WINDOWS 7 : MY FIRST HANDSHAKE (2009-05-27 12:58) . . . . . . . . . . . . . . . . 69

WINDOWS 7 : MY FIRST HANDSHAKE-1 (2009-05-27 23:49) . . . . . . . . . . . . . . . 70

WINDOWS 7 : MY FIRST HANDSHAKE-2 (2009-05-28 14:52) . . . . . . . . . . . . . . . 71

WINDOWS 7 : MY FIRST HANDSHAKE-3- THE PASSWORD RESET DISK(2009-05-28 23:33) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

WINDOWS 7 : MY FIRST HANDSHAKE-4 - THE SNIPPING TOOL (2009-05-29 22:21) 73

ANOTHER FIRST HANDSHAKE : OFFICE 2010 (2009-05-31 23:16) . . . . . . . . . . . . 74

2.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

GSM vs CDMA & Open Market Handset (2009-06-02 23:20) . . . . . . . . . . . . . . . . . 75

THE ’G’ Family : 0G to 4G (2009-06-05 00:10) . . . . . . . . . . . . . . . . . . . . . . . . . 77

Buy a Keyboard : Get a Computer (2009-06-06 23:43) . . . . . . . . . . . . . . . . . . . . . 78

PAPER BOOKS CONVERGE TO E-BOOKS : KINDLE DX (2009-06-07 16:25) . . . . . . 79

Google & Bing (2009-06-11 15:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Google and Bing : Bade miyaaan Chotey Miyaan (2009-06-11 16:09) . . . . . . . . . . . . . 81

My DIGIT Webinar (2009-06-12 22:37) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

4

Page 5: Blogger to E-Book

H.A.M.R : Storage Futurity (2009-06-20 23:46) . . . . . . . . . . . . . . . . . . . . . . . . . 82

Storage Technology - Graduating Trends (2009-06-21 22:09) . . . . . . . . . . . . . . . . . . 83

Hi Tech Door Bell : Is it required? (2009-06-22 16:20) . . . . . . . . . . . . . . . . . . . . . 86

Hi Tech Door Bell : Is it required? (2009-06-22 16:20) . . . . . . . . . . . . . . . . . . . . . 87

Are you secure at your friendly neighbourhood CYBER CAFE ? (2009-06-26 15:27) . . . . 87

NOW CHIP IN BATHING SOAP!!!! (2009-06-27 22:14) . . . . . . . . . . . . . . . . . . . . 89

UNIQUE IDENTIFICATION PROJECT : UID (2009-06-28 16:01) . . . . . . . . . . . . . . 90

2.7 July . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Check your ANTIVIRUS’es Loyalty : EICAR Way (2009-07-03 23:07) . . . . . . . . . . . . 91

USB DHAMAAAL!!! (2009-07-04 22:40) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

AMD : The Launch of ISTANBUL (2009-07-06 22:47) . . . . . . . . . . . . . . . . . . . . . 95

KYPS : HELPS AVOID BEING VULNERABLE!! (2009-07-08 16:20) . . . . . . . . . . . . 95

E-WASTE : DEPOSIT & GET PAID (2009-07-10 23:01) . . . . . . . . . . . . . . . . . . . 97

EYE-FI : GETs YOUR CLICK UPLOADED (2009-07-11 00:02) . . . . . . . . . . . . . . . 99

PC IN A FLOWER VASE : ECS’s MING VASE (2009-07-14 23:09) . . . . . . . . . . . . . 100

HDD DOCKING STATION (2009-07-20 22:03) . . . . . . . . . . . . . . . . . . . . . . . . . 102

DATA STORAGE IN BACTERIA : ASTONISHING-MUST READ (2009-07-26 22:32) . . 103

2.8 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

WHO ESPIED MY COMPUTER? (2009-08-02 15:33) . . . . . . . . . . . . . . . . . . . . . 105

FREE UPGRADATION - ONLY A TRICK!!! (2009-08-02 15:50) . . . . . . . . . . . . . . . 105

SSDs vs HDDs : WHO is GOOD? (2009-08-05 00:59) . . . . . . . . . . . . . . . . . . . . . 106

Being BUSYYYYY (2009-08-15 10:05) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

WiMAX - THE POWER (2009-08-27 22:29) . . . . . . . . . . . . . . . . . . . . . . . . . . 107

2.9 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Use KEYBOARD for MOUSE (2009-09-01 07:26) . . . . . . . . . . . . . . . . . . . . . . . . 107

http://www.emailtheweb.com (2009-09-01 07:42) . . . . . . . . . . . . . . . . . . . . . . . . 108

E mail a Web Page : http://www.emailtheweb.com/ (2009-09-01 07:53) . . . . . . . . . . . 108

xB BROWSER (2009-09-04 23:34) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

xB Browser - Makes you anonymous (2009-09-04 23:45) . . . . . . . . . . . . . . . . . . . . 109

INTEL vs THE SEVEN SAMURAIs (2009-09-11 22:36) . . . . . . . . . . . . . . . . . . . . 109

SATA 1.0 vs SATA 2.0 vs SATA 3.0 : The hunger for speed (2009-09-11 22:49) . . . . . . . 110

PRINT A BATTERY : PRINTABLE BATTERY (2009-09-11 23:22) . . . . . . . . . . . . . 111

HOW IS UR FAVORITE USB MADE? (2009-09-11 23:40) . . . . . . . . . . . . . . . . . . 112

EXTERNAL DRIVES : ARE THEY REALLY FAST? (2009-09-21 19:38) . . . . . . . . . . 112

SUBMARINE COMMUNICATIONS : IT HAS BEEN TOUGH (2009-09-21 21:33) . . . . . 112

5

Page 6: Blogger to E-Book

LIGHT PEAK TECHNOLOGY : INTEL (2009-09-24 16:17) . . . . . . . . . . . . . . . . . 114

MORRO : THE MICROSOFT SIDE OF ANTIVIRUS (2009-09-24 22:29) . . . . . . . . . . 115

SECURITY ESSENTIALS : NO MORE ”MORRO” (2009-09-30 20:22) . . . . . . . . . . . 116

DUAL SCREEN CAMERA : SAMSUNG ST 550 & ST 500 (2009-09-30 20:34) . . . . . . . 117

THE FUTURE OF OSs : MICROSOFT VERSION (2009-09-30 22:08) . . . . . . . . . . . 118

2.10 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

RADIATION EFFECTS & UR MOBILE - QUANTIFIED (2009-10-01 20:22) . . . . . . . . 119

MY WINDOWS 7 HOUSE PARTY PACK : THANK YOU MICROSOFT (2009-10-05 20:44) 121

NIKON S1000PJ : DIGITAL CAMERA WITH INBUILT PROJECTOR (2009-10-06 20:32) 125

1 MBPS BROAD BAND CONNECTION : HUMAN RIGHT IN FINLAND (2009-10-18 22:12) 125

KINDLE : WELCOME TO INDIA (2009-10-25 20:34) . . . . . . . . . . . . . . . . . . . . . 126

RDM : Rival for BLU RAY? (2009-10-25 22:09) . . . . . . . . . . . . . . . . . . . . . . . . . 128

D-ROLL : No end to imagination (2009-10-26 21:23) . . . . . . . . . . . . . . . . . . . . . . 129

2.11 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Green Dam Youth Escort : What’s that? (2009-11-06 06:25) . . . . . . . . . . . . . . . . . 130

LAPTOP Face Recognition falls FLAT!!!! (2009-11-26 08:00) . . . . . . . . . . . . . . . . . 131

2.12 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

Google Binged!!!! - My 100th Post (2009-12-13 01:00) . . . . . . . . . . . . . . . . . . . . . 132

Y2K Bug!!!!Do u remember the time? (2009-12-28 22:12) . . . . . . . . . . . . . . . . . . . 133

BIDI makes LCD touchscreen A PASSE past (2009-12-30 07:49) . . . . . . . . . . . . . . . 133

3 2010 135

3.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

2010 (2010-01-01 06:38) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

HP in the racists scoooop!!! (2010-01-08 06:34) . . . . . . . . . . . . . . . . . . . . . . . . . 135

DUAL SCREEN LAPTOP : Another attempt by (2010-01-08 07:25) . . . . . . . . . . . . . 136

Charge cell phones by using Radio-Waves (2010-01-10 10:44) . . . . . . . . . . . . . . . . . 136

When EARS Speak!!! (2010-01-11 19:25) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

The ALT key Combos (2010-01-13 07:22) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

CHINA & GOOGLE (2010-01-16 07:55) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

Microsoft choose to stay in China: Why not? (2010-01-17 07:06) . . . . . . . . . . . . . . . 139

SHARING DESKTOPS REMOTELY (2010-01-17 07:43) . . . . . . . . . . . . . . . . . . . 139

ZUNE 120 GB (2010-01-18 21:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

Google vs Bing : On Data retention policy change (2010-01-19 21:44) . . . . . . . . . . . . 142

ROOT WEB DIRECTORY VERIFICATION (2010-01-29 07:56) . . . . . . . . . . . . . . . 143

3.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

6

Page 7: Blogger to E-Book

IP Spoofing : Legal Acceptance in India? (2010-02-01 07:47) . . . . . . . . . . . . . . . . . 144

CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!! (2010-02-03 22:55) . . . . 145

Who’s Who? : Terminology world of Portable Computers (2010-02-05 17:25) . . . . . . . . 146

TRACE INDIA (2010-02-07 19:44) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

NVIDIA : Optimus technology (2010-02-13 07:40) . . . . . . . . . . . . . . . . . . . . . . . 147

WEB 2.0 SUICIDE MACHINE (2010-02-15 07:46) . . . . . . . . . . . . . . . . . . . . . . . 147

Steganography : Hide in a JPEG/BMP (2010-02-16 21:15) . . . . . . . . . . . . . . . . . . 148

How to avoid an infected USB/PEN Drive? (2010-02-17 07:52) . . . . . . . . . . . . . . . . 149

SVCHOST.EXE vs SCVHOST.EXE (2010-02-18 21:51) . . . . . . . . . . . . . . . . . . . . 150

Intel® Core™ i3 Processor & Server 2003 (2010-02-23 07:36) . . . . . . . . . . . . . . . . . 151

3.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

The Journey from MB to GB : Pen Drives (2010-03-05 22:53) . . . . . . . . . . . . . . . . . 152

Search Web by FACE recognition - Work is ON!!!: ONE ALBUM (2010-03-07 21:06) . . . . 152

OS CARD : For now just an idea sirjeeeeeeee!!! (2010-03-11 22:19) . . . . . . . . . . . . . . 153

LIQUID COOLING IS IN - FOR CPUs & GPUs (2010-03-15 08:09) . . . . . . . . . . . . . 153

Secure ur Wireless media (2010-03-17 22:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Secure ur WiFi (2010-03-18 07:47) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

GOOGLE finally is OFF from China (2010-03-24 08:40) . . . . . . . . . . . . . . . . . . . . 155

Consequences of Google’s China Exit (2010-03-24 09:14) . . . . . . . . . . . . . . . . . . . . 156

MOZZILA Firefox & GERMANY (2010-03-24 21:27) . . . . . . . . . . . . . . . . . . . . . . 157

DANGEROUS PASSWORDS (2010-03-24 21:58) . . . . . . . . . . . . . . . . . . . . . . . . 158

CLEAR PLAY & DVD PLAYERs : E-CENSOR (2010-03-25 07:49) . . . . . . . . . . . . . 158

WiFi at home : Take precautions (2010-03-28 07:19) . . . . . . . . . . . . . . . . . . . . . . 159

DATA RECOVERY FROM RAM? (2010-03-31 22:44) . . . . . . . . . . . . . . . . . . . . . 160

3.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

HOW TO HYPER LINK IN COMMENTs AT BLOGGER? (2010-04-01 07:50) . . . . . . . 160

7 years of Indian Cyber Law (2010-04-07 23:14) . . . . . . . . . . . . . . . . . . . . . . . . . 161

(2010-04-08 07:47) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

Computer EASTER EGGs (2010-04-15 06:59) . . . . . . . . . . . . . . . . . . . . . . . . . . 161

3.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162

EAVES DROPPING RISK : EMR (2010-05-03 23:12) . . . . . . . . . . . . . . . . . . . . . 162

I M IN ”CHIP”- MAY MONTH EDITION 2010 (2010-05-11 06:48) . . . . . . . . . . . . . . 162

SHADOWS IN THE CLOUD (2010-05-31 15:02) . . . . . . . . . . . . . . . . . . . . . . . . 164

3.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

XINGYUN : World’s Fastest Computer (2010-06-07 11:12) . . . . . . . . . . . . . . . . . . 164

7

Page 8: Blogger to E-Book

Prisoners all set to est BPO : A first from Cherlapally Central Jail (2010-06-08 23:59) . . . 165

What material Laptops are Made of? (2010-06-09 09:30) . . . . . . . . . . . . . . . . . . . . 165

Securelist.com : Informative attempt by Kaspersky Labs (2010-06-09 09:44) . . . . . . . . . 166

Google and Caffeine : The Secret Link (2010-06-11 23:14) . . . . . . . . . . . . . . . . . . . 166

Google and Caffeine (2010-06-11 23:14) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

Where does your Website Rank in the web? (2010-06-12 14:15) . . . . . . . . . . . . . . . . 167

Mobiles & Brain Cancer : WHO Speaks. (2010-06-12 17:59) . . . . . . . . . . . . . . . . . . 167

”GOOGLE STREET VIEW” - FIGHTING PRIVACY ISSUES (2010-06-16 21:03) . . . . . 168

WiFi Amplified 10 times : Here comes WiGig™ (2010-06-16 22:40) . . . . . . . . . . . . . . 169

’Microrings’ - Ultimate Wireless Communication (2010-06-16 22:51) . . . . . . . . . . . . . 169

INTEL : UPCOMING PROCESSOR’S (2010-06-18 23:13) . . . . . . . . . . . . . . . . . . . 170

PANOPTICLICK : Your Browser Finger Print (2010-06-25 21:19) . . . . . . . . . . . . . . 171

Why not leapfrog 3G TO 4G? (2010-06-27 10:17) . . . . . . . . . . . . . . . . . . . . . . . . 171

3.7 July . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

COWS & DATA CENTRES : LINKED!!!! (2010-07-03 21:40) . . . . . . . . . . . . . . . . . 172

Intel meets Car : Makes it SMART CAR (2010-07-07 18:01) . . . . . . . . . . . . . . . . . 172

IT meets HIGH TECH TAPS : Renshui Faucets (2010-07-08 19:36) . . . . . . . . . . . . . . 173

MOST AMAZING TECHNIQUE TO TRANSFER DATA:SLURP (2010-07-08 22:21) . . . 173

SAMSUNGs GALAXY BEAM - Projector meets Mobile (2010-07-09 20:48) . . . . . . . . . 174

Augment your regular desktop with a FACE RECOGNITION feature (2010-07-10 22:19) . 175

How Google detects Invalid clicks? (2010-07-10 22:35) . . . . . . . . . . . . . . . . . . . . . 176

Increasing Laptop Bty Life : Few ways (2010-07-19 07:15) . . . . . . . . . . . . . . . . . . . 176

User Mapped-Section open??? (2010-07-26 21:14) . . . . . . . . . . . . . . . . . . . . . . . . 177

3.8 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

IPAD WORLD & VARIETIES (2010-08-12 22:23) . . . . . . . . . . . . . . . . . . . . . . . 177

Windows Systernals (2010-08-23 21:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

BILL GATES & Khan Academy (2010-08-25 21:55) . . . . . . . . . . . . . . . . . . . . . . 178

3.9 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

Man in the Browser Attack : New dimension of cyber attack (2010-09-02 19:20) . . . . . . 179

ScareWare : One more WAREior in the family (2010-09-02 19:58) . . . . . . . . . . . . . . 180

TABNAPPING : A new generation Cyber Crime (2010-09-02 21:25) . . . . . . . . . . . . . 180

E-Waste & Indian Policy (2010-09-06 07:40) . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

New Gen BIOMETRICS : PALMSECURE from FUJITSU (2010-09-13 07:52) . . . . . . . 182

ORDER OF VOLATILITY OF DIGITAL EVIDENCE (2010-09-15 21:04) . . . . . . . . . . 183

Cyber Warfare : It has started (2010-09-16 13:47) . . . . . . . . . . . . . . . . . . . . . . . 184

8

Page 9: Blogger to E-Book

ZERO DAY EXPLOIT : ??? (2010-09-18 22:45) . . . . . . . . . . . . . . . . . . . . . . . . 185

Root Kits : Hidden Undetected Threats (2010-09-18 22:57) . . . . . . . . . . . . . . . . . . 186

Browser Forensics - Not Simple (2010-09-19 13:26) . . . . . . . . . . . . . . . . . . . . . . . 187

Shadows in the Cloud : Cyber Espionage (2010-09-30 11:24) . . . . . . . . . . . . . . . . . . 188

3.10 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

CLEANERS & FOOTPRINTS (2010-10-07 17:14) . . . . . . . . . . . . . . . . . . . . . . . 188

Security Enabled Hardware :INTEL - McAfee Merger (2010-10-08 17:54) . . . . . . . . . . 188

(2010-10-08 19:32) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

(2010-10-08 19:38) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

ALL izz WELL!!!!!inside this- Check out FREE STUDIO (2010-10-08 21:56) . . . . . . . . 190

RISK MANAGEMENT : Beware while u update with Patches (2010-10-08 22:09) . . . . . 190

Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla(2010-10-08 22:32) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Stuxnet : A Milestone in Malicious Code History (2010-10-11 22:19) . . . . . . . . . . . . . 191

Biggest release of Patch update by MICROSOFT (2010-10-12 07:27) . . . . . . . . . . . . . 193

Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:41) . . . . . . . . . . . . . . . 193

Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:55) . . . . . . . . . . . . . . . 193

CANURE : 100 on ACID3 Test (2010-10-15 19:57) . . . . . . . . . . . . . . . . . . . . . . . 193

Is ur Account Hacked ?- Common ways u get compromised. (2010-10-16 07:43) . . . . . . . 194

Stuxnet : Some more good info (2010-10-16 08:06) . . . . . . . . . . . . . . . . . . . . . . . 195

CaaS : CRIME WARE AS A SERVICE at offer now (2010-10-18 18:05) . . . . . . . . . . . 195

Service Packs & Infection Rates (2010-10-19 22:19) . . . . . . . . . . . . . . . . . . . . . . . 195

Collection of Forensic Softwares : TUCOFS (2010-10-20 21:56) . . . . . . . . . . . . . . . . 196

Crack 14 Character passwords in Seconds : Objectif Sécurité (2010-10-26 07:57) . . . . . . 196

Image Ballistics : Incredible IT (2010-10-31 16:20) . . . . . . . . . . . . . . . . . . . . . . . 196

VIRUS in Boot Sector in Hard Disk fresh from OEM!!!! (2010-10-31 21:08) . . . . . . . . . 197

OPERATION CISCO RAIDER (2010-10-31 22:24) . . . . . . . . . . . . . . . . . . . . . . . 197

3.11 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

6$ is all to shut down a Cloud Client site!!!! (2010-11-01 08:34) . . . . . . . . . . . . . . . . 198

Intel opens first chip plant in China?? (2010-11-01 18:01) . . . . . . . . . . . . . . . . . . . 199

Adobe flash Player hit!!!! (2010-11-01 18:45) . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

Bredolab grabs Attention (2010-11-01 19:11) . . . . . . . . . . . . . . . . . . . . . . . . . . 199

Mozilla @ Prone again!!!! (2010-11-02 07:54) . . . . . . . . . . . . . . . . . . . . . . . . . . 200

MICROSOFT & Failures!!! (2010-11-02 22:08) . . . . . . . . . . . . . . . . . . . . . . . . . 200

Get Paid to Hack GOOGLE (2010-11-04 17:31) . . . . . . . . . . . . . . . . . . . . . . . . . 201

Removing METADATA from JPEG & IMAGE FILES (2010-11-04 18:14) . . . . . . . . . . 202

3.12 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

Full stop from being tracked online :An attempt from FIREFOX (2010-12-05 18:50) . . . . 204

Operation Pay Back & LOIC (2010-12-28 22:29) . . . . . . . . . . . . . . . . . . . . . . . . 204

9

Page 10: Blogger to E-Book

4 2011 205

4.1 January . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

Case of Albert Gonzalez : The Largest Online Fraud in U.S. History (2011-01-29 10:44) . . 205

FBI : A Parent’s Guide to Internet Safety (2011-01-29 11:00) . . . . . . . . . . . . . . . . . 206

Trojan.Spy.YEK : The Corporate Spying Tool (2011-01-29 11:26) . . . . . . . . . . . . . . . 206

BitDefender : Tips for Safe Shopping on Mobile Devices (2011-01-29 11:44) . . . . . . . . . 207

4.2 February . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

IE users stand vulnerable again : Warning from MICROSOFT (2011-02-01 20:43) . . . . . 207

AMD comes up with FUSION (2011-02-01 21:05) . . . . . . . . . . . . . . . . . . . . . . . . 207

Win32.Hlux : January 2011 ” King of worms” (2011-02-06 19:46) . . . . . . . . . . . . . . . 208

DRIVE BY ATTACK (2011-02-06 20:03) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

DATA STORAGE IN BACTERIA : 9,00,000 GB stored in 1 gm of Bacteria (2011-02-08 21:24) 208

INTERNET KILL SWITCH???? (2011-02-09 20:34) . . . . . . . . . . . . . . . . . . . . . . 209

MALWARE & AUTORUN : LOVE BIRDS OF PROPOGATION (2011-02-09 20:40) . . . . 210

The Gawker case : EXPERIENCING A HACK (2011-02-13 20:00) . . . . . . . . . . . . . . 210

NOKIA & MICROSOFT : A MERGER TO READ ABOUT (2011-02-15 20:59) . . . . . . 211

NOKIA should have merged with GOOGLE : Google CEO (2011-02-16 20:02) . . . . . . . 212

Easy Upgrade from USB 2.0 to USB 3.0 :Transcend’s USB 3.0 Express Card Adapter(2011-02-16 21:02) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

Be veri careful : Recent cases of duping online in DELHI (2011-02-19 09:29) . . . . . . . . . 212

4.3 March . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

ANDROID & GOOGLE : AT LOGGER HEADS???? (2011-03-02 19:29) . . . . . . . . . . 213

QUALITIES OF A GOOD ANTIVIRUS (2011-03-13 20:16) . . . . . . . . . . . . . . . . . . 214

How to Disable/Enable Use of USB Storage Devices in Windows (2011-03-15 13:18) . . . . 217

4.4 April . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

The weak password problem : Now solved???? (2011-04-03 21:48) . . . . . . . . . . . . . . 219

The weak password problem : Now solved???? (2011-04-03 21:55) . . . . . . . . . . . . . . 219

Revenge : YouTube Style (2011-04-04 22:16) . . . . . . . . . . . . . . . . . . . . . . . . . . 219

Beware of ’Radioactive’ Emails (2011-04-05 07:51) . . . . . . . . . . . . . . . . . . . . . . . 220

HOW DO U FIND IF YOUR PC IS HACKED?- PART 1 (2011-04-27 20:47) . . . . . . . . 221

HOW DO U FIND IF YOUR PC IS HACKED?- PART 2 (2011-04-27 20:52) . . . . . . . . 221

HOW DO U FIND IF YOUR PC IS HACKED?- PART 3 (2011-04-27 20:55) . . . . . . . . 221

HOW DO U FIND IF YOUR PC IS HACKED?- PART 4 (2011-04-27 20:59) . . . . . . . . 222

HOW DO U FIND IF YOUR PC IS HACKED?- PART 5 (2011-04-27 21:01) . . . . . . . . 222

HOW DO U FIND IF YOUR PC IS HACKED?- PART 6 (2011-04-27 21:03) . . . . . . . . 223

4.5 May . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

10

Page 11: Blogger to E-Book

McMurdo station & more DATA CENTRE Locations (2011-05-16 21:47) . . . . . . . . . . 223

4.6 June . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

INSPIRED FROM INDIA : CHINAs ATTEMPT ON TAKING ON CORRUPTION(2011-06-13 14:45) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

BULLET PROOF HOSTING (2011-06-13 15:06) . . . . . . . . . . . . . . . . . . . . . . . . 224

SYMANTEC SPOTS ONE INTERESTING E-MAIL CAMPAIGN (2011-06-13 15:24) . . . 224

FLIRT BOTS (2011-06-13 15:56) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

FLIRT BOTS (2011-06-13 16:03) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

MAKE incognito YOUR DEFAULT SETTING (2011-06-13 18:38) . . . . . . . . . . . . . . 226

Your VOICE to charge your MOBILE (2011-06-13 21:38) . . . . . . . . . . . . . . . . . . . 226

ANDROID APPLICATIONS CLONED : Developers make it spam (2011-06-27 21:44) . . . 227

4.7 August . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

JAVA SE DEVELOPMENT KIT NOT FOUND!!!! (2011-08-19 22:42) . . . . . . . . . . . . 227

IBM developing PCs that may run 30 times faster (2011-08-21 12:44) . . . . . . . . . . . . 228

Now Aerial cyber attack!!!!r u safe anyway? (2011-08-21 13:40) . . . . . . . . . . . . . . . . 229

touched........20,000 (2011-08-22 11:31) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230

4.8 September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230

CHINA CAUGHT ON WRONG FOOT in its own MARCH (2011-09-03 19:22) . . . . . . . 230

HDFC CLEAN BOWLED by Hidden SQL Injection Vulnerability (2011-09-03 20:12) . . . . 231

CYBER SECURITY : ACTIVE ATTACKS (2011-09-20 20:57) . . . . . . . . . . . . . . . . 232

XSS and CSS : Whats the difference ? (2011-09-20 22:33) . . . . . . . . . . . . . . . . . . . 232

DEEP FREEZE : A way to protect ur system!!! (2011-09-20 22:57) . . . . . . . . . . . . . . 232

DEEP FREEZE : II (2011-09-20 23:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

Common Malware Symptoms (2011-09-25 20:43) . . . . . . . . . . . . . . . . . . . . . . . . 233

When malware prevent you surfing internet : MALWARE REMOVAL -1 (2011-09-25 20:50) 233

4.9 October . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

nVidia GeForce GPU cracks six character password in four seconds (2011-10-10 20:26) . . . 233

HIBERNATION MODE : HOW SAFE FOR YOU? (2011-10-11 22:26) . . . . . . . . . . . 234

WIRESHARK Troubleshoot (2011-10-22 23:19) . . . . . . . . . . . . . . . . . . . . . . . . . 234

DUQU : FROM THE GEN STUXNET???? (2011-10-30 23:10) . . . . . . . . . . . . . . . . 235

BACKTRACK 5 : How to use ? (2011-10-30 23:24) . . . . . . . . . . . . . . . . . . . . . . 235

SOME MORE ON DUQU (2011-10-31 20:50) . . . . . . . . . . . . . . . . . . . . . . . . . . 236

RED PHONE : ENCRYPTED VOICE FOR ANDROID!!! (2011-10-31 21:52) . . . . . . . . 236

4.10 November . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

DUQU’s MICROSOFT LINK!!! (2011-11-02 20:21) . . . . . . . . . . . . . . . . . . . . . . . 236

Our Browsing History Is Leaking into the Cloud!!!! (2011-11-02 21:29) . . . . . . . . . . . . 237

11

Page 12: Blogger to E-Book

DISCONNECT URSELF (2011-11-15 21:20) . . . . . . . . . . . . . . . . . . . . . . . . . . 237

DISCONNECT.ME in Incognito mode (2011-11-15 21:26) . . . . . . . . . . . . . . . . . . . 239

THREATS TERMINOLOGY & GLOSSARY : PART 1 (2011-11-24 22:50) . . . . . . . . . 239

COOKIES & TYPES ? (2011-11-27 21:58) . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

CONTROL COOKIES TAKING CONTROL FROM UR BROWSERS (2011-11-27 22:12) . 241

Cookienator : Option to control cookie menace (2011-11-27 22:26) . . . . . . . . . . . . . . 241

4.11 December . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

Windows 8 Developer Preview : Pre Beta Version for Developers (2011-12-01 07:10) . . . . 242

LogMeIn HAMACHI (2011-12-02 22:04) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

Snake oil Cryptography (2011-12-02 23:01) . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

Windows 8 Developer Pre BETA : How to get full screen on a VM? (2011-12-03 14:04) . . . 243

”LIKE” Button in Facebook : Tracks u!!! (2011-12-03 21:54) . . . . . . . . . . . . . . . . . . 243

12

Page 13: Blogger to E-Book

Chapter 1

2008

1.1 December

SPAM UNSUBSCRIBED IS SPAM SUBSCRIBED (2008-12-26 22:36)

I am sure you would all have recieved all types of spam mails at one time or the other on daily,weekly or onsome periodic basis.Now there is an interesting thing about these spam mails.When you recieve a mail andyou declare it as spam,it goes to your spam box which you keep clearing every now and then.Any time youtry reading any such mails you would often come across “TO UNSUBSRIBE CLICK HERE”.Here is thetrick of the spam generator.Any time you click this you confirm to the spammer that this is an active e-mailid.This way though you may unsubscribe the spam from that particular spammer but the spammer gets toknow that yours is an active email id and he sells…..i REPEAT….he sells your email id to another spammerwith the guarantee that yours is an active email id or a genuine email id.Most of the spammers…i mean theoriginators send the spam mails to randomly computer software generated email id’s and of these all whenu click from your particular id to unsubscribe they get to know that one of these email id’s is genuine andactive.Hence the more you unsubscribe the more you get subscribed to.So friends….dont unsubscribe….!!!!!!

MIAN BV KE JHAGDEY (2008-12-26 22:37)

By god this life is really beautiful and complex,the best thing is the relationships that we have here.Todayfor the 100000th time i had a fight with my only half and it is still on,the small ego’s of ladies,the smallMANhood inside evry man....and when they clash...it is good 2 c...no eye 2 eye...no talks,pin drop silencemaintained at home,kitchen is the most effected..it seems udhar barsoon se koi jaata vaata nahee hai....apnaapna khana...apna apna peena....mian gets busy on his laptop...bv on her soaps(star plus ...colors....sony..zeeand what not).......and the environment looks like 2 continue for eternity...since koi kum nahee hai...ek sebadhkar ek hain....phir suddenly ek din kisi ek kee rooh jagegi aur bolegi bahut hua...chal normal hoja...andlife starts again with a promise kee hum dono ek hain...aaagey se koi ladaaai nahee....we r one.....so waitingfor the time....now busy with lap top!!!!

HOW 2 DELIVER GOOD PRESENTATIONS? (2008-12-26 23:08)

1. How to deliver presentation?Presentation is an art that cannot come overnight,it is ur personality whn ustand there that blends with the subject matter on how u give it.The same set of slides in a presentation given

13

Page 14: Blogger to E-Book

by two different persons will make a different impact all together as and when the presentation gets finished.2. One has to be exactly reach the podium with a free mind and a clear aim on what he has to speak,whatis his scope and what is he going to speak about.Now for a presentation,the presenter need not be an experton that topic,but he should be aware of tits & bits,he should be ready to take on questions for which he isnot prepared from the audience on how is he going to answer them.He should avoid speaking even a word onwhich he is unsure and he is not confident to take on. 3. Another important aspect is the word humour.Toinvolve the audience in the presentation,the humour has to b a crucial part of any presentation.Now i dontmean that humour includes putting some funny slides or poking out few good/bad/dirty jokes for the sakeof it.It again depends on the audience,if it is a mass audience u should be happy since mass involves everytype of people,thus u can have a choice between ur insertions or what u plan to speak to make theminvolved and if it is restricted audience or a small group of people u should be able to gauge the backgroundthey have in common and insert suitable humour likewise.It is left to you how u make the audience smileanyhow.Ask them something that they can easily take on without getting embarassed.Include a surprise insome form.Example if u have to give a presentation which is likely to be more than 10 minutes(....whichmostly are!!!!)...insert a 5 sec movie clip...may b some jackie chan quick action bashing or amitabh fromdeewar in the mandir scene....rajnikanth with flying ciggarete etc etc etc....the scope is aplenty....just catchthe audience by surprise and tell them...that was just to evoke some interest....or take out a tennis ball fromur pocket and throw it to a person in the audience who is a little known to you or even not known willdo and ask him to catch.....or do ask me more on such ideas...AUDIENCE IS THE KEY ALWAYS...YOUHAVE TO GAUGE THEM PRIOR TO GIVING THE PRESENTATION....these ideas will certainly lookWAGUE/IDIOTIC/STUPID at first glance....but i have tried them all....and i have met with success.....ilove giving presentations.... 4. One just need to get in love with this art once,i have seen this.....u get inonce...and u will not be able to come out of this.You will start waiting for opportunities wherein you wouldget an opportunity to give a presentation unlike the otherway round most of the times..will keep adding morein days 2 come....

BALANCE is DIFFICULT (2008-12-27 00:12)

Life 2 day is veri demanding....you cannot have spare time lest you get some leave...i m speaking about thebalance between time u give to ur parivaar and ur profession....how so ever smart u r...you will never beable to make a perfect balance....you give more time 2 ur profession u get stuck with the family...and u givemore time to family u will start hearing that u r not working.......so iss ka ek he solution hai....jo mann karevo karo......jab bv roye to ghar is priority and when boss demands....then company becomes priority.......andwhen both demand then prefer 2 sleep.....baaki own time is evenly booked 2.

Ghazal maestro in making (2008-12-27 00:42)

This link will definitely make u smile....thats a promise [EMBED]

Anonymous (2008-12-28 17:17:00)kya baat hai!kya baat hai!!!good one!

14

Page 15: Blogger to E-Book

TUNE UP 2009 UTILITIES (2008-12-27 00:53)

1. I have been an avid follower of this utility since using 2007 when i used this first as TuneUp 2007 whichgot followed by [1]Tune up 2008.And recently tuneup 2009 has been launched.There was a mark differencebetween the 2007 and 2008 versions.But the recent one has come as a small disappointment.The same facelookup,the same color template with no new features except the one finding out automatic diagnostics forur computer setup.Either i m too early to comment on this or may be i m little harsh in saying that. 2. Themain features include Intelligent recommendations for your unique PC optimization, Identifies your personalsettings and protects them,Highlights your PC’s optimization potential, including unused programs andresource-draining settings and the best is the Recommendation options which explains performance resultsbefore taking any action. 3. So thats all new which is there in this version.Baaki,all the earlier featuresmaintain status quo at their respective tabs and positions.

1. file://localhost/mnt/ext/blogbooker/tmp/tzw310kp/www.tune-up.com

MURPHY’s LAW : JALANDHAR 2 AMRITSAR & BACK (2008-12-28 14:56)

1. Do you believe in murphys law?I have so many instances to recount that murphy works on me.The theoremrecently worked on me when i travelled from jalandhar to amritsar along my FIL & MIL(Father & motherin law ...) in my wagon r duo.

2. The aim was to start,with a top up lpg tank in car, start from jalandhar at 1100h,reach golden templeby 1300h,have darshan and reach wagah by 1600h...and start return at around 1830h from wagah back tojalanadhar,and reach back by 2100h ,looks perfectly fine w.r.t the road conditions and time limit....what wasto follow is the result of what happens when u strike murphy.

3. I m a proud owner of a wagon r duo that works on both petrol & lpg.So as we started on the journeyi decided to topup the lpg tank from the only source near me so that journey could become economical.Asi reached the HPCL outlet,i was told that LPG is out of stock and i would have to wait fr a day to get aeconomical drive.Marta kya na karta””i started with a khula dil...ke kuch nahee hota....let it be petrol......andtravelled 25 km ahead...i met solid...zero visibility DHUND and with a lot of driving skills and maneuveringi reached amritsar by 1430h....and i met the jaam of life....so as to reach golden temple by 1545h........the lineof devotees at the gurdwara could put to shame a european football world cup stadium rush.....so we paidour devotion from heart outside only and started race for wagah.

4. Again we met the dedicated traffic jam,normal rush,lots of dhundh and fog on way to wagah and successfulyreached wagah at 1710h...2 c public rushing back as the drill parade concluded for the day...but FIL insistedthat he would atleast c the gate of pakistan and their sentries.....so much excited was he that he rushed aheadmanuevring the public against the direction....he finally saw the gate ....saw the pak sentries....and returnedback...but ye kya hua....”BETA MERA BATAUA GAYAB.........”then followed our grieveinces and sympathyfor the FIL/papa/nana..so that was the act by a smart jeb katra.......so it was 1750h and we decided to rushback as we were getting late already........

5. Suddenly the responsible damaad realised that lunch kab hoga.....but it was 2 late...so we decided for anearly dinner.......but the visibility was 2 2 2 tooo low to even think of snailing to jalandhar....and then thegood thing happened...the head light of the car focussed on a officers mess board on the wagah road.....andwe decided to stay put their for the night.The deal of the day concluded.

6. We started next day after 1100h and reached in 3 hrs scawling thru the tough foggy conditions......THANXMURPHY....Do i blame murphy or my planning?

15

Page 16: Blogger to E-Book

RFID (2008-12-28 21:51)

1. Here’s an old thing in a new bottle...i mean old wine with a new meaning altogether.Radio-frequencyidentification (RFID) as would anyone know is an automatic identification method, relying on storing andremotely retrieving data using devices called [1]RFID tags or transponders.

2. This is not a new invention ..but the usage certainly has made it something like new.The vast usage of[2]RFID 2day includes a big scope from controlling inventory to controlling limited access to vehs and persto new generation security systems.

3. Big guns of the manufacturing industries across the globe have already exploited the usage of thistechnology and now the technology is gradually making way in the Indian industry in the form of Daphenesystems,ESSL to name a few that come to my mind instantly.

4. The good thing is that even as the technology is introduced to the consumer for the first time,it comescheap...and i mean dirt cheap.Imagine controlling an inventory of a lakh plus item at just under 25K...ie lessthen 25 paise per item and now body would ignore at such a low cost in bulk for the benefit of organisa-tion.This would not only maintain the inventory but would also avoid any theft being carried out in somebody’s pocket....so this is just the beginning of another technology revoloution...all u guys who keep lookingfor some technical buzz word...keep a track of this.....

1. http://en.wikipedia.org/wiki/Radio-frequency_identification

2. http://en.wikipedia.org/wiki/Radio-frequency_identification

3D TELEVISION (2008-12-29 21:54)

1. Read about this lately in one magazine.This is about the [1]3D TV.From the good old Texla era to thecolor tv revolution to the flatrons to the LCDs and DLPs,now comes the 3D TV.What is [2]3D TV?Easy toexplain in layman terms....u must have seen few movies on theatre screens with your 3d glasses ON like thePolar Express or Shiva ka insaaf in mid Eighties or the famous kids movie Chota Chetan....the concept issimilar...wish to see 3D images on a 3D TV ,you need to wear 3D glasses.

2. Sky’s [3]digital satellite broadcast [4]hardware delivered the content to a standard Sky + HD system,which was then played back over a ’3D Ready’ TV.The technical demonstration lasted for the completeduration of a match that featured the England v New Zealand rugby union test match and the Liverpool FCv Marseille UEFA Champions League match, among others.

3. Sky’s 3D system currently requires viewers to wear special glasses, and 3D TV hardware comes at a pricenot easy to afford as on date. Manufacturers such as Philips have 3D TV technology already and LG willbe launching a system next year.

4. I assume that this will be a turning point in broadcasting technolgy once the subject becomes cheap oreven just affordable.But the toll of dedicated viewers will take time as it is not only about viewing with3D glasses but also filming with special 3D TV equipment for a telecast or recording......is it far?....whoknows.....u cant underestimate the speed of TECHNOLOGY ABSORPTION!!!!

1. http://en.wikipedia.org/wiki/3D_television

2. http://en.wikipedia.org/wiki/3D_television

3. http://en.wikipedia.org/wiki/Direct-broadcast_satellite

4. http://en.wikipedia.org/wiki/Personal_computer_hardware

16

Page 17: Blogger to E-Book

Nikhil Chauhan (2008-12-31 13:03:00)Interesting stuff Anupam. Do you think this technology can enter Indian market in the next few years? Given thatthe entry of satellite TV has recently started and HD is nowhere on the horizon, I think it’ll take sometime beforewe can see this in our living rooms. That said, IPTV is something that’s gaining a lot of traction and with the highbroadband adoption rates, that technology definitely would be sustainable. Thoughts?

anupam (2009-01-01 17:12:00)yes dear nikhil,the regime of 3d tv will have a restricted viewing in this country where the concept is still unknownto most of the country men.How many would be able to recount the three movies shiva ka insaaf,ploar express,chotachetan when i mention 3d movies earlier.So this will remain confined to the luxury lanes of 5 star hotels and privilegedcorporate giants offices...and yes u said it correct the introduction of IPTV which has been recently introduced inINDIA will send shivers down the airtel/sky/dish tv lot when they compare the tariff and running expenditures!!!

17

Page 18: Blogger to E-Book

18

Page 19: Blogger to E-Book

Chapter 2

2009

2.1 January

IPTV - TRIPLE PLAY or QUADRUPLE PLAY? (2009-01-01 21:35)

1. Recently a veri dear friend of mine Nikhil mentioned the word IPTV in one of his comments...i wasfamiliar with the word to the extent that i knew that IPTV (Internet Protocol Television) is a system wherea digital television service is delivered using Internet Protocol over a network infrastructure, which includesdelivery by a broadband connection.

2. To see in the indian context,i just dug google slightly deep to know the scope and horizon for effect onlaymen who is used to seeing the TV trash through the sincere loyal galee ka cable walah or the dish tv lot(ieairtel/dishtv/tata sky etc)...the findings were interesting...the word is buzzing in the TV industry and theword is sending shivers down the spine of the effected pers including the gali ka cable walah and the satellitetv lot.

3. The best thing about this is that unlike the satellite tv where u have a multiple choice of combo’s of variouschannel’s (with separate monthly tags)IPTV will have all in one thus leading to no confusion no tension aboutwhich package to go for.I could find reliance and bsnl already into marketing and commisioning of STB’s inselected states.Although initial reaction to this has been lukeworm,since the common men is still wonderingin the land of combinations offered by the satellite tv companies lot.

4. Now when the word IP is tagged within IPTV,it is bound to create added advantage with itself....sharingpics/photos across your TV with another frend with access to IPTV...hai na sahee....TV ka TV and sharingalso on TV ...this is just the tip of the ice berg...as time grows it will be much more then just watching TVand sharing files.So wait and watch

5. The tariff is approx about 250 per month(price ex bsnl yr 2008) with all channels generally about 125including all those high TRP types including saas bahu,dance reality shows and sports etc.

6. What does TRIPLE PLAY mean ? The commercial bundling of IPTV, VoIP and Internet access isreferred to as ”Triple Play” service (when these three are offered with mobility, the service is referred to as”Quadruple Play”).That’s it.Just simple but a techie word...thats what IT is all about!!!!

WHY BLOG? (2009-01-02 07:55)

1. If the answer to this question is asked from people,I am sure we will get varying answers from gettingpublicity, to earning money, to be in the IN thing,to become blog grok,to be zaraa hat key from the league,to

19

Page 20: Blogger to E-Book

create a discussion,to become a reference,agar vo kar sakta hai to y not me and the list is endless and will goon.We all have different reasons to blog.The purpose is same ....achieving SATISFACTION in some form...beit money or publicity or sharing or discussing .........

2. We all are working some where in some organisation.We all have different interests,different tastes whenit comes to plain choice be it any thing like I may be interested in something to do with IT,you may beinterested in something to do with cooking,dance,teaching,commerce, share market,art,painting,music etcand we all do different things in office(which obtrudes and eats into maximum time of our active life) whichmay not gel with the profession in which we are working.Even if we work in some similar environment wemay not get the right set of hoi poll oi(ie people) to discuss or to hear what we have in our minds.So hereis the job of the BLOG giving you a MUGWUMP(ie independent) platform to voice YOUR opinion on abailiwick (ie subject) of your interest.

3. First I didn’t knew what to start and where to start from,then after I got some time and was able todig into the abstruser target of writing few lines every now and then in the blog,I realise it has graduallymoulded into a regular habit.

4. Irrespective of the scuttle butts,irrespective of any number of visitants,irrespective of any readers BLOGstands out in the world of web reflecting you and you only.To make it shine you keep improving upon it bycontinuous feeding of good shareable info.

MPEG vs H.264 (2009-01-03 21:26)

1. A not so techie person like me knows MPEG as the extension of videos also known with the extensionname of .mpg,.mpeg,.mp1.We have been seeing this name since the birth of CDs in late 90s(...i m speakingin Indian gali context,thats when this term evoluted to a common man ).

2. Any one who has followed up the term MPEG would know or would have heard names of various versionsthat followed MPEG1,MPEG2, MPEG3, MPEG4 and lately some thing known as H.264 comes up in thecontext of video compression technology.So this term aroused my interest to know in some detail about whathas been the change and value addition over these various versions that keep following up every 2-3 years.

3. Moving Picture Experts Group(....expanded form MPEG) also known as ISO/IEC JTC1/SC29 WG11evoluted from MPEG 1 to H.264 2day.

4. MPEG 1 : The earliest standard for compression of video and audio was designed to compress VHS-qualityraw digital video and CD audio.This included many severe shortcomings in form of a lower resolution,less ef-ficient audio compression system,lack of flexibility,access control issues,unsuitable for HDTV,did not supportinterlaced footage.

5. MPEG-2 : Successor tO MPEG 1 Standard that describes a combination of lossy video compression andlossy audio data compression methods also permitted storage and transmission of movies using currentlyavailable storage media and transmission bandwidth.This overcame the shortcomings of MPEG-1 mentionedabove.

6. MPEG-3 : A coding standard designed to handle HDTV signals but it was soon discovered that MPEG-2,at high data rates, would accommodate HDTV.Thus, in 1992 HDTV was included as a separate profile inthe MPEG-2 standard and MPEG-3 was rolled into MPEG-2

7. MPEG-4 : About this I will give a point wise summary in days to come.In brief otherwise it absorbsmany of the features of MPEG-1 and MPEG-2 and other related standards adding new features such assupport for 3D rendering.MPEG-4 is still a developing standard and is divided into a number of parts.Companies promoting MPEG-4 compatibility do not always clearly state which ”part” level compatibilitythey are referring to.

20

Page 21: Blogger to E-Book

8. The key parts to be aware of are MPEG-4 part 2 and MPEG-4 part 10 used by the Nero Digital AVC,by Quicktime 7, and by next-gen DVD formats like HD DVD and Blu-ray Disc.

9. Now comes the talk about H.264.In short H.264 is a standard for video compression, and is equivalentto MPEG-4 Part 10, or MPEG-4 AVC (for Advanced Video Coding). It uses motion-compensation-basedcodec standard.Now whats motion compensation?Will speak on this in few days after I get 2 know what itis?

10. Thanks wiki for sharing this.

Amsang (2009-01-06 11:05:00)yeh meliorate kaun hai....

ANUPAM (2009-01-06 16:07:00)Sir,Meliorate means GET BETTER

harjot (2009-01-20 20:48:00)anupam ,good effort , keep it up

DUAL SCREEN LAPTOP : LENOVA (2009-01-06 22:39)

[1]

[2]1. Now thanks 2 laptopmag.com that I could get this pic that actually shows the newly unvield modelfrom lenova the THINKPAD W700ds.The first of its kind in the laptop world.With a purpose of ? Still 2decide!!!but yes some ideas start propping in every one’s mind about what he/she can do with such a modelif given a choice to work on.

[3]

[4]2. A word about the cost ranges from a cool 90,000 Rs and beyond.Inside the W700ds is a choice of IntelCore 2 Quad processors, NVIDIA Quadro FX graphics and up to 8GB of DDR3 memory. There’ll be achoice of hard drives in RAID configuration, or solid-state drives with a 17” main display and 10.6” verticaldisplay.Weight is going to be a problem as the baby model baby needs a pull of 40Newtons for a pick ...Imean approx 4.1 kg.....bhaisaab over weight to hain!!koi doubt nahee...but is it worth?Who will actually needit as on date?I can guess with guarantee about few big corporate houses who like the TASHAN factor or forthose who have the Lakshmi and can spare some for a style.

[5]

21

Page 22: Blogger to E-Book

[6]3. So the initial reaction is going to be limited.But......yes there is a but......I mean how many of us knewthat we will possess a laptop few years back...when it seemed like a rich mans shauk.....not many....and 2daydesktop are actually pursuing the stone age road already.So it is just a matter of time,low cost and sale andeconomic growth of a country like Hindustan where each one of us has a dil ke andar tashan kee baat.....stylekee baat.....so i assume that this concept will be well recieved in near future.

[7]

[8]4. Certainly,there needs more refinement on the concept w.r.t the cost & the weight.Lets weight ...I meanwait and watch......

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SWOZHqT0sqI/AAAAAAAAAE0/LQlkAta_vSg/s1600-h/lenovo700ds_0001g.jpg

2. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWOY5HG7P8I/AAAAAAAAAEs/lEwe7J3ptLY/s1600-h/lenovo700ds_0001g.jpg

3. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWOY5HG7P8I/AAAAAAAAAEs/lEwe7J3ptLY/s1600-h/lenovo700ds_0001g.jpg

4. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWOY5HG7P8I/AAAAAAAAAEs/lEwe7J3ptLY/s1600-h/lenovo700ds_0001g.jpg

5. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWOY5HG7P8I/AAAAAAAAAEs/lEwe7J3ptLY/s1600-h/lenovo700ds_0001g.jpg

6. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWOY5HG7P8I/AAAAAAAAAEs/lEwe7J3ptLY/s1600-h/lenovo700ds_0001g.jpg

7. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWOY5HG7P8I/AAAAAAAAAEs/lEwe7J3ptLY/s1600-h/lenovo700ds_0001g.jpg

8. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWOY5HG7P8I/AAAAAAAAAEs/lEwe7J3ptLY/s1600-h/lenovo700ds_0001g.jpg

Get Flummoxed : Futuristic Laptops (2009-01-08 15:05)

1. Got these pics from http://www.tuvie.com/category/laptop.This site has a collection and details of allthese laptops with brief details.Below is a collection of these real good lucrative futuristic laptop sets.Wortha dekkhna.

[1]

22

Page 23: Blogger to E-Book

[2]

[3]

[4]

23

Page 24: Blogger to E-Book

[5]

[6]

24

Page 25: Blogger to E-Book

[7]

[8]

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SWXOu2K9fpI/AAAAAAAAAHc/KJTCMsO0qGM/s1600-h/qwertjpg

2. http://4.bp.blogspot.com/_z1QH8I3k9vk/SWXOmeT7p0I/AAAAAAAAAHU/K8sF_hkHlb4/s1600-h/XOXO_ebook_150.jpg

3. http://3.bp.blogspot.com/_z1QH8I3k9vk/SWXNMbdaCAI/AAAAAAAAAHM/ud9R8Ah709M/s1600-h/compenion-laptop1.jpg

4. http://4.bp.blogspot.com/_z1QH8I3k9vk/SWXM3n9aIsI/AAAAAAAAAHE/ke9g8584kVk/s1600-h/solar-notebook1.jpg

5. http:

//4.bp.blogspot.com/_z1QH8I3k9vk/SWXMdlWi7ZI/AAAAAAAAAG8/QZzEfmkfv4Q/s1600-h/mo-redefined-notebook-pc1.jpg

6. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWXMQlb_JKI/AAAAAAAAAG0/szvhy7aMFUE/s1600-h/cario-laptop-concept2.

jpg

7. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWXLlEv5CEI/AAAAAAAAAGM/aWHQk8h5dhA/s1600-h/

v12-dual-touch-screen-laptop1.jpg

8. http://2.bp.blogspot.com/_z1QH8I3k9vk/SWXLO9Kj9EI/AAAAAAAAAGE/P6Xk6J61Wzg/s1600-h/

v12-dual-touch-screen-laptop21jpg

25

Page 26: Blogger to E-Book

DOES DEMOCRACY MEAN FREE 2 STRIKE? (2009-01-09 14:49)

[1]

[2]

1. Days will not be far when we search fuel on google!!!!No time to joke anyway.This comes in context of thePSU and the govt dispute.Now an effect, to the scale of effecting the entire nation, over a regular issue thatkeeps propping every now and then,can happen in apna own democratic HINDUSTAN only.

2. In this country the meaning of democracy is not understood by many.To many it means anyone can speakanything,anyone can do anything,anyone can sit on a dharna or may be anyone can go on strike.This is whatis understood by many.Now since yesterday anyone who has been watching TV would have come across usualcommon man cry over shortage of petrol...kisi kee maa bemaar hai...kisi ki koi meeting hai...someone is leftstranded on a NH1 highway for want of petrol....and the list goes on.No body is effected in the PSUs andnor in the goverment.They both are fighting and the common men is being pisoed.2. This kind of a strike clearly reflects SELFISHNESS,MEAN-NESS,Miserly attitude of the strikers.Havesome responsibility towards the nation.There is no difference I find between a cosseted,spoilt,ballsed uptyke and them.For want of a wage revision they are ready to put at stake the NATION. 3. Any out-side country watching this could easily take this opportunity if this doesn’t get under control at the earli-est.Movement/Motility/Commuting across a country,mind it not a city or a town or a village,in context ofan entire nation is held up.Imagine at this time ,being struck by a natural calamity,all relief measures wouldbe held up for want of an issue like wage revision of a PSU.Awful!!!Execrable. 4. Now it would be seenI am sure all the echelons in these PSUs would move scotfree,no action would be taken.....because INDIAhas the biggest democracy in the world.What does democracy mean,no body knows!!at least the PSUs don’tknow.The fact that these Mongrel’s have put a country at stake before their own meagre selfish mind isenough to prove them guilty of commiting a undesired umbrage. 5. So recommended action is DECREASETHEIR SALARIES.

26

Page 27: Blogger to E-Book

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/SWchtVvUUXI/AAAAAAAAAIE/qwYe1uScbEo/s1600-h/google-gas.png

2. http://2.bp.blogspot.com/_z1QH8I3k9vk/SWca8F8MTcI/AAAAAAAAAH8/hjMqlxvBPs8/s1600-h/petrol_4.jpg

Anonymous (2009-01-30 11:09:00)Hi Meliorate: The tag line reads ’... there is no end to improvement’. Would you mind improving on the partialknowledge reflectd in the above blog by going through this link:http://energizingnation.blogspot.com/2009/01/information-for-indian- citizens-oilmens.htmlthis:http://energizingnation.blogspot.com/2009/01/sequence-of-events-oi l-sectors-officers.htmland possibly also this:http://www.flonnet.com/fl2603/stories/20090213260310500.htmRegards

ANUPAM (2009-01-31 06:41:00)hi anonymous,1. i read through your links and would like to tell you that YESS you have been subjected to worst possible treat-ment by the sarkar,but just being treated like that should not make you do what you have done...STRIKE is not thesolution...what would you like to prove by that?2. If army also does the same thing...even they r frustrated lot after the sixth pay commission...their structure hasbeen lowered,thier proposals have been thrown...would you agree if ARMY GOES TO STRIKE?I certainly know theanswer ..it would be NO...there are some duties and responsibilities that are not just salaried...they carry a bondingand obligation towards nation....and so is yours...you move the nation on road,on rail every where across.....regards,anupam

Software Leloooo....Software lelooooo (2009-01-12 14:05)

[1]

1. I have spent my bachpan in the middle class galiyaan of Saket wherein I was frequent to hearing the sabzee-wala singing and doing cantabile on his cycle with loads of subziyaan .....”AALLLU LELOOOO....Baiganlelo...........” and so on and the list went on till he recited his entire list of subzees in his bunny bag.

[2]

2. Lately I got cued of this sequence as I visited Nehru Place,the hub of IT Hardware selling andSoftware.Not less then about 30-35 persons with a bag full of CDs and DVDs with a collection of ple-beian photocopy list of all the latest softwares (cracked) were found freely dispersing the song ”Software

27

Page 28: Blogger to E-Book

Leloooooooo.....Software Leloooooo”.I was surprised thus,for the second time I put my ears wide open toget the substantiation again.Yes....indeed they all were selling SOFTWAREs....all including Windows Server2008,Autocad 2009,Windows 7 beta,Encarta 2009,Encylopedia 2009 and so on...........the list is endless.....

3. I wanted to take a pic of that but regrettably I was not carrying anything to get them clicked.Nehru Placeis one real place to be known as IT HUB...the real one.....much like we have sabzee ka bazzaar there we havea IT ka bazaar.People who do not K of computer(.........does it even exist in the word)...are found selling oldcomputers...motherboards””harddisks...RAM....all.....u name it they have it.....and at a price at which BILLGATES WILL ANNOUNCE HIS RETIREMENT AGAIN.SUN,SOLARIS and all major software developerswould get deposited in their closest and respective ICU’s............Rs 60/ is all it takes to get a combinationof all these softwares in one DVD........yes...a DVD...DUAL LAYER with a capacity of 16 GB........Janta isfound even bargaining & dickering on this and they even get it.

4. Is it right or wrong?.........of course it is wrong !!! but who cares.........oh darling yeh hai India.........

1. http://2.bp.blogspot.com/_z1QH8I3k9vk/SWsHPR1_NxI/AAAAAAAAAIk/e16J-MBJZkU/s1600-h/nehru1.jpg

2. http://1.bp.blogspot.com/_z1QH8I3k9vk/SWsG-U--mqI/AAAAAAAAAIc/dIJa_2ixvnI/s1600-h/mob101_1097313659_1.jpg

Google & Carbon Dioxide : The relationship most of us don’t know (2009-01-13 18:22)

[1]

1. Now this again is something new that I came across. I certainly know about a typical data center and itslong term cordial relation of janam janam with heat generation. Now what I came across new is somethingto do with statistical data about equivocalness and measurement of this heat connection with the Googlehits.

2. A recent study survey says that performing two Google searches from a desktop computer generatesabout 15 gm of Carbon Dioxide which tantamounts to boiling a kettle for a cup of tea. Isn’t it somethingnonplussing. Now I am sure you would read the sentence again. Meanwhile I will go ahead……

3. So hunting in Google has a definite environmental wallop. So why is everyone after google…..y measurein terms of google hits …y not measure in terms of hits of http://anupriti.blogspot.com Ha...ha ha….ha…its simple because Google has the largest number of hits about 200 million global hits every day and-http://anupriti.blogspot.com has only the author who reads……SIMPLE!!!!!!!!!!

4. Further in store is says that CO2 emanations caused by individual use of internet generates about 0.02gm of CO2 per second. This increases by 10 fold to 0.2 gm of CO2 when viewing a website with compleximages, animations or videos.

5. So what’s the worry folks…is their something to worry…….Yes I unfeignedly believe it’s a critical issue.The internet revolution has just begun in last 8-9 years and has a long way to go and if this is the beginningwhat’s in store ahead ???What now then?........let the brain techies think over it and we can just appreciatelater……..thats what 99 % of us belong to and do most of our lives………!!!!!!!!!!!!!!

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SWyPDl5ja0I/AAAAAAAAAJE/GklfENqt2TQ/s1600-h/google+climate+group.jpg

28

Page 29: Blogger to E-Book

HOLOGRAPHIC TEXT Messages (2009-01-17 23:23)

This thing I had heard and discussed long back when I was being graded in an institute or still clearer...when I was studying few years back ....then it was taken as an IT hoax that would never happen or wouldtake light years to become a reality...not any more for those who believe that IT is the biggest biggest thingto have happened in the history of mankind after the invention of wheel...zyada to nahee bola....khair anyway....this video shows what can be the impact of a holographic text message....needless to explain this...itis to be understood by seeing!!!!!!so watch it to believe it......

[EMBED]

COMPRESSION.... has a LIMIT? (2009-01-19 22:11)

[1]

1. Compression of files to me means diminution or simply reduction in size of data in order to save space ortransmission time.So till recently I used to use the famous winzip which used to give an average reduction of30-40 % of the original file size.But that stood till recently before I met a file of size 716kb....even less thenone MB and when I unzipped it ..it stood out to be a complete 696 MB...amazing..yes a compression beyondbelief.

2. For information compression can be as simple as removing all extra space characters, inserting a singlerepeat character to indicate a string of repeated characters, and substituting smaller bit strings for frequentlyoccurring characters. This kind of compression can reduce a text file to 50 % of its original size and this ismade possible with the help of various programs that uses various obscured formulas or algorithms.

3. This lead me to hounding for various zipping softwares available in the web world and I found oneKGB....now the KGB site claims ([2]http://kgbarchiver.net/) that it reduces 1 GB into 1 MB......I said inmy mind.....ke bhaiya this is impossible till i tried compressing one avi file of 700MB ...........and the reducedsize was 726kb...........so was it!!!!!!!so I mailed it to my mail box....downloaded it in my office next day.andyes...i downloaded 700kb file and I got extracted with a 700 MB file...so theorem proved LHS =RHS.

4. So where is the discommotion?...good things never come easy........i had to wait for 135 minutes forcompression and ”Yes” before you try it make sure you have a good processor which can bear the load ofwork that would be given to the bechara processor combined with gooooooood RAM......the other problemis availability of the software at a price...where did I get it from? do u wish to know? the answer starts fromT & ends with Z.........still not understood......better mail me ur email id.......will let u know!!!!!!!!!!

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/SXS1LQ61kbI/AAAAAAAAAJs/fPxS_pP-V1Y/s1600-h/diamond-pressure.jpg

2. http://kgbarchiver.net/

29

Page 30: Blogger to E-Book

THE NAME IS RAJNIKANTH (2009-01-20 22:14)

[1]

1. Now whats Rajnikanth doing here in this BLOG..which deems itself to reflect IT news and small thingsabout life.Actually a personal favorite of mine...I thought I must include this favourite of mine...this guy isamazingly amazing for those who know him....and for those who do not know him...I really understand thatthey r missing something.....i mean not someting...but quiet a LOT...ek baar rajni ka issssshtyle dekhogeyto vaaakai TENSION free ho jayogey.....

2. This guy has stupefying,flummoxing,baffling or more simply just amazing SCREEN PRESENCE.I have alot of respect for him for he is unlike a superstar in so many ways we see other actors and still dooms large onthem.The XXX factor could be measured when crowds from all sections of the society Hindi/Telugu/TAMILoff course/Kannada/Japan/Russia throng the cinema theatres.Google is the place where one would be ableto measure the scale of strength he modulates when he appears in his movies today....even as a young-ster.....(though he is closing on 60 next year).

3. Here is a list of characteristics of the character that Rajnikanth entertains on in his list of HITS...

a. Rajnikanth makes onions cry

30

Page 31: Blogger to E-Book

b. Rajnikanth can delete the Recycle Bin.c. Ghosts are actually caused by Rajnikanth killing people faster than Death can process them.d. Rajnikanth can build a snowman..... out of rain.

e. Rajnikanth can strangle you with a cordless phone.

f. Rajnikanth can drown a fish.

g. When Rajnikanth enters a room, he doesn’t turn the lights on,......... .... he turns the dark off.

h. When Rajnikanth looks in a mirror the mirror shatters, because not even glassis stupid enough to get in between Rajnikanth and Rajnikanth.

j. The last digit of pi is Rajnikanth. He is the end of all things.k. Rajnikanth does not know where you live, but he knows where you will die.l. Rajnikanth calendar goes straight from March 31st to April 2nd, no one fools Rajnikanth.

m. If you spell Rajnikanth wrong on Google it doesn’t say, ”Did you mean Rajnikanth?” It simply replies,”Run while you still have the chance.”n. Once a cobra bit Rajnikanth’ leg. After five days of excruciating pain, the cobra died.

o. Rajnikanth was once on Celebrity Wheel of Fortune and was the first to spin. The next 29 minutes of theshow consisted of everyone standing around awkwardly, waiting for the wheel to stop.

31

Page 32: Blogger to E-Book

p. It takes Rajnikanth 20 minutes to watch 60 Minutes.

q. Rajnikanth once shot down a German fighter plane with his finger, by yelling, ”Bang!”

r. Behind every successful man, there is a woman. Behind every dead man, there is Rajnikanth.

s. Rajnikanth destroyed the periodic table, because Rajnikanth only recognizes the element of surprise.t. Rajnikanth got his drivers license at the age of 16 Seconds.u. WHEN YOU SAY ”NO ONE’S PERFECT”, RAJNIKANTH TAKES THIS AS A PERSONAL INSULT.

1. http://2.bp.blogspot.com/_z1QH8I3k9vk/SXYGzfEEymI/AAAAAAAAAKM/Goxm5O5FK6E/s1600-h/12.jpg

francisfreny (2009-02-05 08:58:00)Simply Superb(pronounce in southern style)!!! excellent research work by a very talented and an amazing personhimself.

DETRITUS...(I mean dust) vs IT (2009-01-30 20:14)

1. People ask me about why I choose words like “detritus” when I could have chosen a simple word likeDust which is more familiar to the aam Indian janta…well….even I don’t know why I sometimes try to makesimple thing complex….so that’s not the subject I am going to discourse here….the subject relates to the

kinship, the affinity and the relationship between IT in India and dust.

2. Not so long back I remember in my school computer classes we were made to remove shoes and thencountenanced to enter the consecrated Mandir ie the computer lab of the school. Be it the school principle orthe vice patron/patron or be it any Hifi panjandrum..(I mean a VIP)..he would only enter the sacred mandirof the school after removing his/her shoes. There on, I was made clear in the mind that [1]dust and IT sharea typical gali ka majnu(Dust) and a pulchritudinous or more simply a beautiful girl(IT) relation….wherethe majnu will be always after the girl and girl would try make a vague attempt to repudiate the undesiredadvances from the majnu…..and the winner will be majnu.

32

Page 33: Blogger to E-Book

3. In came so many IT giants in India viz SONY, Samsung, Philips, Moser Bair and the list goes on…theyintroduced Zero Dust Labs in there respective manufacturing units. I have been fortunate to visit most ofthese wherein I was made to look like an astronaut covered in beautiful, neat, clean white tailored clothswith boots of snowman before I could enter these labs.It was an exercise beyond doubt for an employeewho would go through this drill of changing clothes in the morning as he enters,in the afternoon twice as hebreaks of for lunch and then rejoins to again finally breakoff in the evening.All said and done the IT giantsmade every ounce of effort to make the ZERO DUST LAB a success…but the moment the test tube babiescame out of the lab…I mean as the manufactured units in form of CDs,DVDs or harddisks etc..they wouldagain be exposed to DUST and that’s where it would again go out of control…..the dust interacts again……

4. So off late when I read articles like a recent one where [2]SONY has kept [3]Indian demographics and usageenvironments in mind and has introduced the AD-7220S-ID DVD-RW drive with ’dust proof’ technology.This drive offers 22x DVD read/write speed and has six sponges in the inside of the bottom cover and bezeland PWB to make it dust-proof; a 20 percent increase in product life is claimed by Sony due to this. Thedrive is available in SATA format and supports 48x CD read/write speed and maximum 12x DVD-RAMwrite speed.

5. The sponges might make a fringy & marginal difference by absorbing dust and keeping the drive cleanbut the madhur Milan of the majnu would never fail and the dust would always be there at the end to meetthe IT.

1. http://www.yourdictionary.com/dustproof

2. http://www.sony.co.in/section/home?referer=http://www.google.co.in/search%3Fhl%3Den

3. http://en.wikipedia.org/wiki/Demographics_of_India

Anonymous (2009-02-02 03:47:00)Inspite of the instructions, u chose to write a blog instead of replying to the email, but i can see your hindi is never-theless as adavnced as it has been since the days of the school lab...

2.2 February

INTEL & BIKE (2009-02-05 18:33)

[1]

33

Page 34: Blogger to E-Book

1. When I first got to know of the joint embarking between Intel & OCC ie Orange County Choppers,globalmanufacturers of rugged & custom choppers(….we call bikes). I read the whole article once again to believeit and leaped 15 years back …of course in memoirs…when I got my first bike Hero Honda SPLENDOR.Thisbike ruled the Indian roads for a good 5-6 years with no stiff competitors around till 2001 when Bajaj PUL-SAR was launched with the DTSI 150/180cc with the option of a DIGITAL SPEEDOMETER….the first ofits kind in the bike segment in INDIAN context.

2. The kind of spark this created to the bike customers was stupefying.In no time Pulsar swept over thebike segment complete in all aspects. Marketing, sales, roads….colleges, schools, offices….Pulsar made itscomportment every where just because of its Male look(..as advertised) and of course a small contributingfactor was the electronic speedometer which made Bikies like me think then if ever computer will do something

with bike.

34

Page 35: Blogger to E-Book

3. So it first happened about 2 years back when Intel® and Orange County Choppers got together tobuild an Intel® themed masterpiece. They needed a computer that could take all the abuse the bike woulddish out and still be flexible, portable, and powerful enough to power all the systems of the bike.BlackDiamond Advanced Technology (Black Diamond), a technology development firm specializing in the designand implementation of rugged electronic systems, provided engineering support to create a fully computerizedIntel® themed motorcycle by Orange County Choppers.The following are the key features of interest :

a. “Sunlight Viewable Detachable dashboard” and fully computerized processes on the motorcycle such askeyless ignition and electronically controlled kickstand activation.Keyless ignition is replaced by finger printrecognition software. The figure shows a pictorial representation of how the dash board looks like.

b. Designed to meet military specifications to endure shock, vibrations, dirt, water and extreme tempera-tures). PC features a custom module that allows for easy portability of the computer, which is mountedbetween the handlebars on the motorcycle.Portability means you can take the detachable dashboard from theparking stands to your office and open Microsoft Word and do some office work after attaching the keyboard.

c. Rear-mounted cameras that replace standard rear-view mirrors,so web cam time is no more confined toyour desktops and laptops...it has started making presence felt in vehicle infotainment.

d. Audio and video systems integrated with the handlebars and headset in the helmet

e. Wireless connectivity including Bluetooth, Wi-Fi and GPS.

f. Processor details includes 1.0 GHz Intel® Celeron® M processor, 1GB of 400 MHz DDR2 and can runWindows XP, Vista, CE, Mobile or Linux, packing the power of a desktop PC in a lightweight, handheldrugged form factor.

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/SYrkA7VNRZI/AAAAAAAAALU/5v9kfAgb_Ys/s1600-h/Untitled.jpg

Anonymous (2009-02-05 23:08:00)is it a real bike or some toy from leo company?..and if it is real...it is real coooool....thanks for the info!!!

Fighting LIGHTSCRIBE !!! (2009-02-11 16:46)

1. I bought my laptop few years back and I had exploited all its features including Blue Tooth,WiFi,Webcam,running high processing softwares to test its 2GB RAM,CD/DVD Writting etc but not LightScribing.

2. This term in easy terms would mean printing on CD/DVD just like you take a printout on paper…..willget more clearer from the picture inset…..I had read some theory on this on how it works and what is theprocedure of doing the light scribe but practical always remained a backlog till last week when I got theopportunity to do some thing on it.

35

Page 36: Blogger to E-Book

3. LightScribe is an innovative technology that uses a special disc drive, special media, and label-makingsoftware to burn labels directly onto CDs and DVDs. These have a limitation of being in Black & White onlyas on date. Because the labels are laser-etched—not printed—there’s no ink, no smudging, and no peeling.Your labels can be whatever you want them to be. Create one-of-a-kind designs with your own photos, text,and artwork using your label-making software. Or choose from the many free templates available on the net.

4. The first thing I required was the light scribe DVD.Now finding lightscribe DVD in a small town (..I hopethe jalandharite’s don’t mind on that....)is also a problem . Shopkeepers have to be explained N number oftimes of what it is ? and still they never understand. You usually get comments like “kya saaab....matlabcd pe screen printing ha ha ha....That apart I finally got one opportunity on leave to visit the IT hub NehruPlace in New Delhi.

5. At Nehru Place,I got to know of the variety of Light Scribe DVDs available.They range from Rs 400/-to Rs 1800/- for a set of 10.To find out the reason of difference in price it was not the company orbrand,but something to do with the quality of laser coating on the DVD.The costlier the DVD,the bet-ter would be the contrast and the cheapest of them would give you a relatively darker burn but would begood enough to see the image you have burned.So I went ahead with the Rs 400/- to experiment with.

6. Next thing was the software. My laptop came preloaded with Home Vista Basic which made its way toheaven immediately on arrival since I wanted it to work with Vista Ultimate. So the preloaded Light scribeHP software was gone and I thought of installing it from the SWSETUP/LSHSI folder.As i started it , Igot the message “UPDATE SHELL COMMAND” property must be set on the command line”…sostraight I asked god!!!…(Has google become God?)..so came many answers and threads to solutions butnothing could solve it.So I started looking and experimenting with numerous third party software’s and Itried “Sure Thing CD Labeler”. The name of the software went with the meaning and solved my problem.Easy Installation, Easy Writing, No Hassles,No DLL’s missing and no message to mess with ““UPDATESHELL COMMAND”.So got my first LIGHTSCRIBE as shown in pic.

Mohd Sahid Khan (2009-02-23 08:49:00)good keep it going anupam

Anonymous (2009-03-06 15:49:00)I liked it. Good job!:)Rinkoo

36

Page 37: Blogger to E-Book

IT ostracized!!!!! (2009-02-26 23:04)

1. Few days back a petition was filed at the Bombay High Court calling for a ban on Google Earth citingthat terrorists used this mapping service to plan attacks on key emplacements in Mumbai, on 26/11. Itreminded me of a similar instance of army wherein few years back Pen Drives were banned following somebreach of security information.

2. “ Mindset” comes as the key to such pudden-head and dullard bans. Such Mindset is linked to the lowIQ and literacy level of such decision seekers. I have also read articles wherein similar bans were asked forWiFi connectivity at various places.Now moving on these lines I have a few sample bans which should alsobe taken care of to eliminate security breach:

a. Why not ban manufacturing Vehicles in which the terrorists or the offender moved from the source locationto the destination location quickly?

b. Why not ban mobile phones across India so that they cannot plan further?

c. Why not ban manufacturing or accessing computers in this country owing to which all this is taking place?

d. Why not ban manufacturing Guns/Rifles and ammunition?

e. Why not simply ban INTERNET in India?

3. So why just pendrives or google earth? It is indeed staggering the way decisions are being made andsought in this country. It wouldn’t come as a surprise to me if access to Google Earth is banned in thisregion in some time.

4. What we actually need is to find a way out to tackle these…elimination is not the solution.

5. The IT quotient of aam aadmi (which indeed hold the majority) needs to actually improve before it getstoo late.Be it the defence or the civil.Till the time the defence General saab knows what can be more lethalthen pen drive,till the time judge saab of the court knows what power IT holds today…what decision will hebe able to make?However big they may be in terms of respectable positions and appointments,they wouldstill form the TAO group(harayana wala) who still believe ke bhayaa ye computer shamputer kuch na karkeydega…karna sabko khud padega…………!!!!!!!

37

Page 38: Blogger to E-Book

2.3 March

Fight of the Browser’s : ACID3 TEST (2009-03-05 22:27)

[1]

1. I recollect the first interaction with the web with the services of Internet Explorer 3.0 some time in1997.Then there was a alternative of Netscape Navigator 3.0 only.So between the two in those days,there wassinewy competition and I would appreciate that the choice between the two mattered owing to individual’spersonnel choices. I liked browsing with Netscape Navigator and Ujjwal (my only IT savvy friend then…)liked it with IE 3.0.

2. So there were no standards then to decide upon which one is actually better. Time graduated to the early2000’s and in came a lot many browsers each arrogating to be the best amongst lot. These included Amaya,Konquerer, Phoenix, Galion and the list is endless. Anyone interested in knowing about these unheard namestoday may just google and inquire about them…..now on way to superannuation!!!

3. Those which endured the decade long fight of the browsers included Safari, Opera, Mozilla to name a fewand few new one’s to include Google Chrome, Flock.

4. Now after a decade of evolution , few standards spranged up to finally one make adjudicate about whichone is actually better.The standard I am going to mention is ACID3 TEST. Nothing to do with Sulphuricor Hydrochloric acid.

5. Acid3 is a test page from the [2]Web Standards Project that checks how well a [3]web browser followscertain [4]web standards, especially relating to the [5]Document Object Model and [6]JavaScript.

38

Page 39: Blogger to E-Book

6. When successful, the Acid3 test displays a step by step increasing percentage counter with colored[7]rectangles in the background. I tried on mine ie Google Chrome and it scored 78/100(Picture In Set).Thepercentage displayed is based on the number of sub-tests passed. It is not representing an actual percentage ofconformance as the test does not keep track of how many of the tests were actually started (100 is assumed).In addition to these the browser also has to [8]render the page exactly like the reference page is rendered inthe same browser.

7. Further to this I inquired about why Chrome scored 78,it was because prior to conduct of test it wassupposed to be set to its original default settings which I did not do. So I surfed few forums on what hasbeen the score of other browsers. This lead me to conclusion that as on date Chrome scores over others atleast in ACID3 test and being a sincere Chrome user my self...believed the same quickly....thanks for wikifor info!

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SbAGIzkaKUI/AAAAAAAAAMc/7H1UT_xlsuk/s1600-h/20084196.JPG

2. http://en.wikipedia.org/wiki/Web_Standards_Project

3. http://en.wikipedia.org/wiki/Web_browser

4. http://en.wikipedia.org/wiki/Web_standards

5. http://en.wikipedia.org/wiki/Document_Object_Model

6. http://en.wikipedia.org/wiki/JavaScript

7. http://en.wikipedia.org/wiki/Rectangles

8. http://en.wikipedia.org/wiki/Rendering_(computer_graphics)

Nikhil Chauhan (2009-03-07 01:49:00)Good to know Dude.

39

Page 40: Blogger to E-Book

Be CAREFUL (2009-03-08 00:14)

[1]

1. We all drive our respective vehicles daily from one point to another without agnizing what risk weare always at. Disregardless of how we drive, what matters most is how others drive.3-4 months backon way from Gurgaon to Noida I saw this mangled, mutilated remains of a so called Car(INSET). Asmall mistake, be it in form of being tired on a long drive or speaking on phone or just driving casually

would lead one’s soul out of this globe.

40

Page 41: Blogger to E-Book

2. The sole purpose of posting this is to promote the tag “DRIVE CAREFULLY”.

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SbLCTAkLncI/AAAAAAAAAM8/8guwL8r0Aww/s1600-h/DSC07488.JPG

Anonymous (2009-03-08 00:46:00)ultimately it is taqdeer mere bhai!

41

Page 42: Blogger to E-Book

PictBridge (2009-03-17 16:05)

[1]

1. Any time we wish to take a printout of clicked pics from our camera,what do we do?Either insert thememory stick directly into the card reader of lap top/pc or we connect thru the regular interface cable.In boththe cases,we need to have a computer as a via media.So to kill this form factor,PictBridge has arrived.WhatsPictBridge?...read on.... 2. PictBridge is a technology that was created to allow the user to transfer picturesfrom a camera phone (or digital still camera) to a printer without a PC or image-editing software. PictBridgemakes printing digital photos easier and more accessible. A number of manufacturers have direct printingmethods on the market today. The drawback is that some of these direct printing methods are proprietary,which means that you can only print your pictures when everything is provided by the same manufacturer.Itsformal name is ”Standard of Camera & Imaging Products Association CIPA DC-001 — 2003 Digital Solutionsfor Imaging Devices”.

3. PictBridge is typically implemented using Universal Serial Bus portsand the USB protocol. PictBridge-capable printers typically have a USB Type A receptacle which is thenconnected by cable to the USB port of a PictBridge-capable digital camera (typically a Type Mini-B). Theuser then uses the camera to select the pictures to print, which the printer then retrieves from the cameraand prints.

4. The good thing is that it is not just limited to printing from Camera’s,it can be a mobile which isPictBridge enabled.The limitation to use this is both the devices have to be PictBridge enabled.As on datemost of the high end Canon brand models are supporting this PictBridge.Just like Lightscribe logo thePictBridge too has its small green label as shown in set. 5. Just a start on the right road.......FUTURE ISBRIGHT...for now we have to bear with limitations and enjoy what we have.

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/Sb-BFAm5d0I/AAAAAAAAANE/UZitcUTara8/s1600-h/delete1.jpg

42

Page 43: Blogger to E-Book

THE LINK : BJP & OPEN SOURCE!! (2009-03-18 16:25)

1. Rajnitee and IT ?Do they share a relation in our country? Do they meet anywhere in Indian scenario?Haveyou ever heard a technical IT buzz word shooting from any of the mantri’s mouth.I am sure in most casesthe answer would be NO.

2. Recently I read this article at the [1]http://infotech.indiatimes.com/articleshow/4272163.cms wherein itadverted that Mr L.K.Advani has said that if his party comes to power, it will actively promote opensourcesoftware and internet telephony. Now irrespective of whether Mr Advani knows what open source softwareis or not,or whether he just recited what he was told to by IT savvy speech writer,the good good news is

that IT is buzzing now in politics.

3. The power of open source software is still lying completely unexploited in our country for most of us don’tknow what opensource has in store for us.All paid softwares ex any Software developer viz Microsoft,Coreletc to name a few has an equivalent in opensource costing free which unfortunately now one is aware.Did

you still not understand ? Read on for what is open source?

4. Open source software (OSS) is defined as computer software for which the source code and certainother rights normally reserved for copyright holders are provided under a software license that meets theOpen Source Definition or that is in the public domain. This permits users to use, change, and improvethe software, and to redistribute it in modified or unmodified forms. It is very often developed in a public,collaborative manner. The term open source software originated as part of a marketing campaign for freesoftware. A report states that adoption of open source software models has resulted in savings of about $60billion per year to consumers.(…thanks wiki)

5. So Mr L K Advani’s party seems to be the first to realize the power hidden in this.Good!Isn’t it…….Nowwhy open source doesn’t seem to be a success in India?One line answer….may I attempt?........”becauseMicrosoft’s Cracked Windows Xp and Vista are available for free in any gali,mohalla of the Hindustan.Sothe next motto for a political party would be to crack those crackers!!!!!!!!!!For now its INDIA SHINING!

1. http://infotech.indiatimes.com/articleshow/4272163.cms

Pawan (2009-03-20 21:08:00)Open Source may be a right solution for a country like INDIA. Because of following reasons1) Need more skilled man power in development of software.

43

Page 44: Blogger to E-Book

2) Development of software according to the need of customers.3) No hidden cost like license or update of software.4) No dependability on support of product develop company.5) Fully control on source code of software.

Download video from Magazines/Billboard: MMCC (2009-03-21 23:06)

[1]

1. Imagination is one key to success today. Had we never imagined things, things would not have come upas they have today.Today I read this article on Indiatimes.com/ InfoTech Tab about Mobile Multi-ColourComposite (MMCC) 2D-Barcode.Now it looks like just another IT dictionary term which has a complexname but a simple function and utility. It goes like this……

2. Ideate(…means imagine) a magazine with an advertisement of a mobile phone manufacturer with a barcode printed something like inset. From this bar code, can u think of downloading ringtones, product info,Video? Can you? Puzzled, I am sure. This has no more remained a subset of imaginativeness, it hasbecome unfeigned today with this technology, which is known as Mobile Multi-Colour Composite (MMCC)

2D-Barcode.

3. The MMCC is a color 2D barcode designed for storing high capacity data on printed media and displays,tailor made for camera mobile phone applications. Using the MMCC, the user can retrieve digital content totheir camera mobile phone directly from the barcode by capturing an image of the barcode and decoding iton their mobile. According to the scientists, by taking a photo of the barcode, users can download complexinformation, such as videos, voice recordings or text, instantly to their mobile.

4. Why named 2D Bar code ? 2D means ’two dimensional’. 2D barcodes comprise more information thanconventional one dimensional linear barcodes. Conventional barcodes get wider as more data is encoded. 2Dbarcodes make use of the vertical dimension to pack in more data. Data is encoded in both the horizontal andvertical dimensions. As more data is encoded the size of the barcode can be increased in both the horizontaland vertical directions thus maintaining a doable shape for easy scanning.

44

Page 45: Blogger to E-Book

5. Advantage of 1D over 2D : Although 1D barcodes hold a more belittled amount of data it is ’spread’over the whole height of the barcode. The barcode contains a high degree of redundancy. This means thebarcode can be read even with considerable degradation. If your application needs only a few characters (upto about 15) then a 1D barcode is probably the best solution. Increasing the height of a 1D barcode doesnot increase its capacity but it does increase its redundancy thus making it more resistant to abasement andobliteration and making it easier to scan.

6. In Japan the 2D Barcode has even been placed on Billboards(picture inset).[Source:

http://cootieshot.wordpress.com]

The visitor takes a picture of the Barcode on the Billboard and their phone brings up more information aboutthe deceased person, pictures of them or any other content the family or pre-deceased and now occupantso chooses. In spain they are being used to contain detailed train maps to make travel easier and mostinterestingly in a recent Holland Inovation Fair placed a code on each visitor’s badge and each presentor’stent. The visitors didn’t have to exchange business cards if they wanted to learn more about eachother’sideas. They simply scanned the other person’s barcode and their information was sent to their cellphonethrough SMS.

7. As on date, Bartender comes as one of the leading software’s in creating 2D barcodes.I could not findany thing on the price aspect as to how much it costs today. So next what? Download something from yournews paper or download movie trailers from movie magazines……grrrrrrrr8……Future is bright………….For now keep waiting till the technology reaches your doorstep.

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/ScUmZpNhouI/AAAAAAAAAN8/bzUoa4zMzq8/s1600-h/flytip_qrcode.jpg

Anubhav Bhatia (2009-06-01 15:50:34)hi!I am a student from Symbiosis Institute of Telecom Management.I want to know more about this. can u also help me with some company with which i can do a research project onthis.Please write to [email protected]

gcf (2010-09-02 19:10:30)i have it scand whit my mobile: it‘s back on dvd september 10th

45

Page 46: Blogger to E-Book

2.4 April

IRON KEY : World’s Most Secure Pen Drives (2009-04-07 22:14)

1. Pen drives are dangerous and have even been banned by few organizations including the prestigiousarmed forces after one scandal of security leak came to light few years back in navy.Is that the solu-tion? Now it is like marta kya na karta wali baat….”i don’t have control over it so better ban it”.GoodNews for those who still desire to use pendrives in a much much safer way then available in the mar-ket.IRON KEYS have come to take care of the security issue of pendrives.What is IRON KEY? Read

on……..

2. The IronKey drives are very small, very portable, and very convenient. They come in configurations of1Gb, 2Gb, 4Gb, and 8 Gb’s. IronKey’s Secure Flash Drive is similar to an iPod, as its hardware, softwareand online service all rolled into one product. The IronKey Cryptochip uses US government-approved AES,CBC-mode, 128-bit encryption at the hardware level.

3. All models come in a sleek, stainless-steel, waterproof case that is sturdier and heavier than other USBdrives. The case has been injected with an epoxy compound that blankets the inner workings and keeps themdry and shock-resistant. Security-wise, the case would be extremely difficult to pry open without destroyingwhat’s inside.

46

Page 47: Blogger to E-Book

4. IronKey has a password generator that can create passwords up to 99 characters in length at either normalstrength with alphanumeric characters or stronger strength, which includes all keyboard characters. To usethe IronKey flash drive, you need to activate an online account. This is a necessary step to enable certainservices – such as online password backup, device and software updates and to access IronKey’s encryptedWeb-surfing service, which uses Mozilla’s Firefox. Besides creating an online username and password, youare asked to supply answers to three supplemental authentication questions that will verify your identity incase you ever lose your username or password. Failing to answer the questions accurately will lock you out

of your account permanently.

5. IronKey e-mails an activation code that you must enter in a window to complete your online setup.IronKey allows you to change personal security information at any time by accessing account settings. Ifsomeone does happen to gain access to your flash drive and they fail to type in the correct password morethan 10 times, IronKey will self-destruct, permanently locking out users and wiping out all the data on thedrive.

6. From a speed standpoint, IronKey is fast. Hd Tach tests showed speeds well above the competition:IronKey’s speed is 31MB/sec. burst speed; an average read rate of 29.6MB/sec., and a 6-millisecond random

47

Page 48: Blogger to E-Book

access rate. The CPU utilization rate is vastly higher than any other driver on the market by as much as 22%. SLC memory lasts about 100,000 write cycles and MLC memory lasts about 10,000 writes.

7. Special Solutions USA is an exclusive distributor of IronKey Secure USB flash drives for the Indianmarket.

8. More on [1]https://www.ironkey.com/

1. https://www.ironkey.com/

Anonymous (2009-07-17 02:44:04)VERY GOOD

Anonymous (2009-08-13 19:57:17)Be very cautious when dealing with Special Solutions USA / Special solutions Group.

Anonymous (2009-08-14 23:01:40)This post has been removed by a blog administrator.

Anonymous (2009-08-23 23:17:51)I HAVE DEALT WITH SPECIAL SOLUTIONS FOR MANY YEARS AND HAVE FOUND THEM AND THEOWNERS VERY PROFESSIONAL AND HAVE NEVER HAD A SHIPMENT NOT DELIVERED TO US THEABOVE COMMENT IS WELL OUT OF ORDER

special solutions group (2009-08-23 23:20:02)From Special Solutions: These are slanderous remarks and we would like to know who the anonymous is posting theseremarks about Special Solutions.If there really was an issue with any of our customers/clients and vendors, they would say who the firm is on the blogcomment.We know we do not have any dissatisfied customers/clients and vendors, By the way regarding vendors, We pay forall our products 100 % up front prior to shipping.Special Solutions

ANUPAM (2009-08-24 07:08:09)although i have not had any direct interaction with the subject group but with respect to the profile available andremarks on them in various forums on the net...they seem to be a very professional.

Anonymous (2009-08-24 16:04:41)This post has been removed by a blog administrator.

ANUPAM (2009-08-24 22:20:51)well mr anonymous,pls do not use this blog to exercise your grievances...if u have any thing like u have mentionedabove...pls take something legal...posting here will not serve you any purpose...thanks...

Anonymous (2009-08-29 17:39:37)This post has been removed by a blog administrator.

Anonymous (2009-09-04 16:01:11)This post has been removed by a blog administrator.

48

Page 49: Blogger to E-Book

Anonymous (2009-09-04 16:03:23)I have dealt with David of special solutions for many years and i must say he is a very profesial person and has donesome great work for our govermnet

ANUPAM (2009-09-04 22:07:03)i would request the posting comments personnel to at least write some name so that if someone is being blamed orcommented upon...he can just cross check their records...

MICHAEL JAMES (2009-09-09 17:03:05)SPECIAL SOLUTIONS GROUP HAS WORKED WITH MYSELF AND MY COMPANYS FOR SEVERAL YEARSAND I HAVE NEVER HAD A PROBLEM WITH HIM OR ANY OF HIS WORKERS THEY DO GREAT WORKAND OFFER SOME FANTASTIC PRODUCTS I WOULD NOT LISTEN TO A WORD ANYONE IS SAYING IKNOW HE FIRED A EMPLOYEE IN THE USA DUE TO THEFT AND LIEING TO SUPPLIERS AND TO CUS-TOMERS AND THIS GUY IS RINGING AROUND LIEING HIS NAME IS BOB WOODS AND HE HAS DONE AVERY BAD THING PEOPLE WHO LISTEN TO A GUY LIKE HIM ARE AS BAD AS HIM THE COMMENTSMADE ARE WRONG AND SHOULD BE REMOVED FROM THIS BLOG THIS IS A SLUR AND IS BAD FORTHE BUSINESS ANUPAN I RECOMEND YOUI REMOVE THE COMMENTS AND GIVE THE BUSINESS ACHANCE

J HURST (2009-09-09 17:43:21)who is saying all this crap about SSG these people are my pals come on big boy who are you come tell me how badthey are to my face you dave is a sound guy and you mess with him you mess with a lot of people this is a great guyand so are his guys you need to take a look at this woods guy and another guy call craig forshae from a companycalled RPG this guy had the balls to take cash off SSUSA to save his company as its going bust with a lot of deptand he and woods the pair of u know what are ringing people saying a load of rubbish jockies in my book they shouldkeep an eye on there backs big time if i was them

ANUPAM (2009-09-09 21:52:20)since mr anonymous has not come out in open and told the fora about his identity...i assume he is just here to createconfusion and create a bad image of the subject company....thus i m forced to delete objectionable comments as desiredby the fora....regards to all...anupam

rax (2010-11-17 17:06:41)hi,thanx for such useful information.[1]Secure USB

1. http://www.lok-it.net/usb-protection//

Rakesh (2010-12-02 22:27:52)Hi Friend Thank for the useful Info. I want to buy the product and visited the mentioned website ”www.ironkey.com”but could not find and Indian Supplier for the same. I also tried to find Special Solutions USA but could not find alink.Please provide me the link of Special Solutions / other Indian Supplier of the product. Please reply me on my e-mailid ”rgupta [email protected]”.

ANUPAM (2010-12-02 22:58:44)hi rakesh!get in touch with dave bale at [email protected]

A Sanghvi (2011-11-24 14:17:07)Hi Anupam,

49

Page 50: Blogger to E-Book

We also are suppliers for Ironkey in India. In fact we are suppliers for MXI and Kanguru as well. These are the top3 manufacturers of Secure USB drives. We are a company promoting only Secure External Storage and are workingon introducing these devices in a big way.People interested in the product can contact us on [email protected] visit www.sangv.com for comparison between the various offerings and also for data sheets.Thanks

GUIYU : THE CONNECTION WITH E-WASTE (2009-04-14 23:04)

[1]

1. Have you ever thought where have all the 486 and Pentium machines vanished from your desktops at homeand offices, what happens after your ink cartridge gets over and is thrown in the garbage, what happens to thediscarded keyboards, mouse’s and all electronic accessories that u reject being obsolete. In 90 % of the cases,they often end up in GUIYU, which may be the electronic-waste capital of the globe. Guiyu (pronouncedGWAY-yoo), a few hours’ drive northeast of Hong Kong, is by far China’s biggest e-waste scrap heap. Thecity comprises 21 villages with City businesses processing 1.5 million tons of e-waste a year. As much as 80

50

Page 51: Blogger to E-Book

percent of it comes from overseas.

2. China is believed to be the predominant recipient of the world’s e-waste, with a roughly estimated onemillion tons of electronic waste being shipped there per year, mostly from the United States, Canada, Japan,and South Korea. It arrives via container ships through the ports of Hong Kong or that of Pearl River Deltasuch as Nanhai. From there it is trucked to informal e-waste processing centers. Guiyu receives more e-wastethan any other area in China. Guiyu began receiving e-waste around 1995, slowly attracting peasant migrantworkers from other provinces to work in processing it. There are an estimated 150,000 e-waste workers in

Guiyu.

3. This obscure Chinese rice village is now the e-waste capital of the world - a place where bona fidemountains of keyboards and circuit boards tower over its inhabitants. The water here is undrinkable - ithas been for years. Most of Guiyu makes their living by trashing outdated Dells with their bare hands. Toaccess the cooking needs, for example, they roast circuit boards over coal-fired grills. Gold is obtained usingacid strippers, whose sludge is later dumped into the local river.

4. During an undercover visit to Guiyu in December of 2001, representatives of the Basel Action Network,Seattle, saw and taped villagers manually cracking leaded-glass computer monitors to retrieve the copperyokes within. The men, women and children of Guiyu also conduct open burning of PVC-coated wire andcable; they “grill” circuit boards to melt the lead solder to remove chips; and they work with a 75 percent

51

Page 52: Blogger to E-Book

hydrochloric acid solution to separate precious metals from circuit boards.The amounts of scrap computers,monitors and printers is staggering, overflowing in large piles in the front and back yards of villagers whowork from their homes or other small locations.The acid stripping operations, along with the open dumpingof waste and ash residue into ditches and riverbeds, has rendered the well water and ground water of Guiyuundrinkable. For the past five years, water has been trucked in from distant villages.

5. ”If you burn it, you can tell what kind of plastic it is,” said the man, who gave only his surname, Wang.”They smell different. There are many kinds of plastic, probably 60 or 70 types.”Six of Guiyu’s villagesspecialize in circuit board disassembly, seven in plastics and metals reprocessing, and two in wire and cabledisassembly.An average computer yields only $1.50 to $2 worth of commodities such as shredded plastic,

copper and aluminum.

6. The biggest obligation lies in the developed countries that export e-waste, instead of doing somethingabout the problem ,they are just dumping the same in underdeveloped and developing countries. JUSTTRANSFERING THE TRASH AND GETTING AWAY.

7. Perniciousness is only one reason that recycling electronics is costly in the United States. Another is poordesign. U.S. manufacturers haven’t made products to facilitate disassembly. A report advises that investing$1 more in design costs per computer could save $4 for American recyclers in disassembly costs. Nor havemanufacturers gone very far in finding ”green” materials to replace toxic flame retardants.

8. So whats the sole purpose of writing this and doing some cut paste from various utilitarian sites likewiki/ban.org and many others,the intention is to get educated on the subject. Nothing more. It is not inmy or your hands to stop receiving e-waste from the so called developed countries, it is in the hands ofthe political big bosses who are busy pheroying jhanda’s of respective parties and are absolutely clueless.Where’s is the GUIYU town in India?????Any clue’s?1. http://2.bp.blogspot.com/_z1QH8I3k9vk/SeTNQ5twkAI/AAAAAAAAAQc/wUc6q2MF2wc/s1600-h/1.jpg

sanjeev (2009-05-01 13:52:00)the state of obsolete computers is slightly better in india...because the aam aadmi is very hesitant to through a com-puter at dirt cheap price....u see all your oldies around who are computer savvy and have computers at home...theywill all be running lives on p2 or p3 or may be an old celeron......which are in good condition running and doing thenecessary typing work...it is synonymous to having a diamond.....kyonkee heera hai sadaa ke liye...and so is an oldcomputer at home..good work anupam....

Recession Laptop (2009-04-30 18:30)

1. Now a days working on making a recession laptop…all by my self.The idea is not original,but the workis.What is Recession Laptop? Just a Buzz word to make people hear and turn back. Recession is the key

52

Page 53: Blogger to E-Book

word now a days every where…be it industries, employment, export, import, IT, real estate and so manyother things…

2. Recession laptop is actually PC in a brief case….yes…in a easily available SAFARI make suit-case….GAREEB ka Laptop actually.

3. Will post all all details soon….i hope some one see’s and reads it!!!

Daffa (2009-05-15 23:18:00)Hi, Jall. I love your technology blog. I like the images. Keep Update! Jall. I’ll be back.

2.5 May

Nehru Place : The hub (2009-05-02 08:02)

[1]

1. Not so long back I advertedabout the “Software Lelooooooooo” thing in Nehru Place,Delhi vide http://anupriti.blogspot.com/2009/0-1/software-leloooosoftware-l eloooooout-3.htmlNehru Place is the hub, the google, the god ,the solution forany computer hardware software freak where every thing related to hardware/software is available at ease at

53

Page 54: Blogger to E-Book

dirt cheap prices. 2. Today morning I gotan opportunity window of 3 hours to be in Nehru Place exploring the shops selling these computer accessories.Any time I have been to Nehru Place earlier ,I have always found something new. Few things that evoked myinterest this time are as follows: a. USB to Lan Socket(with driver CD)[means NIC card is over???] b. USBto Audio Video.[means Sound Card is over???] c. SVGA to Audio Video(without power) d. USB to bluetooth(…I had seen this one earlier) e. USB vacuum cleaner(enough to handle dust in mother board) f. USBto table lamp with stand. g. USB cooler fans in various designs h. Windows 7 software(they install if u havelaptop along with drivers from net available on WiF hotspot!!!!!!!!!!!)………..truly amazing……….Bill…r u

listening? Pics of such sellers In-Set.

54

Page 55: Blogger to E-Book

3. Plebeian Point about all these itemsmentioned is that these all are Chinese items,all are available in a bracket of Rs 100-200 and most im-portantly no no no Guarantee or Warranty from the moment you leave the shop .If u can, test at the shop.

4. Last time I did not mention about the ink filling procedure being practiced with loads of suc-cess for the sellers at least. As shown in the picture in set. That setup is enough for one toget an ink refilled in the cartridge for Rs 50/-(fifty only) with the help of disposed syringes thatthey arrange from the local medical clinics… …..shocking or surprised? In fact to stop this ,HPand Canon like companies who deal with printers should start reporting matter to the concerned

55

Page 56: Blogger to E-Book

IT departments to ban and stop this.

5. I m putting up a scanned copy of visiting card of one of these software sellers, not meant to motivate youto buy from him,but to show you how piracy has made professionals in this field. Why is the IT act 2001 ina state of quiescency here???

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/Sfwbw0IGKII/AAAAAAAAAR8/YyEM6id6PSU/s1600-h/nehru+place+anupam+(8)

.JPG

Anonymous (2009-06-25 14:32:30)great thats wat i heard too”softwaree”sofwaree”for once i thot that they were sellin ”softy”

56

Page 57: Blogger to E-Book

gosh surely a comp hub

Mohit (2009-06-25 14:36:58)great!!!you can have everything right here in NH ..The piracy hub... &if someone is good at bargainig ..he/she can have these for min of Rs 30-35...

Anonymous (2009-10-28 17:06:12)Why ur stomach i aching if they are selling the pirated softwares...we are the only one getting benefit from it.......dou have enough courage to buy original windows 7 at cost 6000/- when we can get it at 100-200/- rs. in NP.

ANUPAM (2009-10-28 21:16:30)hi ”stomach ache” anonymous ...thanks for the comment...i did not even need rs 200 for the windows 7...i got it forfree chk the link at http://anupriti.blogspot.com/2009/10/my-house-party-pack-thank-you-m icrosoft.html

RONY (2010-03-10 22:46:38)this is really india

nishu (2010-04-09 15:56:18)I love NH & India

rajnish (2010-07-01 19:38:37)i love my india...ye mera india

Briefcase PC (2009-05-04 22:53)

57

Page 58: Blogger to E-Book

1. Now this is likely going to be the longest one till date in terms of what I write since a lot of work andeffort has gone into it. The idea had been obsessing me for months now about fitting a PC into a brief case.I got the mite of this possibility from one of my senior colleagues Baiju last year. Some how I thought witha year down the lane, with a much better form factor available now a days I would be able to squeeze “Morein Less”. So when I got the official permission from my honcho in the office, I was quick in exercising the

same.

2. Where to start from ? So the first question came to my mind about where to start from. Whether Istart from selecting the mother board or first I select the most lilliputian brief case available in the marketor the smallest monitor or what? So I googled a good deal on if any one can give me lead on this ,but what Igenerally got from the web was assembled lot of pc essentials with a cobweb of wires. So I came back roundround to where I was primitively of the search.

3. By now I had started having a feeling of thriftlessness as I had invested or should I appositely saywasted about 5-6 days on the issue of where to start from? So eventually cogitated to start from thesmallest mother board. So the recent Digit magazine and Amod Sir(big boss of IT related issues in mycircle) suggested that go for the recently launched atom processor based essential series mother board.

58

Page 59: Blogger to E-Book

So when I finally got one on my table it looked like in set. A real treat to start with. Ideate a mother boardwith processor that encroaches only 7 inch by 7 inch area. So I was happy to start with this and finally made

it final for selection.

4. Some thing about the mother board. Now this one is designed to support Internet-centric computing forthe new flexible Mini-ITX form factor. Following features are inbuilt :

(a) Integrated 45nm Intel® Atom™ processor

(b) Energy-efficient solution for home users as well as for unique vertical market needs.

(c) Designed with Intel’s leading edge 45nm Hi-k metal gate processor,

(d) Provides incredible opportunities to communicate, listen, watch, play via Internet connectivity.

(e) 4 USB Drives

(f) Lan port

(g) COM1/LPT1

(h) Regular interfaces for Mouse and Keyboard ie PS/2 etc

59

Page 60: Blogger to E-Book

5. Bootable pendrive or Hard Disk ? Next in row was the hard disk.I was quiet aye that I would beable to make a bootable pendrive or a bootable lap top harddisk. So I tangled with various web pages thatclaimed to make a bootable pen drive.But…but….but……….I could never bring home the bacon. I meancould not make that. I tried all stunts incl formatting with FAT32,assayed many 3rd party software’s butcould not. Eventually I turned discomfited and decided to go with an internal SATA drive. But I am stillworking on this. I will make it in days to come if any one has been able to make it after googling. That’sslightly ahead anyway. So for the time being I selected a SATA 160 GB. No hue and cry about the simpleconnections with the mother board.

6. Choice of the SMPS : The SMPS was a choice to be made from a sea full of resources. Right fromChotu and Tambi of Zebronics make who do not have fans but are able to make it thru fins only to theMICRO ATX cabinet of i-ball ,I called all of them one by one in my office and then finally settled with theiball one with the fan on lower side.I was some how keen on keeping the fan facing down in the briefcase. Sowent ahead with it.Although Tambi and Chotu were quiet keen on making it inside my briefcase owing to the

beautiful and very bewitching form factor.

7. Key board : Now was the choice of the keyboard. I had no time wasting in this. I was sureabout the flexible keyboard of Icom worth Rs 350/- only .Now this one is a thing to watch out for thosewho have not seen and heard of .I first saw it in the hands of Patil Sir.So first impression of it carriedfor about a year or so. Although I had another option of trying the laser keyboard,but some how thecost kept me on the back foot.The grey market cost of the same ex secunderabad is Rs 4500/-.So tobe economical for the first time,I played safe with the cheap and trust worthy flexible icom Keyboard.

60

Page 61: Blogger to E-Book

8. DVD Drive : Now what is left? The DVD drive, mouse and the briefcase. So when I embarkedon surveying about the DVD drive.I had a choice between the small 3.5” dvd drive of LG/Samsung andthe normal DVD drive. So instead of trammeling and constricting to use of the smaller DVDs I wentahead with the normal drive size. To be precise I plowed ahead with LG Combo drive DVD-R/RW.

9. Briefcase : So for now I had the masala in form of all the actors and actresses to star in the movie, Imean the hardware. So now I had to choose a brief case which can take it all. First I surveyed the local makebriefcases available in jalandhar.I got many choices, but some how people around me actuated me to go forthe trademarked ones to obviate any breakage and ensure a strong casing for protection. So the cheapest Icould home on was of make Safari 21”.Why Safari and why not a VIP? Simply because Safari is a trustedcheaper brand. Although I could have attempted to fit all in a 17” one,but for sake of safety I thought…..21”is better.I was correct in deciding this as I agnized later.

10. So all at the table now. How to earmark the land to the hardware in the available land space inside thebriefcase ? Tried few combinations and then more combinations and then was finally able to home on the

61

Page 62: Blogger to E-Book

layout as shown in the pic inset.

11. Sealing : After the regular slots were made for the motherboard interface, SMPS power supply plug,SMPS fan, DVD drive, another problem that was standing upright was the case of sealing. How do I sealthe brief case from outside detritus?Should I use the cheap looking tape or should I use the cut piecesof the briefcase or wax it? I fortunately got in contact with one civil carpenter who prefaced me to atype of sealing which is actually a gel and when you fill it in the empty space to be sealed, it gradu-ally takes into the form of rubber overnight. Jet black in color. How does it look like? Shown in set.So I decided to try this. And I got what I wanted but some how I was dysphoric with the final finish.

12. Monitor : Oh!How can I forget the monitor. No fights and confusions on that. Actually wanted to gofor a 14” TFT since it would encroach lesser area,but some how I found that 14” TFT is not available easilyand at the place it is available, it is even costlier then the 15” one. Seems like manufacturers have kiboshedmaking this size. Since I had ample of space for this one too,I went ahead with a 15” TFT LG make.

13. Fitment : How to make the DVD drive, Hard disk, SMPS and the mother board stick to the base of thebriefcase? The first thought that came to my mind was to stick all with good quality thick Velcro. But somehow was hesitant in going ahead with this.The second option was screw and nut, a stronger alternative!!SoI opened up the bottom screws from DVD Drive and screwed them again from bottom with the briefcase

62

Page 63: Blogger to E-Book

base in between, it came out nicely intact and neat. Similarly for the SMPS and the motherboard. For themother board one small forethought was to place cut to size small rubber pads to maintain a distinct air gapbetween the motherboard bottom and the briefcase. For the hard disk I went for a thick Velcro since it wouldbe the most prone for changing at times and I have to experiment it replacing with a pendrive!!!!!!!Monitorwas difficult to decide upon w.r.t fitment. Velcro would not have been able to take on the load, bolting isnot possible, fiddling with back cover is not advisable……now what? So came a solution from the household queen of my life, my wife. She recommended trying it with a sliding drawer rail fitted on both sides ofthe monitor. And……….it worked like the rails were made for the monitor to fit in. Problem solved. Seethe fitment in set.

14. Extra’s : Just to take care of the additional risk of placing motherboard in open I covered the insidebriefcase with a cut to size transparent acrylic fiber sheet screwed on aluminum channels if u can notice inthe pic below with keyboard on top.

15. Ratiocination : All items fitted, fitment done, repair tool kit inside, sealing done, connections made,the thing of assembling the pc inside a briefcase is over. But that felicitousness from within has not comesince I am still failing at making a bootable pen drive!!!!!!!!!!!!!!!

63

Page 64: Blogger to E-Book

anand (2009-05-05 07:17:00)Hi Anupam, Its great.Anand.

Pankaj (2009-05-05 09:36:00)Hi AnupamIt is really a great effort. Congrats !!! You must send this to the EME Journal and a write up to the Comp Sc dept.How have u taken care of heating issues?Your blog is always interesting and I have visited it in the past also. I am in Delhi now and look fwd to meeting youall when u r here.Wishing you many more such achievements in future.RegardsPankaj Verma

Ujjwal (2009-05-06 23:17:00)Anupam,Good Job done... I think this should go to some records (like Guiness/ Limca Book).This is really a fantastic acheivement.Regards,Ujjwal

Nikhil Chauhan (2009-05-07 00:20:00)Anupam:Bravo! This is fantastic vision and execution.What are some of the use cases you envision for this?-Nikhil

ANUPAM (2009-05-07 05:42:00)nikhil...the utility is to be exploited as a test jig in forwards areas or attend to in situ defective computers whichgenerally are left un attended to during operations and exercises,to save on time etc etc.Besides I have catered itto allow for general software installations required mostly...thanks for the compli.....aur kuch value addition ho tobataa!!!!

sartaj (2009-05-07 12:26:00)sirji........gr8 work....next time i’m home...am coming straight to take a look!!!!!!!cheers......amazing!!!

Rakesh (2009-05-08 09:28:00)Its great!!Well done.Keep it up

Mohd Sahid Khan (2009-05-09 09:29:00)its great at least we have three inventor in our group.Baiju , Patil and U.Good job keep fabricating.Recently Baijuhas lot of innovations something like broadcasting vedio across the net by using remote wireless VOIP gateway.regardsKhan

shweta (2009-05-10 22:27:00)bhabhi ko time diya itna kabhi

64

Page 65: Blogger to E-Book

anshuman (2009-05-11 00:06:00)sirexcellent work done .i must say it is fandu idea n get a patenton it fast.a v

Baiju (2009-05-11 20:51:00)Dear AnupamThere was no limit to excitement when i saw your chottu pc .Really excellent work done . that wasTHE way i wanted to make it .Well documented effort.Its so nice to hear that someone is doing a professional job.Keep it up. all the very best.RegardsBaiju

DAVID NICHOLSAN (2009-09-24 16:27:23)Thats gr8 work!!u have done the same with good details mentioned here....i m also working on a similar one...willshow u soon..regards...david

Bidisha (2010-05-12 12:33:43)What an amazing effort !!!

WORK : New Definition (2009-05-06 15:43)

1. The Center for Disease Control has issued a medical alert about a highly contagious, potentially dangerousvirus that is transmitted orally, by hand, and even electronically. This virus is called Weekly OverloadRecreational Killer (WORK). If you receive WORK from your boss, any of your colleagues or anyone elsevia any means whatsoever -DO NOT TOUCH IT!!!This virus will wipe out your private life entirely. If youshould come into contact with WORK you should immediately leave the premises and do the following :

a. Take two good friends to the nearest liquor store and purchase one or both of the antidotes

i. Work Isolating Neutralizer Extract (WINE)

ii. Bothersome Employer Elimination Re-booter (BEER).

b. Take the antidote repeatedly until WORK has been completely eliminated from your system.

3. You should immediately forward this link to friends and save their lives before they get infected withWORK....thanks manish for fwd!!!

Anonymous (2009-05-06 15:57:00)ha ha ha.....reali good

HP and VLC at logger heads? (2009-05-09 17:07)

1. One fine evening last week,suddenly my speakers of laptop dozed of permanently...I mean no soundoutput.I took it as a regular audio driver conflict since I keep installing and uninstalling softwares on my lap-

65

Page 66: Blogger to E-Book

top.So in next few days...i tried fiddling with the drivers....did fresh installations...but kuch kaam na aaaya!!!

2. Since I am addicted to keep the speakers ON for music everytime I am working,I thought the layman’sidea of formatting would come as the best and easiest solution...so I went ahead and formatted the systemand installed a fresh Vista premium OS.But.......sameproblem stood again.....I thought may be my speakershave conked off............which is unlikely otherwise........

3. Today came another close friend of mine Sunil with a similar problem....in his notebook Compaq.He gaveme an astoundingly unbelievable news......that after he called up his HP auth dealer with the problem he gotthis answer ........”The laptop will not cover under warranty if its identified that the diagonse report finds theuser used the VLC player.”.............

4. Shocking indeed for me..............I have been using VLC Player of and on with media player classic attimes regularly.When I googled on this i got few threads which said the same thing.......these threads includethe following links :

a. http://www.infoinfi.com/2009/01/29/hp-and-vlc-player-on-conflict/

b. http://forum.videolan.org/viewtopic.php?f=14 &t=57589

5. So did i screw my speakers because of VLC ? Pl answer...............any one....?????

6. The extract of one of the threads is reproduced below :

” The Biggest Computer system vendor HP (Hewlett Packard) reporting their laptop customers to not touse VLC Player.VLC Player is the popular open source video player software among a lot of computer users.Recently HP laptop users facing a inbuilt speaker problem, which is often getting malfunction across theusers. The official HP service center executives advicing the laptop users to stop using the VLC player towatch, play media files. They reporting that playing a media files using VLC Player causing the damageto the built in speakers.As an additional information the official HP service center executives informing thecustomers bring the laptop to service for the build in speaker problem that , “the laptop will not cover underwarranty if its identical that the diagonse report finds the user used the VLC player.” ”

Anonymous (2009-05-12 21:23:00)dont worry man, service center people will surely replace the speakers. i guaranty you.

Anonymous (2009-06-07 22:16:05)A friend of mine had the same problem and the HP service center chaps had the same response (i.e. not covered underwarranty). It’s pretty unfair.

USB Bootable Vista (2009-05-11 22:13)

1. For long I have been trying to find out and try ....infact have already tried many options on how to make apendrive bootable till one day I got in touch with the link [1]http://kmwoley.com/blog/?p=345 #more-345

66

Page 67: Blogger to E-Book

2. I could not find out 50 % of the meaning of the commands that I blindly typed and followed as per thescreen shots available....but finally I could make one.

3. Simple steps ,no need to worry about screwing up your system......no probs at all...it all goessmoothly.Extract is produced below for dispersion.

4. Required hardware :

• USB Flash Drive (4GB+)

• Microsoft OS Disk (Vista / Windows 7)

• A computer running Vista / Windows 7

Step 1: Format the DriveThe steps here are to use the command line to format the disk properly using the diskpart utility. [Bewarned: this will erase everything on your drive. Be careful.]

1. Plug in your USB Flash Drive

2. Open a command prompt as administrator (Right click on Start > All Programs > Accessories >Command Prompt and select “Run as administrator”

3. Find the drive number of your USB Drive by typing the following into the Command Prompt window:diskpart list disk The number of your USB drive will listed. You’ll need this for the next step. I’llassume that the USB flash drive is disk 1.

4. Format the drive by typing the next instructions into the same window. Replace the number “1” withthe number of your disk below. select disk 1 clean create partition primary select partition 1 activeformat fs=NTFS assign exit When that is done you’ll have a formatted USB flash drive ready to bemade bootable.

Step 2: Make the Drive BootableNext we’ll use the bootsect utility that comes on the Vista or Windows 7 disk to make the flash drivebootable. In the same command window that you were using in Step 1:

1. Insert your Windows Vista / 7 DVD into your drive.

2. Change directory to the DVD’s boot directory where bootsect lives: d: cd d:\boot

3. Use bootsect to set the USB as a bootable NTFS drive prepared for a Vista/7 image. I’m assumingthat your USB flash drive has been labeled disk G:\ by the computer: bootsect /nt60 g:

4. You can now close the command prompt window, we’re done here.

Step 3: Copy the installation DVD to the USB driveThe easiest way is to use Windows explorer to copy all of the files on your DVD on to the formatted flashdrive. After you’ve copied all of the files the disk you are ready to go.

Step 4: Set your BIOS to boot from USBThis is where you’re on your own since every computer is different. Most BIOS’s allow you to hit a key atboot and select a boot option.

1. http://kmwoley.com/blog/?p=345#more-345

67

Page 68: Blogger to E-Book

Chinese Mobile - Death or Life :The answer is finally LIFE (2009-05-13 08:44)

1. While doing a course in Sec’bad many of my colleagues purchased cheap but high in functions chinesebrand mobile phones.There were few reactions in form of a anticipatory ban in few months from date ofpurchase since they do not have IMEI (International Mobile Equipment Identity) numbers and posed aserious security risk. ......but those who chose to buy it were ready for the risk.....then finally the news cameout in media that with effect from Apr 15 09 this year about 16 million handsets would go out of service ,as GSM service providers, including Airtel and Vodafone pull the plug on them.

2. The verdict is finally out.The government has given a go-ahead to GSM operators to provide a new uniqueidentification number to over 16 million China-made mobile phones in the country. Users of these handsets,which don’t have the 15-digit International Mobile Equipment Identity (IMEI) number, will have to shell outabout Rs 180 to obtain the number. This has been made possible with the help of a new software, developedby GSM operators’ body Cellular Operators Association of India (COAI) and Mobile Standards Allianceof India.The association has obtained the IMEI numbers from GSMA, the global body that allocates thesenumbers.

3. Thanks TOI InfoTech Tab.

E Waste (2009-05-17 22:29)

1. In an earlier attempt to touch upon the subject when I discussed GuiyU,I did not mention much aboutwhat we are doing in Idia execpt for some remarks at the end and one comment by one reader.

68

Page 69: Blogger to E-Book

E WASTE (2009-05-17 22:44)

[1]

1. I earlier attempted to discuss on this subject when I wrote on Guiyu few weeks back.But I had notwritten anything on what India has been doing on the subject matter except for some one liner remark atthe end.But that was because I did not find anything of weight anywhere. Recently I found some usefulcontent at [2]http://india.ewasteguide.info/.

2. This site mentions about K.G.NANDINI ENTERPRISES (KGN) based in Bangalore which is India’sfirst full integrated electronic waste recycling plant. The Plant is located in Bidadi, next to Wonderla andhas a capacity of 1.0 ton per hour. KGN has taken the license (CFE & CFO) from KSPCB for a capacityof 7200 MT/annum and does accept all kind of ewaste (printed circuit boards, computers, electrical cables,electrical transformers, small house hold appliances etc.).

3. In a first step hazardous wastes or elements are removed manually. Loading point of the plant is theshredder. The reduced material is then passing a magnet, FE parts are removed. Afterwards the materialenters the delamination mill, the heart of the process. Very high forces affect the composite materials andare thereby reduced and delaminated. The material is pneumatically transported from the mill to a cyclone,is discharged and conveyed to a screening machine. The classified material is transferred to a battery ofseparators; non ferrous metals are separated from plastics. All process steps are connected by conveyors, areautomated and controlled by visualization. A central filter system, which is equipped with explosion and firesafety measures, de-dust the entire process. The equipment reflects the state-of-the-art technology had hasbeen developed and provided by swissRTec AG from Switzerland.

4. This is one acchi baat I thought is good to share!!!!

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/ShBKwFd5h-I/AAAAAAAAAVE/vdAXp8PsCP0/s1600-h/123.jpg

2. http://india.ewasteguide.info/

WINDOWS 7 : MY FIRST HANDSHAKE (2009-05-27 12:58)

1. After a long time about 4 months in which I didn’t get much time to work on this and after 3 unsucessfulattempts...i mean 3 infected downloads....I am finally writing this from the new Beta OS Windows 7......yesthe successor to Windows VISTA!!!!!!!

69

Page 70: Blogger to E-Book

2. Till now I have been able to load the chipset dvr, graphics card driver,office 2007 and one F SecureAntivirus Internet edition for windows 7.No compatability issues and first impression is generally OK tillnow......one bad thing is shayaad that wondows classic style has been done away with!!!!

3. In a few days more...i will be writing more about whats new and different in Windows 7 when comparedto Vista!!!!!!!!

WINDOWS 7 : MY FIRST HANDSHAKE-1 (2009-05-27 23:49)

1. In further exploring Windows 7,few more facts that have come to my knowledge include the following:

70

Page 71: Blogger to E-Book

2. Minimum configuration :

• GHz processor (32- or 64-bit)

• 1 GB of RAM (32-bit); 2 GB of RAM (64-bit)

• 16 GB of available disk space (32-bit); 20 GB of available disk space (64-bit)

• DirectX 9 graphics device with WDDM 1.0 or higher driver

3. Task bar Classic style is out.

4. Sticky notes is a new permanent feature which was earlier an optional gadget in Vista.Once clicked,it getsa little yellow notepad and one can type short note for own reference and mailing.Pic of sticky note yellowwindow from my laptop is shown inset.

5. A lot has been put in renovation and refurbhishment of taskbar.The taskbar at the bottom of the screenis what one used to launch and switch programs between them. In Windows 7 one can pin any program tothe taskbar so it’s always just a click away, icons can be rearranged just by clicking and dragging. Hoveringover the icons will make thumbnails appear of every file or window that is open in that program.But theover all effect is not looking so appealing till now 2 me.

6. Speed for reaching desktop while start and reaching in off mode while shut down is relatively much muchfaster.

WINDOWS 7 : MY FIRST HANDSHAKE-2 (2009-05-28 14:52)

1. Continuing further exploring Windows 7 was a good expereince and has started looking promising to me.

2. Windows explorer : Windows Explorer has also been modified. New commandbar, new left-side panecontaining Libraries, Favorites, etc, new Details Pane, a few new options in ”View” menu like Content andat last re-sizable Searchbar.

3. Installation did not ask many questions nor did it take much time...may 30-35 minutes...i was on thedesktop.

4. Desktop context menu is similar to earlier OS but addends 2 new choioces which are :

71

Page 72: Blogger to E-Book

a Share with

b. Gadgets

5. Control Panel window has also been redesigned. The left sidebar takes lesser space and resizes itselfwhenever any control panel item is opened in the window which provides more space.

6. Calculator is a thing that I have left for now for it needs to be worked on with few examples with newfeatures.For now I would just add that PROGRAMMER and STATISTICS are two new menu options thathave been added.

7. Outlook Express is not seen till now and has been done away with!!!!

8. More will be added as I explore more!!!!!!!

WINDOWS 7 : MY FIRST HANDSHAKE-3- THE PASSWORD RESET DISK(2009-05-28 23:33)

1. When you protect your Windows 7 user account by assigning a password to it, you have the option ofcreating a password hint.(NOTHING NEW). Windows 7 displays the password hint if you enter an incorrectpassword. If you didn’t save a password hint, or if you can’t remember the password even with the helpof the hint, you can reset your password—but only if you have created a password reset disk(THE NEWTHING). I used to earlier do this with a GATE CRASH CD.You can create this disk on either a USB flashdrive or a floppy disk, but not on a CD. Don’t think you will ever lose or forget your password? It mightsound unlikely, but it can happen, especially in an environment that requires you to change your passwordon a regular basis. Creating a password reset disk is a simple precaution that might save you a lot of grief.

2. To create a password reset disk:

a. Connect a USB flash drive, or insert a disk into your computer’s floppy disk drive.

b. In Control Panel, click User Accounts and Family Safety, and then click User Accounts. Then in theTasks list, click Create a password reset disk.

c. The Forgotten Password wizard starts.

d. On the Welcome page, click Next.

e. On the Create a Password Reset Disk page, select the USB flash drive or floppy disk drive you want touse, and then click Next.

f. On the Current User Account Password page, enter the password you use to log on to Windows 7, andthen click Next.

g. When the progress bar displays 100 % complete, click Next. Then on the Completing the ForgottenPassword Wizard page, click Finish.

3. To reset your password by using a password reset disk:

a. On the Windows 7 Welcome screen, enter a blank password into the password box, and then press Enteror click the Go button. Windows informs you that the user account name or password is incorrect.

b. Click OK to return to the Welcome screen, and then click the Reset password link that appears belowthe password box. The Password Reset wizard starts.

c. On the Welcome page, click Next.

d. On the Insert the Password Reset Disk page, select the USB flash drive or floppy disk drive you want touse. Insert the password reset disk into the drive, and then click Next.

72

Page 73: Blogger to E-Book

e. On the Reset the User Account Password page, enter a new password and password hint, and then clickNext.

f. On the Completing the Forgotten Password Wizard page, click Finish.

WINDOWS 7 : MY FIRST HANDSHAKE-4 - THE SNIPPING TOOL (2009-05-29 22:21)

1. This one is surely going to be one of the most HIT feature of Windows 7.This feature allows users tocapture , edit and share information of web and local pictures (images).Snipping allows you to send thecapture image/text to anyone using the option listed on the menu options.This allows user to save theselected portion in any of the formats PNG,GIF,JPEG & MHT.

2. To explain it in a simpler way.What we used to earlier till Vista when we wanted a screen shot.Four steps:

- Press print screen

- Go to Paint Brush

- Do paste

73

Page 74: Blogger to E-Book

- Save in desired format3. This is now replaced by one click on the snipping tool...all steps done in one click.No print screen,no opening

of paint brush,no paste,no saving.So time saved is time gained.

Harjot Singh Pelia (2009-05-30 14:45:21)hi anupam,nice to see someone amongst us doing something useful.anyway. though not exactly the same feature however a similar feature did exist in office 2007 - OneNote. you candirectly take screen clippings from the screen or print the entire page to OneNote instead of the printer.You can also take snapshots of a part of the page too.anyway good job done ....pl keep us updated and keep up the good job.harjot

ANOTHER FIRST HANDSHAKE : OFFICE 2010 (2009-05-31 23:16)

1. After a week long handshake with Windows 7 and some interaction with my microsoft acquaintance whotold me further about release of beta version of Office 2010.So being on leave allows me to explore this also.So

74

Page 75: Blogger to E-Book

I downloaded the same today and for the first time the software installed on Windows 7 smoothly in about20 minutes.....i don’t know why it took so long.

2. The beta release of the software is known as Technical Preview Office 2010.

3. A quick glance on all of the packages in form of Word,Powerpoint etc gave a glance of new features andfew new menu’s,though not yet explored look good.....will give some insight in days to come

2.6 June

GSM vs CDMA & Open Market Handset (2009-06-02 23:20)

1. In recent times, another field that has been buzzing vibrantly apart from IT is the world of mobiles andtele-communications. I have somehow always endeavored to be updated on computers and IT…..but thisfield is also a very concerning field to dig and poke into.

75

Page 76: Blogger to E-Book

2. So the first thing of interest to me was to know as to why in India, CDMA has not been such a hugesuccess as in west.Why GSM has been given the lead in handsets. Why is it that a CDMA subscriber has alimited choice of handsets and a GSM subscriber has a variety to choose from? To be with stats, of the 376.12million mobile subscriber base(ex INDIA only) only 97.77 million use CDMA network.(Pic Inset courtesy :

www.mobiletor.com)

3. CDMA services were launched in the year 2002 in India with the sole intention of acquiring a sizeablesubscriber base by allowing the customers to affordable devices with minimum features like color screen andFM Radio. In order to attain this aim,the OEMs then introduced handsets that could be used only with theirnetworks. More distinctly I remember RELIANCE doing the brunt of the job. But that was in 2002.Overlast seven years, the times have commuted, the customer’s desires have changed, the technology has changed,the psych of the intended customer has changed for better. He has become ready to shelve out some moneyfor more features and why not? With the introduction of handsets like Nokia 5800,LG Cookie and SamsungPixon, the customer is likely to be enticed!!!!!!!!!!!

4. Those customers who got into the CDMA tag over the years have had no problem with the services prof-fered, the price of the calls, all is OK except for the problem that they have to persist in with the same handsetfor so long as there is no choice in the CDMA segment. But not now……OEMs of the handsets have startedcoming up with new generation handsets which support both GSM and CDMA in one. The most commonhandset manufacturers that come first to mind include NOKIA,SAMSUNG,LG,VIRGIN,MOTOROLA andnow more promising Indianised manufacturers include FLY,GEE PEE,X FONE,LEMON,MAGICON(I amcertain u have heard none of them)

5. So the good thing about the CDMA subscribers is the introduction of OMH ie Open Market Handsetstarted by the CDMA development group which is an international body comprising CDMA Operators,manufacturer’s and application providers. This body enables full boasted CDMA devices to be used in anyOMH compliant operator network. Thus the Bandhan of constraining to one operator and OEM is no morerifer.

76

Page 77: Blogger to E-Book

THE ’G’ Family : 0G to 4G (2009-06-05 00:10)

1. The ‘G’ (0G,1G,2G,2.5G,2.75G,3G,4G) family that has now become, originally started with mobile tele-phone service MTS in the US in 1946 (ie 0G) followed by Analog Communication standards in 1980s(ie 1G).One of the largely used 1G based service in earlier 80s was NMT (Nordic Mobile Telephone) that was usedin Nordic countries, Switzerland, Netherlands, Eastern Europe and Russia.

2. 2G (or 2-G) is short for second-generation wireless telephone technology and these were commerciallylaunched on the GSM standard in Finland in early 90s. Three elemental benefits of 2G networks were :

(a) Phone conversations were digitally encrypted.

(b) More efficient on the spectrum allowing for far greater mobile phone penetration levels

(c) 2G introduced data services for mobile, starting with SMS text messages.

The main 2G standards are:

• GSM (TDMA-based)

• IS-95 aka cdmaOne , (CDMA-based, commonly referred as simply CDMA in the US

• PDC (TDMA-based), used exclusively in Japan

• iDEN (TDMA-based), proprietary network used by Nextel in the United States and Telus Mobility inCanada

• IS-136 aka D-AMPS, (TDMA-based, commonly referred as simply TDMA in the US

3. 2.5G is considered to be a way between 2G & 3G cellular wireless technologies. The term ”second and ahalf generation” is used to describe 2G-systems that have implemented a packet switched domain (Packetswitching is a network communications method that groups all transmitted data, irrespective of content,type, or structure into suitably-sized blocks, called packets.) in addition to the circuit switched domain(acircuit switching network is one that establishes a circuit between nodes and terminals before the usersmay communicate, as if the nodes were physically connected with an electrical circuit.) This got famouslyknown as GPRS and was able to provide data rates from 56 kbit/s up to 114 kbit/s.

4. 2.75G actually meant to refer the EDGE technology ie Enhanced Data rates for GSM Evolution,asthe name suggestsallows improved data transmission rates as an extension on top of standard GSM. EDGE

77

Page 78: Blogger to E-Book

can carry data speeds up to 236.8 kbit/s. There is also something known as evolved EDGE which is afurther extension over EDGE wherein Peak bit-rates of up to 1Mbit/s and typical bit-rates of 400kbit/s aresupported.

5. 3G is the third generation of telecommunication hardware standards and general technology for mobilenetworking, superseding 2.75G. This would be able to provide even higher transmission rates that wouldrange from a minimum speed of 2Mbit/s to a maximum of 14.4Mbit/s for stationary users, and 348 kbit/sin a moving vehicle.

6. 4G is the short term for fourth-generation wireless, the stage of broadband mobile communications thatwill supplant the third generation (3G). While neither standards bodies nor carriers have concretely definedor agreed upon what exactly 4G will be, it is expected that end-to-end IP and high-quality streaming videowill be among 4G’s distinguishing features. Fourth generation networks are likely to use a combination ofWiMAX and WiFi.

7. I was curious to know about all the G’s and have written in brief of what I have understood very clearlyand read from Wiki and other good sources.Thanks Wiki again!

Buy a Keyboard : Get a Computer (2009-06-06 23:43)

1. When you buy acomputer,you buy a keyboard : LOGIC UNDERSTOOD. 2. When you buy a Keyboard,you get a com-

puter : LOGIC NOT UNDERSTOOD. 3.Let me explain Para 2.Asus has come up with a EEE Keyboard which is actually a PC with a typical QW-ERTY keyboard,minus NUM PAD.In place of the numpad ,we get a 5 inch,800 x 400 resolution touch screen.

4. Keyboard is equipped with a

78

Page 79: Blogger to E-Book

Intel Atom Processor,16 GB SSD,1 GB Memory,VGA & HDMI OUTS,a few USB Ports and support for

WiFi and Blue tooth.

5. Cost : Approx 24K to be launched in June 09 : INDIA

PAPER BOOKS CONVERGE TO E-BOOKS : KINDLE DX (2009-06-07 16:25)

1. We have been hearing often in our offices, in the forums, in various visionary speeches from bosses about apaperless office. I heard this word for the first time in late 90’s when the company I was working in, the CEOgave a mention about a paperless office. The word induced internal laughs amongst most of the audience ofhow is it possible?

2. Slowly over a period of time, now 10 years, the thing doesn’t look inconceivable. To add to the variousoptions available today in form of e-mails, web sites, mobiles etc.....the latest IN thing is KINDLE DX from

Amazon. The gadget is shown in the pic inset.

79

Page 80: Blogger to E-Book

3. Recently read about the same in the June issue of Digit. It also mentioned about how the biggest libraryof the world ie British Library is putting in lots of effort in digitizing books available presently on its shelves.It has put up four giant scanners, working for last 2 years with the help of a 21 MP camera clicking all the

way while a robotic arm turns them.

4. The configuration of this KINDLE Dx is as follows :

- Slim: Just over 1/3 of an inch, as thin as most magazines- Carry Your Library: Holds up to 3,500 books, periodicals, and documents- Beautiful Large Display: 9.7” diagonal e-ink screen reads like real paper; boasts 16 shades of gray forclear text and sharp images- Auto-Rotating Screen: Display auto-rotates from portrait to landscape as you turn the device so youcan view full-width maps, graphs, tables, and Web pages- Built-In PDF Reader: Native PDF support allows you to carry and read all of your personal andprofessional documents on the go- Wireless: 3G wireless lets you download books right from your Kindle DX, anytime, anywhere; no monthlyfees, no annual contracts, and no hunting for Wi-Fi hotspots- Books In Under 60 Seconds: You get free wireless delivery of books in less than 60 seconds; no PCrequired- Long Battery Life: Read for days without recharging- Read-to-Me: With the text-to-speech feature, Kindle DX can read newspapers, magazines, blogs, andbooks out loud to you, unless the book’s rights holder made the feature unavailable.

Google & Bing (2009-06-11 15:58)

1. Most of you must have come across a new search buzz known as BING launched by Microsoft.I have bingeda few times but have recurred back to Google most of the times since it is a habit as on date.Although best

80

Page 81: Blogger to E-Book

wishes to BING....since the more these two fight..the better it is for us.

2. An interesting site that compares these two is [1]http://www.bingandgoogle.com

3. This site would give the search results from both the sites on one page.Like wise MELIORATE ie mysitename appears on second and third number in GOOGLE and yet to find a place at BING.....

1. http://www.bingandgoogle.com/

Google and Bing : Bade miyaaan Chotey Miyaan (2009-06-11 16:09)

1. Most of you must have come across a new search buzz known as BING launched by Mi-crosoft.I have binged a few times but have recurred back to Google most of the times since itis a habit as on date.Although best wishes to BING....since the more these two fight..the betterit is for us. 2. An interesting site that compares these two is [1]http://www.bingandgoogle.com

3. This site would give the search results from both the sites on one page.Like wise MELIORATE ie mysitename appears on second and third number in GOOGLE and yet to find a place at BING.....

1. http://www.bingandgoogle.com/

My DIGIT Webinar (2009-06-12 22:37)

1. Digit,the IT magazine is presently celebrating its 8th Anniversary Carnival and has launched many eventsincluding webinars,daily online contests,workshops across the country.

2. I was part of one WEBINAR on Security of PC today.It was a first for me,although this would be aregular feature for most of my IT savvy friends The word makes the meaning of the term understandableie a Seminar held on web.It included a presentation run by a Digit rep and about 25 invitees logged in todiscuss on the several issues related.A screen shot just for info.

81

Page 82: Blogger to E-Book

3. Overall a new thing and experience.

Salman (2009-06-19 19:40:38)Nice blog keep it upThanksSalmanwww.tips4blogging.co.cc

H.A.M.R : Storage Futurity (2009-06-20 23:46)

1. In the last 15 years of my interaction with various modes of storage medias right from the days of floppydrives,tape drives,CDs,DVDs and now Blue Ray’s,we have all witnessed as to how the storage is shrinkingand shrinking and shrinking...(reminds of the ascent of dharmender paaji saying daru peeing and peeing andpeeing...from Sholay)...khair this is not the intented aim here.

2. A new buzz word in the future storage trends has come up in the name of H.A.M.R....briefed below.

3. Heat-assisted magnetic recording ie HAMR is a technology that magnetically records data on high-stabilitymedia using laser thermal assistance to first heat the material. HAMR takes advantage of high-stabilitymagnetic compounds such as iron platinum alloy. These materials can store single bits in a much smallerarea without being limited by the same superparamagnetic effect that limits the current technology usedin hard disk storage. The only catch being that they must be heated to apply the changes in magneticorientation. HAMR was developed by Fujitsu in 2006 so that it could achieve one terabit per square inchdensities.

82

Page 83: Blogger to E-Book

4. Seagate Technology said it had successfully demonstrated the principles behind HAMR, the name for thetechnology that could form the basis of Seagate’s next-generation hard drives. The successful demonstrationdoesn’t mean that the technology is right around the corner as the roadmap calls for HAMR to be introducedin about five or six years.

5. If the technology lives up to its promises, however, then HAMR could blow away the ”superparamagneticlimit” by about a factor of 100, according to Seagate. The company hopes to read and write 50 terabits (6.25terabytes) of data in a square inch using low-cost manufacturing techniques.

6. Thanks Wiki and Seagate for info.

Salman (2009-06-21 09:55:56)nice blogThanksSalmanwww.tips4blogging.co.cc

ANUPAM (2009-06-21 10:25:30)thanks salman...will see ur site sooon

Storage Technology - Graduating Trends (2009-06-21 22:09)

1. Recently I was asked to write a paper on Trends in Storage Technology for an internal office maga-zine.Although have been aware of the trends in a hazzy manner but it gave me an opportunity to revisethe entire lot and infact made myself cognizant of many new things all set to arrive in near future.Relevantextract as would be making the reader wise on subject matter is produced below.

2. Many different forms of storage, based on various natural phenomena, have been invented. So far,no practical universal storage medium exists, and all forms of storage have some drawbacks. Therefore acomputer system usually contains several kinds of storage, each with an individual purpose. The two primarystorage technologies are magnetic and optical.

3. The primary types of magnetic storage are:

(a) Diskettes (floppy disks)

(b) Hard disks

(c) High-capacity floppy disks

(d) Disk cartridges

(e) Magnetic tape

4. The primary types of optical storage are:

(a) Compact Disk Read-Only Memory (CD-rfruROM)

(b) Digital Video Disk Read-Only Memory (DVD-ROM)

(c) CD-Recordable (CD-R)

(d) CD-Rewritable (CD-RW)

FUTURE TRENDS

5. MEMS : One technology that promises to store more information than disk drives is micro electrome-chanical systems. MEMS have electrostatic actuators — electrically-driven springs and levers — that can

83

Page 84: Blogger to E-Book

move components like storage media and read/write heads tiny, precise distances. It involves recording bitsby heating the tips to melt tiny pits in a plastic storage medium, similar to burning a CD. The presence ofa pit represents a 1 and the absence a 0. The device reads bits by sensing changes in temperature. When atip moves across the surface and falls into a pit, more of the tip is in contact with the surface, which causes

it to dissipate heat more quickly.

6. Holographic Storage : Holographic storage devices have the potential to both hold much more datathan magnetic technologies and access it much faster. Holograms are made by bouncing a laser beam offan object and having a second laser beam intersect the reflected light. The laser beams interfere with eachother, producing a unique pattern of bright and dark areas that can be captured in storage media like light-sensitive plastics or glass composites. The resulting hologram can be illuminated by shining the second laserbeam on the media at the same angle as when the hologram was recorded.

7. Blu Ray : Blu-ray Disc (also known as Blu-ray or BD) is an optical disc storage medium de-signed/created by Sony to supersede the standard DVD format. Its main uses are for storing Playsta-tion 3 games, high-definition video and data storage with 50GB per disc. The disc has the same physicaldimensions as standard DVDs and CDs. The name Blu-ray Disc derives from the blue-violet laser usedto read the disc. While a standard DVD uses a 650 nanometre red laser, Blu-ray uses a shorter wave-length, a 405 nm blue-violet laser, and allows for almost six times more data storage than on a DVD.

8. Network Storage : Network storage is a generic term used to describe network-based data storage, butthere are many technologies within it. Direct Attached Storage (DAS) is a storage device that is directly

84

Page 85: Blogger to E-Book

attached to a host system. The simplest example of DAS is the internal hard drive of a server computer,though storage devices housed in an external box come under this banner as well. DAS is still, by far, themost common method of storing data for computer systems.

9. Molecular Switches : Storing a bit in a single molecule is about as small as you can get. Certainmolecules can be used to store data because they can be switched back and forth between two stable statesthat can represent the 1s and 0s of digital data. One of these is rotaxane, which contains a thin, thread-like section with a ring that moves freely around it. The ends of the thread section are thicker, preventingthe ring from slipping off. Researchers have found ways to move the ring from one end of the thread to theother and the ring will stay where it is placed.

10. Nanotechnology, shortened to ”Nanotech”, is the study of the control of matter on an atomic andmolecular scale. Generally nanotechnology deals with structures of the size 100 nanometers or smaller, andinvolves developing materials or devices within that size. Nanotechnology is very diverse, ranging from novelextensions of conventional device physics, to completely new approaches based upon molecular self-assembly,to developing new materials with dimensions on the nanoscale, even to speculation on whether we can directlycontrol matter on the atomic scale. Breakthrough Nanotechnology Will Bring 100 Terabyte 3.5-inch DigitalData Storage Disks

11. Storage-specific operating system : Just as a computer operating system makes a computer usable, astorage-specific operating system will make storage devices and their associated networks operate in a usablemanner. Powerful storage networking switches may provide the platform for the storage-specific operatingsystem.Moving intelligence away from servers and storage systems into interconnected switches in the core ofthe network could solve interoperabliity problems that are inherent in heterogeneous enterprise environmentsand administration tools and allow complex infrastructures to be managed as a single, scalable entity.

12. Storage Virtualization: Virtualization improves storage manageability by separating the presentationof storage to the server operating system from the actual physical devices. Virtualization consists of takingseveral physical storage devices and joining them to appear as one logical unit to manage. This represents acollective pool from which users can request any amount of disk space. The users will thus be able to accessstorage without knowing where a device is, and how it is configured.

13. H.A.M.R : Heat-assisted magnetic recording ie HAMR is a technology that magnetically records dataon high-stability media using laser thermal assistance to first heat the material. HAMR takes advantageof high-stability magnetic compounds such as iron platinum alloy. These materials can store single bits ina much smaller area without being limited by the same super paramagnetic effect that limits the currenttechnology used in hard disk storage. The only catch being that they must be heated to apply the changesin magnetic orientation. HAMR was developed by Fujitsu in 2006 so that it could achieve one terabit per

85

Page 86: Blogger to E-Book

square inch densities.

14. R.A.I.D & M.A.I.D : RAID is an acronym to describe a Redundant Array of Inexpensive Disks, atechnology that allowed computer users to achieve high levels of storage reliability from low-cost and lessreliable PC-class disk-drive components, via the technique of arranging the devices into arrays for redundancy.On the other hand we have MAID, an acronym to describe Massive Array of Idle Disks ,a system usinghundreds to thousands of hard drives for near-line data storage. MAID is designed for Write Once, ReadOccasionally (WORO) applications. In a MAID each drive is only spun up on demand as needed to accessthe data stored on that drive. This is not unlike a very large JBOD but with power management.

Anonymous (2009-07-11 18:36:43)very informative. Keep it up! - rinkoo

Hi Tech Door Bell : Is it required? (2009-06-22 16:20)

1. IT is venturing into all Gali’s and Muhallah’s at global level.It is no more confined to certain sectors.Well,Iam writting this one because it made me laugh all the way!!!may be I am being foolish but I am still laughingwhile I am writing this.

86

Page 87: Blogger to E-Book

2. I recently came across this good tech info site ie [1]http://www.emmexcorpio.blogspot.com/that introduced me to the subject heading.The picture explains it all...yes!!!this is a door bell...

3. It made me laugh because I directly connected itwith the INDIAN RESIDENCES.The doodh wala,the safaiwala,the milk man,all friends and relatives,thesurprising visitors,we have all encountered and will keep encountering till eternity in India atleast.So I waswondering what thier reactions would be like if they read all that. 4. But anyway the idea is good and isbased on simple database query run fed by the owner of the house or office

1. http://www.emmexcorpio.blogspot.com/

Salman (2009-06-23 19:25:05)really awesome blog keep it upSalmanwww.tips4blogging.co.cc

Hi Tech Door Bell : Is it required? (2009-06-22 16:20)

1. IT is venturing into all galiyaan and muhallah’s of

Are you secure at your friendly neighbourhood CYBER CAFE ? (2009-06-26 15:27)

[1]

87

Page 88: Blogger to E-Book

1. This one comes after I have read a wonderful article in the DIGIT Carnival issue Jun 09 on Cyber caféSecurity. This article covered how few Cyber Cafe’s with notorious intentions can play with crucial, criticaland confidential information of the user who might have accessed his e-mail accounts or would have bookeda flight ticket with his credit card or might have done some personal work on the cyber cafe’s PC.In thefollowing paragraphs I would just go over the preventive measures in brief as outlined in that article. GenuineInformative CREAMY INFO THAT IS!!!!!!!!

2. PORTABLE WEB BROWSER : A portable web browser as the name suggests would be able to allowyou to take bookmarks and passwords with you while not writing any information on the host computer.This allows to bypass key loggers who would be expecting that all that you type would be logged in oneseparate file unknown to the user. So this feature of the portable browser would allow you to access youraccounts without typing and thus preventing from leaking your crucial info. But at the same time you haveto be aware that PENDRIVE would be equal to your most precious thing in life….so don’t ever try andattempt loosing it.Mozzilla,Opera have these free softwares ready for download at the click of a button andChrome is working still!!!!!

3. Another thing about the key logger software’s available in the market, yes they include OPEN SOURCETYPE ALSO………so all the more vulnerable the user becoming a quarry. Key logger can be of two types :

a. Hardware Type – By using a small chip in the keyboard which makes by passing impossible.As shownin the figure below,we see a normal CPU rear from back and another PC with the malicious chip placed in

between the cable.

b. Software Type – Can be activated with the help of a Trojan or with the help of a simple installation.

4. A software based key logger can either keep a record of what is being typed or would be able to takeperiodic screen shots while the user is using the PC.All this being sent to a remote server without theknowledge of the bechara user.Hai na kamaaal ke baat!!!!!!!!!!

5. VIRTUAL KEYBOARD : Although the endeavor of the cyber cafe PC user should be to ensure thatin no circumstance, credit card details should be typed,but if at all it is marta kya na karta wali baat,thenuse of virtual keyboard should be exploited. This would be available as Start > Accessories > On ScreenKeyboard.Although there are ways and means to even break this,but then there would never be a guaranteeof sort…after all U R ON THE WEB BHAISAAAB…..every thing is accessible.

6. I would like to mention one more thing here….VIRTUAL KEYBOARDS/ON SCREEN KEYBOARDSare not a guarantee for ensuring safety. There are key loggers which are even configured to log only detailsfrom on screen key boards. There is a solution to this also and that is OBFUSCATION.

7. OBFUSCATION : This basically allows key loggers to log a certain combination of keys,while keying indifferent combination. There are some programs that are targeted at different obfuscation algorithm and thusby pass typing in the meat thing. Obfuscation is actually the deliberate hiding of the software’s behavior,is used by malware authors as well as legitimate software developers. They both use code obfuscationtechniques to keep curious souls from understanding how their software works and what it is doing to thecomputer on which it runs.A complex thing in itself but who needs to know that….aaam khao….not to worryof guthli!!!!!!!!!!!How to use it?Pl BING or Google.

88

Page 89: Blogger to E-Book

8. Another important thing to be ensured is to protect your USB drive from Viruses.The first thing todo when you plug in your USB Drive into a public computer is to identify and disable malicious processesrunning. Process Explorer is a good utility for doing this.This is actually like windows task manager butwith few more good options to work on. A Screen Shot from my lap top shown below.

9. Securely deleting data : Last but not the least…ensure using a good software that ensures that notrace of activity on the used computer is left behind.I recommend using ERASER and Free Commander……tried and tested……………

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SkSe7L8F7YI/AAAAAAAAAbs/ZCAczZB33rU/s1600-h/pc-security.jpg

NOW CHIP IN BATHING SOAP!!!! (2009-06-27 22:14)

1. I was really amazed to read this one in TOI today wherein I came to know that in few remote villages ofsouth India,some panic occured after they found a chip resembling a pen drive in their toilet soaps.

2. This was prominent in a village near Bajpe and as rumours spread that the chip was a bomb or wasinserted to make blue films, the villagers made a beeline to the police station. Police investigated and foundthat the chip was installed for collecting data. A team from Hindustan Lever Limited was conducting studiesrelated to Lifebuoy soap and its usage in the village.

3. “There was nothing harmful in it. A chip was installed in the soaps as a part of the research. Theteam had visited about 28 houses. A representative from UK, Julian Collins had explained the villagers in

89

Page 90: Blogger to E-Book

detail about the project. The only mistake was that they had not obtained permission from the districtadministrator to conduct the research,” he added.

4. Though most of the houses had signed a consent letter for the use of the soap, on seeing the chip, theypanicked. The company’s documents, however, showed everything was above board.Meanwhile, Sumathi,Project co-ordinator of the company said, “Hindustan Lever Limited was conducting a two-year project tostudy children’s health in connection with the use of Lifebuoy soap.

5. Thus chip was a data-collection card which entered data about the children’s health in relation to thenumber of times they used the soap.All documents regarding the research project are clear and the companyhad obtained permission from the superintendent of police and about 30-40 people were working on theproject.

6. Wonder what else is in store when this can be claimed to be the begining of some sort in the name ofresearch and

investigation!!!!

7. Some extract taken from http://www.punemirror.in

UNIQUE IDENTIFICATION PROJECT : UID (2009-06-28 16:01)

1. We all know how the launch of PAN Cards and Voter ID Cards in the initial period say about 7-8 years ormay be slimly earlier created discombobulation amongst the aam janta. Photos clicked, Data base createdand then all got inter amalgamated and I got somebody else’s pan card with a different pic and altogetherdifferent address with the age of my grandfather endorsed in BOLD.The thing and the vision seems to haveameliorated today.

2. Now on top of this Sarkaar plans to make a Unique Identity Card.Since the sarkaar never wanted to takea chance this time ,the onus of the culmination of the project has been given to INFOSYS and the over allcoordinator is none other then Mr Nandan Nilekani,the co chairman of infosys.

3. The UID (Unique Identity) project is one of the most aspirational projects of the UPA government. TheUID programme will provide an identity card to every citizen to establish citizenship and address securityconcerns.

4. The identity cards purported will be smart cards which will carry information of each and every individual,his/her finger biometrics as well as a photograph. A unique National Identity Number will be assigned toeach individual including those below 18 years of age.

5. The government will spend around $6 billion on developing smart cards apart from a gigantic citizendatabase. Karnataka has reportedly been chosen as the pilot state to carry out the project.

6. The broad idea is to get all the births, deaths, marriages, passport data, bank account data, ration carddata into one database. This will help all these offices to just tap into the central database as and whenrequired and update their accounts.

7. In year 2000, Tata Consultancy Service was assigned with the task of studying the feasibility of thisproject. It came up with the report which said that the government would have to earmark around Rs10,000 crore in three to four years, to implement it.The project would also require completely new software,capable of handling detailed information on at least one billion data entries.

8. This proposal that took almost a decade to become a project. And now the government is reportedlylooking at a three-year term to complete the entire programme. I am slightly positive about this deadlinebeing met as the project is in the hands of INFOSYS.

90

Page 91: Blogger to E-Book

9. Info from [1]http://infotech.indiatimes.com and [2]http://www.ciol.com

1. http://infotech.indiatimes.com/

2. http://www.ciol.com/

Anonymous (2009-06-28 17:20:10)how do u search all this man?

Anonymous (2009-08-01 14:04:05)How do you help Nandan Nilekani in making the project successful ? Can we join the project voluntarily ?

ANUPAM (2009-08-01 14:52:44)nandan has now become a one man army anyway!!!

2.7 July

Check your ANTIVIRUS’es Loyalty : EICAR Way (2009-07-03 23:07)

1. The world of bloggers is increasing at an astonishing pace and there are lots and lots of good of themwith loads of beneficial and estimable info. Recently I came across one good one that introduced me to ”TheEuropean Institute for Computer Anti-Virus Research” (EICAR).

2. Now this was able to provide me a real cool trick that of testing the reliability of the antivirus being run.I tested the same on two computers. One with a antivirus loaded and the other one badly infected. I willnow share the cream instead of minting words.

3. It is just a matter of simple cut & paste.Just do the following steps and the matter of how reliable yourantivirus is will be taken care of.

(a) Open Notepad and paste the code given below

X5O!P %@AP[4\PZX54(Pˆ)7CC)7 } $EICAR-STANDARD-ANTIVIRUS-TEST-FILE! $H+H*

(b) Save the notepad with the name eicar.com

4. If ur Anti-Virus is powerful , it will stop u from saving .. Or atleast trap it few seconds after saving.

5. That’s it!!!!!So simple.So my infected computer was able to save the same and the F - secured one caughtthe moment I tried saving it and deleted it too!!!!!!!!Screen shot in set

91

Page 92: Blogger to E-Book

6. Thanks EICAR and [1]http://www.technotips24x7.co.cc/

1. http://www.technotips24x7.co.cc/

USB DHAMAAAL!!! (2009-07-04 22:40)

1. The world of USB based gadgets is in for some real surprising things.Two of the recent ones that surprisedme really are mentioned below.

2. USB Beverage chiller : The name says it all.

92

Page 93: Blogger to E-Book

Features:

• Works w/ Soft Drinks, Coffee, Tea, and More

• High Efficiency - Works in Just a Few Minutes after Plugging into USB Port

• Draws Power Directly from USB Interface

• Plug and Play (No Driver Required)

• On Board Button to Switch from Warm to Chill

• Weight : 440 gm

• USB Cable length : 1.1 m

3. USB Mini Fridge : Again the name says it all.The features include :

• Powered entirely via your computer’s USB port

• Internal blue LED illumination

• Keeps one 12oz can of beverage chilly cold

• No batteries required

93

Page 94: Blogger to E-Book

[1] [2]

4. Where are we heading this way?

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/Sk-PilnzirI/AAAAAAAAAcs/C9-ie2UHkLs/s1600-h/Cool_USB_Fridge_Cooler.

jpg

2. http://4.bp.blogspot.com/_z1QH8I3k9vk/Sk-PSrJcJqI/AAAAAAAAAck/2hwtiKImJq8/s1600-h/usb1.jpg

Techsense (2009-07-05 02:12:41)http://itstechsense.blogspot.com/

94

Page 95: Blogger to E-Book

AMD : The Launch of ISTANBUL (2009-07-06 22:47)

1. I really wonder whats going to be the end of MOORE’s Law.Where did the thing start from and whatsgoing to be the conclusion or is their really going to be any?First it was the pentium, then pentium 2,then3 ,then 4,then Core 2 duo,dual core,then it was Quad Core and now comes the launch of SIX PACK ABS.....sorry..I mean Six Core Processor,the first of its kind from the AMD,to be known as the ISTANBULProcessor.Why so named is still a question?

2. The good thing is that these processor can simply be used to replace and upgrade the existing lot of QuadCore processors ie the Opteron Series without investing again into the motherboard and making it obsolete.

3. Istanbul comes with a powerful DDR2 memory architecture and the AMD virtualisation technolgy.Justto be clear these are 6 distinct physical cores, just as the Shanghai processors contained 4 distinct physicalcores. Each core comprises 512K of L2 cache and 128k of L1 cache. The L3 is a 6MB cache shared by thesix cores.

4. This also comes as an answer to the Intel’s ”Nehalem” Xeons.I assume that with the launch of IS-TANBUL,now the quad series of the AMD is heading for a conclusion and a farewell from the exisitingmotherboards since Istanbul can simply fit into the same slot as the Quad core’s.

5. So next after Istanbul will be ?????.......Afghanistan!!!!ha ha ha....long and fast lives the MOORE’s Law.

KYPS : HELPS AVOID BEING VULNERABLE!! (2009-07-08 16:20)

[1]

95

Page 96: Blogger to E-Book

1. In an earlier post when I had discoursed how much prone are you at any cyber cafe or at some other nonfriendly computer when u surf web on a holiday outside or when u dont have your own laptop,how proneyou become to keylogger!!I had given out given out few suggestions in form of using mobile/portable browseretc. that was at http://anupriti.blogspot.com/2009/06/are-you-secure-at-your-friendly .html

2. Not a new thing but I tried this for the first time yesterday ie KYPS that stands for Keep Your PasswordSecret.Now for the understanding of this I will write a small step by step instruction.

3. BACKGROUND

How to avoid typing username and password at the outside or malicious looking cyber cafe computer.?

4. SOLUTION

(a) Register at http://kyps.net/home/

(b) Get a set of codes at your email id

(c) Register those username/passwords site that u intend using sometime later at some other computer.

(d) Now when u wish to access the email account at the cyber cafe you simply have to log into the site ofKYPS and site will help you reach and access the e-mail without using the username and password,but byusing the one time codes that I had mentioned earlier.

5. EXAMPLE

(a) You register your email id [email protected] at KYPS.

(b) Once you register,a set of codes will be mailed to you.Qty will be decided as per your choice.Say 80.

(c) These codes will look some thing like :

100 9?nRQuJ8p 110 DzobNpk?M 120 Xg1Z2kXsL 130 maXXcACKV

101 x0Ivy4XsB 111 jcK8p7JRl 121 WqJ6GXDz4 131 XfjKVH65p

102 ilKzybBE0 112 /nvspLbmr 122 VoaX7yI1 132 5ILuG5ddN

103 tXaRNJwk? 113 lcMEO?GN? 123 MjpXow3CI 133 vBbKpkXiT

104 lAJNJnfcZ 114 Lf?U7Zzyn 124 VX71za0+J 134 KGXkxsVc

96

Page 97: Blogger to E-Book

(d) You go to a Cyber Cafe.Log into the KYPS site with your e-mail id.

(e) Select which e-mail you would like to access.

(f) Once selected, KYPS will ask you the equivalent code of 100 ie 9?nRQuJ8p

(g) and you log into the email page to access your mails.

(h) DONE.That’s it.

6. RISK

The only risk you build here is that since you rely on KYPS which has your info in their server but theyclaim is never stored.So one risk closed is one risk open......thats the funny side of SECURITY

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/SlR8LhMiIlI/AAAAAAAAAds/F1t4rpkcQQY/s1600-h/logo+(1).gif

ramesh kumar (2009-07-10 22:22:14)is it worth the risk?risk never gets over once u r on the web!!!

E-WASTE : DEPOSIT & GET PAID (2009-07-10 23:01)

1. In an earlier post I discussed about the consequences of e-waste and how few organisations were involvedin controlling the issue.

2. Recently I came to know of this site at [1]www.techshop.in/e-cycle which claims to recyle e-waste in areal economical manner.They pay you for the trash that you deposit.More details mentioned below.

3. MGA & Associates is a major organisation for the recovery & recycling of electronic equipments andcomponents based strategically in the deep sea port area of Kandla India. MGA & Associates plans & carriesout the collection, transportation, processing & recovery of all base materials from electronic equipments.They offer an environmentally sound and compliant route for organisations for their end of life and obsoleteelectronic equipments & components with the best available techniques. All MGA & Associates processes anddaily operations are backed up by ISO 9001 and ISO 14001Quality & Environmental management systemscertified by Bureau Veritas.

97

Page 98: Blogger to E-Book

4. MGA & Associates was formed in 2003 by a group of dedicated & professional individuals with over 60years of collective experience in recovery and recycling of electronic equipment and components and is oneof the largest professional processors of this type of equipment.

5. Your e-waste can be sent or deposited in person against which you get the coupons at the followinglocations:

(a) Polytela e-Commerce PVT. LTD.

25, Gaurav Industrial Estate, Bail Bazaar,

Kurla (W), Mumbai 400070.

Tel.: +91 9920213743 , +91 9323699901

Fax: +91 2264501259 E-mail: [email protected]

(b) MGA & Associates

Factory Site

Plot No. 262/263, Sector 4, Kandla Special Economic Zone,

Gandhidham - 370 230, Gujarat, INDIA.

Tel.: +91 2836 252225, +91 2836 253930

Fax: +91 2836 252522 E-mail: [email protected]

(c) Logix Express

37/1945 Om Karam CHS ltd. Gandhinagar. Bandra E. Mumbai. 400051.Tele: 022 26510708/26510687.M- 09833175486.Contact Person: Mr. Abhishek.

(d) DELHI

Logix Express8908/2 Multani Dnada. Opp. Rangoli Guest House.Pahargung. 110055.Tele: 011 32617289.M- 09999796936.Contact Person: Mr. Govind.

(e) AHMEDABAD

Logix ExpressBlock No. 71 to 76, Sagar Estate Part 3.Opp. Ekta Hotel. Sarkhej Bavala Road.Sarkhej- Ahmedabad. 380210.Contact Person: Govind.Tele: 079 26890419.M- 09979865961.

(f) HYDERABAD

Logix ExpressC/o Fast Freight Courier1-10-9/3, Airport Road, Opp. IBP Petrol Bunk,Begumpet, Hyderabad-500016.

98

Page 99: Blogger to E-Book

Contact Person : Mr. Anil ReddyM- 9848017335

(g) CHENNAI

Logix Express13/Devsigamani Street.Chulaimedu.Chennai.94.Contact Person: Mr. Silverraj.M- 09841418946.

(h) BANGALORE

Logix ExpressC/o Ever Green Logistics6, 4th Cross, 5th Main,S R Nagar, Bangalore-560027.Contact Person : Mr. RaviM- 09845836058.

(i) PUNE

Logix ExpressSurvey no 755, Kalpana warehouse.Opp. Hotel Ram kamal, Pune Nagar Road.Katkewadi, Wagholi, Dist. HaveliPune-412207.Contact Person: Mr. Raja Ram.M- 09850604994/09730073535.

(j) SURAT

Logix ExpressGround Floor, Swagat Complex.Kadodara Chokdi.Surat.Contact Person: Jayendra.M- 9979865968.

6. GOOD WORK...SO FREE PUBLICITY!!

1. http://www.techshop.in/e-cycle

Anonymous (2010-05-30 15:21:52)Wonderful. I am going to reproduce it with your permission

Anonymous (2010-05-31 09:45:58)welcome anonymous....

EYE-FI : GETs YOUR CLICK UPLOADED (2009-07-11 00:02)

1. What’s the route from the moment you click any pic from your digital camera or your camera phoneto the time you upload the selected few.It involves clicking the pic followed by Booting-up your computer,

99

Page 100: Blogger to E-Book

plugging in your camera, uploading pics to the hard drive and finally choosing what to send to the web!!!that has started becoming annoying now...since the number of pics a camera freak clicks is huge....so hegenerally shams it out and let them remain in the stoarge media by default.

2. SOLUTION : EYE-FI Memory Card. The Eye-Fi camera memory card (Pic in set) not onlyprovides memory as usual for your pictures, but uploads the snaps as you take them.

3. The procedure involves just sync the card to a hard drive or Wi-Fi network, and getting it plugged into adigital camera and start snapping away. Pics are then routed to the hard drive or to one of 17 photo vendors(like Facebook or Flickr.) The card’s software deftly handles scaling and compression while privacy settingsat the individual sites allow you to filter what gets published. The software handles scaling and compressionas well as privacy settings.

4. The Wi-Fi chip uses 70 percent less power than competing products, allowing it to be comfortably nestledin a standard SD card.

5. Thank you [1]http://www.technovelgy.com

1. http://www.technovelgy.com/

Widi Septyono (2009-07-13 21:44:42)Maybe if you are interested in my blog, please give comments and I will soon reply

PC IN A FLOWER VASE : ECS’s MING VASE (2009-07-14 23:09)

1. One Taiwanese computer maker has come up with a novel way to camouflage a computer made for yourliving room: give it the shape and color of a Ming Dynasty vase. 2. Elitegroup Computer Systems (ECS) putthe small blue and white vase-shaped computer on display by a large-screen LCD TV at Computex Taipei2009, to the effect that it really looked like Chinese art work rather than a gadget. 3. Inside the shapelyplastic covering includes (a) Home media computer complete (b) A Blu-ray Disc player offering full 1080phigh-definition video quality (c) Intel Atom N230 microprocessor (d) Nvidia Ion graphics chips and a (e)2.5-inch hard disc drive. (f) Bottom of the vase reveals plugs for an HDMI cable, an Ethernet cable and USBports. 4. See all this in the pictures in set....really amazing!!!

100

Page 101: Blogger to E-Book

[1]

[2]

[3]

101

Page 102: Blogger to E-Book

[4]

1. http://2.bp.blogspot.com/_z1QH8I3k9vk/SlzDQjJxFFI/AAAAAAAAAe8/sqYKQUchOBg/s1600-h/4.jpg

2. http://2.bp.blogspot.com/_z1QH8I3k9vk/SlzDLqURVBI/AAAAAAAAAe0/QemJe3SRe90/s1600-h/3.jpg

3. http://4.bp.blogspot.com/_z1QH8I3k9vk/SlzDDQcMWOI/AAAAAAAAAes/9TRJv-pq8kk/s1600-h/2.jpg

4. http://1.bp.blogspot.com/_z1QH8I3k9vk/SlzC7urAu9I/AAAAAAAAAek/MEkrMfLbYiY/s1600-h/1.jpg

HDD DOCKING STATION (2009-07-20 22:03)

1. In a typical IT savvy home,one would expect a desktop and a laptop today.So do Ihave that.I got mypresent desktop about 6 years back and have been since upgrading as and when I find an opportunity tomake up with the race of not being left in obsolesence.Thus today I have about 6 IDE/sata based hard disksat my home that bear the back up and confine themselves to the shelves till they are required.

2. Once required,I attach them with the easily available USB to SATA or USB to the typical IDE port.Nowwhen I do this,the table that I work on becomes a horde of wires with keyboard, mouse,power cable ofthis conversion kitging bank intermingling with each other.To make this neater a new thing that I recently came across is

the HDD DOCK STATION.More below :

102

Page 103: Blogger to E-Book

3. The plug-n-play ready, high speed HDD Docking Station provides the user with flexibility, portability andperformance. The unit supports both 2.5” and 3.5” SATA drives up to 1TB in size. The docking station isalso hot-swappable using the USB2.0 and eSATA interfaces so it can be moved from computer to computerwith ease for all your backup needs. If data integrity is your habit, then the HDD Docking is the perfectsolution for you. 4. The dock is compatible with Windows and supports HDD upto 1 TB. 5. Thankshttp://www.sunbeamtech.com

DATA STORAGE IN BACTERIA : ASTONISHING-MUST READ (2009-07-26 22:32)

1. I had read about this about 2 months back but could not get any thing rock solid about what is theconcept like actually?Although still not much detail is available,the crux from various sites is reproducedbelow for one to just imbibe the idea.

2. Artificial DNA with encoded information can be added to the genome of common bacteria, thus preservingthe data. The technique was developed at Keio University Institute for Advanced Biosciences and KeioUniversity Shonan Fujisawa Campus. So now what would happen to those USB flash memory ”thumbdrives”which is claimed as being small!!

103

Page 104: Blogger to E-Book

3. The technology aims at the succesful development of a DNA memory utilizing living organisms. Theresearchers proposed a method to copy and paste data within the genomic sequence of a living organism,Bacillus subtilis. Since microbs such as the Bacillus subtilis are very small and they keep gene information forgenerations, they can be applied for extremely smaller-size, larger-volume memory media that can store datafor a longer period of time, compared to electronic or magnetic media including CD-ROM, flash memoryandhard disc.

4. According to researchers, up to 100 bits of data can be attached to each organism. Scientists successfullyencoded and attached the phrase ”e=mc2 1905” to the DNA of BACILLUS SUBTILIS, a common soilbacteria.The Bacillus itself creates new copies of the data every time it reproduces itself, thus making it anideal archival storage system.

5. While the technology would most likely first be used to track medication, it could also be used to storetext and images for many millennia, thwarting the longevity issues associated with today’s disk and tapestorage systems – which only store data for up to 100 years in most cases.It is also claimed by the inventorthat unlike optical/magnetic storage, data would be safe for thousands of years!!!

6. However, DNA sequences gradually change as their generations advance and that has been a hurdle inthe research of biotic memory media. Changes in the DNA arrangements would make recovery of the stored

104

Page 105: Blogger to E-Book

data impossible, provided that no error correction techniques found at magnetic or optical storage media isavailable. The research group said its latest development indicated a possible resolution for this problem.

7. The technology proposes a method to copy and paste data within the genomic sequence of a livingorganism, Bacillus subtilis, thus acquiring versatile data storage and the robustness of data inheritance.Two or more different DNA molecules which carry the encoded data were duplicated into multiple genomicareas for data storage. The encoded data is then retrievable by complete genome sequencing and searchingfor duplicated coding regions using multiple alignments of all the possible decoded bit-data sequences of thegenomic DNA. Therefore, even if the recorded information is partly destroyed, the original correct informationcan be restored.

8. Thanks http://www.technovelgy.com

rinkoo (2009-07-28 19:58:53)Great!

2.8 August

WHO ESPIED MY COMPUTER? (2009-08-02 15:33)

[1]

1. How many times would you be able to know who logged in or who used ur computer in your absence?NOtmuch most of the times!!!An easy to find out the details is a one liner solution......

2. So,here is the trick for that ..Simply type as given below in the RUN bar ie

Start - Run - TYPE eventvwr.msc

3. All details of login will be in front of your eyes.SIMPLE!!!!!!!

4. Thanks [2]http://www.technotips24x7.co.cc/

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/SnVmaJ65imI/AAAAAAAAAgM/rONK0NTohz4/s1600-h/spying.jpg

2. http://www.technotips24x7.co.cc/

FREE UPGRADATION - ONLY A TRICK!!! (2009-08-02 15:50)

1. This trick comes for those who wish to upgrade their processors in the respective computers forfree.......(only the name) 2. Start -> run -> type regedit.exe -> press ok 3. In registry editor -> HKEY

105

Page 106: Blogger to E-Book

LOCAL MACHINE\HARDWARE\DESCRIPTIONlashSystem\CentralProcessor\0 4. On right Pane Se-lect ProcessorNameString and change the value to Pentium 5 or as you desire!! Note: For those PC bugsonly who just use the machine and don’t worry of whats inside?Of course,they can be content with thename they give....viz an old celeron be renamed to QUAD CORE......and so on!!!! 5. Thanks again to[1]http://www.technotips24x7.co.cc/

1. http://www.technotips24x7.co.cc/

SSDs vs HDDs : WHO is GOOD? (2009-08-05 00:59)

1. Off late few notebook manufacturer’s have been seen promoting their product for being the first tointroduce SSDs. Now at the first glance they really seem to be promising since they offer less energyconsumption, less weight, no mobile parts and also offer better speed in some ways than regular hard diskdrives. But the question is whether they are strong enough to deliver the performance through out their lifespan. This puts a question mark????????????

2. If you have just bought a shiny new SSD, it isn’t likely to continue performing at blazing speeds aftersome usage. An empty drive will always perform better than one written to. The good news is that afteran initial dip in performance, SSDs tend to level off. Even if they do drop in performance over time –undercutting a manufacturer’s claims – consumer flash drives are still vastly faster than traditional harddrives, because they can perform two to five times the input/output operations per second of a hard drive.

Why does performance drop?

3. Unlike a hard disk drive, any write operation to an SSD requires not one step, but two: an erase followedby the write. When an SSD is new, the NAND flash memory inside it has been pre-erased. But, as datais written to the drive, data management algorithms in the controller begin to move that data around theflash memory in an operation known as wear leveling. These algorithms are used to more evenly distributedata across flash memory so that no one portion wears out faster than another, which prolongs the life ofwhole drive. Even though wear-leveling is meant to prolong the life of the drive, it can eventually lead toperformance issues. SSD performance and endurance are related.

4. Generally, the poorer the performance of a drive, the shorter the lifespan. That’s because the managementoverhead of an SSD is related to how many writes and erases take place. The more write/erase cycles thereare, the shorter the drive’s lifespan. Consumer-grade Multi-Level Cell (MLC) memory can sustain from

106

Page 107: Blogger to E-Book

2,000 to 10,000 write cycles. Enterprise-class Single- Level Cell (SLC) memory can last through 10 times thenumber of write cycles of an MLC-based drive.

What Matters ?

5. ALGORITHM : A read-modify-write algorithm in an SSD controller will take a block about to be writtento, retrieve any data already in it, mark the block for deletion, redistribute the old data, then lay down thenew data in the old block.

6. Some manufacturers use algorithms that combine writes to more efficiently use NAND flash memoryspace; others use cache to store writes in order to lay them down more efficiently.

7. BUGS : Bugs Can Cause Slow-Downs, Too Intel’s X25-M SSD had a firmware bug that led to ma-jor fragmentation problems that dropped throughput dramatically . But what’s clear is SSDs need moredevelopment to address these long term performance issues.

8. Thanks PC WORLD!!!

Being BUSYYYYY (2009-08-15 10:05)

For last few days...have not been able to upload anything new since i have been busy with a real task onhand......will get back soon....!!!

WiMAX - THE POWER (2009-08-27 22:29)

For so long ....may be about two weeks I have not been able to upload any posts on this blog...courtesy anopportunity to slightly dig deep into WiMAX...and I am really happy to have finally got deeper into this.I gotto know about various Wireless Technologies and terms viz OFDM, MMDS, LMDS, Blue tooth,WiFi,EVDO,the ’G’ family, HSPA, 802.16M, 802.20, Cable modem, broad band over power line, LTE, FTTH, spectrumbands, base stations, CPEs, NOCs, EDGE,Gateways,Back haul links,Security aspects of WiMAX.....a lot oflearning...gr8888...will share brief on all these aspects in days to come....

2.9 September

Use KEYBOARD for MOUSE (2009-09-01 07:26)

1. This one is a small worth a look trick which you can use to impress anyone.This trick allows you to moveyour mouse pointer using your keyboard ie Numeric keypad.2. Press your left alt+shift+numlock in your keyboard to enable this feature.3. Now press ok.4. Use the keys 1, 2, 3, 4, 5, 6 7, 8, 9 of numeric keypad to move the mouse pointer.5. To perform mouse click use the key 56. To perform double click use + sign.7. To disable this feature click on NumLock.

8. Got this one from [1]http://informativetipz.blogspot.com/

1. http://informativetipz.blogspot.com/

107

Page 108: Blogger to E-Book

http://www.emailtheweb.com (2009-09-01 07:42)

1. Now even this one comes as a handy tool when you expect your friend to click a link for access to awebpage.Now your friend may not be able to access the webpage for reasons like site not working that timeor site been crushed by the twin menace of malicious spam and malicious web pages and your email is cryingto be heard.

2. Now who on earth is worried about that page that did not open except you.I know none...except you....sinceit is you who wish your link to be clicked

Instead of holding your breath waiting for your recipients to visit the web links you email to them, send theweb to them with EmailTheWeb.com

E mail a Web Page : http://www.emailtheweb.com/ (2009-09-01 07:53)

1. This one also comes as a pretty handy tool when u expect your friends to open a web page by clicking thelink you had sent to them on e-mail.It may open....and it may not open....the thing is ensured and guaranteedif u use the feature given at [1]http://www.emailtheweb.com/

2. A few advantages this will be able to ensure are :

- will saves your recipients time by not making them click a link to read your web page. For busy people,this improves the likelihood that they will read the linked web page.

- All scripts and dynamic elements of a web page is stripped out. This protects your recipients from popupsand other annoying activity that may be malicious.

- Allows you to email a page to someone who doesn’t have access to the the web page (either because thepage was dynamically generated or the page is password-protected.)

- Today’s web is more dynamic than ever and web pages are changing all the time. By emailing the entireweb page, you ensure that your recipient is seeing the same web page as you—even if the original web pageis changed.

- Many people need to have a archive record of a web page and use.

3. I have tried the same and find it pretty okay.....you need to have a new account or you can simply accessthe same using your Google/Gmail account.

1. http://www.emailtheweb.com/faq.html

xB BROWSER (2009-09-04 23:34)

1. xB Browser is a free and open-source anonymous web browser in the world which is just a click away fromanonymous surfing right now! With xB Browser you can securely and anonymously surf the internet, andbypass firewalls and website censorship. 2. The main advantage compared to other anonymous web browsersis that xB Browser requires no configuration or technical knowledge in order to achieve anonymity. xBBrowser is open-source so you can feel safe knowing what goes into our code. Additionally, it is even portableon a USB stick . 3. xB Browser was previously known as Torpark. It does not store a cache on the user harddrive, nor does it store cookies, so there is no mess to clean up with eraser programs. xB Browser also hasadvanced features such as SSL MD5 RSA certificate vulnerability detection, DOM object and flash cookieprotection,cross-site scripting attack prevention, user-agent cloaking, and java proxy control. xB Browser

108

Page 109: Blogger to E-Book

also detects and disables malicious browser addons that are hidden in the windows registry. 4. I recentlydownloaded the same from http://download.cnet.com/windows/3055-2144 4-10660326.html?tag=pdl-redirand I am really impressed with the same......the only thing I got perturbed was with the speed.Having riddenon chrome for over a year...the speed is not a match.It is about 45 Mb in size...isn’t that heavy...well anyway...CHROME rules still.

xB Browser - Makes you anonymous (2009-09-04 23:45)

1. xB Browser is a free and open-source anonymous web browser in the world which is just a click away fromanonymous surfing right now! With xB Browser you can securely and anonymously surf the internet, andbypass firewalls and website censorship.

2. The main advantage compared to other anonymous web browsers is that xB Browser requires no configu-ration or technical knowledge in order to achieve anonymity. xB Browser is open-source so you can feel safeknowing what goes into our code. Additionally, it is even portable on a USB stick .

3. xB Browser was previously known as Torpark. It does not store a cache on the user hard drive, nor doesit store cookies, so there is no mess to clean up with eraser programs. xB Browser also has advanced featuressuch as SSL MD5 RSA certificate vulnerability detection, DOM object and flash cookie protection,cross-sitescripting attack prevention, user-agent cloaking, and java proxy control. xB Browser also detects and disablesmalicious browser addons that are hidden in the windows registry.

4. I recently downloaded the same from [1]http://download.cnet.com/windows/3055-2144 4-10660326.html?tag=pdl-redir and I am really impressed with the same......the only thing I got perturbedwas with the speed.Having ridden on chrome for over a year...the speed is not a match.It is about 45 Mb insize...isn’t that heavy...well any way...CHROME rules still.

1. http://download.cnet.com/windows/3055-2144_4-10660326.html?tag=pdl-redir

INTEL vs THE SEVEN SAMURAIs (2009-09-11 22:36)

1. The old story of “MUTTHI MEIN TAQAT” has come up with a new version in the 21st century in theform of SEVEN SAMURAI

2. Dysphoric with Intel’s dominance in the sector, the conglutination of processor designers and manufactur-ers has teamed up to develop a revolutionary new microprocessor. The coalition is led by the recent mergerof NEC, Renesas , Hitachi, Toshiba, Fujitsu, Panasonic and Canon. Nickname for the group: THE SEVEN

109

Page 110: Blogger to E-Book

SAMURAI

3. The new microprocessor will be based on innovative energy-saving software. The final, commercial CPUwill run on solar cells; it will be smart enough to use only as much power as is needed for the data beingprocessed at the time; and it will remain switched on even during power cuts. A prototype is reported to berunning at 30 percent of the power of current CPUs and remains ON even when mains power is cut. Thisnew standard, along with the CPU is likely to be introduced in 2012.

4. Come on ….come on brains of the world…fight more with each other for consumers like us who wish toget the best!!!!!!!!!!!

5. Thanks [1]www.thinkdigit.com and [2]http://www.osnews.com

1. http://www.thinkdigit.com/

2. http://www.osnews.com/

SATA 1.0 vs SATA 2.0 vs SATA 3.0 : The hunger for speed (2009-09-11 22:49)

1. Today technology runs faster then u blink. Today when someone has not even come to terms fromIDE TO SATA 1.0 and when mostly have not even heard of SATA 2.0,in comes with a bigul siren SATA3.0.YESSSSS!!!!with a whooping 6 Gb/Sec, and a range of new features for bandwidth intensive users, a muchrapider future lies ahead. SATA 3 is bound to increase the interface speed but to fully realize its potential

110

Page 111: Blogger to E-Book

the viscera of a hard drive need to get quicker.

2. SATA 3 introduces changes including ”a new Native Command Queuing (NCQ) streaming command toenable isochronous data transfers for bandwidth-hungry audio and video applications, better power man-agement, and the connection mechanism for compact devices with connectors designed for the smaller 7mmoptical drives in laptops and a Low Insertion Force connector for 1.8-inch drives.

3. Thanks Digit again!!!!

PRINT A BATTERY : PRINTABLE BATTERY (2009-09-11 23:22)

1. Before I get into the meaning lemme tell you that this is again astonishing discovery.you can take a printout of something as shown in figure and use it as a battery..I mean as a source of power.....read ahead tofind out.

2. A new type of low-power battery that does not require a case and is thin enough to be printed on paperis all set to venture on ur laps and desktop tables.The power source relies on an undisclosed mixture ofchemicals to produce 20 milliamp-hours at a terminal voltage of 1.5 volts for every square centimetre that isprinted. The battery material is roughly 0.5 millimetres thick and would, if mass-produced, cost just a fewcents per square inch, according to Israeli-based company Power Paper.

3. The subject battery has been developed by a team led by Prof. Dr. Reinhard Baumann of the FraunhoferResearch Institution for Electronic Nano Systems.

111

Page 112: Blogger to E-Book

4. As this is a printable battery so the characteristics of this battery differ significantly from those ofconventional batteries. As the name suggest it must have very less weight.It weighs less than one gram onthe scales, is not even one millimeter thick and can therefore be integrated into bank cards.It’s voltage is 1.5V, which is general.The battery weighs less than one gram on the scales, is not even one millimeter thickand can therefore be integrated into bank cards, for example. The battery contains no mercury and is inthis respect environmentally friendly. Its voltage is 1.5 V, which lies within the normal range. By placingseveral batteries in a row, voltages of 3 V, 4.5 V and 6 V can also be achieved.

5. It is composed of different layers: a zinc anode and a manganese cathode, among others. Zinc andmanganese react with one another and produce electricity. However, the anode and the cathode layerdissipate gradually during this chemical process. Therefore, the battery is suitable for applications whichhave a limited life span or a limited power requirement, for instance greeting cards

6. The new battery consists of three different layers. It has conventional zinc manganese-dioxide componentsas anode and cathode. Sandwiched in between, the cell’s chemical power source remains a closely guardedsecret.

7. Paper Power claims the material is non-toxic and non-corrosive, making the battery safe to use withoutcasing.”Technically it will work like any other battery, but you can cut the battery into any size and shapefor your product.”

8. Thanks www.newscientist.com,Digit.

HOW IS UR FAVORITE USB MADE? (2009-09-11 23:40)

WORTH A DEKKKO

[EMBED]

EXTERNAL DRIVES : ARE THEY REALLY FAST? (2009-09-21 19:38)

1. When one goes for buying a external hard disk,how important is for him/her to give due importance tospeed that is mentioned as spec....like 7200 rpm and 5400 rpm?Does it really matter in this case?

2. Well not much and as a matter of fact the difference is ZERO = NULL = NIL.The faster the harddrive ,the better : this generally stands true for the internal drives that remain connected to IDE/SATA.Inmost of the cases pertaining to external drives the interface of connectivity is none other then USB whichis significantly slower equated to SATA/eSATA/IDE on any day.USB drives at the most support a transferspeed of 33-37 MB/s...and thats all...whether u connect a 5400 rpm or a 7200 rpm..

SUBMARINE COMMUNICATIONS : IT HAS BEEN TOUGH (2009-09-21 21:33)

1. Ever wondered how the internet and communications right from telgraph days has been working acrossthe globe?Everi one knows the technology behind these terms...but ever wondered how the same has beenestabilished.I will not dig deep...the pictures below will make it amply clear...one pic shows the layout ofsubmarine wires in the year 1901 and the other shows the OFC layout in the year 2005.......it would have

112

Page 113: Blogger to E-Book

taken amazing human effort.....salutes to the manpower that had been behind all the tough work.....HATSOFFFFFFF!!!!!!!!

[1]

2. Wanna get some light on the cost aspects? Cables with 10Gbps bandwidth were laid at a cost of $27000per KM...thats right...per KM.....now do the calculations for the approx length.......

1. http://2.bp.blogspot.com/_z1QH8I3k9vk/Sreky6X9cjI/AAAAAAAAAhc/Yz0tm8wOt8c/s1600-h/cabe1gif

113

Page 114: Blogger to E-Book

LIGHT PEAK TECHNOLOGY : INTEL (2009-09-24 16:17)

[1]

1. Your internet connection at home and office would be happy biting at 10 or 100 Mbps, how about beingable to get upgraded to 100Gbps over the decade! yes...INTEL has thrown some light on this vide the newLight Peak technology that uses light instead of electric signals to transmit data, meaning faster speeds,smaller cables, and less signal loss. The subject technology is already in use in data-centers, but has notbeen able to gate crash into mainstream computing yet.

2. In the coming year Intel plans to release this technology for use in consumer devices and mainstreamcomputing, for the first time giving people the taste of transfer speeds up to 10Gbps. Light Peak is thecode-name for a new high-speed optical cable technology designed to connect electronic devices to each otherwhile allowing high bandwidth starting at 10Gb/s with the potential ability to scale to 100Gb/s over thenext decade.

114

Page 115: Blogger to E-Book

3. Light Peak consists of a controller chip and an optical module that would be included in platformssupporting this technology. The optical module performs the conversion from electricity to light and viceversa, using miniature lasers and photo detectors.

4. Since this as optical technology, multiplexing multiple connections over a single cable will be much simpler,and thus a single cable cold be used to connect your computer to multiple ”peripherals, workstations, displays,disk drives, docking stations, and more.”

5. Light Peak is designed to be cheap, and in fact claims to be smaller and cheaper than current telecommodules. The Light Peak optical modules are up to 120 times smaller and up to 30 times cheaper thancurrent telecom modules! The optical fibres used in it are in fact nearly as thin as human hair, and useLASER chips called VCSEL (Vertical Cavity, Surface Emmiting LASER) which are a mere 250 microns by250 microns.

6. Comeeeeeeeeee ON....what r we heading for in next 50 years....our generation is the lucky one to see all thisquick transition from files,postman to emails and Light peak transfer rate.No other generation other then thepresent one would see this difference....kids today are born without seeing a postman in their galiiiii....bornwith computers and laptops in hands of ma and pa..

7. Thanks DIGIT & www.engadget.com

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SrtO_MTGlsI/AAAAAAAAAiE/G1urBll-3JI/s1600-h/DELETE.jpg

MORRO : THE MICROSOFT SIDE OF ANTIVIRUS (2009-09-24 22:29)

1. Impregnable news is coming in that Microsoft is ready to launch its free anti-virus software called Morro forpersonal computers. This is a huge competition in making for security software leaders like Symantec NortonAntivirus and McAfee Anitvirus software.To address the growing need for a PC security solution tailored tothe demands of emerging markets, smaller PC form factors and rapid increases in the incidence of malware,Microsoft Corp. plans to offer this to the new consumer security offering focused on core anti-malwareprotection.

2. Code-named “Morro,” this streamlined solution will be available in the last quarter of 2009 and is likelyto allow comprehensive security from malware including viruses, spyware, rootkits and trojans.

3. The surprising news is that Microsoft isn’t bundling Morro with Windows.Currently in beta testing, itwas available for download to the first 75,000 people in the United States, Israel, People’s Republic of Chinaand Brazil.

115

Page 116: Blogger to E-Book

4. Morro” will take advantage of the same core anti-malware technology that fuels the company’s current lineof security products, which have received the VB100 award from Virus Bulletin, Checkmark Certificationfrom West Coast Labs and certification from the International Computer Security Association Labs.

5. “Morro” will be available as a stand-alone download and offer malware protection for the Windows XP,Windows Vista and Windows 7 operating systems. When used in conjunction with the ongoing security andprivacy enhancements of Windows and Internet Explorer, this new solution will offer consumers a robust,no-cost security solution to help protect against the majority of online threats.

6. Microsoft in an open source mooood!!!!!!!!!!

SECURITY ESSENTIALS : NO MORE ”MORRO” (2009-09-30 20:22)

1. So it has been launched finally after a long wait...a few debates...a few hues and a not so lots of pub-licity....the microsoft antivirus ”SECURITY ESSENTIALS”. I downloaded it today and saw thats it is verilight at least as on date and has been able to capture the regular worms and malwares that were present inmy desktop.

116

Page 117: Blogger to E-Book

2. One problem for most of the Hindustani’s......it only works on genuine microsoft windows....since priorto installation it checks if you have a genuine windows...if NOT ..then it comes out in between installationwithout procedding ahead....

DUAL SCREEN CAMERA : SAMSUNG ST 550 & ST 500 (2009-09-30 20:34)

1. Earlier I had discussed about one dual screen laptop....then we all know about big touch screens on mobilesin so many versions,shapes and sizes.Ever wondered what purpose would a dual screen serve in a typicaldigital camera.Just scroll down and see the pics to get the concept...i am sure u will appreciate it!!!!

[1]

117

Page 118: Blogger to E-Book

2. Delivering an unrivalled user experience, the 1.5 inch LCD screen located on the front of the camera nowallows consumers to take first-rate photos by themselves in addition to the one who is busy clicking.

[2]

3. Thanks [3]http://www.samsung.com/sg/news/newsPreviewRead.do?news seq=14419

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SsN00-xTIGI/AAAAAAAAAik/OTd19KeClBg/s1600-h/samsung-st500-st550.jpg

2. http://4.bp.blogspot.com/_z1QH8I3k9vk/SsN0vdw9MpI/AAAAAAAAAic/1mg5FbWH0Dc/s1600-h/main_M.jpg

3. http://www.samsung.com/sg/news/newsPreviewRead.do?news_seq=14419

THE FUTURE OF OSs : MICROSOFT VERSION (2009-09-30 22:08)

1. Microsoft’s involvement in playing a key role in the field of future operating systems can be gauged fromthe fact deciphered below in successive paragraphs.

2. So when Microsoft tries working on the futuristic versions of operating systems...the sur-prise is that windows does not come in the discussion....windows is out...yessss!!!it is terms likeMIDORI,SINGULARITY,BARRELFISH,HELEOS.....the names must be sounding french to people likeme....just read ahead!!!

MIDORI

3. Midori based on their Singularity operating system research project is an experimental operating system,in which all code, even device drivers, and the kernel itself are written in managed code, making the operatingsystem much safer. The operating system also has a large focus on concurrency.Midori is in incubation, whichmeans it is a little closer to market than most Microsoft Research projects, but not yet close enough to beavailable in any kind of early preview form to users.

BARRELFISH

4. Barrelfish, an OS written specifically for multicore environments. It hopes to improve the performance ofboxes with such chips by creating a network bus and calls itself a multi-kernel operating system. Its focus is onleveraging the increasing number of cores in desktop processors. The mainstream operating systems today,Windows, and Linux, have both been designed for single-core computers, with multi-processing supportadded on later.

5. The Barrelfish project instead tries to redefine the entire operating system keeping in mind that multi-coreis here is stay. Today we have dual-core, quad-core, and even hexa-core, but given a decade, we may be

118

Page 119: Blogger to E-Book

looking at hecto-, kilo-, or even mega-core computers! These will require a rethinking of the very organizationof the operating system.

6. Barrlefish does just that. It treats the multi-core processor environment as a collection of networkedprocessor cores, and applies the concepts used with distributed computing to manage the execution of thecomputer’s processes. This has the effect of making the system much more scalable. An interesting part ofthis approach is also

that the processor cores need not be homogeneous! The multiple kernels could all be running on processorsof different architectures, one kernel might be executing on an ARM, while another on a x86, and a third ona GPU!

HELEOS

7. Heleos, another research OS in MS labs and their latest revelation, takes the concept of heterogeneousmultiprocessing further, and introduces ”satellite kernels”.It explains that current operating systems aredesigned with a homogeneous running environments in mind. For this reason, an operating system is writtenfor either an IA64, or an x86, or a PPC, or an ARM platform, however it cannot leverage all of them.Our computers however are no longer homogeneous. We have CPUs and GPUs of different architectures,each with multiple cores. The GPU is highly optimized for a vector processing, and has an architecturewhich vastly differs from that of the CPU, with a completely different instruction set and performancecharacteristics.

8. The Helios project introduces satellite kernels, which essentially presents the developers with a ”sin-gle,uniform set of OS abstractions across CPUs of disparate architectures and performance characteristics.”This satellite kernel is a micro-kernel, and runs all other services and drivers in individual processes.

9. With Singularity and Barrelfish both available as open source releases, it seems Microsoft might just beheaded for a more open future.

10. Thanks DIGIT and Microsoft for the updates.

2.10 October

RADIATION EFFECTS & UR MOBILE - QUANTIFIED (2009-10-01 20:22)

1. We all hear about how the radiations emitted from our mobiles keep effecting us on the wrong side……butwhat are the specifications laid down for quantification of these effecting variables? What are these variables?How much do they effect us? Do separate mobile handsets effect us in different ways?Are their any safelimits in these? What are the available standards?

2. The first and the most significant variable is the Specific absorption rate (SAR) , a measure of the rateat which energy is absorbed by the body when exposed to a [1]radio frequency (RF) electromagnetic field.It is defined as the power absorbed per mass of tissue and has units of watts per kilogram. SAR is usuallyaveraged either over the whole body, or over a small sample volume (typically 1 g or 10 g of tissue). Thevalue cited is then the maximum level measured in the body part studied over the stated volume or mass.

119

Page 120: Blogger to E-Book

3. SAR is used to measure exposure to fields between 100 kHz and 10 GHz. It is commonly used to measurepower absorbed from mobile phones and during MRI scans. Few specifications of good and bad mobiles asfound rated from TOI site at their INFOTECH tab are shown below with details :

SAMSUNG IMPRESSION : GOOD

Maximum radiation: 0.35 Watts per kilogram (W/kg) (based on reported radiation level when held up toyour ear)SAR when held at the ear: 0.35 W/kgSAR when worn on the body: 0.83 W/kg

MOTOROLA RAZR V8 : GOOD

Maximum radiation: 0.36 W/kgSAR when held at the ear: 0.36 W/kgSAR when worn on the body: 0.86 W/kg

SAMSUNG SGH-T229 : GOOD

Maximum radiation: 0.38 W/kgSAR when held at the ear: 0.38 W/kgSAR when worn on the body: 0.69 W/kg

MOTOROLA MOTO VU204 : WORST

Maximum radiation: 1.55 W/kgSAR when held at the ear: 1.55 W/kgSAR when worn on the body: 0.58 W/kg

BLACKBERRY CURVE 8330 : WORST

Maximum radiation: 1.54 W/kgSAR when held at the ear 1.54 W/kgSAR when worn on the body 0.99 W/kg

4. United States: The [2]FCC requires that phones sold have a [3]SAR level at or below 1.6 watts perkilogram (W/kg) taken over a volume of 10 gram of tissue while European Union specify SAR limits within2 Watts/kg taken over a volume of 10 gram

120

Page 121: Blogger to E-Book

5. So next times some one asks you or even mentions about radiation effect of mobiles on health….just makethe aspect more clear of weather of not his/her mobiles in meeting the S.A.R norms or not?

6. Thanks Wiki,Tech gadgets and TOI.

1. http://en.wikipedia.org/wiki/Radio_frequency

2. http://www.fcc.gov/

3. http://www.mmfai.org/public/sar.cfm

MY WINDOWS 7 HOUSE PARTY PACK : THANK YOU MICROSOFT(2009-10-05 20:44)

1. Two months back I had registered to host a house party on the occasion of launch of WINDOWS 7 ...thenext generation windows OS after answering a few FAQs on Windows 7 without realising that I would endup as a winner of the signature edition of the house party pack including the original Windows 7.I got theconfirmation from microsoft two weeks back......still then I had thought of it being some spam mail....till I gotthe tracker ID from DHL....so since last two weeks have been waiting to get that pack of Windows 7....andfinally today I got the pack today......and it looks like this .......grrrrrrrrrrrrrrrrrr8...thanks Microsoft for thedabba.....so happy to use a genuine edition of a Windows OS for the first time!!!!!ha ha ha!!!!that to on myname direct from the US of A.

121

Page 122: Blogger to E-Book

122

Page 123: Blogger to E-Book

[1]

123

Page 124: Blogger to E-Book

[2]

[3]

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/SsoSMp-NiRI/AAAAAAAAAjk/xCrI-dQ80jI/s1600-h/DSC09473.JPG

2. http://2.bp.blogspot.com/_z1QH8I3k9vk/SsoQecREbtI/AAAAAAAAAi8/6icVWjYYSAM/s1600-h/DSC09483.JPG

3. http://3.bp.blogspot.com/_z1QH8I3k9vk/SsoQdwFTsCI/AAAAAAAAAi0/YxSsb8AjJBk/s1600-h/DSC09484.JPG

anand (2009-10-06 06:55:19)congrat.

Amsang (2009-10-07 23:37:08)in the first photo who is the one on the left

124

Page 125: Blogger to E-Book

NIKON S1000PJ : DIGITAL CAMERA WITH INBUILT PROJECTOR(2009-10-06 20:32)

1. The thing that was till now thought of as futuristic has finally arrived...and that too at a reasonable andworthy price....the title says it all...DIGITAL CAMERA with a inbuilt PROJECTOR.

2. The first one to attempt this and allowing the consumers to exploit this is NIKON...vide model NIKON

S1000PJ as shown in pic and video below.[EMBED]

IEDig.com (2009-10-18 12:26:27)I would like to invite you to join blogging Social Networking[1]IEDig.comwhich helps you to get more visitors to your blogs and you get the chanceto meet other celebrity bloggers.[2]Join IEDig.com

1. http://iedig.com/

2. http://iedig.com/

1 MBPS BROAD BAND CONNECTION : HUMAN RIGHT IN FINLAND(2009-10-18 22:12)

1. If there was any further proof needed of how much the Internet is affecting human lives and can helpenrich it, just look towards Finland. The country has become the first in the world to make broadbandInternet access a human right, making us consider whether we should move there or not.

2. The Ministry of Transport and Communications has stated that starting next July, every person inFinland will have the right to a one-megabit broadband connection. That’s right, 1Mbps. And here in India,we start jumping around when the same is offered for upwards of Rs. 1,500.

3. The biggest kicker, though, is that in another six years, the Finnish government wants to make 100Mbpsspeeds the mandatory minimum for all its 5.5 million citizens. Granted, that’s a small population, but itstill throws a poor light on almost all other governments across the world.

4. And yes, some variations of the above will be allowed if connectivity can be managed on mobile phonenetworks.

125

Page 126: Blogger to E-Book

5. It’s unfair to compare India to Finland, given the gross discrepancies, but doesn’t this make your bloodboil? There’s hardly any broadband penetration in India, Internet speeds are a joke and let’s not even getstarted on 3G.

6. Thanks Indiatimes.com for the info

KINDLE : WELCOME TO INDIA (2009-10-25 20:34)

1. Kindle has finally reached the shores of Hindustan.For those of you,who are puzzled of what KINDLE isall about what be able to judge a fair idea from the pics below.An e book storage and reading device.

2. Capable of wirelessly downloading books, magazines, newspapers and personal documents ,the Kin-dle screen has no backlight, so it doesn’t giveout the glare a normal screen would. The navigation is fairly simple and all the text content is custom

formatted.

3. The device features a 2,50,000 word dictionary that can be accessed independently to lookup a word, or from within text. It can also play MP3 but the quality of sound takes ratingthis on the back foot.The battery life that comes due to the electronic ink display. On a singlecharge it can last up to two weeks without the wireless network on. And 2-4 days with wireless!

126

Page 127: Blogger to E-Book

4. Indian users can avail of a catalogue of 2,80,000 books, each downloaded in about a minute over 3G GSMor EDGE. There are no data charges for downloading a book, the service for which is provided globally by

AT &T and its international partners.

5. Kindle is weighs around 290 grams, almost the weight of advanced mobile phones. The display specifica-tions include 6″ diagonal E-Ink® electronic paper display, 600 x 800 pixel resolution at 167 ppi, 16-level grayscale. The Kindle offers 2Gb of Memory Storage though 1.4Gb would be available to the user and they donthave to connect it to a PC if they need to transfer ebooks because it has inbuilt 3G connectivity & Wi-Ficonnectivity.

6. However, the Kindle does not have any sort of content filtration or rating system, so there is the risk ofmature content being easily accessible to minors. So, will the Kindle tinkle in India? Well a few things goagainst it. First is the price tag …sources put it at about Rs 20,000/-.

7. Thanks www.thinkdigit.com and www.amitbhawani.com for info.

127

Page 128: Blogger to E-Book

RDM : Rival for BLU RAY? (2009-10-25 22:09)

1. Even before Blu ray product’s have been able to reach the consumer,a new rival by the name of RDM(...inshort for Royal Digital Media) has come out with HD VMD(Versatile Multilayer Disc) and CH-DVD(ChinaBlue High-definition Disc) – all set to tittupp into town to challange BLU Ray. Royal Digital Media hasintroduced its bona fide Blu-ray rival... while casually forgetting to name it. These ”high-definition discs”will be able to store up to 100GB and will boast military-grade encryption. RDM’s format ”will transformperceptions of high-definition,” as it is able to ”display the next generation of high-definition: 1920p.”

2. DreamStream is the first company to implement a 2,048-bit encryption in consumer media. AES encryp-tion, used in Sony’s Blu-ray discs, relies on only a 128-bit system.

3. For consumers, RDM’s increase in storage capacity allows for a single disc to hold approximately fourhours of video content at 1920p resolution.

4. Because RDM’s system is based on inexpensive red laser technology, their players are expected to sell formuch less than Sony’s, which routinely sell for hundreds of dollars. The retail prices for RDM’s players anddiscs are expected to ”equal those of the traditional DVD format, greatly undercutting Blu-ray,” .

5. RDM’s technology can be implemented into existing DVD production processes through the integrationof a proprietary software and firmware system. The only potential hardware modification is, ”at most, thesimple replacement of a single chip,” said Levich. As such, existing DVD manufacturers will be able tointegrate RDM’s technology with only minor modifications to their production processes.

6. RDM’s players are backwards compatible and able to read traditional CDs and DVDs. Moreover, aninnovation in data processing enables RDM’s players to ”drastically enhance the playback quality of regularDVD content,” said Diebel.

7. The incorporation of DreamStream’s encryption into RDM’s system will thwart the piracy of digitalcontent. The content of RDM’s discs will only be able to be read by RDM’s players. Thus, ensuring that thecontent cannot be copied and illegally distributed. Will it really?....so many claims till date on such issueshave been found cracked a day after launch…well for now ALL THE BEST for the new BLU ray rival.

128

Page 129: Blogger to E-Book

8. Thanks http://dreamstream.info

D-ROLL : No end to imagination (2009-10-26 21:23)

The tashan of modern gadgets which apart from being fashionable are getting smaller, slimmer ,sleaker andsmarter day by day . And the latest creation to catch eye is “D-roll” or “digital roll,” the new device workslike a regular laptop, but rolls up to be a side bag or even a backpack for easy transportation. Designed likean artist’s tube, the D-roll Laptop features a roll up OLED screen and a slide out keyboard, together witha mouse and a detachable webcam that can be worn on your wrist when not attached to the system. Themouse and web camera can also be used as the end caps for the laptop case, while the straps double as portsto plug in your USB devices.

[1]

[2]

129

Page 130: Blogger to E-Book

[3]

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/SuXHK-v40eI/AAAAAAAAAk8/8l_skURoK-E/s1600-h/d-roll_xuWzl_58.jpg

2. http://2.bp.blogspot.com/_z1QH8I3k9vk/SuXHKYGl19I/AAAAAAAAAk0/rpMl978UGCE/s1600-h/d-roll-laptop-concept-1_

BeZyG_17621.jpg

3. http://3.bp.blogspot.com/_z1QH8I3k9vk/SuXHJwFMktI/AAAAAAAAAks/oiMCDBViq5k/s1600-h/d-roll-laptop-concept-2_

UZnCt_17621.jpg

2.11 November

Green Dam Youth Escort : What’s that? (2009-11-06 06:25)

1. The title suggests that it has got something to do with college unions doing thier bit contribution in savingsome water or fighting over some water dam issue.But its nothing like that.It is the name of a firewall whichis a first of its kind official government imposed content-control software developed in the People’s Republicof China (PRC). Under a directive from the Ministry of Industry and Information Technology (MIIT) , it ismandatory to have either the software, or its setup files accompanied on a compact disc or pre-installed onall new personal computers sold in mainland China, including those imported from abroad.

2. The firewall software is to be made a mandatory pre-requisite for new computers sold in the country,as a meaure to help stamp out pornography and other vile elements on the Web. The move thus has beenwidely criticised by industry groups and officials as rash, politically intrusive, technically ineffective andcommercially unfair.Few of the features of the software are enumerated below :

• Designed to work with Microsoft Windows operating systems,the software is specifically aimed atrestricting online pornography but could be used for other purposes.

• Green Dam Youth Escort automatically downloads the latest updates of a list of prohibited sites froman online database, and also collects private user data.

130

Page 131: Blogger to E-Book

• Green Dam recognizes pornographic images by analyzing skin-coloured regions, complemented by hu-man face recognition. The software is incapable of recognizing pictures of nudity featuring black- orred-skinned characters but sensitive enough to images with large patches of yellow that it censorspromotional images of the film Garfield: A Tail of Two Kitties.

• The software’s misrecognition of ”inappropriate contents” in applications including Microsoft Word canlead it to forcefully close those applications without notifying the user, and so cause data losses.

• The software runs only on Microsoft Windows x86, so Microsoft Windows x86-64, Mac and Linux usersare ignored. Even on Microsoft Windows, the software is known to interfere with Internet Explorerand Google Chrome, and is incompatible with Mozilla Firefox.

• Some computers sold in China already come with parental-control software, but it isn’t government-mandated.

3. The latest good news for the chinese people is that for the time being the compulory shipping andinstallation by the user has been put on hold.

4. Thanks http://www.circleid.com and off course wiki like always!!!!

LAPTOP Face Recognition falls FLAT!!!! (2009-11-26 08:00)

1. Now this is one interesting thing to read.All those claims by Saif Ali Khan in his ad promoting one companyfor face recognition feature introduction had made its way out of the IT World.....well....so it seems!!!!readON.........

2. Experts from Bkis Internet Security in Vietnam have proven how easy it is to defeat this.In front oftechnology experts, authors and press representatives from different countries participating in an internetsecurity conference, Bkis experts demonstrated the vulnerabilities in Face recognition function on Asus,Lenovo and Toshiba laptops. Even when set at the highest security level, the laptop could not prevent Bkisexpert Mr Nguyen Minh Duc from breaking into the system. With some technical tricks, Duc in turn loggedonto Asus, Lenovo and Toshiba computer at the amazement and continuous applause from the audience.Everyone was really surprised to see how a famous and trusted security technique could be broken so easily.APic is shown below from actual demo loc.In some cases,even the owners of Facebook profile photo could be

printed and used.

131

Page 132: Blogger to E-Book

3. What the researchers found is that the technology just isn’t that hard to fool. Even photographs thathave previously been digitized and distributed, like those on Web pages or transmitted through videophoneconversations, will do the job.The model exploits the flaw in image processing. In other words, it uses aphoto of a person instead of his/her real face. It works because the algorithms will process in effect digitalinformation.Provided those conditions, an attacker might take some photos of one user within the system,perform some image editing, regenerate “special pictures” and penetrate into the system. 4. Now the worrypoint is that Biometric data, including facial recognition, is increasingly being built into passports, driverslicenses and other forms of ID. [1]Australia and Germany both use facial recognition to control access anddetermine identity at border crossings, and the [2]U.S. and other countries are moving in that direction.So....ab kya hogaaaa? 5. Thanks http://www.examiner.com,http://www.bkis.com and Chip magazine.

1. http://en.wikipedia.org/wiki/SmartGate

2. http://aero-defense.ihs.com/news/2008/nist-facial-recognition-120308.htm

Darin (2009-11-30 20:25:30)Certainly the tested implementations of facial recognition have their issues and it’s good to know about them. That’sa far cry, however, from saying that ALL implementations have the same weaknesses. There’s a very strong versionfrom Sensible Vision/Dell Computers, for example (NOT evaluated by the researchers...interesting), that not onlyhas very strong photo resistance, but also a very straight forward second factor feature that all but resolves the issueentirely.It also takes a bigger picture look at security by locking the desktop automatically when you walk away...a wide opendesktop being a much bigger threat than a brute force photo attack since ”hacking” an already open machine doesn’trequire any skill, effort or time at all...just physical proximity!Of course no solution is perfect or ever will be. Given enough time and physical access, absolutely any security canby bypassed. It’s really a matter of picking the right tools to make this as difficult as possible given the threats likelyto be faced while still keeping the computer easy (or at least not too much more difficult) to use in the process.Full disclosure - I have worked for Sensible Vision for quite some time now. We’ve successfully used this technologyfor several years already to protect security critical PCs in hospitals, banks - even a maximum security prison. Thenew consumer Dell platform is based on the same technology.Here is a link to our online response to this testing. http://www.sensiblevision.com/company/releases/2-24-09.htm

ANUPAM (2009-12-01 10:33:33)thanks for the invaluable comments darin

2.12 December

Google Binged!!!! - My 100th Post (2009-12-13 01:00)

1. For so many days wanting to upload some post but just could’nt find anthing so interesting before I readabout this.

2. From the time Bing was introduced and pitted against arch rival Google,there have been talks and forumsacross proving each others superiority over each other.Now for the first time some one Big has come up withthis.....it follows down..please read!!!

3. A Mozilla official today advised Firefox users to the extension that adds Microsoft’s Bing to the list ofthe browser’s search engines after Google’s CEO downplayed consumers’ privacy concerns.

4. Citing a clip from a CNBC broadcast shown below, during which Google chief executive Eric Schmidtdiscussed online privacy, During the interview, Google chief executive Eric Schmidt was asked: ”People are

132

Page 133: Blogger to E-Book

treating Google like their most trusted friend...should they be?” It was Schmidt’s answer that motivatedDotzler to show users how to drop Google, Firefox’s default search engine, for rival Bing.

”IF YOU HAVE SOMETHING THAT YOU DON’T WANT ANYONE TO KNOW, MAYBE YOUSHOULDN’T BE DOING IT IN THE FIRST PLACE,”SCHMIDT TOLD CNBC. ”IF YOU REALLY NEEDTHAT KIND OF PRIVACY, THE REALITY IS THAT SEARCH ENGINES, INCLUDING GOOGLE, DORETAIN THIS INFORMATION FOR SOME TIME AND IT’S IMPORTANT, FOR EXAMPLE, THATWE ARE ALL SUBJECT IN THE UNITED STATES TO THE PATRIOT ACT AND IT IS POSSIBLETHAT ALL THAT INFORMATION COULD BE MADE AVAILABLE TO THE AUTHORITIES,”ADDEDSCHMIDT.

[EMBED]

5. Asa Dotzler, Mozilla’s director of community development, then on provided a link to the Firefox extensionthat adds Bing to Firefox’s search engine list.

6. Google chief executive Eric Schmidt would be now trying to undo his statement in some form but thearrow has been shot….and the dent on the google is seen……so googler’s Be ware now on!!!!!!

7. Thanks http://www.computerworld.com

Y2K Bug!!!!Do u remember the time? (2009-12-28 22:12)

1. I was just wondering about the time when the much-hyped Y2K crisis had come in with a long, sustainedroar and went out with a mewl.While the world excogitated dire predictions of massive global infrastructurefailures – everything from elevators to air traffic control systems was rumored to be vulnerable , the specterof a total paralysis of business operations resulting from cascading Y2K failures galvanized organizationsinto a frenzy of activity. For many CIOs, the unprecedented size and scope of addressing Y2K problems wasthe biggest project of their careers.

And then it was over. On Dec. 31, 1999, the world held its breath and nothing happened. Jan. 1, 2000came in just like any other day. There were no major failures to report anywhere.

2. Today after 10 years....I feel the time has just rolled like a ball....so quickly we are a decade ahead of thatnight....the night that was a wakeup call for every one who felt that there is no need of IT then....the nightthat showed how heavily we r banked on the IT......

3. Thanks to http://www.computerworld.com for making me remember that.

BIDI makes LCD touchscreen A PASSE past (2009-12-30 07:49)

1. This is definitely going to be some thing new for most of the readers.....the following article makes thepresent touchscreen a PASSEE by introducing the BIDI.

2. The BiDi Screen is an example of a new type of I/O device that possesses the ability to both capture imagesand display them. This thin, bidirectional screen extends the latest trend in LCD devices, which has seen theincorporation of photo-diodes into every display pixel. Using a novel optical masking technique developed atthe Media Lab, the BiDi Screen can capture lightfield-like quantities, unlocking a wide array of applicationsfrom 3-D gesture interaction with CE devices, to seamless video communication.The BiDi Screen uses a sen-sor layer, separated by a small distance from a normal LCD display. A mask image is displayed on the LCD.When the bare sensor layer views the world through the mask, information about the distance to objects in

133

Page 134: Blogger to E-Book

front of the screen can be captured and decoded by a computer. 3. This allows a typical LCD screen workingby interpreting hand gestures, without touching the screen.This allows viewers to control on-screen objects bywaving their arms in the air without touching the screen, let alone a mouse or keyboard.Although users cantouch the screen to activate controls on the display but as soon as they lift their finger off the screen, the sys-

tem can interpret their gestures in the 3-D.4. ”This is a level of interaction that nobody’s ever been able to do before,” New Scientist quoted RameshRaskar at the Massachusetts Institute of Technology Media Lab, as saying.The screen - dubbed BiDi, shortfor bi-directional - allows users to manipulate or interact with objects on the screen in three dimensions.5. It will also function as a 3D scanner, he adds. ”If you spin an object in front of screen, the softwarewill stitch together a 3D image.”The new system uses an array of optical sensors that are arranged behinda grid of liquid crystals, similar to those used in LCD displays. They physically control how much lightpasses from the display’s backlight.In the new system a regular grid of hundreds of pixels spread across thescreen use their liquid crystals to create a tiny hole that acts as a pinhole camera lens, focusing an imageof the scene in front onto a thin translucent film a few centimetres behind the LCD. 6. Those images aredetected by a camera inside BiDi, allowing the device to know what is happening before it. 7. Thankshttp://infotech.indiatimes.com and http://web.media.mit.edu/ mhirsch/bidi/

134

Page 135: Blogger to E-Book

Chapter 3

2010

3.1 January

2010 (2010-01-01 06:38)

This number is not to be connected with any Microprocessor or any IT equipment......this comes to wish youall a VERI

HAPPY NEW YEAR 2010

HP in the racists scoooop!!! (2010-01-08 06:34)

1. Phenominal is the pace at which the IT Sector is growing and Interesting are the ways in which few errorshappen one of which I am mentioning down.....

2. The issue has attracted worldwide attention this month, when a US Black man known as ”Black Desi”posted a YouTube video that showed his HP webcam built in to its new computers refusing to track his facebut on the other hand it could do so just fine for his white friend Wanda.Titled ”HP computers are racist”,the YouTube video quickly attracted more then 500,000 hits and showed Black Desi’s webcam working as itshould when his work colleague ”White Wanda” stepped in front of the camera, but when ”Black Desi” gotin front, no face recognition took place.

[EMBED]

3. What does HP have to say about it?

””

”We thank Desi, and the people who have seen and commented on his video, for bringing this subject to ourattention,” it said in a blog on its help page.

”The technology we use is built on standard algorithms that measure the difference in intensity of contrastbetween the eyes and the upper cheek and nose. We believe that the camera might have difficulty ’seeing’contrast in conditions where there is insufficient foreground lighting,” the blog added.

””

4. So what would have happened is like this !!!!!HP would have conducted all QC tests in their labs whichin all probablity would have involved only the whites......HP by now mut have enrolled few Blacks for betterQC of their products in their labs......well that was just in good humour....

135

Page 136: Blogger to E-Book

5. To errrrrr is human.....and to IT errrrr is HP.

DUAL SCREEN LAPTOP : Another attempt by (2010-01-08 07:25)

Charge cell phones by using Radio-Waves (2010-01-10 10:44)

1. Here comes another first from NOKIA...no more charging from your mobile chargers...no more that lastminute search to find that hidden mobile charger....now charge from a mixture of 78.03 % nitrogen, 20.99 %oxygen, 0.94 % argon, 0.03 % carbon dioxide, 0.01 % hydrogen, 0.00123 % Neon, 0.0004 % helium, 0.00005% krypton, 0.000006 % xenon or more simply AIR!!!!!!

2. Nokia says that in a few years time, they will be able to charge cell phones by utilizing close radio waves.This conniving and shaking up technology could lead to brobdingnagian reductions in energy demand ifevery cell phone could pull a charge of juice out of thin air.

3. Researchers at the Nokia Research Centre in Cambridge in the UK are working hard on a technology thatcan harvest small amounts of energy from ambient radio and TV waves. The cell phone would pick up radiowave frequencies as low as 500 megahertz up to 10 gigahertz, which includes television broadcasts, microwaveovens, mobile phones, wireless LAN, bluetooth, GPS, and two-way radios. In theory, two circuits would becapable of receiving and then converting the free energy to an electrical current to charge the battery of acell phone.

4. Hopefully, it would be enough energy to keep the phone charged in standby mode; although at first itwon’t be adequate to charge the phone while in use, or to full battery capacity. So far, the device can collectup to 5 milliwatts of power, and the short term goal is to collect 20 milliwatts of power, which is just enoughto keep the phone charged in standby mode. Ultimately, 50 milliwatts of power would be ideal and couldhelp slowly recharge the battery.

5. This technology could be applied to other electronic equipment as well. Radio waves could be used tocharge MP3 players, handheld devices, Kindles, portable game players, etc. Nokia isn’t relying on this type oftechnology alone to power their phones, they are also looking at integrated solar cells to work in conjunctionwith this new development. Deployment of this feature in Nokia phones is still at least 3 years away. We’llbe standing by with our waning cell phones waiting for word.

6. Thanks http://technochest.com

136

Page 137: Blogger to E-Book

When EARS Speak!!! (2010-01-11 19:25)

1. Do you any of the following :

(a) That your ears make sound?

(b) That these are know as [1]otoacoustic emissions?

(c) That this has a biometric angle?

(d) That any two persons always have different [2]otoacoustic emissions?

2. I am sure most of you don’t because the exploitation of this fact has been recently discovered.Although ithas been known from quite some time, that our ear makes sounds of its own, sometimes due to a scientificprinciple called otoacoustic emissions1, other times in protest to the loud music we listen to. In either case,the sounds are too weak to detect using normal microphones.Although scientists knew about these soundssince the 1940s, it was only with improvements in [3]microphone technology in the 1970s, that it becamepossible to detect these [4]otoacoustic emissions (OAE).

3. Recently though it has been suggested that such sounds may in-fact be used for biometric security devicesof tomorrow. The variations in each person’s OAE can be used as a metric for determining one’s identity.The technology is as simple as a microphone!

4. A good enough microphone embedded in any device can be used to detect these sounds, and accordinglyconfirm ones identity, and be eventually used by banks to confirm the identity of a person over the phone,or by the phones themselves before they allow someone to make a call!

5. So for example,as on date when u speak to a customer service at a bank...u r supposed to tell youDOB,Phone number or street address for verification before you actually demand a solution to your accountquery...not so will be required in near future...wherein your phone set will be able to detecty the sound inyour ear and verify your identity...nothing to memorise....plain simple unique identification.

6. Otoacoustic emissions can be clinically important as they are the basis of a simple, non-invasive, test forhearing defects in newborn babies and in children who are too young to cooperate in conventional hearingtests.

7. The good thing is that dead people do not emanate otoacoustic emissions.So unlike Hollywoodmovies...wherein a cut thumb or extracted eye have broken the identity procedures...this one won’t....

1. http://en.wikipedia.org/wiki/Otoacoustic_emission

2. http://en.wikipedia.org/wiki/Otoacoustic_emission

3. http://en.wikipedia.org/wiki/Microphone

4. http://en.wikipedia.org/wiki/Otoacoustic_emission

The ALT key Combos (2010-01-13 07:22)

Nothing new for those who are conversant with the special characters used in combination with the ALTkey.Following is a small summary i could manage from technochest...for those of you who do not understandthe use of such characters......they are of crucial signia in the world of PASSWORDS......got that!!!!!!

Alt +0162 = ¢ , Alt +0163 = £ , Alt +0165 = ¥ , Alt + 0128 = ¬

Alt +0169 = © , Alt +0174= ® , Alt + 0153 = ™ , Alt + 0161 = ¡

Alt +0177 = ± , Alt +0191 = ¿ , Alt +0215 = × , Alt + 0247 = ÷

Alt +0190 = ¾ , Alt +145 = æ , Alt + 155 = ¢ , Alt + 156 = £

137

Page 138: Blogger to E-Book

Alt + 157 = ¥ , Alt +159 = ƒ , Alt + 171 = ½ , Alt + 172 = ¼Alt + 225 = ß , Alt + 230 = µ , Alt + 241 = ± , Alt + 0134 = †

CHINA & GOOGLE (2010-01-16 07:55)

1. The long tug of war between these two respective giants is finally coming to an end...and the end meansthe end of GOOGLING in china.The fact that any person can choose to access anything at any time, andusually at no cost is too uncomfortable an idea for the Chinese thinking tank and they have been busyimplementing moves and measures to constrain people’s access to the internet for about last two years thati have read across in various articles and snips.

2. I can see the smile on the Bing’s face now....no Googling means more chance of a Bingingand likely revival of few earlier search engines...remember AltaVista generation about 10 years back.

3. Now China’s logic behind this!!!!!we allknow when we google what happens...i had given on post at [1]http://anupriti.blogspot.com/2009/12/goo-gle-binged-my-100th-p ost.html .This reason is valid though.Extract produced from Google’s blog at[2]http://googleblog.blogspot.com/2010/01/new-approach-to-china. html is reproduced below : Like manyother well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December,we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from Chinathat resulted in the theft of intellectual property from Google. However, it soon became clear that what at firstappeared to be solely a security incident–albeit a significant one–was something quite different.First, this attack was not just on Google. As part of our investigation we have discovered that at least twentyother large companies from a wide range of businesses–including the Internet, finance, technology, media andchemical sectors–have been similarly targeted. We are currently in the process of notifying those companies,and we are also working with the relevant U.S. authorities.Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accountsof Chinese human rights activists. Based on our investigation to date we believe their attack did not achievethat objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to accountinformation (such as the date the account was created) and subject line, rather than the content of emailsthemselves.Third, as part of this investigation but independent of the attack on Google, we have discovered that theaccounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights inChina appear to have been routinely accessed by third parties. These accounts have not been accessed throughany security breach at Google, but most likely via phishing scams or malware placed on the users’ computers.4. Who’s is correct then? It is just a matter of perspective and convenience of the mind.

1. http://anupriti.blogspot.com/2009/12/google-binged-my-100th-post.html

2. http://googleblog.blogspot.com/2010/01/new-approach-to-china.html

138

Page 139: Blogger to E-Book

Microsoft choose to stay in China: Why not? (2010-01-17 07:06)

1. Just a day after I mentioned that Bing will be seen smiling on Google’s exit from the dragon land, Microsofthave released a official statement on this. Brief Extract from [1]http://infotech.indiatimes.com/News-Inte-rnet-We will stay in China Microsoft/articleshow/5448256.cms reproduced below :

Microsoft Corp has no plans to pull out of China, its chief executive has said, playing down concerns aboutrecent cyber attacks and censorship raised by rival Google Inc.The company’s stance indicates the world’s largest software maker is not likely to support its fierce rival inits battle with China and rebuffs broad US political backing for Google.”There are attacks every day. I don’t think there was anything unusual, so I don’t understand,” MicrosoftCEO Steve Ballmer told Reuters after a meeting on modernizing government services at the White House.”We’re attacked every day from all parts of the world and I think everybody else is too. We didn’t see anythingout of the ordinary.”

1. http://infotech.indiatimes.com/News-Internet-We_will_stay_in_China_Microsoft/articleshow/5448256.cms

SHARING DESKTOPS REMOTELY (2010-01-17 07:43)

1. Of the many tools that exists today for desktop sharing including standard Windows Remote DesktopConnection...i recently found one which is relatively very easy...the name is TEAMVIEWER.A very light soft-ware about 2.56 Mb only,easy to install,no complex configurations,no IP setup problems,easy interface.....justlogin like you log in a regular e-mail id account with a password.

2. I recently used it for trial with my friend across the another part of the continent.The result was quickand very smooth.

3. The same is available for download at [1]http://www.teamviewer.com/index.aspx .There is a paid versiontoo with more features....but for general viewing and sharing,the unpaid will work fully to your requirements.

1. http://www.teamviewer.com/index.aspx

139

Page 140: Blogger to E-Book

Harjot Singh Pelia (2010-01-25 11:33:25)dear anupam,hi a few queries:-1. privacy issues2. what all is shared by default3. responsiveness4. how is traffic routed5. copyright issues if anypl cc copy of the reply to my mail id also

ZUNE 120 GB (2010-01-18 21:44)

1. For those of you who are hearing this name for the first time,lemme tell you what it is in brief? ZUNE isa Microsoft entertainment platform and [1]portable media player on the lines of Ipod by Apple on a largerscale in terms of screen, capacity, features. etc. Of the various models of Zune, ZUNE120 measures 4.3inches high by 2.4 inches wide. I will give some brief on this since i got this one recently.

Features

2. Main menu has the following scroll down as shown in screen shot from my ZUNE.

- Music

- Videos

- Pictures

- Social

- Radio

140

Page 141: Blogger to E-Book

- Market Place

- Games

- Settings

3. Further brief on few of these of interest are enumerated below

Market Place allows browsing, previewing & downloading music directly from Microsoft’s Zune Marketplaceonline store. Marketplace submenu further allows choosing between browsing Songs, Albums, and NewReleases, or search for specific music by keying in a few letters. Songs can be previewed for 30 secondswith the option to add them to your virtual cart or purchase and download immediately. By signing upfor Microsoft’s Zune Pass music-subscription service (a free 14-day trial is available).....still to be availed byme.....

ZUNE is WiFi enabled and allows keying in the passwords if required vide Zunepad.

Radio : An interesting part of my first few days of interaction with ZUNE was non running of FM stationstill the time I got link to this thread ie [2]http://vasudevg.blogspot.com/2007/12/zune-fm-radio-tip.htmlthat involved simply changing country from preset US to Europe

Video format : The only problem that I faced was that the horde of movies that I possess do not run directlyon this.One needs to convert them to zune/ipod format with easy to use Windows Media Encoder....timeconsuming but worth it when we play it here on the ZUNE......I converted Sivaji Rajinikanth(...my fav)with a third party software Cucusoft...but was labelled with trial version watermark throughou(screen shotdown)....rest was quiet ok....then converted with windows media encoder...and worked perfectly fine....gr8output in video and sound....

Ports : Only two including one to ear phone and the other to USB for interface with PC for sync andcharging battery.

Capacity : 120 GB...thats awesome for storage!!!!!

141

Page 142: Blogger to E-Book

4. Any one across with any difficulty or query on Zune player can just leave his/her problem....will get backasap.......thats a promise for while.....

1. http://en.wikipedia.org/wiki/Portable_media_player

2. http://vasudevg.blogspot.com/2007/12/zune-fm-radio-tip.html

Anonymous (2011-01-04 16:32:33)thanks

Google vs Bing : On Data retention policy change (2010-01-19 21:44)

1. Ever wondered about privacy policy of search engines specifically about [1]Google and [2]Bing...i came toknow of this recently while i read at [3]http://www.bing.com/community/blogs/search/archive/2010/01/19/updates-to-bing-privacy.aspx on the subject.

2. In case of [4]Bing,the amount of time IP addresses are stored from searchers is 18 months which the claimnow to reduce to 6 months. Generally, when Bing receives search data ,the following things undergo action

First, steps to separate the account information (such as email or phone number) from other information(what the query was, for example).

Secondly , after 18 months another additional step of deleting the [5]IP address and any other cross sessionIDs associated with the query.

142

Page 143: Blogger to E-Book

3. Under the new policy, all the steps will continue as were applied previously except that now [6]IP addresswill be completely removed at 6 months, instead of 18 months. Rival Google had cut retention time to 9months from 18 in August 2008.Notwithstanding, Microsoft executives arrogates their initiative go muchfurther than Google , because Microsoft intends deleting all parts of the IP (Internet Protocol) address aftersix months, while Google still retains part of the address after its self-imposed nine-month cut-off point.

4. Thanks [7]http://microsoftontheissues.com

1. http://www.google.co.in/

2. http://www.bing.com/

3. http://www.bing.com/community/blogs/search/archive/2010/01/19/updates-to-bing-privacy.aspx

4. http://www.bing.com/

5. http://en.wikipedia.org/wiki/IP_address

6. http://en.wikipedia.org/wiki/IP_address

7. http://microsoftontheissues.com/

ROOT WEB DIRECTORY VERIFICATION (2010-01-29 07:56)

http://anupriti.blogspot.com/anupriti.blogspot.comd31050ebd4c35e4bfe f7968f2083013109fa7941.htm

Gina (2010-01-30 06:35:32)Hi.I’m trying to add a stuf like this to my root web diretoryCould you help me whit this ? Is for Mcafee site advisor to verify my site.I can’t figure it out...thanks

ANUPAM (2010-01-30 07:45:35)hi gina...m working on it...likely it is that we have to insert this in the HTML edit tab of the settings section...willconfirm asap...thanks

143

Page 144: Blogger to E-Book

Gina (2010-01-31 20:12:07)hiI’ve try it too, it’s not working in HTML...you have to put in in ”root web directory”But metatab from google may be inserted, and it’s working

ANUPAM (2010-01-31 21:09:34)hi gina,how do we insert metatab from google?please guide!

Gina (2010-02-02 21:44:57)This post has been removed by the author.

Gina (2010-02-02 23:51:54)http://blogging.nitecruzr.net/2008/09/verifying-ownership-of-your-si te-to.htmlsorry for the post before :)now hope it helps :)

3.2 February

IP Spoofing : Legal Acceptance in India? (2010-02-01 07:47)

1. I have been reading about this term for many years,have known about what it is through various sites,readabout types of IP spoofing incl [1]Blind Spoofing,[2]Non blind spoofing etc.One question that started metrying reach out details of this term was ”WHY IS IT AVAILABLE?”What is the aim intended in spoofingan IP?Is it solely MALICIOUS?

2. Indian IT Act 2000 followed by amendments ie IIA 2006,IIA 2008 have not mentioned any thing onthis surprisingly!!Is it legal to use this for any reason?Recently I tried one third party software for thisto check out effectivity of this.As per the option available in this software I configured this to chang-ing IP address every 8 minutes.Then after it started I checked out my IP address from 4 sites including[3]whatismyip.com,[4]whatismyipadress.com etc.And yes!!! one minute I was shown in USA and the otherminute I was in Netherland followed by Russia,China etc.If a script kid like me can do this what can aprofessional person intended with malicious intention can do.

3. Remember the Mumbai Blast episode wherein the email sent to the police were tracked only with thehelp of IP address.God forbid,he knew of such tricks what would have we tracked out?

4. I will request any reader to just add his views or enlighten me on this!!

1. http://www.javvin.com/networksecurity/BlindSpoofingAttack.html

2. http://www.linuxsecurity.com/content/view/120225/

3. http://www.whatismyip.com/

4. http://whatismyipaddress.com/

144

Page 145: Blogger to E-Book

CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!! (2010-02-03 22:55)

[1]

1. The earlier mention on [2]IP Spoofing and the pleothra of options and techniques available for at-tack,hack,sniff,crashing a network etc are well known for not reaching out to the origin of the person or hackerwith the malaecious intention. [3]DARPA (...please google or bing if u wish to know more on [4]DARPA)hasfinally come out with the ‘Cyber Genome Program’ which will allow any digital artifact either in form of adocument, or a piece of malware - to be poked into its very origins.

2. In in principle, it appears that almost any data fished from a relevant network, a computer, a pen drive,someone’s phone or whatever is to be studied much as like a human genetic material. The code or document’srelationships with other ”digital artifacts” will be revealed, perhaps its origins, and other info of interest to aPentagon admin defending military networks or a military/spook investigator tracing online adversaries.Inother words, any code you write, perhaps even any document you create, might one day be traceable backto you - just as your DNA could be if found at a crime scene, and just as it used to be possible to identifyradio operators even on encrypted channels by the distinctive ”fist” with which they operated their Morsekeys. Or something like that, anyway.

3. The concept is a cyber-equivalent of human finger-prints or DNA. The project will thus seek to developa digital genotype as well as any inferred or observed phenotype in order to determine the identity of suchdigital artifacts and thus the users who left them behind.

4. DARPA is now looking for technologists to develop and use the cyber-equivalent of DNA to targetthe people behind cyber attacks. They are looking for geniuses in the fields of Cyber Genetics, [5]CyberAnthropology and Sociology and [6]Cyber Physiology who can jointly work out the practical solutions tothis project.The research involves creating lineage tree for digital artifacts, gaining better understanding ofsoftware evolution, and automatic analysis of social relationships between users and malware. Each of theseresearches will jointly develop the cyber equivalent of fingerprints or DNA.DARPA believes that this canidentify the best-of-the-best hackers.

5. Thanks [7]http://www.theregister.co.uk

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/S2myLdPUuqI/AAAAAAAAAm8/lXWb5wHp8SU/s1600-h/darpa_50th_logo.jpg

2. http://anupriti.blogspot.com/2010/02/ip-spoofing-legal-acceptance-in-india.html

3. http://www.darpa.mil/

4. http://www.darpa.mil/

5. http://en.wikipedia.org/wiki/Anthropology_of_cyberspace

6. http://www.cyberphysiology.com/

7. http://www.theregister.co.uk/

145

Page 146: Blogger to E-Book

Who’s Who? : Terminology world of Portable Computers (2010-02-05 17:25)

1. The have been a pleothra of terms related to small portable computers in form of [1]Laptop, Leaptop,Netbook, Notebook, Smartbook, Tablet,UMPC, Air Book etc all of which represent the segment that massof the people call or refer to just as Lap Top’s.But there exists a difference between all of these.....I havetried to extract out the thin line difference that exists between these all terms : - [2]Laptop : MainPurpose : Device that serves either as a desktop replacement or a portable gaming rig. Characteristics :Large screen,full QWERTY Keyboard. - [3]Net Book : Main Purpose : Device which is small and lightweight device meant basically for internet and the cloud for the people on the move. Characteristics : SmallSize,Light Weight,Long Battery Life. - Notebook : Main purpose : Used basically for documents andpresentations. Characteristics : Sleek and Lightweight,large screen - Smart Book : Main purpose : Hybridbetween smart phone and notebook with range of connectivity options. Characteristics : Long batterylife,Light weight. - Tablet : Main Purpose : Is like a digital slate with a full touc hscreen surface and nokeyboard. Characteristics : Basically a large touchscreen - UMPC : Main purpose : Stands for Ultra MobilePC,a tablet with a sliding keyboard. Characteristic : Low processing power. - Air Book : Main purpose: Macintosh [4]AirBook by Apple which is positioned as the ultraportable in Apple’s MacBook Family andwas introduced at the Macworld Conference & Expo on January 15, 2008. Characteristic : 13.3-inch glossyLED backlight TFT LCD widescreen display, 1280 x 800 pixel resolution and integrated nVidia GeForce9400M graphics processor with 256 MB of DDR3 SDRAM shared with main memory - Leap Top : Just alaptop branded by[5] HCL India it has trademarks for the term leaptop. 2. I actually got confused in thesethin boundary differences...but thats the way it is in the market of brands. 3. Thanks [6]DIGIT and Wiki.

1. http://en.wikipedia.org/wiki/Laptop

2. http://en.wikipedia.org/wiki/Laptop

3. http://en.wikipedia.org/wiki/Netbook

4. http://en.wikipedia.org/wiki/MacBook_Air

5. http://www.hcl.in/

6. http://www.thinkdigit.com/

TRACE INDIA (2010-02-07 19:44)

1. I came across this relatively good Data Base site in which someone has attempted to ensure most of theimportant things are traced to an area if not the street address.For eg when u enter a mobile number in thesearch query,u will get to know the city and the state from which the number belongs to or like pincodesof India are traceable to exact area identification or even vehicle numbers are traceable to the city....niceattempt but still looking for more in depth query geneartion...i m sure they are working on it...meanwhileenjoy what they offer now.Few links are given below :

MOBILE NUMBER LOOK UP at [1]http://www.indiatrace.com/trace-mobile-number-location/trace-mobile-number.php

VEHICLE NUMBER LOOK UP at [2]http://www.indiatrace.com/trace-vehicle-location/trace-vehicle-number.php

PINCODE LOOK UP at [3]http://www.indiatrace.com/trace-pin-code/trace-pin-code.php

STD/AREA CODE at [4]http://www.indiatrace.com/trace-std-code /trace-std-area-code.php

IP ADDRESS LOCATION at [5]http://www.indiatrace.com/trace-ip-address/trace-ip-number.ph p

146

Page 147: Blogger to E-Book

REVERSE DNS LOOKUP at [6]http://www.indiatrace.com/trace-reverse-dns/trace-reverse-dns .php

Even TRACES PEOPLE at [7]http://www.indiatrace.com/trace-people/trace-people.php

2. Thanks [8]http://www.indiatrace.com/index.php

1. http://www.indiatrace.com/trace-mobile-number-location/trace-mobile-number.php

2. http://www.indiatrace.com/trace-vehicle-location/trace-vehicle-number.php

3. http://www.indiatrace.com/trace-pin-code/trace-pin-code.php

4. http://www.indiatrace.com/trace-std-code/trace-std-area-code.php

5. http://www.indiatrace.com/trace-ip-address/trace-ip-number.php

6. http://www.indiatrace.com/trace-reverse-dns/trace-reverse-dns.php

7. http://www.indiatrace.com/trace-people/trace-people.php

8. http://www.indiatrace.com/index.php

NVIDIA : Optimus technology (2010-02-13 07:40)

1. nVidia has come up with the OPTIMUS TECHNOLOGY for the mobile PCs ie Laptops, Notebooks etc.This technology selects and switches the graphics processor for an application, depending upon the type ofapplication. It automatically swops between an integrated graphics and the discrete graphic card based uponwhether the application running needs a brawny 3D chip, or not. This helps the device in offering improvedperformance in applications when required, while saving on battery by reducing power drain in applicationsthat can do without 3D support.

2. Notebooks with nVidia technology as on date include Asus UL50Vf, N61Jv, N71Jv notebooks.

3. Thanks [1]http://www.thinkdigit.com/

1. http://www.thinkdigit.com/

WEB 2.0 SUICIDE MACHINE (2010-02-15 07:46)

1. An unheard term till now....WEB SUICIDE...what does it connote?

[1]

2. We all r slowly becoming addicted to internet for some use or the other... 85 % of internet surfingbeing used for social networking..can u believe that!!!a number of identities on various social network-ing sites..[2]orkut..[3]facebook..[4]twitter ,[5]myspace,[6]linkedin and the list is getting endless....and mostof us are getting into habit of remaining online 24 hours...checking e-mails every 10-15 minutes or evenless..frequently scraping to all friends....uploading pics on sites....and some one has realized that by doing sowe all are missing on real people....parents,kids,wife and neighbours etc etc...thus has originated the conceptof [7]WEB SUICIDE......simply register with this site and u will kill,remove traces of each and every footprintu ever had on these sites....the name of the site is [8]http://www.suicidemachine.org/

3. Extract from site ”Liberate your newbie friends with a Web2.0 suicide! This machine lets you delete allyour energy sucking social-networking profiles, kill your fake virtual friends, and completely do away with

147

Page 148: Blogger to E-Book

your Web2.0 alterego. The machine is just a metaphor for the website which moddr is hosting; the bellyof the beast where the web2.0 suicide scripts are maintained. Our service currently runs with Facebook,Myspace, Twitter and LinkedIn! Commit NOW!” 4. Well to some extent the intent is correct that we rslowly loosing on realizing the importance of physical world,but removing urselg from web.....hmmm!!!!!i mstill a long way...how abt you?

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/S3izPmcaUSI/AAAAAAAAAnM/Rmtj4dyRQuU/s1600-h/Capture.JPG

2. http://www.orkut.com/

3. http://www.facebook.com/

4. http://www.twitter.com/

5. http://www.myspace.com/

6. http://www.linkedin.com/

7. http://www.suicidemachine.org/

8. http://www.suicidemachine.org/

Steganography : Hide in a JPEG/BMP (2010-02-16 21:15)

1. [1]Steganography is the art and science of writing hidden messages in such a way that no one,apart fromthe sender and intended recipient, suspects the existence of the message, a form of security through obscuritywhile [2]Cryptography is the practice and study of hiding information.

2. The advantage of [3]steganography, over [4]cryptography alone, is that messages do not attract attentionto themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion,therefore,whereas cryptography protects the contents of a message,steganography can be said to protect both messagesand communicating parties. 3. Just for how it works..i tried one free [5]Steganography software ”InvisibleSecrets” that allows one to encrypt and hide files in other files (carriers) which are not suspect of encryption(JPG, PNG, BMP).The link I downloaded from can be accessed by clicking [6]here. 4. Now this is a small1.8 MB software good enough to do the job.The file u see below of golden temple is just not a jpeg,it consistsof a text file with a message...the password to access the text file is 12 34....for those of u who r interested to

experiment 5. The scope of utility involvesprovisioning solutions to the following queries of any user across : (a) Are you afraid that someone elsecan see your sensitive and secret data stored on your computer ? (b) Are you afraid that hackers or otherpeople can penetrate your system and find your valuable information ? (c) Your wife, boss and kids can

148

Page 149: Blogger to E-Book

see what you used the internet for? (d) You have many passwords in your mind or spread all over yourcomputer and you can’t organize them? (e) You want to send a secure email to your friend or partner andyou want nobody to read or to access it? (f) You want to password protect certain applications to be usedonly by you? Do you want them not to be visible in the Start Menu, but still have quick access to them?(g) You want to delete an email or a file but you think someone else can restore it and use it against you ?(h) You want to combine file encryption with steganography (hide files and folders) to better protect yourdocuments and emails? (j) You want to hide files on your computer so that nobody finds them? 6. Thanks[7]http://www.invisiblesecrets.com

1. http://en.wikipedia.org/wiki/Steganography

2. http://en.wikipedia.org/wiki/Cryptography

3. http://en.wikipedia.org/wiki/Steganography

4. http://en.wikipedia.org/wiki/Cryptography

5. http://en.wikipedia.org/wiki/Steganography

6. http://www.invisiblesecrets.com/ver2/index.html

7. http://www.invisiblesecrets.com/ver2/index.html

How to avoid an infected USB/PEN Drive? (2010-02-17 07:52)

1. The most common way for a virus to infect a healthy PC is through USB/Flash drives. Common [1]virusessuch as ’Ravmon’ , ’New Folder.exe’, etc spread through [2]USB/flash drives . Invariably, anti virus programsare unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantineit. Following are a step by step easy to do instruction

(a) A window appears similar to the one shown below…

(b) Don’t click on Ok , just choose ’Cancel’.

149

Page 150: Blogger to E-Book

(c) Open the Command Prompt by typing ’cmd’ in the run box.

(d) In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.

(e) This will display a list of the files in the Flash drive or Hardisk. Check whether the following files arethere or not

(i) Autorun.inf

(ii) Ravmon.exe

(iii) New Folder.exe

(iv) svchost.exe

(v) Heap41a

(vi) or any other .exe which may be suspicious.

(f) If any of the above files are there, then probably the USB drive is infected.

(g) In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only,Archive, System and hidden file attribute from all the files.

(h) Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the filesthat are suspicious. To be on a safer side, just scan the USB drive with a latest anti-virus program like[3]McAfee or TrendMicro’s PCCillin to check whether it is free of virus or not. Now remove the drive andplug it again. In most of the cases, the real culprit turns out to be the ”Autorun.inf” file which mostly getsexecuted when someone clicks Ok in the dialog window which appears above. Thus the infections invariablyspreads...but not if u take these precautions as mentioned above.

2. Thanks [4]http://www.howtodothings.com

1. http://en.wikipedia.org/wiki/Virus

2. http://en.wikipedia.org/wiki/USB_flash_drive

3. http://home.mcafee.com/

4. http://www.howtodothings.com/

SVCHOST.EXE vs SCVHOST.EXE (2010-02-18 21:51)

1. Two approximately similar names but with poles apart function and reason to exist.If ever you have triedcleaning or accessing an infected pen drive you must have come across these names in the file names list.Iwould just try and make the difference clear in brief below.

2. SCVHOST.EXE is a process which is registered as W32/Agobot-S [1]virus. This [2]Trojanallows attackers to access your computer from remote locations, stealing passwords, Internetbanking and personal data. This process is a security risk and should be removed from yoursystem.

3. [3]SVCHOST.EXE is located in the System32 folder and is an built-in part of Windows OS. It cannot bestopped or restarted manually. This process manages 32-bit DLLs and other services. At startup, Svchost.exechecks the services portion of the registry and constructs a list of services that it needs to load. Under normalconditions, multiple instances of Svchost.exe will be running simultaneously. Each Svchost.exe session cancontain a grouping of services, so that many services can be run depending on how and where Svchost.exe isstarted. This allows for better control and debugging.

4. I hope this amply makes the difference clear

150

Page 151: Blogger to E-Book

1. http://en.wikipedia.org/wiki/Computer_virus

2. http://en.wikipedia.org/wiki/Trojan_horse_(computing)

3. http://support.microsoft.com/kb/314056

Intel® Core™ i3 Processor & Server 2003 (2010-02-23 07:36)

1. Strange are the ways sometimes when we get troubled by the PC.In an attempt to upgrade one of thePCs to [1]Intel® Core™ i3 Processo[2]r,I found a problem I never thought of. 2. Now just to give u a smallbrief,I have a small office complex with about 15 computers on [3]Server 2003 which was running fine till oneday when i just decided to upgrade my server machine to [4]Intel® Core™ i3 Processor.I bought the combopack of this processor with its motherboard for about 11k,i assembled it and started with the setup of server2003.....started nicely but this would never install completly in my ’N’ number of attempts and would hanghalfways.....then i thought like Murphy is acting fine with me and their is some problem with the processormotherboard hardware...so replaced the same pack with a new one..but the problem persisted....i contactedthe local dealer,surprised with the problem he himself attempted the same but met with the same end.....3. I changed my installation CDs ,still met with the same problem...finally I could arrive that there may besome compatibility issue between [5]server 2003 & Intel® Core™ i3 Processor.........and reverted back to core2 duo,the earlier one. 4. I would request readers to augment their comments, if any, with such a problembeing faced anywhere else.

1. http://www.intel.com/Consumer/Products/Processors/corei3.htm

2. http://www.intel.com/Consumer/Products/Processors/corei3.htm

3. http://www.microsoft.com/windowsserver2003/default.mspx

4. http://www.intel.com/Consumer/Products/Processors/corei3.htm

5. http://www.microsoft.com/windowsserver2003/default.mspx

Claudia Lawrence (2010-03-06 02:24:10)Hi, ur blog is really nice & informative, while reading it I truly like it. I just wanna suggest that u should submityour blog in this [1]website which is offering very unique features at cheap prices there are expert advertising teamwho will not only provide the adspace but also promote ur blog & affiliate ads through all over the networks whichwill definitely boost ur traffic & readers. Finally I have bookmarked ur blog & also shared to my friends. hope u havea wonderful day & !!happy blogging!!.

1. http://www.blogerzoom.com/

Agha (2011-05-04 11:28:37)use 2003 32 bit server with Service Pack, it will solve ur problem. Thanks

kamal kant (2011-05-07 13:55:36)HII have hp laptop pailion g6 with core i5 processor 4gb of ram.When i install window server 2003 standard 64bit itgives me error in blue screen 0x0000007b like this.can i install window 2003.please replyThanks in advance.

ANUPAM (2011-05-13 23:26:57)@KAMAL perhaps the lone solution is uptodate patch of server 2003,the one generally floating in the market is notupdated with the SP3.....i had this similar problem...could be solved only after i updated it with the latest SP....asrecommended by AGHA.....

151

Page 152: Blogger to E-Book

3.3 March

The Journey from MB to GB : Pen Drives (2010-03-05 22:53)

1. I bought my first pen drive in the year 2004 at a price of Rs 42oo/- and the capacity was a whoooping 256MB....yeah that was so high those days.....today i came across a link to Kingston that has recently launchedthe world’s first 256GB Pen drive.The new pen drive is DataTraveller 300 USB Flash Drive.

[1]

2. I know the next thing that comes to mind is what about the cost?......the cost is just Rs 48000/-(i heardthis is approx).

3. Thanks [2]http://www.newtechnology.co.in

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/S5JfSmvs1tI/AAAAAAAAAnk/mT2r77w4KlI/s1600-h/datatraveller-300.jpg

2. http://www.newtechnology.co.in/

Search Web by FACE recognition - Work is ON!!!: ONE ALBUM (2010-03-07 21:06)

1. [1]Microsoft Israel Innovation Labs is currently working on ONEALBUM ,a project under development,that uses face-recognition technology to search for photos

2. ”OneAlbum” scans faces that regularly appear in a user’s OneAlbum photo collection, then searches hissocial networks ([2]Facebook,[3]Orkut, Windows Live and others) for more photos of these people. It thenautomatically finds relevant photos in other albums on the Internet and brings them to the user’s album,and shows them side-by-side with his photos. Not only facial recognition, but OneAlbum also involvesevent-matching technology by analysing the people, dates, colours, and textures in a set of photos and willrecognise these photos as being taken in on the same event.

3. Little confusing in the first reading.....what I understood is like one will be able to find a same personsphoto when u bing(.. google)....so u put ur photo in the search bar and press enter...there u r......u see allcontent results of same person.....difficult to believe but....will be available soon in coming years!!!!

4. Thanks [4]http://www.liveside.net

1. http://www.microsoft.com/israel/rnd/products/innovation_labs.html

2. file://localhost/mnt/ext/blogbooker/tmp/tzw310kp/www.facebook.com

3. http://www.orkut.com/

4. http://www.liveside.net/

152

Page 153: Blogger to E-Book

OS CARD : For now just an idea sirjeeeeeeee!!! (2010-03-11 22:19)

1. Recently I came across this interesting idea article which introduced me to the [1]OS Card.....yess...theoperating system card....read on for some interesting info

(a) The ”OS Card” would be inbuilt with a independant [2]operating system that is installed or flashed ontoa PCI-E card for computers.

(b) Complete operating system such as Windows/[3]solaris/ubuntu etc would come preloaded one of thesecards. Instead of booting and running your OS from your local hard drive, it would run most of the OS fromthe PCI-E card.

(c) The card would be read only, protecting vital system files from malware such as trojans or viruses. Asmall number of system files that would require read and write functions would be copied to your local harddrive where they could be modified and read by the card.

2. What would this do? For amateurs it would make installing an operating system much easier. Instead ofhaving to deal with CDs, DVDs and serial numbers a person would simply buy the card and put it in theircomputer.

3. The best thing to be curbed is that this would be able to put a serious incision in piracy of operatingsystems. Furthermore, it would free up a considerable amount of space on your hard drive.

4. The OS Card could come with it’s own independent CPU and Memory (RAM), which would completelyremove the need for an operating system’s system requirements. This would most likely speed up all otherprocesses and events being run on the computer now that system processes are now no longer hogging PCresources.As on date some info on related product at [4]http://www.gi-de.com

5. What an idea sirjeeeeeeee@ [5]http://www.creativitypool.com

1. http://en.wikipedia.org/wiki/Operating_system

2. http://en.wikipedia.org/wiki/Operating_system

3. http://www.oracle.com/solaris/index.html

4. http://www.gi-de.com/portal/page?_pageid=42,103236&_dad=portal&_schema=PORTAL

5. http://www.creativitypool.com/

LIQUID COOLING IS IN - FOR CPUs & GPUs (2010-03-15 08:09)

1. I heard about water cooling concept in servers specific to data centers some years back.With induction ofi3 and continuing high end series, water cooling kits are no more visualization and futuristic components ofenthusiast and fancier machines. Now water cooling is all set to reach your desktops.Thus with the executionlevels of the core components increasing, keeping the heat levels under control has no more remained as achallenge. 2. The Aquagate Max is the first Enthusiast System Architecture (ESA) simpatico liquid coolingkit which allows some amazing features . With multicontrol connected sensors located all around inside thecase the architecturte design eliminates the need to manually check that it works properly.Together with theCooler Master Cosmos ESA case it allows the advantage of being able to mount the liquid cooling kit insidethe system case with no external parts. More from figure below

153

Page 154: Blogger to E-Book

[1]

[2]

[3]

3. Thanks [4]http://www.coolermaster.com

1. http://4.bp.blogspot.com/_z1QH8I3k9vk/S583k4Yb1BI/AAAAAAAAAos/liqaIJAlt1s/s1600-h/3.jpg

2. http://1.bp.blogspot.com/_z1QH8I3k9vk/S583e8IQjwI/AAAAAAAAAok/6AkaAh0PIiY/s1600-h/2.jpg

3. http://1.bp.blogspot.com/_z1QH8I3k9vk/S583WP-TdzI/AAAAAAAAAoc/L6OFgxSky74/s1600-h/1.jpg

4. http://www.coolermaster.com/

154

Page 155: Blogger to E-Book

Secure ur Wireless media (2010-03-17 22:04)

Secure ur WiFi (2010-03-18 07:47)

[1]

1. http://2.bp.blogspot.com/_z1QH8I3k9vk/S6GNXxkf4II/AAAAAAAAApM/Sm3r52fXXN8/s1600-h/Picture1.jpg

GOOGLE finally is OFF from China (2010-03-24 08:40)

1. In my earlier post at [1]this,[2]this and [3]this,the subject matter was under decision making....finally theresult is out....Monday night, the cyberspace gargantuan shut its Chinese site and repositioned its searchengine services to unexpurgated Hong Kong after two months of confrontation with Beijing over censorshipand alleged hacking attacks.

155

Page 156: Blogger to E-Book

[4]

2. The decision has its set of PROs & CONs....this will allow opportunity for others to make an attemptto compete with google which has largely overshadowed the cyber space to a large extent with discussionslike one discussed for [5]Data retention policy between Google and Bing.This is going to make China lesserdependent on Google for a large number of things which unknowingly we all have become used to.This willdisallow google to retain data as per their existing policies from the complete area of CHINA unlike otherswho are happily allowing them to retain all data and surfing habits.....now for the CONs....Chinese will notbe able to search with the precision they used to(...although will be a temporary phase...they may come upwith something better....)...is that the only CON??????I feel it is worth it!!!!!!!!!

3. Indian Sarkaaar....pls let your IT IQ refresh........thanks [6]http://images.smh.com.au and[7]http://www.hindustantimes.com

1. http://anupriti.blogspot.com/2010/01/china-google.html

2. http://anupriti.blogspot.com/2010/01/microsoft-choose-to-stay-in-china-why.html

3. http://anupriti.blogspot.com/2009/11/green-dam-youth-escort-whats-that.html

4. http://3.bp.blogspot.com/_z1QH8I3k9vk/S6mHznVlTUI/AAAAAAAAApU/2Um-xY5q8zY/s1600-h/googlechina5-420x0.jpg

5. http://anupriti.blogspot.com/2010/01/google-vs-bing-on-data-retention-policy.html

6. http://images.smh.com.au/

7. http://www.hindustantimes.com/

Consequences of Google’s China Exit (2010-03-24 09:14)

1. This is a uncoiled lift from [1]http://www.theatlanticwire.com.I thought worth putting it in here.Fororiginal post please click [2]here.

2. The post has shown the following 4 consequences of exit :

(a) Cripples the Work of Chinese Scientists

A Nature News survey of Chinese scientists found that 84 percent of them thought losing accessto Google would “somewhat or significantly” hurt their work process. Like their Americancounterparts, Chinese researchers use Google and Google Scholar to find papers and relatedinformation.

“Research without Google would be like life without electricity,” one Chinese scientist toldNature... If eventsdo continue in that direction, truly global enterprises like science could suffer as information becomes harder— even if only moderately — to exchange.

156

Page 157: Blogger to E-Book

(b)

Puts the Onus on China to Liberate the Internet

Puts the Onus on China to Liberate the Internet

, says Leslie Harris, president of the Center for Democracy and Technology: ”[We applaud]Google for following through on its commitment to protect human rights and for its continuedeffort to enable China’s people with unfiltered access to robust sources of information from allover the world. Whether the Chinese people will be able to take advantage of Google searchnow rests squarely with the Chinese government.”

(c) Fully Exposes China’s Censorship

Fully Exposes China’s Censorship, writes Dan Nosowitzat Fast Company: ”Google almostexpects China toblock the crap out of the redirect. They’ll even be creating a new siteto monitor exactly how much of theirnew services are being forcibly blocked by the Chinese government, updated daily. Google is also showing alittle concern about the future of its 600-person sales staff in China, and issuing a bit of a challenge to theChinese government: if they shut down the redirect to Google HK, Google will have to lay off a percentage ofits sales team, as they’ll not be needed.”

(d) Cleanses Google’s Reputation

Cleanses Google’s Reputation, cheers Preston Gralla at Computer World: ”China will become the world’slargest Internet market, and in taking this step, Google is endangering its standing there. True, it only has arelatively small market share at this point, but that would have changed over time, and even a relatively smallmarket share of a large market means a lot of revenue. It’s rare that a tech company — or any company, forthat matter — takes a stand this principled, and Google should be congratulated for it. Other tech companies,notably Apple and Microsoft, should follow suit, although all signs point to them continuing to cooperate withChinese censors.”

3. Thanks [3]http://www.theatlanticwire.com

1. http://www.theatlanticwire.com/

2. http://www.theatlanticwire.com/opinions/view/opinion/4-Consequences-of-Googles-China-Exit-2937

3. http://www.theatlanticwire.com/

MOZZILA Firefox & GERMANY (2010-03-24 21:27)

1. In another notable policy implementation involving IT aspect and signifying the importance of browser,German government and administration has suggested computer users not to use Firefox and run an alter-native browser instead, because of a critical security demerit. It has recommended that PC users stop usingFirefox till Mozilla releases a fix. 2. The advice is based on studies and recommendations of [1]BurgerCERT,adivision of German Federal Office for Security in Information Technology. The reason why Germany is evok-ing such ostensibly forceful action is based on the presence of a critical vulnerability in currently availableversions of Firefox that could be exploited by hackers to launch malicious code on users’ computers. 3. Forits part, Mozilla has acknowledged the security vulnerability, and has released the latest version of its Firefoxweb browser ahead of schedule because of security vulnerabilities found in earlier versions.Firefox 3.6.2 wasdue to launch at the end of March, but is already available to download from the Mozilla website. 4. Anyadvises or thoughts from the [2]MOD(IT) INDIA.....none!!!!!! 5. Thanks http://www.computerweekly.com

1. http://www.thenewnewinternet.com/tag/burgercert/

2. http://www.mit.gov.in/

157

Page 158: Blogger to E-Book

DANGEROUS PASSWORDS (2010-03-24 21:58)

1. According to a recent study,most dangerous passwords used across the cyber fora and continents are listedbelow :

123456

Tops the list.The study reveals that ’123456’ is the most ordinarily used password. [1]Imperva found thatnearly 1 % of the 32 million people it studied were using ”123456” as a password.

12345

The second most vulnerable password is 12345

123456789

Stands at a proud 3rd position

PASSWORD

The fourth most vulnerable password is the word ’Password’ itself

iloveyou

Another easy one for remembrance and breaking.

princess

Stands at 6th position

Rockyou

The seventh most compromising password is 12345

1234567

Rockyou is followed by 1234567 at No 8

abc123

the last one as per study....

2. How many of you have or had from the list?be carefullllllllllllllllllllllll

3. Thanks [2]Imperva and [3]TOI.

1. http://www.imperva.com/

2. http://www.imperva.com/

3. http://timesofindia.indiatimes.com/default1.cms

CLEAR PLAY & DVD PLAYERs : E-CENSOR (2010-03-25 07:49)

1. A new technology that can CENSOR ALL POTENTIALLY UNSAVORY SCENES of a movie, makingit watchable with children at home is all set to introduce it self to the parents.It invariably happens acrossthe homes when one family sits down to watch a movie on a DVD thinking there’s nothing up ahead likelyto cause embarrassment, only to find the stars undressing and making the set of family watching the movieawkward.

158

Page 159: Blogger to E-Book

[1]

2. [2]ClearPlay (patented) comes to the rescue in all such cases.This is an advanced parental control featurethat allows filtering of regular DVD movies. ClearPlay is a technology that allows the users to skip over ormute undesirable content such as profanity, graphic violence, and adult content.

3. A [3]ClearPlay-enabled DVD player is required, along with what are called Filter files. These files, whichare created by ClearPlay editors, will know where the possibly unwanted content is located, even to the exactframe. This allows the ClearPlay DVD player to block offensive or undesirable content during playback ofthe DVD. The choice is also made available to watch the film in its original form, by turning the filtering off.

4. ClearPlay allows users to customize what they want to skip. There are twelve categories of content thatcan be filtered and with four different levels (none, implied, explicit and graphic).These categories include:Violence, Sex, Nudity and Vulgarity. You will also see a list, before the movie starts, of possibly questionablecontent that ClearPlay will not remove depending on the movie, scene and/or situation.

5. Thanks [4]http://technochest.com

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/S6rLXsK4BII/AAAAAAAAAp4/-YLf3iDQOIs/s1600/CP-747_information.gif

2. http://www.clearplay.com/

3. http://www.clearplay.com/

4. http://technochest.com/

WiFi at home : Take precautions (2010-03-28 07:19)

1. Accessing WiFi at home is no more limited to tech geeks as the simple configuration has made it accessibleto even a layman who hardly has any know how of how it works and what are the dangers floating around if

159

Page 160: Blogger to E-Book

he goes with the default settings.[1]The two year back case of a hacker emailing from an open WiFi accountin Mumbai reflects the deep dangers associated with such mishaps.Following are a set of desirable configchanges any WiFi account holder at home and office whould take care of while configuring.....

Step 1: Change the default password Step: 2: Change the default IP address Step 3: Disable the DHCPservice DHCP (Dynamic Host Configuration Protocol) enables remote computers connected to the router toobtain an IP address and join the network without needing to know the IP and router address information.This is a simple and effective way of keeping intruders away. As far as possible, set up the computers onyour network with static IP addresses. If you still want to use DHCP to make your own configuration easier,restrict the number of DHCP IP users to the number of computers on your network. For example, if youhave five laptops running on the network, limit the DHCP IP addresses to 5 from the default 50. Step4: Restrict the network mode Step 5: Change the default SSID Step 6: Opt for WPA2 or PSK securityover WEP Step 7: Enable the MAC Filter Step 8: Use the router’s firewall Step 9: Use Internet AccessPolicies Step 10: Disable remote administration Step 11: Switch off the router when not in use Step12: Disconnect the Internet when not needed Step 13: Position your router carefully Step 14: Updatethe router firmware Step 15: Scan for signal leaks from time to time 2. Also check out [2]here.Thanks[3]http://www.freealldown.com

1. http://economictimes.indiatimes.com/news/politics/nation/

WiFi-was-hacked-again-to-send-terror-mail-Mumbai-ATS/articleshow/3481850.cms

2. http://www.freealldown.com/2010/03/how-to-secure-your-router-in-11-steps.html

3. http://www.freealldown.com/

DATA RECOVERY FROM RAM? (2010-03-31 22:44)

1. If any one can just throw some light or post a link to any matter that exists on the web pertaining tolimitations/possibilities of recovery of data from RAM inside a computer?

2. Thanks.

david nicholson (2010-04-01 07:21:34)i m sure this will help,check out at [1]http://tdistler.com/2008/02/21/data-in-ram-can-be-recovered-a fter-power-off

1. http://tdistler.com/2008/02/21/data-in-ram-can-be-recovered-after-power-off

3.4 April

HOW TO HYPER LINK IN COMMENTs AT BLOGGER? (2010-04-01 07:50)

1. I was recently commenting at a blogpost and wanted 2 place a hyperlink..but could not find any optionwhile right clicking or from any where.Thus googled and found this simple two step procedure [1]here 2.Thanks [2]http://mike.brisgeek.com

1. http://mike.brisgeek.com/2006/08/30/simple-html-for-formatting-blogger-comments/

2. http://mike.brisgeek.com/

160

Page 161: Blogger to E-Book

7 years of Indian Cyber Law (2010-04-07 23:14)

1. While reading a recent article by Rohas Nagpal @ 7 years of Indian Cyber Law….i came across these caseswhich have been briefly but adequately discussed at length in the article by the author ie Rohas Nagpal.Must read …just for updated info……

[1]- Avinish Bajaj vs State of Delhi

[2]- Firos Vs State of Kerala

[3]- Syed Asifuddin vs State of Andhra

[4]- SBI vs Rizvi Exports

[5]- State vs Mohd Afzal

[6]- Is ATM a computer

[7]- P.R.Transport agency vs UOI & others

2. For another link on similar info ,pls click [8]here.

3. Thanks [9]http://www.asclonline.com & [10]Mr Rohas Nagpal,President Asian School of Cyber Laws

1. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf

2. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf

3. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf

4. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf

5. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf

6. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf

7. http://www.asclonline.com/images/c/cc/7_years_of_Indian_Cyber_Law.pdf

8. http://www.cyberlawconsulting.com/cyber-cases.html

9. http://www.asclonline.com/

10. http://www.asclonline.com/index.php?title=Rohas_Nagpal

(2010-04-08 07:47)

Computer EASTER EGGs (2010-04-15 06:59)

1. Whats an easter egg post doing here? Well even this has an IT context.In the computer world this refersto an un documented lineament that is in a program that the makers of that program placed in the programfor additional fun and credits. Easter Eggs are in no way destructive to any software or hardware within thecomputer and are usually meant for fun. For example an interesting computing easter egg is given below- Type ”=rand(200,99)”(without quotes) into the MS word and watch as around 567 pages get filled withrandom text!! 2. Thanks [1]http://www.computerhope.com & [2]Digit magazine subscriber edition.

1. http://www.computerhope.com/

2. http://www.thinkdigit.com/

161

Page 162: Blogger to E-Book

3.5 May

EAVES DROPPING RISK : EMR (2010-05-03 23:12)

1. Imagine someone sitting in a van outside a person’s house can read the EMR that is emanating fromthe user’s laptop computer inside the house and reconstruct the information from the user’s monitor on adifferent device. Different devices have different levels of susceptibility to Tempest radiation. A handheldcalculator gives off a signal as much as a few feet away, and a computer’s electromagnetic field can give offemissions up to half a mile away. The distance at which emanations can be monitored depends on whetheror not there are conductive media such as power lines, water pipes or even metal cabinets in the area thatwill carry the signals further away from the original source.

2. This problem is not a new one; defence specialists have been aware of it for over twenty years.Information onthe way in which this kind of ”eavesdropping” can be prevented is not freely available. Equipment designedto protect military information will probably be three or four times more expensive than the equipmentlikely to be used for processing of non-military information.Until recently it was considered very difficultto reconstruct the data hidden in the radiated field, and it was therefore believed that eavesdropping ondigital equipment could only be performed by professionals with access to very sophisticated detection anddecoding equipment. As a result, digital equipment for processing information requiring medium or low levelprotection, such as private and business information, is not protected against eavesdropping of this kind.

3. The EMR that is emitted by electric devices contains the information that the device is displaying orstoring or transmitting. With equipment designed to intercept and reconstruct the data, it is possible tosteal information from unsuspecting users by capturing the EMR signals. The U.S. government originallybegan studying this phenomenon in order to prevent breaches in military security. The government was usingthe technology to their advantage during WWII and realized that they needed to protect themselves againstothers using the same tactics against them. The name Tempest, or Tempest radiation originated with theU.S. military in the 1960s as the name of the classified study of what was at the time called ”compromisingemanations.”

4. Today the phenomenon is more commonly referred to as van Eck phreaking, named after Wim vanEck, the Dutch computer scientist who brought it to general attention in 1985 when he published his paper”Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?,” in which he demonstratedthat the screen content of a video display unit could be reconstructed at a distance using low-cost home-builtequipment - a TV set with its sync pulse generators replaced with manually controlled oscillators.

5. Van Eck phreaking is a major security concern in an age of increasing pervasive computing. High-securitygovernment agencies are protecting themselves by constructing safe rooms that through the use of metallicshielding block the EMR from emanating out of the room or by grounding the signals so that they cannotbe intercepted. It is possible, though costly, for individual users to shield their home computer systems fromEMR leakage.

6. Thanks [1]http://www.webopedia.com

1. http://www.webopedia.com/

I M IN ”CHIP”- MAY MONTH EDITION 2010 (2010-05-11 06:48)

1. Don’t get me wrong for those of you who read only I M IN ”CHIP”...i m not inside the regular chip...buthave been able to find space in MAY edition of the [1]Chip - India’s Most Trusted Guide To Gadgets AndTechnology.Scanned copy attached.

162

Page 163: Blogger to E-Book

[2]

[3]2. Thanks [4]CHIP

1. http://www.chip.in/

2. http://1.bp.blogspot.com/_z1QH8I3k9vk/S-jFcTY1TcI/AAAAAAAAAqU/7y-7ZaxeGOo/s1600/chip0001.jpg

3. http://3.bp.blogspot.com/_z1QH8I3k9vk/S-ixNkvq5RI/AAAAAAAAAqM/cOEz4LnCsWg/s1600/anupamchip.jpg

4. http://www.chip.in/

Bidisha (2010-05-12 12:37:08)Congratulations!Your family and friends must be really proud of you!Thanks for uploading it here, I could read both your aritcles and will follow this corner. Though not able to makecomplete meaning out of everything; surely get the gist.Keep writting!Rgds.Bidisha

wimpy (2010-05-12 20:55:26)thats how i tracked youhi buddy this is vikrant here.mail me [email protected]

ANUPAM (2010-05-12 22:24:22)vikrant sir!!!i got a mail domain failure from the email u mentioned....pls psot ur email again here

163

Page 164: Blogger to E-Book

wimpy (2010-05-17 20:22:23)sorry buddy! try this [email protected] better call 9418760446

SHADOWS IN THE CLOUD (2010-05-31 15:02)

1. First time I heard this term...i thought its abt some movie...some crime thriller or may be some novel orbook...but when I actually came to know about this...it was exploring a whole new world....this is abt a 60 pgbrief on how cyber security can compromise you and your organisation secrets....wonderfully compiled...easyto understand...easy english....gr88888 ...

[1]

2. I got the copy from SCRIBD at [2]http://www.scribd.com/doc/29493199/Shadows-in-the-Cloud-2010040[3]6

3. Must read for IT Security enthusiasts!!

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TAOD09kemnI/AAAAAAAAAqk/WaqPeB5caFI/s1600/untitled.JPG

2. http://www.scribd.com/doc/29493199/Shadows-in-the-Cloud-20100406

3. http://www.scribd.com/doc/29493199/Shadows-in-the-Cloud-20100406

3.6 June

XINGYUN : World’s Fastest Computer (2010-06-07 11:12)

1. ”Experts say one second of its work may take a whole day for a dual-core personal computer”2. Such is the astonishing ..or I say beyond imagination power of this officially disclosed SUPERCOM-PUTER named ”Xingyun” from China that runs at more than one quadrillion (one thousand million million)calculations per second.3. XINGYUN is now the server of ‘Dawn 6000’ which has been jointly developed by Dawning Information

164

Page 165: Blogger to E-Book

Industry Co. Ltd, Chinese Academy of Sciences Calculation Institution and the South China Supercomput-ing Centre. It has been developed for DNA sequencing and for cloud computing.4. Perhaps there is no end to improvement.....tomorrow will come up with much much higher speeds thenXINGYUN......wait and watch.....

Prisoners all set to est BPO : A first from Cherlapally Central Jail (2010-06-08 23:59)

1. In a country where media,politicians,government, bureaucrats,actors,sportsman etc etc and most of thecitizens are busy baking power and minting money,this is one news that could do HINDUSTAN proud.

2. In a bold & really unique experiment,likely to be the first of its kind in our country,there will soon beBPO units with the inmates as employees. This is a unique development and Cherlapally Central Jail inHyderabad@Andhra Pradesh is the first prison throughout the country to have such a unique facility in itspremises.These BPO units will have educated convicts serving out their terms. A public-private partnershipwas signed up between the prison authorities and the Bengaluru based IT firm, [1]Radiant Infosystems.Asmany as 250 inmates will be enrolled in the BPO unit and they will be later shortlisted according to theirqualifications. Most of the inmates are matriculates and graduates. The shortlisted inmates will then begiven training by experts and then absorbed by the BPO company into their Jail unit. For starters, theconvicts working there will not have any access to phones as in the case of a normal call centre. They willbe mostly involved in bank-related data entry and transfer work.

3. ”We found that large number of convicts are willing to work on computers. So, I thought these prisonerscan made use of and they can be put on computer-based jobs,” said Gopinath Reddy, Director General ForPrisons, Andhra Pradesh.

4. This is really positive contribution I feel....although a percent of readers may tend to opine about QoSetc...but...worth a start and Idea....

5. Thanks [2]Voice & data and [3]http://news.oneindia.in

1. http://www.radiantinfo.com/

2. http://voicendata.ciol.com/

3. http://news.oneindia.in/

Anonymous (2010-06-14 11:23:46)nice info to start my morning.....

What material Laptops are Made of? (2010-06-09 09:30)

1. Ever wondered what a typical laptop is made up of and where does all that material source to.......readon...it is interesting to know the effort......

China: ABS, PMMA, Epoxy, PVC, Polyoxymethylene, PP, SBR, elastomer, PET, Magnesium Germanium,Terbium

Russia: Steel, Ferrite, Ruthenium

Chile: Copper

South Korea: Glass, Cadmium

Australia: Titanium,Nickel

165

Page 166: Blogger to E-Book

Peru: Indium

India: Barium

Khaidarkhan: Mercury

Canada: Aluminium, Uranium

South Africa: Cadmium, Chromium, Platinum, Manganese

Japan: Stainless Steel, Selenium

Brazil: Silicon, Tantalum

Zimbabwe: Lithium

Congo: Cobalt

Mexico: Bismuth

Tajikistan: Antimony

2. Thanks [1]http://www.sourcemap.org

1. http://www.sourcemap.org/object/typical-laptop-computer

Securelist.com : Informative attempt by Kaspersky Labs (2010-06-09 09:44)

1. Kaspersky has come up with the launch of a veri informative site on IT security with lots of articles andupdates on various types of viruses/malwares etc.You can access the same by clicking [1]here.

2. One interesting section by the name of ”Internal threats” is available which should prove popular in futureand also ”Kaspersky Security Bulletin”.

1. http://www.securelist.com/en/

Google and Caffeine : The Secret Link (2010-06-11 23:14)

1. A little over year ago ,Google unveiled a “secret project” of “next-generation architecture for Google’s websearch“ which was supposed to include crawling, indexing, and ranking changes. While the biggest visiblechanges in Microsoft’s relaunched search engine, Bing, was user-interface related, Google’s secret projectwas supposed to be only infrastructure related and proposed no UI changes. 2. Thus after an year ofthe unveiling,Google is now getting faster and more comprehensive with a new Web indexing system called”Caffeine.As per the Google Blog Post’s , the project now stands on completion stage and now ”provides 50percent fresher results for Web searches”.

[1]

166

Page 167: Blogger to E-Book

3. The old indexing architecture was based on several layers, some of which were refreshed at a faster ratethan others; the main layer would get updated every couple of weeks.To refresh a layer of the old index,entire web was analysed, which meant there was a significant delay between when we found a page and madeit available to the user. With Caffeine, the web is analysed in small portions and search index is updated ona continuous basis.Thus more improvement on existing setup....that I say ”there is no end to improvement”

4. Thanks [2]http://www.trustedreviews.com

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TBJ5q93359I/AAAAAAAAAqs/PJCU3EUCBKI/s1600/del.jpg

2. http://www.trustedreviews.com/

Google and Caffeine (2010-06-11 23:14)

1. A little over year ago

Where does your Website Rank in the web? (2010-06-12 14:15)

1. An interesting free info site for to see what you have done with your website and what you need to do toincrease performance of traffic and readers to your website is listed below. The site uses a combination oftools to solve issues or tweak your best techniques used in your web design and content.

2. The name of the site is [1]http://truxtertech.com/siteworth.

1. http://truxtertech.com/siteworth

Mobiles & Brain Cancer : WHO Speaks. (2010-06-12 17:59)

1. In an earlier post at [1]http://anupriti.blogspot.com/2009/10/radiation-effects-ur-mob ile-quantified.html,wherein the sad and bad effects of using mobiles on brain and health,the quantified SARie specific absorption rate were discussed.There is good news for those who always feared using mobilephones for standing at a risk to gain brain cancer in the long run.The WHO study on links between mobilephone use and certain types of brain cancer has proved inconclusive.The researchers said that even thoughthere could be possible health risks from heavy mobile phone use, nothing conclusive has been found as yet.

2. The long ten year study of about 13,000 people focused on both healthy users of mobile phones and thosewith two types of brain cancer - glioma and miningioma tumors. There were suggestions of an increased riskof glioma, and much less so meningioma, in the users with highest decile (10 per cent) of cumulative calltime, in subjects who reported phone use on the same side of the head as their tumor. Strangely though,the study declares these 10 per cent to be people who use their phone to call for more than 30 minutes aday. These stats seem seriously doubtable. Going by it, almost everyone we know is in that 10 percent.

3. However, the study has been criticized, as biased, because mobile phone companies provided 25 percentof the funding.Actually...now it is more then 15 years when the world has been actively using mobiles...moreso in india in last 10 years....had it been the other way...how much of the human populi in the world wouldhave been effected by now....

4. More at [2]http://www.who.int/mediacentre/factsheets/fs193/en/

1. http://anupriti.blogspot.com/2009/10/radiation-effects-ur-mobile-quantified.html

2. http://www.who.int/mediacentre/factsheets/fs193/en/

167

Page 168: Blogger to E-Book

”GOOGLE STREET VIEW” - FIGHTING PRIVACY ISSUES (2010-06-16 21:03)

1. Ever heard of google’s street view application...m sure many of you must have...for those who have notheard of it...in brief it refers to a technology featured in Google Maps and Google Earth that provisionsisometric views from various positions along many streets in the world. Launched on May 25, 2007 theapplication displays images taken from a fleet of specially adapted cars. Areas not accessible by car aresometimes covered by Google tricycles. On each of these vehicles there are nine directional cameras for360° views at a height of about 2.5 meters, GPS units for positioning and three laser range scanners for themeasuring of up to 50 meters 180° in the front of the vehicle. There are also 3G/GSM/Wi-Fi antennas forscanning 3G/GSM and Wi-Fi hotspots.

[1]

2. No about the fighting issue that i have reffered in the subject topic.Now whether it is a facility for the worldbase users to utilize viewing live views of streets world vide or it is an attempt to log in to the private data ofthe users across.....yess...I repeat it is the private data of the users avaiable from the open WiFi signals fromtheir home computers and laptops.The intresting thing is that Google has accepted this collection of datafrom unencrypted wireless networks....and they have put the blame on a masoom software engineer.Googlesays the massive furore over Wifi snooping by Street View cars was all the fault of one software engineer.Inan interview ,CEO Eric Schmidt said the whole affair came about because a software engineer insertedunauthorised code into the Street View system software. The man is now under investigation internally bythe company as per posts on google blog.

[2]

3. Now what ever answer that google may come up with in form a mistake or simply putting the blameon that software engineer(...where was the Software Testing deptt and QC then otherwise?),the point that

168

Page 169: Blogger to E-Book

I intend putting accross is that just take care of envryting your WiFi router.Google has at least acceptedthe fact and mistake and they are taking measures to rectify it...but it will not be always like that.....thereare so many mis adventurists present all around that looking around that unencrypted wireless networks formisuse.....just [3]read this post again to avoid becoming a target like others.

4. Thanks [4]http://tech.blorge.com & [5]http://en.wikipedia.or[6]g/

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TBj0WO9OOwI/AAAAAAAAAq8/OpvzXCfToog/s1600/google-street-tricycle.jpg

2. http:

//3.bp.blogspot.com/_z1QH8I3k9vk/TBjz92yhoVI/AAAAAAAAAq0/hdWkgcr439w/s1600/image-81729-panoV9free-ntwx.jpg

3. http://anupriti.blogspot.com/2010/03/wifi-at-home-take-precautions.html

4. http://tech.blorge.com/

5. http://en.wikipedia.org/

6. http://en.wikipedia.org/

WiFi Amplified 10 times : Here comes WiGig™ (2010-06-16 22:40)

1. WiFi,the term that has revolutionised our lives at home with ease of access and mobile internet connectivityis all set to receive a major boost in speed when the 60GHz frequency band comes into operation. Wi-Fi Alliance® confirmed an alliance with [1]WiGig™ to expand the current WiFi band range. CurrentWiFi technologies will remain, with the new 60Ghz range coming in to compliment these already existingtechnologies. 60 GHz device connectivity will be an exciting enhancement to the capabilities of today’s Wi-Fitechnologies. It will expand the utility of Wi-Fi, used by hundreds of millions of people every day.The goal- to bring 7Gbps wireless connectivity to users!!!!

2. How does this happen? Basically transfer speeds that are ’turbo boosted’. Today maximum data transferspeeds are in the region of about 150 Mbps. Bringing in this new technology will boost that figure toanywhere between 1 Gbps to 7 Gbps. That is about 10 times faster than the norm today. On the flipside,higher frequency waves don’t have the range of current lower frequencies, and the 60 Ghz band travels in astraight line, meaning one would need line of sight between two devices to transfer data.

3. Estimates are that this technology will be available in devices that have dual-band or tri-band capabilities,in approximately two years. These devices will most likely have the ability to switch between the current 2.4Ghz or 5 Ghz, and the 60 Ghz band.

4. Thanks h[2]ttp://www.new-technology-world.com & [3]http://wirelessgigabitalliance.org/

1. http://www.blogger.com/WiGig%E2%84%A2

2. http://www.new-technology-world.com/

3. http://wirelessgigabitalliance.org/

’Microrings’ - Ultimate Wireless Communication (2010-06-16 22:51)

1. Researchers based in Purdue University have developed a miniature device capable of converting ultrafastlaser pulses into bursts of radio-frequency signals, a step toward making wires obsolete for communicationsin the homes and offices of the future.Such an advance could enable all communications, from high-definitiontelevision broadcasts to secure computer connections, to be transmitted from a single base station, saidMinghao Qi, an assistant professor of electrical and computer engineering.The team fabricated tiny silicon”microring resonators,” devices that filter out certain frequencies and allow others to pass. A series of the

169

Page 170: Blogger to E-Book

microrings were combined in a programmable ”spectral shaper” 100 microns wide, or about the width of ahuman hair. Each of the microrings is about 10 microns in diameter.

[1]

2. Thus a single base station would be sort of a computer by itself, perhaps a card inserted into one ofthe expansion slots in a central computer. The central computer would take charge of all the informationprocessing, a single point of contact that interacts with the external world in receiving and sending informa-tion.”There is no end to improvement......as i say.....just when we thought WiFi is the end of home troubleshootings for easy connectivity...this goes many steps ahead.....

3. Thanks [2]http://www.new-technology-world.com

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TBkIQHF_igI/AAAAAAAAArM/eKpiryCABU0/s1600/microrings1.jpg

2. http://www.new-technology-world.com/connect/index.php?do=/Admin/blog/

microrings-new-technology-may-pave-the-way-for-ultimate-wireless-communicat/

INTEL : UPCOMING PROCESSOR’S (2010-06-18 23:13)

1. At an earlier post [1]here, I had discussed about the upcoming OSs incl Barrelfish,Midori,Helios etc likelyto be introduced by Microsoft in near future.....now some thing from leaked (which valve actually faltered…no one knows?) source on the net about processors from INTEL,three quad-core Clarksfield processors,the i7-720QM, i7-820QM and i7-920XM, clocked at 1.6GHz, 1.73GHz and 2GHz can be expected by the endof this year

2. Low voltage chips including 25W 2.26GHz Core i7-660LM,1.46GHz Core i7-680UM and 1.33GHz Corei5-560UM with an overall aim to enhance the battery life while end Dec 2010 will see high-end Core i7-680UMthat starts at 1.46GHz and speeds up to 2.53GHz and a 1.33GHz / 2.13GHz Core i5-560UM, plus a 25W2.26GHz Core i7-660LM low-voltage chip will also see the year 2010. All these will have on-die Intel HDGraphics .

3. Another 32nm ”Huron River” is likely to make it to the user shores by early 2011 which will single handedlyhandle WiMAX, WiDi and Intel Bluetooth alongside new concept dubbed Zero Power ODD which promisesa power-saving sleep mode for optical disks drives.

170

Page 171: Blogger to E-Book

4. Thanks [2]http://www.theinquirer.net

1. http://anupriti.blogspot.com/2009/09/future-of-oss-microsoft-version.html

2. http://www.theinquirer.net/

PANOPTICLICK : Your Browser Finger Print (2010-06-25 21:19)

1. The development and growing interest in hacking and retrieving info from browsers has been gainingsignificant importance today when security is BAAP of all priorities in any IT field.Today surfers are warnedthat even with cookies deleted and disabled,advanced fingerprinting techniques could be used to identifythem.In an attempt to check and test browsers,[1]THE ELECTRONIC FRONTIER FOUNDATION hascome up with a site at http://panopticlick.eff.org/ which tests your browser to see how unique it is based onthe information it will share with sites it visits.

[2]

2. Check out at [3]http://panopticlick.eff.org/

1. http://www.eff.org/

2. http://4.bp.blogspot.com/_z1QH8I3k9vk/TCTRFlnv_5I/AAAAAAAAArU/Crqe5Hy7CIU/s1600/DE.png

3. http://panopticlick.eff.org/

Why not leapfrog 3G TO 4G? (2010-06-27 10:17)

1. It has actually been veri long hearing about Indian Government trying/deciding to start the 3G Spectrumallocation. Finally few decisions have been made in last few weeks and something has been done in a limitedcapacity.Now till the time this limited capacity becomes ready to take on fully operational 3G Servicesacross India,3G will be without doubt an obsolescent and old technology at global level.The amount ofinfrastructure,investment,time and loads of effort that will be sucked in by this 3G setup is likely to go inwaste considering the thirst everywhere to be at par with the latest in communication.3G may look goodtoday when we are not aware of 4G Technology.For those who are interested to know about ’G’ family inbrief,pls click [1]here.

2. So,still when the exhaustive details on spectrum auction are awaited,why not leap frog to 4G thusvamoosing the extraordinarily delayed 3G for attaining higher data speeds to finally allow users in India toexperience the ”state of art speeds”.

1. http://anupriti.blogspot.com/2009/06/g-family-0g-to-4g.html

171

Page 172: Blogger to E-Book

3.7 July

COWS & DATA CENTRES : LINKED!!!! (2010-07-03 21:40)

1. Cows and data centers ???Whats the link.......any guesses....strange you may find but this has come fromHP who feel that both entities are connected...read on for the link///

2. According to HP Labs, the estimate dairy cow produced is about 55 kg of manure per day, and thus 20metric tons per year. The manure that one dairy cow produces in a day can generate 3.0 kilowatt-hours(kWh) of electrical energy.A medium-sized dairy farm with 10,000 cows produces about 200,000 metric tonsof manure per year. This farm can fulfill the power requirements of a medium sized 1 megawatt (MW) datacenter.The heat generated by the data center need not be wasted. Instead, it can be used to break downanimal waste which results in the production of methane.Methane can then be used to generate power forthe data center.HP Labs researchers say that this symbiotic relationship allows the waste problems faced bydairy farms and the energy demands of the modern data center to be addressed in a sustainable manner.

3. Actually HP should have not just come up with the idea...with the strong hold they have in the market..itwould have more suited them to actually attempt the same on ground rather then advising and makingstatistical data of the dung!!!!

4. Thanks [1]http://www.informationweek.in

1. http://www.informationweek.in/

Intel meets Car : Makes it SMART CAR (2010-07-07 18:01)

1. In an earlier post [1]here about Intel’s Bike,I discussed about how Intel had plans to get IT into Bike.Nowthey have gone a step further.....I mean from Bike to Car...yess..they have graduated to Car.

2. Intel is currently working on a smart car that will register desired information about the speed, steering,braking while also recording video footage from the outside.This would work well enough as a black boxsince all the information can be used in case of crashes and if possible, even thefts. Safety features like anon-board camera system, sensors to monitor the road condition, distance sensors to warn the driver of closingin distances and mobile control to lock or unlock the car.

3. Thanks [2]http://www.newlaunches.com

172

Page 173: Blogger to E-Book

1. http://anupriti.blogspot.com/2009/02/intel-bike.html

2. http://www.newlaunches.com/

IT meets HIGH TECH TAPS : Renshui Faucets (2010-07-08 19:36)

1. Water Taps with in-built chips , the Renshui high-tech faucets, allows customised control of the flow andtemperature of the water . All it takes is a simple touch and one can change these parameters to prepare aperfectly tailor-made lovely bath.The water’s temperature is also displayed on the cool body of this faucetthat’s totally different in style and form.

[1]

2. With a simple touch, one can go from hot to cold water, on or off. Another great feature is the intelligentlight, which shows the water’s temperature to cut down the risk of scalding accidents. All these featurescome wrapped in a contemporaneous design that will add sleek , style in additions to reducing your walletweight.

3. Thanks [2]http://www.trendir.com/

1. http://2.bp.blogspot.com/_z1QH8I3k9vk/TDXeaLjuGwI/AAAAAAAAArs/Q_h54J4dfTE/s1600/renshui-faucet.jpg

2. http://www.trendir.com/

MOST AMAZING TECHNIQUE TO TRANSFER DATA:SLURP (2010-07-08 22:21)

1. This is by far the most amazing thing I have seen in recent years....we have all seen ways to transferdata from one PC to other including bluetooth,wifi,cable and so on.....but this one involvesslurping up(extracting) information and squirting out (injecting) pointers to digital objects. Hence, information can

173

Page 174: Blogger to E-Book

be transferred from machine to machine without any kind of wired or unwired connection.It will be reallyclear when you see the above video.....you use a dropper like object to pick up a folder from one desktopto other......AMAZZZZINGGG!!!!!! [EMBED] 2. This clever innovation comes in from a former MIT MediaLab student, Jamie Zigelbaum. 3. Thanks [1]http://zig.media.mit.edu/Work/Slurp

1. http://zig.media.mit.edu/Work/Slurp

SAMSUNGs GALAXY BEAM - Projector meets Mobile (2010-07-09 20:48)

1. Imagine one single mobile handset offering the following features : (a) Miniprojector at 640 x 480 pixelresolution. (b) 3.7-inch Super-AMOLED (Active-Matrix Organic Light-Emitting Diode) (c) An 8-megapixelcamera. (d) Can be used as a wireless access point. (e) FM. (f) Wi-fi. (g) Bluetooth 3.0 (h) GPS (j)Inbuilt 16 GB storage (k) TV out (l) MP3,MPEG4,WMV,DivX & H.264 (m) Touchscreen (n) 3G/EDGEConnectivity (o) 530 hours Stand By (p) 7 hours talktime

[1]

2. Thats Samsung Galaxy Beam to be launched on 17th July 10

174

Page 175: Blogger to E-Book

[2]3. More at [3]www.[4]samsung[5]hub.com

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TDc-MR8yl0I/AAAAAAAAAr8/16a70_vsaOA/s1600/2.bmp

2. http://2.bp.blogspot.com/_z1QH8I3k9vk/TDc-Ab8_GpI/AAAAAAAAAr0/tEJ8J4c6nEQ/s1600/1.jpg

3. http://www.blogger.com/www.samsunghub.com

4. http://www.blogger.com/www.samsunghub.com

5. http://www.blogger.com/www.samsunghub.com

Augment your regular desktop with a FACE RECOGNITION feature (2010-07-10 22:19)

1. Face recognition technology although has been compromised earlier on various times and occasions whichhave been mentioned at this blog [1]here,[2]here and [3]here.But again things are improving with morecomplex algorithms being used for processing and allowing a person to Log In.Now suppose an online examis being conducted which requires students to login with their accounts; anybody could login with anybody’saccount as long as they knew their username and password.So for regular window OS users,Luxand Blinkallows an alternative to traditional Windows login and a solution to problems. It provides its users with adifferent way to login to Windows: through Facial Recognition.

[4]

175

Page 176: Blogger to E-Book

2. [5]Luxand Blink is a free application comptable with 32 bit version of Windows Vista and Windows 7.The download size of the application is 8MB and installs in a standard way. A webcam is required to beinstalled in the computer...(did I need to tell that?)

3. So just look into a webcam for a moment, and you’ll be logged into your account before you notice.Blink! employs advanced face recognition technologies to provide automatic, quick and reliable login to oneor many computer users. It uses its advance image recognition algorithms to recognize our face. Such isthe competence of this application, that whether the lighting is different or our hair are different, [6]LuxandBlink will still recognize our face and log us in.So a regular old desktop becomes ready with the [7]FACERECOGNITION feature.

4. Thanks [8]http://www.luxand.com/blink/

1. http://anupriti.blogspot.com/2010/01/hp-in-racists-scoooop.html

2. http://anupriti.blogspot.com/2009/11/laptop-face-recognition-falls-flat.html

3. http://anupriti.blogspot.com/2010/03/search-web-by-face-recognition-work-is.html

4. http://1.bp.blogspot.com/_z1QH8I3k9vk/TDilyp0468I/AAAAAAAAAsE/4AZvNaV3rbI/s1600/12.jpeg

5. http://www.luxand.com/blink/

6. http://www.luxand.com/blink/

7. http://en.wikipedia.org/wiki/Facial_recognition_system

8. http://www.luxand.com/blink/

How Google detects Invalid clicks? (2010-07-10 22:35)

More often then not,most of the registered Google Ad sense users are always tempted to increase theirclicks on the ad to generate some monetary benefit....this one comes specially for all those who try tricks oftrade....believe it or not their are none... Google is tooooooooo smart...read down below and links below :

1. IP Address If those clicked on their own ads multiple times from the same IP address means you will sureget banned. 2. Sabotaged by third party Sometimes, you may also be sabotaged. A third party may decideto do a series of illegal clicks on your advertisements for the purpose of getting you banned. If you notice anysuspicious clicks of this nature, Google encourages you to report it to them. 3. CTR The normal CTR ratiomust be in between 0.5 % – 15 %. Anything more then 15 % will be flagged. 4. Cookies Few Adsense users,use the trick by using the dynamic IP address but it falls flat as cookies in computer can be used to trackour cookies and help identify the invalid clicks. 5. Physical Location Google has many software and bots totrace. They will trace the IP address of the small town and city. So do not click your own ads in differentinternet cafe and also in friend’s home. If you do this, your account will flagged. 6. Fake Web Traffic Fakeweb traffic is anything that generates false impressions on your Google AdSense advertisements, includingparticipating in link farms or link exchange directories. 7. Search Engine Ranking If you got many clickswithout the help of search engine ranking, social media traffic means Google will easily smell it. More veriuseful info here at [1]https://www.google.com and [2]http://www.ambabo.com

1. https://www.google.com/adsense/support/bin/request.py?hl=en&contact_type=invalid_clicks_contact

2. http://www.ambabo.com/do-you-know-how-google-detects-invalid-clicks/

Increasing Laptop Bty Life : Few ways (2010-07-19 07:15)

1. Hibernate: Hibernating the laptop is always a tidier option than putting it on standby, or shutting itdown. This is because the laptop’s hibernate mode saves it in the state it was hibernated in, and does notrequire the laptop to reboot all applications, thereby using much less power.

176

Page 177: Blogger to E-Book

2. Get some extra RAM: Whenever a laptop runs short of RAM memory it end up shifting to the virtualmemory which results in hard disk use, which is a much less efficient option in terms of power consumption.Putting in extra RAM does use more power, so don’t get too much extra, but when compared to the use ofvirtual memory it’s a more efficient option.

3. Apply energy saving options on the OS

4. Bring down the brightness of the screen

5. Shut Down External devices: Most USB devices and other external devices like external hard drivesor USB lights or even USB mice should be switched off and removed if not in use.

6. Shutdown background apps

7. Amend battery cycle: For a healthy Lithium-ion based battery, it is always suggested to keep theelectrons that are present inside in motion occasionally. That means it’s never a good idea to keep youlaptop plugged in or on charge all the time as the electrons lose their ability to store energy. One should letit discharge fully and charge it completely at least once a month to keep the battery as good as new.

8. Switch-off unused wireless radios

9. Try to reduce multitasking: When using the laptop on battery power, one should try as much aspossible to use one application at a time, and should ideally shut one application completely before openinganother, to reduce consumption of both processing and battery power.

10. Defrag on regular intervals

User Mapped-Section open??? (2010-07-26 21:14)

1. Regular users of Torrents might have seen something like the title disturbing them and stopping them oftheir downloads....i m one of them...so i tried and checked up few forums...tried doing force start etc...nothingworked....then tried disabling the antivirus for a while.....and it worked.....

2. So...simply just disable the antivirus for the time u wish to download....so lose some...gain some....

3.8 August

IPAD WORLD & VARIETIES (2010-08-12 22:23)

1. Ever wondered about how many variants of IPAD exists from various companies apart from ap-ple....many....and i mean really many....few of which i recently read in DIGIT

NOTION INK ADAM

1. Hard working hackers have recieved more then 700,000 pounds from thousands ofbank accounts in Britain using a malicious software which claimants say is the deadli-est,brutaliest(whats this???)trojan attack ever seen....

2. More then 4,000 online banking customers have found themselves as unwanted customersof this deal by hackers which empties their accounts while showing them fake statements sothe crime goes undetected.This trojan is being termed and guessed as a variant of the Zeus

177

Page 178: Blogger to E-Book

trojan banking virus called Zeus v3. This is capable of collecting data such as passwords andeven transfers money out of accounts automatically.

3. Beware ...nothing of this scale has happened till date in INDIA...why....because poor donthave much money and the rich keep and talk cash

1. Ever seen your account with minute details of each and every penny/cent/paise in your account...I msure many of you wouldn’t have....how does it matter if its Rs 22323.45 or Rs 22322.12.....a difference ofsome paise ...we generally account for it against rounding off....but now on be ware...u may just be a salaamitarget....better known as Saalami Attack

2. An example of this also known as penny shaving, is the mal practice of stealing money repeatedly inextremely small quantities, usually by taking advantage of rounding off to the nearest money unit viz centor paisa in financial transactions. It would be done by always rounding down, and putting the fractions of acent into another account. The idea is to make the change small enough that any single transaction will goundetected.

3. IT comes with a whole lot of things...u get some,u loose some.....be ware.For more info click [1]here, [2]hereand [3]here.

4. Thanks [4]http://www.cyberpolicebangalore.nic.in and [5]http://en.wikipedia.org

1. http://all.net/CID/Attack/papers/Salami2.html

2. http://en.wikipedia.org/wiki/Salami_slicing

3. http://www.ibls.com/ibls-internet-law-document.aspx?d=2447

4. http://www.cyberpolicebangalore.nic.in/

5. http://en.wikipedia.org/wiki/Salami_slicing

Windows Systernals (2010-08-23 21:58)

1. I had not heard and read about this very low key but very powerful utility site which helps one manage,troubleshoot and diagnose Windows systems and applications incl so many unheard functions and utilitiesthat one can go on and on exploring all.....the complete Windows systernals Suite can be downloaded byclicking [1]here[2].

2. Another related site named [3]Sysinternals Live is a service that enables to execute Sysinternals toolsdirectly from the Web without hunting for and manually downloading them.

3. Must see and must try site.....click [4]here to hit direct.

1. http://technet.microsoft.com/en-us/sysinternals/bb842062.aspx

2. http://technet.microsoft.com/en-us/sysinternals/bb842062.aspx

3. http://live.sysinternals.com/

4. http://technet.microsoft.com/en-us/sysinternals/default.aspx

BILL GATES & Khan Academy (2010-08-25 21:55)

1. I m a follower of Bill Gates on twitter and have come to know of this khan academy thru this......

178

Page 179: Blogger to E-Book

2. When every one looks forward to learning from Bill Gates on so many aspects of IT education.....wheredo u guess his 11 year old son looks up-to for his education.....he follows Salman Khan...no no...not theBollywood Dabanggg...he is another Salman Khan.[1]..[2].click here to know more.....

3. Khan turns out thousands of videos from a converted walk-in closetin his Silicon Valley home (shown inthis pic below) ...................gr888888888 work...and imagine the amount of effort that he has put in singlehandedly here......

4. This site at [3]http://www.khanacademy.org/ has 1600 plus videos for school level maths,chemistry andscience and many more subjects.....[4]more news ....click here

1. http://www.khanacademy.org/

2. http://www.khanacademy.org/

3. http://www.khanacademy.org/

4. http://money.cnn.com/2010/08/23/technology/sal_khan_academy.fortune/index.htm

3.9 September

Man in the Browser Attack : New dimension of cyber attack (2010-09-02 19:20)

1. The name is interesting though and so is the working behind....MITB (Man in the Browser) attacks aredesigned by fraudsters to infect a web browser with malware which can result in mmodified web pages andtransactions that are largely transparent to both the user and the host application.Trojans incl [1]SilentBanker,[2]Sinowal etc are pre programmed by fraudsters to activate when the user browser accesses a specificwebsite such as their online banking portal.The activated trojan can then track the online session and performreal time interception etc that can lead to illegal money transfers,identity theft and further compromise onthe users personal info. 2. The Man-in-the-Browser attack is the same approach as [3]Man-in-the-middleattack, but in this case a Trojan Horse is used to intercept and manipulate calls between the browser and itssecurity mechanisms or libraries in real time.A MitB attack will be successful irrespective of whether securitymechanisms such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place. 3. Thanks[4]http://fanaticmedia.com/infosecurity/

1. http://www.symantec.com/security_response/writeup.jsp?docid=2007-121718-1009-99

2. http://www.symantec.com/security_response/writeup.jsp?docid=2007-121718-1009-99

179

Page 180: Blogger to E-Book

3. http://en.wikipedia.org/wiki/Man-in-the-middle_attack

4. http://fanaticmedia.com/infosecurity/

ScareWare : One more WAREior in the family (2010-09-02 19:58)

1. Adware,spyware,malware....and now one SCAREWARE.Imagine this...u r surfing innocently(???) on theweb via your home/office PC,an advertisement appears on the web-page, trying to convince you that yourcomputer is at risk and you must download the anti-virus to clean it. Once you click on the advertisement,a software trigger gets activated and you get caught in an unnerving loop impossible to abort. A scannerwindow will appear with red-letter warnings listing viruses purportedly infesting your hard drive. A seriesof dialogue boxes will follow giving you choices that all lead to the same screen: a sales pitch. Make thepurchase, and you get a bogus inoculation. Try to cancel it, and you’ll get repeated offers. It’s like steppinginto quicksand. The more you try to get out of it, the deeper you sink.....this is Scareware..the latest newgeneration way to get ur PC infected...although its first origin dates to sometime in 2004...its now that thisis getting firm roots via increased strength of web surfers who are naive about security. 2. In brief, thescareware trickery ensnares internet users in the following steps:

• Criminals buy blocks of advertisement space on websites, intermittently slipping in a tainted adver-tisement.

• Just visiting a webpage with a tainted ad causes a fake warning box to appear.

• Clicking ”OK” or ”Cancel” launches the same thing: a ”free scan.”

After you’ve been lured into a fake ”free” scan of your PC:

• The bogus scan will purport to find a virus infestation.

• Ensuing boxes steer the user to activate ”Personal Antivirus,” on left.

• The activation prompts take the user to a shopping cart.

• Declining to place an order triggers endless fake scans.

3. Thanks [1]http://fanaticmedia.com

1. http://fanaticmedia.com/

TABNAPPING : A new generation Cyber Crime (2010-09-02 21:25)

1. Another new term in the cyber crime is ”Tabnapping” a combination of ”tab” and ”kidnapping” that couldbe used by phishers to dupe users into giving up passwords by secretly changing already-open browser tabs.All browsers on Windows and Mac OS X are vulnerable.It is thus a computer exploit,a kind of phishing attack,which persuades users to submit their login details and passwords to popular Web sites by impersonatingthose sites and convincing the user that the site is genuine. Eg . An open tab of Facebook for instance maybe a false window. But very few of us may notice. As a result, we readily log in our username and passwordwhen prompted, only to fall to phishers.

180

Page 181: Blogger to E-Book

2. [1]Aza Raskin is the person behind coining this term,this 1984 born genius is an active phishing re-searcher.It is unlikely that Browser makers will patch this up soon the risk does not emanate from securityvulnerabilities per se.

3. However, every major browser has a filter of some kind designed to weed out malicious sites and sitessuspected of being infected with attack code. Those filters, assuming the blacklists underlying them arecurrent and accurate, would block tabnapping attacks.

4. Thanks [2]http://www.standardmedia.co.ke & [3]http://www.couponsherpa.com

1. http://www.google.co.in/url?sa=t&source=web&cd=3&ved=0CCUQFjAC&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%

2FAza_Raskin&ei=n8l_TPXfMYKGvAP8l4WhBA&usg=AFQjCNEn__1Loadv4fkU2tH5oUW6eRf9GQ&sig2=lF40D7j2Yi0SQBJo3mewOg

2. http://www.standardmedia.co.ke/

3. http://www.couponsherpa.com/

E-Waste & Indian Policy (2010-09-06 07:40)

1. In my earlier blog posts at [1]here,[2]here & [3]here ,issues of e-waste and its repurcussions were men-tioned.....now seems like Indian govt has attempted to wake herself up and find a solution.In a recent develop-ment,Directorate of Revenue Intelligence (DRI) seized some containers in Chennai containing large quantityof such waste. The imports were made despite a prohibitory order in this regard. The containers were fullof outdated computers and electrical waste. On further investigation, it was found that containers carriedhundreds of tonnes of e-waste sourced from Australia, Canada, Korea and Brunei in violation of norms.

2. E-waste is being dumped in the country by developing nations using loopholes in domestic rules which allowNGOs and educational institutions to import such gadgets freely on the pretext of donations. onscious of thefact that huge shipments of e-waste generated in developing countries are finding convenient burial groundin India, the government had through a public notice on May 13, 2010 prohibited educational and otherinstitutions from importing second hand computers, laptops and computer peripherals, including printers,plotters, scanners, monitors, keyboards and storage units. The step was short of a complete ban on suchimports.

3. The government is now looking at banning the import of used computers and other electronic waste -coming primarily from developed nations such as US, Australia, Canada and parts of Europe - after severalcases of e-waste smuggling came to light recently. A decision is likely to be taken at the Economic IntelligenceCouncil meeting scheduled for this month to be chaired by finance minister Pranab Mukherjee.

4. Thanks [4]http://timesofindia.indiatimes.com

1. http://anupriti.blogspot.com/2009/04/guiyu-connection-with-e-waste.html

2. http://anupriti.blogspot.com/2009/05/e-waste.html

3. http://anupriti.blogspot.com/2009/07/e-waste-deposit-get-paid.html

4. http:

//timesofindia.indiatimes.com/india/Govt-may-ban-import-of-e-waste/articleshow/6501864.cms#ixzz0yiABJRqh

181

Page 182: Blogger to E-Book

New Gen BIOMETRICS : PALMSECURE from FUJITSU (2010-09-13 07:52)

1. Quiet often we seen biometrics fingers,palm,eyes,retina being chopped off in Hollywood movies for gainingillegal access to control rooms and secure areas by the bad man...so we used to think like there is no endand no permanent solution to this....now comes a solution to this problem wherein not the fingerprint or thepalm print is taken as authentication model....it is the veins inside that exist inside the palm that matterand should match...now these veins should also be flowing blood to authenticate the logger.

2. Fujitsu provides a highly reliable biometric authentication system based on palm vein pattern recognitiontechnology. PalmSecure™ features industry-leading authentication accuracy with extremely low false rates,and the non-intrusive and contactless reader device provides ease of use with virtually no physiologicalrestriction for all users.Applications include :

• Physical access control / Time and Attendance

• User authentication to PCs or server systems

• Government / Commercial identity management systems

• OEM terminal devices (POS, ATMs or information kiosks)

• Other industry-specific applications

•182

Page 183: Blogger to E-Book

3. More about this [1]here.

1. http://www.fujitsu.com/us/services/biometrics/palm-vein/

ORDER OF VOLATILITY OF DIGITAL EVIDENCE (2010-09-15 21:04)

1. Not all information-based evidence is the same! Evidence can be organized into an “order of volatility”meaning how long it will stick around for you to collect until it automatically is lost.

2. Dan Farmer & Wietse Venema created the below table of evidence volatility, which is commonly referencedby forensic professionals. For example, information stored on a CD-R or some optical storage media can lastfor about 10-100 years depending on the brand used. Information stored in a computer’s main memory, bycontrast, will last for only tens of nanoseconds before it is wiped out by the computer’s normal processing.

183

Page 184: Blogger to E-Book

TYPE OF DATA

LIFESPAN

Registers, peripheral memory, caches, etc.

Nanoseconds or less

Main memory

Ten nanoseconds

Network state

Milliseconds

Running processes

Seconds

Disk

Minutes

Floppies, backup media, etc.

Years

CD-ROMs, printouts, etc.

Tens of years

3. Very critical from forensics point of view.....most people would want to turn a computer off (or at thevery least unplug it from the network) when they realize an incident has occurred. However, as noted in thechart above, one will lose evidence in main memory and “network state” information (which other systemsthe computer is connected with and what information they are exchanging) with such an approach. Evenshutting down a computer the “normal” way (Start / Turn Off Computer / Turn Off in Windows XP) candelete evidence, as Windows performs a number of housekeeping tasks in the shutdown process, such asclosing opened files and clearing out the temporary disk cache.

4. Thanks Peter C. Hewitt (Read from Browser Forensics).

Cyber Warfare : It has started (2010-09-16 13:47)

1. I have been recently digging deep into reading [1]”Tracking Ghostnet”& ”[2]Shadows in the cloud”.Crisp,tothe point,full of information,a must read for all IT Security savvy personnels.This is where I got to read about

184

Page 185: Blogger to E-Book

”[3]The May 2007 DoS Attacks on ESTONIA”.Brief about this Estonia Case below :

2. Subject attacks on Estonia capitallyy known as Estonian Cyberwar or Web War 1, refers to a series ofcyber aggresses that began April 27, 2007 and deluged websites of Estonian organizations, including Estonianparliament, banks, ministries, newspapers and broadcasters, amid the country’s row with Russia on somerelocation issue of the Bronze Soldier of Tallinn.Most of the attacks that had any influence on the generalpublic were distributed denial of service type attacks ranging from single individuals using various low-techmethods like ping floods to expensive rentals of botnets usually used for spam distribution. Spamming ofbigger news portals commentaries and defacements including that of the Estonian Reform Party website alsooccurred.

3. Subsequent to the incident, a criminal investigation was conducted and On 24 January 2008, DmitriGalushkevich, a student living in Tallinn, was found guilty of participating in the attacks. He was fined 17,500kroons (approximately US $1,640) for attacking the website of the Estonian Reform Party.So surprisingly,afterso much of damge had been done,so much of ministeries websites were defaced,the followup resulted in a singleconviction of a Russian Living in ESTONIA.Imagine....one single person from Russia was found responsiblefor the cyber havoc that Estonia had to face.

4. The net and the cyber world is still in the stage of nascency and there is lots coming ahead for sure infuture...like the events surfaced in the movie ”[4]Live Free or Die Hard”.Every one across the globe today hasrealized the potential of Cyber warfare.....and the power is immense....anyone who is clear....stands as ONEMAN ARMY.....as cited through one eg above.

1. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.nartv.org%2Fmirror%

2Fghostnet.pdf&ei=2dKRTKWtK4G2vQOG952SBA&usg=AFQjCNGmDHveSkcPYPDEfAIbi5V_6Wlcbw

2. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.nartv.org%2Fmirror%

2Fshadows-in-the-cloud.pdf&ei=pdKRTPKrCougvgOtkKGQBA&usg=AFQjCNG862EIwNn9zKt689y0-hUdDItN4g

3. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%

2F2007_cyberattacks_on_Estonia&ei=D9ORTOuRL4LovQO4-KXDAw&usg=AFQjCNGGEg4b8qvWEOshpfYXYTYmAdbKOg

4. http://www.google.co.in/url?sa=t&source=web&cd=2&ved=0CCYQFjAB&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%

2FLive_Free_or_Die_Hard&ei=UdORTMSqL46kvgOpkqGIBA&usg=AFQjCNHJ42RoeUPO2ZU7UoC5oFFHSCUrcg

ZERO DAY EXPLOIT : ??? (2010-09-18 22:45)

1. While reading an article on [1]Browser Forensics,came across this term ”0-day” exploit....whats it allabout?

2. A zero day exploit is a malevolent computer attack that takes capitalizes on a security hole before thevulnerability is known. This means the security issue is made known the same day as the computer attack ismade. In other words, the software developer has zero days to prepare for the security breach and must workas quickly as possible to develop a patch or update that fixes the problem.This occurs on or before the firstor ”zeroth” day of developer awareness, meaning the developer has not had any opportunity to distribute asecurity fix to users of the software.

185

Page 186: Blogger to E-Book

3. Zero day exploits may involve viruses, trojan horses, worms or other malicious code that can be runwithin a software program. While most programs do not allow unauthorized code to be executed, hackerscan sometimes create files that will cause a program to perform functions unintended by the developer.Programs like Web browsers and media players are often targeted by hackers because they can receive filesfrom the Internet and have access to system functions.While most zero day exploits may not cause seriousdamage to your system, some may be able to corrupt or delete files. Because the security hole is madeknown the same day the attack is released, zero day exploits are difficult to prevent, even if you haveantivirus software installed on your computer. Therefore, it is always good to keep a backup of your data ina safe place so that no hacker attack can cause you to lose your data.

4. Thanks [2]http://www.techterms.com/

1. http://www.google.co.in/url?sa=t&source=web&cd=2&ved=0CBoQFjAB&url=http%3A%2F%2Fwww.browserforensics.org%

2F&ei=UPSUTNWyGYygvgOL0MyZDQ&usg=AFQjCNEj7ZDkhthSVE3OzOE14Xb-IT3HvQ

2. http://www.techterms.com/

Root Kits : Hidden Undetected Threats (2010-09-18 22:57)

1. Malwares,trojans,adwares,spywares,virus,wormwares etc etc....protection vide Internet security editions byso many OEMs...and now rootkits(its not actually a recent development....)...has been in the threat makingfor about 10-12 years..but now the term is getting serious....so what actually are rootkits?

2. Rootkit is the term given to a group of utilities that hackers can misrepresent to keep access into acomputer system once they have hacked into it. It gives them admission rights to find out usernamesand passwords, allow strike against remote systems, remain hidden by erasing history from the systemlogs, and overabundance of various surreptitious tools.Rootkit is a combination of two words, “root” and“kit”. Root means supreme & Kit means a group of programs or utilities providing access to a user toretain a constant root-level contact to a terminal. The presence of rootkit ideally remains untraceable.

186

Page 187: Blogger to E-Book

3. So more simply,they are a set of programsthat can hide not only themselves but also other viruses, spyware, keyloggers and network traffic from normalantivirus and spyware removal software! Yes, a rootkit can infect your computer and take full control of it!You look inside a folder which contains rootkit files but you will see nothing. Why? Because the rootkit hastold it to tell the user there are no files here. That is why, they are so dangerous and hard to detect...... 4.BlackLight,RKDetector 2.0,RootkitBuster 1.6,RootkitRevealer 1.71 & Rootkit Unhooker 3.0A are few of therootkit removal tools available...google for further details 5. Thanks [1]http://www.rootkitonline.com/

1. http://www.rootkitonline.com/

Browser Forensics - Not Simple (2010-09-19 13:26)

1. Just read one book by [1]Peter C.Hewitt on Browser Forensics.An eye opener for anyone....the amount ofinfo that stands compromised whilst using any browser is astonishing.....

2. Now in a normal routine maintenance when I used to clear my browser History,cookies and cache....when Iused to remove unnecessary files using utilities like [2]Glary Utilities,[3]Cc Cleaner and [4]Tuneup utilities....iused to think that there r no traces left...before I was introduced to [5]Mandiant’s Webhistory, [6]Pasco,[7]Galleta and [8]IE Passview.

3. I checked up first with [9]Mandiant’s Webhistory....an 8 MB file...simple to install” ,free.Web Historianis a program that allows an investigator to collect, display and analyze web history data using MandiantIntelligent Response (MIR) technology. It seeks to provide a customizable yet simplistic interface to viewand navigate voluminous amounts of web history data. Perhaps the most powerful feature is the ability tocorrelate and provide multiple views of the data (including graphical and timeline) through the Analyzerand Web Profiler tool, in the hopes that investigators can come to well-informed conclusions about the dataquickly.

4. So after I cleaned up my PC using every utility....and scanned the PC with this software....the result waslike nothing has been removed...all what I had accessed in last few days stands out in a compiled tabulatedform ready to be saved as a Excel file for record.So what exactly allows this info extraction in spite ofassurances from utilities available.The most recent versions of Windows store information about the pagesviewed by the browser in a file called index.dat. One of the index.dats, in turn, contains information pointingto other files used in the browsing session. Windows has 3 types of index.dat files, for the cache, history andcookie files, respectively.Obviously, viewing all 3 types will give us the best understanding of what browsingtook place. So....its not simply erasing ur history that could save you at some time......there is much muchmore ........

1. http://www.browserforensics.org/wp.../03/BrowserForensics-v1-03-03-2010.pdf

2. http://www.glaryutilities.com/

3. http://www.piriform.com/ccleaner/download

4. http://www.tune-up.com/products/tuneup-utilities/

5. http://www.mandiant.com/

6. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.opensourceforensics.

187

Page 188: Blogger to E-Book

org%2Ftools%2Funix.html&ei=EL-VTLnEKo2CvgPA05GaDQ&usg=AFQjCNFDCDT1hNbmmc_bCIjYd_HLC9Bptg

7. http://www.foundstone.com/us/resources/proddesc/galleta.htm

8. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.nirsoft.net%2Futils%

2Finternet_explorer_password.html&ei=J7-VTLW4G4KiuQPSl_GtDA&usg=AFQjCNGPXqseM96ZRiYB_j7CyfJRUh8dRA

9. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBUQFjAA&url=http%3A%2F%2Fwww.mandiant.com%2F&ei=

-MCVTNLhMYOuvgOVkvjFAw&usg=AFQjCNGB8oo0VnFU1qzwiNmkZ7LWHh4Ekw

Shadows in the Cloud : Cyber Espionage (2010-09-30 11:24)

Uploaded a Presentation on this recently been my fav article to read on Scribd.....[1]Shadows in the Cloud

1. http://www.scribd.com/doc/38447191/Shadows-in-the-Cloud

3.10 October

CLEANERS & FOOTPRINTS (2010-10-07 17:14)

1. Off late I have been experimenting with few software’s which claim to do a 100 % cleansing actionof removing every browsing marks and history of any kind on your computer that u use for work andsurfing.These incl the following :

- CyberScrub Privacy Suite v 5.1 - [1]PC Tools Privacy Guardian v4.5 - [2]Webroot Window Washer 6.5.5.155- [3]MilEraserSetup XP2k - [4]Privacy-eraser - [5]Notrace-setup - [6]Eraser 6.0.7.1893

2. Among these I have no doubts of who is leading?....CyberScrub Privacy Suite v 5.1 & PC Tools PrivacyGuardian v4.5.Though CyberScrub Privacy Suite v 5.1 does leave Chrome traces and does’t have Chromeincluded in its list of browsers......It does a pretty neat job by giving options of wiping that include NavyStaff Office Publication (NAVSO PUB) 5239,Russian Gost,Brouce Schneier algorith and many others withoptions of selecting passes......on the other side ie PC Tools Privacy Guardian v4.5...includes chrome as aoption to be selected with similar wiping algorith options.....

3. Try you must.......all of them to know the real difference or simply follow the recommendations......

1. http://www.pctools.com/privacy-guardian/

2. http://www.webroot.com/En_US/consumer-products-windowwasher.html

3. http://3d2f.com/tags/mil/eraser/

4. http://www.privacyeraser.com/

5. http://www.no-trace.org/

6. http://eraser.heidi.ie/

Security Enabled Hardware :INTEL - McAfee Merger (2010-10-08 17:54)

1. “Security is more effective when enabled in hardware” provisions for something in the pipe known asSecurity Enabled Hardware.Howzzz that???? There has been a lot of speculation about the rationale behindIntel’s recent acquisition of McAfee....well if u r not aware of this Intel’s proposed $7.7billion purchase of

188

Page 189: Blogger to E-Book

McAfee that comes as the most magnanimous takeover deal in the chip giant’s 40-odd-year history....u betterbe now....although there is no product roadmap to speak of yet.

[1]

2. McAfee technology deeply desegregated into Intel products would mean adding security functional-ity into Intel’s chip. But would this pushing security into silicon be able to negate the increasinglysophisticated and dynamic threats from cyber crime? Though components of security could be sig-nificantly enhanced if chips were designed integrating this way. What about updates,patches etc [2]

3. Security in the 21st century is about being dynamic, responding to the ever-changing threat landscapein real-time, which you can do with a cloud-based system powered by a network of threat intelligence sen-sors and reputation-based technologies that stop threats before they even hit the device. Pushing securitydown to the hardware level makes it very difficult to be reactive, agile or fundamentally secure. 4. Thanks[3]http://www.infosecurity-magazine.com

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TK8N6-QPdhI/AAAAAAAAAuc/dfrD7LmDaRc/s1600/intel-mcafee1.jpg

2. http://4.bp.blogspot.com/_z1QH8I3k9vk/TK8MvQ2avLI/AAAAAAAAAuY/j3wWQLT8LT0/s1600/masthead_intel.jpg

3. http://www.infosecurity-magazine.com/

(2010-10-08 19:32)

(2010-10-08 19:38)

My routine surfing on net invariably includes few video downloads,uploading videos to you tube and othersites sometimes,convert various available audi video formats to compatible formats with the help of so many

189

Page 190: Blogger to E-Book

convertors available accross,fiddling with audio formats,burning CDs & DVDs with videos and data files....ina typical scenario all this would be done on arange of softwares of different companies.....came across thisabsoutely free software ie FREE STUDIO...one single window solution to evri task as mentioned above andmuch more....and yes it is absolutely free...try it must...

ALL izz WELL!!!!!inside this- Check out FREE STUDIO (2010-10-08 21:56)

My routine surfing on net invariably includes few video downloads,uploading videos to you tube and othersites sometimes,convert various available audi video formats to compatible formats with the help of so manyconvertors available accross,fiddling with audio formats,burning CDs & DVDs with videos and data files....ina typical scenario all this would be done on arange of softwares of different companies.....came across thisabsoutely free software ie [1]FREE STUDIO...one single window solution to evri task as mentioned aboveand much more....and yes it is absolutely free...try it must...

[2]

1. http://www.dvdvideosoft.com/free-dvd-video-software.htm

2. http://1.bp.blogspot.com/_z1QH8I3k9vk/TK9FjmRuCpI/AAAAAAAAAug/surFwtQF5MY/s1600/Capture.JPG

RISK MANAGEMENT : Beware while u update with Patches (2010-10-08 22:09)

1. A zero-day exploit as discussed at an [1]earlier post in this blog .....Some thing more to it...

2. A good extract straight lift from [2]Infosecurity-magazine.com

”For a vendor, developing the update is not the part that takes time – testing is. We have more than 600million downloads when we publish an update. If we “just” break 10 % of the systems the update is installed,it would be a huge denial of service. So testing is the name of the game. How well is an unofficial patchtested?Often the vendor publishes workarounds (at least we do). This should be part of your risk mitigationstrategy. Would the workaround be acceptable to buy you time?

How far do you trust the author of the unofficial update? How big is the risk that the update comes withpre-installed malware? The question immediately comes up: Why should we trust a vendor? Well, youbought or downloaded the software at the first hand – so, you decided to trust the vendor at the beginning.

190

Page 191: Blogger to E-Book

What do you do once the vendor releases an update? Can you de-install the unofficial update?

Basically, it is a risk management decision, which should include at least the questions I raised above. Donot just run for the unofficial update – to me it should be really the last resort, if even!”

3. A good site to follow : Check out [3]http://www.infosecurity-magazine.com[4]

1. http://anupriti.blogspot.com/2010/09/zero-day-exploit.html

2. http://infosecurity-magazine.com/

3. http://www.infosecurity-magazine.com/

4. http://www.blogger.com/

Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla(2010-10-08 22:32)

1. I am sure we all endeavor to keep the antivirus updated,keep the OS patch updated,keep cleaning reg-istries,keep cleaning browser history at regular intervals,keep ensuring regular complete scan of the preciousPC Machine that we own....we all do this to ensure that we r safe while we browse...now read further to findout how it all goes in vain even with the best and leading browser company......

2. Antivirus company [1]Webroot have identified an information extracting trojan, which alters a Firefoxfile, so that the browser stores passwords automatically.The trojan is named as Trojan-PWS-Nslogm andis capable of stealing usernames and passwords stored by both Internet Explorer and Firefox browsers.Bydefault, whenever Firefox detects that login credentials are submitted through a Web form, it offers toremember them for future use.When this happens, the user is presented with several options which include”Remember”, ”Never for This Site” or ”Not Now”. If they choose remember, the browser stores the usernameand password in a local database.Since it’s easier to steal credentials from this database instead of injectingthe browser process and grabbing them as they are submitted, the author of this trojan thought it wouldmake more sense to have Firefox remember all passwords without asking users for confirmation.To achievethis, he created a routine to patch the nsLoginManagerPrompter.js file in the Firefox installation by addingnew code and commenting out some already existent lines.”The Trojan then scrapes information from theregistry, from the so-called Protected Storage area used by IE to store passwords, and from Firefox’s ownpassword storage, and tries to pass the stolen information onward, once per minute,” Andrew Brandt, amalware researcher at Webroot, explains.

3. The password stealer installs itself in the c:\windows\system32 folder as a file called Kernel.exe. Thecaptured data is send to a command and control server via a deprecated ActiveX control called msinet.ocx.

4. So kya solution hai?...whats the solution to this?...simply stop using internet....just joking...solution beingworked out still at FIREFOX labs.Thanks [2]http://news.softpedia.com

1. http://www.webroot.com/En_US/consumer-products-antivirus.html

2. http://news.softpedia.com/

Stuxnet : A Milestone in Malicious Code History (2010-10-11 22:19)

1. Stuxnet,the internet worm,intent of which was thought to effect Iran’s nuclear programme has now takena U Turn towards HINDUSTAN....

191

Page 192: Blogger to E-Book

2. American cyber warfare expert Jeffrey Carr has assured the GoI,that China the originator of this wormwhich has terrorised the world since Mid 2010. Ascribing the break down of ISRO’s INSAT 4B satellite afew months ago ,Carr said it is China which gained from the satellite failure. Although he re affirms that theconclusions are not definite.Invariably the effected systems are loaded with a Siemens software which havebeen specifically targetted to which Siemens has released a detection and removal tool.Siemens recommendsinstalling the Microsoft patch for vulnerabilities and disallowing the use of third-party USB sticks.It is furthercontemplated that incorrect remotion of the worm could cause irrepairable damage.

3. Jeffrey Carr says ”The satellite in question (INSAT 4B) suffered the power ‘glitch’ in an unexplainedfashion and it’s failure served another state’s advantage – in this case China,” he said.The connecting linkbetween INSAT 4B and Stuxnet is that the Siemens software is used in ISRO’s Liquid Propulsion SystemsCentre ie S7-400 PLC and SIMATIC WinCC.Something about Stuxnet...these attack Windows systems usingfour zero-day attacks and targets systems using Siemens’ WinCC/PCS 7 SCADA software. It is initiallyspread using infected USB flash drives. Once inside the system it uses the default passwords to commandthe software.Few intretsing things about this :

- Half a megabyte in size

- Written in different programming languages (including C and C++)

- Digitally signed with two authentic certificates which were stolen from two certification authorities (JMicronand Realtek) which helped it remain undetected for a relatively long period of time. - Capabable to upgradevia peer to peer.

- Eric Byres, an expert in maintaining & troubleshooting Siemens systems, expects that writing the codewould have taken many man-months.

4. Stuxnet is a threat aiming a specific industrial control system such as a gas pipeline,satellite systems &power plants. The ultimate goal of Stuxnet is to sabotage the facility by reprogramming programmable logiccontrollers (PLCs) to operate as the attackers intend them to, most likely out of their working and identifiedboundaries.This worm represents the first of many milestones in malicious code history ,it is the first to exploitfour 0-day vulnerabilities, compromise two digital certificates, and inject code into industrial control systemsand hide the code from the operator. Whether Stuxnet will usher in a new generation of malicious codeattacks towards real-world infrastructure,overshadowing the vast majority of current attacks affecting morevirtual or individual assets—or if it is a once- in-a-decade occurrence remains to be seen.Stuxnet is of suchgreat complexity requiring significant resources to develop—that few attackers will be capable of producinga similar threat, to such an extent that we would not expect masses of threats of similar in sophisticationto suddenly appear. However, Stuxnet has highlighted direct-attack attempts on critical infrastructure arepossible and not just theory or movie plotlines.The real-world implications of Stuxnet are beyond any threatwe have seen in the past.

5. When is India actually going to work for itself rather then performing across the globe...y is the worldtelling us that we are effected here...even in the case of [1]SHADOWS IN THE CLOUD...we were told by the[2]Shadow server foundation that our institutes have been compromised inspite of the fact that we have all ittakes to take the IT world by storm...but we are all working for ourselves...and not for own country...creamis flowing out and getting outsorced..IT IS ACTUALLY SAD THAT THE WORLD KNOWS INDIA’SPOTENTIAL BUT THE INDIANS DONT KNOW THIER OWN.....

1. http://anupriti.blogspot.com/2010/09/shadows-in-cloud-cyber-espionage.html

2. http://www.shadowserver.org/wiki/

192

Page 193: Blogger to E-Book

Biggest release of Patch update by MICROSOFT (2010-10-12 07:27)

1. Patches by MS to be released today are said to be the biggest and largest batch of updates by Microsoftsince Oct 2003.According to Microsoft, this batch will be the LARGEST in its history with no less than 16security updates designed to address a total of 49 vulnerabilities in Windows, Internet Explorer, MS-Officeand the software giant’s .NET Framework.

2. All this effort and size of the patches by MS reflects how vulnerable each one of us remains to thehacking and leak of personal info in wrong hands....the batch of updates will include Windows 7 criticalupdates,updates for Internet Explorer, MS -Office 2010.And all those happy using the pirated copies of OSacross remain as vulnerable as they are already....

Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:41)

1. First watch this video and then read few lines on what CYBERTECTURE is?

[EMBED]

2. A state of art technological concept that appropriates a emblematic relationship between the urban fabricand technology. It excogitates both hardware of built environment and software system and technologiesfrom micro to macro scales of development.I am sure the video would have opened thinking horizons to whatmroe can be done with this.....wish to read more....[1]click here

3. Click for more at [2]http://www.jameslawcybertecture.com/

1. http://www.jameslawcybertecture.com/

2. http://www.jameslawcybertecture.com/

Another Wowwwwww!!!!-CYBERTECTURE (2010-10-15 18:55)

1. First watch this video and then read few lines on what CYBERTECTURE is?

[EMBED]

2. A state of art technological concept that appropriates a emblematic relationship between the urban fabricand technology. It excogitates both hardware of built environment and software system and technologiesfrom micro to macro scales of development.I am sure the video would have opened thinking horizons to whatmroe can be done with this.....wish to read more....[1]click here

3. Click for more at [2]http://www.jameslawcybertecture.com/

1. http://www.jameslawcybertecture.com/

2. http://www.jameslawcybertecture.com/

CANURE : 100 on ACID3 Test (2010-10-15 19:57)

1. Last year in March 09,I [1]wrote on my acquaintance with ACID3 and then CHROME scored the highestamong the then present browsers.....now here comes a little known [2]CANURE and u believe it or not...whats

193

Page 194: Blogger to E-Book

the score?...100 on 100......perfect 100....m sure worth a try...when chrome is scoring about 80 in 100 ,thisclaims getting 100/100 in Acid 3 Web Tests and 145/160 in HTML 5 Test.

2. [3]Download here.

1. http://anupriti.blogspot.com/2009/03/fight-of-browsers-acid3-test.html

2. http://www.blixcorp.com/Blix.htm

3. http://www.mediafire.com/?hxbwaf9v1a69wyi#1

Is ur Account Hacked ?- Common ways u get compromised. (2010-10-16 07:43)

1. There is no doubt on the fact that [1]Google users are growing phenomenally.....and with this growing risealso comes the phenomenal rise and ways to get compromised or become a [2]botnet.Thus a Google Accountis also valuable for spammers and other unknown citizenry looking to impair you with ur personal info anddata on ur pc and account inbox. It’s not so much about your account, but rather the fact that your circleof relatives and friends see your Google Account and mails from it as reliable.

2. Nothing new about this but the most common ways hackers can login to your Google password are:

• Password re-use: You sign up for an account on a third-party site with your Google username andpassword. If that site is hacked and your sign-in information is discovered, the hijacker has easy accessto your Google Account.

• Malware: You use a computer with infected software that is designed to steal your passwords as youtype (“keylogging”) or grab them from your browser’s cache data.

• Phishing: You respond to a website, email, or phone call that claims to come from a legitimateorganization and asks for your username and password.

• Brute force: You use a password that’s easy to guess, like your first or last name plus your birthdate (“ujjwal3008”), or you provide an answer to a secret question that’s common and therefore easyto guess, like “dosa” for “What is your favorite food?”

3. Another common error that we all unknowingly is that we keep the password same for multiple accountson [3]yahoo,[4]gmail,[5]blumail and so on.......put on ur thinking caps......if one account linked to other username is compromised ....then in a way all are....

1. http://en.wikipedia.org/wiki/Google

2. http://en.wikipedia.org/wiki/Botnet

3. http://en.wikipedia.org/wiki/Yahoo!

4. https://mail.google.com/mail/?shva=1

5. http://www.blumail.org/

194

Page 195: Blogger to E-Book

Stuxnet : Some more good info (2010-10-16 08:06)

1. Recently,[1]after i mentioned Stuxnet on [2]Meliorate...I found some more good info and FAQs at[3]http://www.newscientist.com/........must read....

1. http://anupriti.blogspot.com/2010/10/stuxnet-milestone-in-malicious-code.html

2. http://www.anupriti.blogspot.com/

3. http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is-like-nothing-seen-before.html?full=

true

CaaS : CRIME WARE AS A SERVICE at offer now (2010-10-18 18:05)

1. Bhaigiri...Supari..khokha...and similar terms have been till date used in reference with the crimeworld...now come to terms like [1]Software as a Service(SaaS), [2]Hardware as a service(HaaS) ,[3]Platformas a service(PaaS) etc and the list is all set to become endless with cloud computing...whats the relationhere?????..it goes 2 merge these two separate worldsie CRIME & IT....the earlier terms mentioned pertainto the world of crime and the later once refer to the vast possibilities and power knocking the users....thusrefers to Crimeware as a Service(CaaS)

2. The controverting side is the world of hackers & cyber criminals who seem to exploit their technicaltools to great effect. However, even for newbie hackers eager to join this world don’t need to possess therequired levels of technological expertise. CaaS (Crimeware-as-a-Service) pulled out of some distant Cloudcan provision the necessary tools, be they Virus/Worm Creation Kits, [4]Denial of Service (DoS) applicationsor more simply estabilishing a botnet.A recent research proved they can be just a mouse click away! Kitswere easily located to build a variant of ‘Indra’ Malware, as well as a manifestation of Badboy , providingthe user with the power to create their own version to send on to their targets.

3. Granted these are not examples of cutting-edge malware, but they do however still pose a threat tothe unprepared and unsuspecting organisation. As amazing as it may seem, even today there are largeorganisations who permit access to sites, and allow the download of Malware Construction Kits – and evenmore worrying, there are still pockets of companies who do not maintain their anti-virus or patches in anup-to-dtate condition.

4. Crime is going to be a inherent part in the cyber world and the cause of worry is that unlike army andmil est in the real world...no concrete effort and source is there to resist these evil forces.We are still actingto a situtaion when need of the hour is to be more then PROACTIVE.....

5. Thanks [5]http://www.infosecurity-magazine.com/

1. http://en.wikipedia.org/wiki/Software_as_a_service

2. http://searchitchannel.techtarget.com/sDefinition/0,,sid96_gci1285741,00.html

3. http://en.wikipedia.org/wiki/Platform_as_a_service

4. http://en.wikipedia.org/wiki/Denial-of-service_attack

5. http://www.infosecurity-magazine.com/

Service Packs & Infection Rates (2010-10-19 22:19)

1. First it was windows XP..then it was SP1(Service Pack 1)...followed by SP2,SP3 ...further by VistaSP1,SP2 and now Windows 7...how the upgrades in these packs have been reducing the infection rates isbriefly reflected as per stats from [1]Microsoft Security Intelligence Report.

195

Page 196: Blogger to E-Book

- Infection rate for windows XP with SP3 is less then half of that for SP2 and less then a third of SP1.

- Windows Vista SP2 has a lower inefction rate then SP1 which is about 50 % lower then Windows VistaBasic.

- In case of Server Operating SystemS,the infection rate for windows server 2008 with SP2 is about 20 %less then the predecessor ie Windows Server 2008 RTM.

2. Thanks [2]http://www.microsoft.com/security/sir/

1. http://www.microsoft.com/security/sir/

2. http://www.microsoft.com/security/sir/

Collection of Forensic Softwares : TUCOFS (2010-10-20 21:56)

I found this good link with a identified set of softwares for various OSs and lot many links to other web-sites..worth a look if u have some interest in [1]DIGITAL FORENSICS

Check out this link at [2]TUCOFS - The Ultimate Collection of Forensic Software

1. http://en.wikipedia.org/wiki/Digital_forensics

2. http://www.cybersnitch.net/tucofs/tucofs.asp?mode=mainmenu

Crack 14 Character passwords in Seconds : Objectif Sécurité (2010-10-26 07:57)

1. There have been articles and forums on the powerful high speed GPU (video card) processors being ableto easily provision cracking passwords very apace.A new technology steps here to rule the roast and allowpassword cracking upto 14 characters in seconds.....this is called [1]Objectif Sécurité ,by a Swiss securitycompany,which uses rainbow tables on SSD drives.Seemingly it is the hard drive access time and not theprocessor speed that slows down cracking speed. So using SSD drives can make cracking faster, but just howfast? This technique has a phenominal capacity that could crack passwords at a rate of 300 billion passwordsa second, and could decode complex password in under 5.3 seconds.

2. A real time demo of cracking is available on line at [2]Objectif’s free online XP hash cracker.Just visit thelink and see urself by mentioning the hash in the text box.....astoundingly simple....

3. Thanks [3]http://www.objectif-securite.ch/en/products.php

1. http://www.objectif-securite.ch/en/products.php

2. http://www.objectif-securite.ch/en/products.php

3. http://www.objectif-securite.ch/en/products.php

Image Ballistics : Incredible IT (2010-10-31 16:20)

1. In a typical crime or a murder case anywhere involving a pistol or a firing weapon,the forensic or theinvestigating personnel’s involved can make out the make and model of the firing weapon with the help ofthe bullet found on site.The field dealing with this is known as ballistics.Now sync this with the field ofIT....now imagine that u have shot a photograph or are analyzing some pic and you wish to know whichcamera was used to shoot that pic.......can u find out???????Yes....the answer is yesss!!!the field is known asImage Ballistics.

196

Page 197: Blogger to E-Book

2. In a recent case,i read about a rave party being organized at outer skirts of a city with about a 200 pluspeople ,all collegites and similar age group....all of them had a blast and a few with some wrong ideas caughthold of a girl...drugged her and made some obscene mms and clicked some pics...next day it was uploadedon the you tube and the social networking sites.....now how to find the culprit?pretty difficult when abouta 200 plus strength of personnel’s have to be inquired.....the answer is Image Ballistics....the investigatingagency got hold of the pics...came to know which model the pics were clicked from...yes the answer wasa famous Nokia Model mobile.....so the owners were now limited to 8 out of the 200 plus strength...theremobiles checked and the simple recovery software’s were enough to find out the culprit......imagine....isn’t itastonishing.....

[1] 3. I checked up the state of pics clicked from mycamera years back and all answers were correct.....few Nikon,few sony.......one easy and free tool for suchinvestigation is [2]JPEGSNOOP.Simple to download,very small size and great analysis report.....

4. [3]To know more click here......

1. http://2.bp.blogspot.com/_z1QH8I3k9vk/TM1Lrg5QMII/AAAAAAAAAuo/H9Qd16rQnew/s1600/CYBER+FORENSICS.jpg

2. http://www.impulseadventure.com/photo/jpeg-snoop.html

3. http://www.impulseadventure.com/photo/jpeg-snoop.html

VIRUS in Boot Sector in Hard Disk fresh from OEM!!!! (2010-10-31 21:08)

Have recently heard of this in reputed makes and model of Top list hard disks OEMs.Would like to know ifsome has ever encountered this or has any form of info on this?

OPERATION CISCO RAIDER (2010-10-31 22:24)

1. Counterfeiting is not new....since we were born we have been seeing dupli’s and counterfiets ofReebok,nike,hmv etc...the list is actually endless....this endless list is now augmented with IT inventory....tocite you an example which has rocked the nations across is about OPERATION CISCO RAIDER.

2. Relevant original EXTRACT FROM [1]http://www.coastnetwork.com is produced below :

” Cisco made a decision a decade ago to manufacture product in China as a way of cutting production costs.A great deal of Cisco manufacturing is now done overseas, specifically in China. What has happened is thatmany of the companies that do the outsourcing for Cisco now run an extra shift and sell the now counterfeithardware out the back door. After all, they have the manufacturing capability, the expertise and the full

197

Page 198: Blogger to E-Book

blessing of Cisco. The result? More and more counterfeit Cisco hardware is now showing up on Americanshores. Part of the problem is that China does not have strong intellectual property protection laws. This isa situation that Cisco and many other companies are still struggling to solve and one that does not promiseto be resolved soon.

Warning signs of a possible counterfeited item:

If you are getting discounts of 40-55 % off the list price for brand new hardware, i.e. sealed boxes, thenit is a red flag. The largest of Cisco’s customers – the Bank of Americas, Ford Motor Company, UnitedAirlines, AT &T, etc. get these discounts. You don’t. If it is any consolation, even dealers do not get thetop corporate discounts.

While it is flattering and tempting to receive big discounts for new Cisco hardware, it is also unrealistic andshould be treated with the utmost caution.

Ask what the retail price is and compare it to the price you are being quoted. If you are getting a 15-25 %discount from the list price for new/sealed hardware, then you are being quoted a fair and realistic price.Expect a reasonable discount, however; too big a discount often spells trouble.

Another sign to be aware of is the receipt of unsolicited email from unknown dealers offering you Ciscohardware at very good prices. This warning is doubly true if the email or company originates from mainlandChina.

3. Thanks [2]http://www.coastnetwork.com/counterfeitcisco

1. http://www.coastnetwork.com/

2. http://www.coastnetwork.com/counterfeitcisco

3.11 November

6$ is all to shut down a Cloud Client site!!!! (2010-11-01 08:34)

1. [1]CaaS,as mention at an earlier blog post here,has come up with a new success(or is it failure?) story.Nowthis goes like this.....invest $6 and take down any client’s server with the help of Amazon’s EC2 cloudinfrastructure!!!!!

2. The cloud-based denial-of-service attack was part of a presentation : Cloud Computing, a Weapon of MassDestruction? An onsite demo during the presenatation by Bryan and Anderson involved entering a name andcredit card number, the experts created a handful of virtual server instances on Amazon’s EC2. They startedwith only three virtual servers, uploaded their prototype attack tool, called [2]Thunder Clap, scaled up to 10servers, and then took their client’s company off the Internet.Security consultants David Bryan of Trustwaveand Michael Anderson of NetSPI said that they encountered nothing to stop them, like no special bandwidthagreements and no detection mechanisms for servers taking malicious actions. Their Thunder Clap programuses cloud-based services to send a flood of packets toward the target company’s network. They reported thatthey can control the software directly or through a command left on a social network.Bryan and Andersonlaunched the attack to test their client’s network, a small business that wanted its connectivity tested.According to DarkReading, Bryan said, ”A threat agent could potentially run extortion schemes against acompany by attacking for a couple of hours – and then telling the company that, if you don’t pay me, thenI will attack you again.” Amazon reportedly failed to reply to complaints by the security consultants.

3. This can provision customised Botnets availability on rent, giving ”would-be attackers a criminal ’cloud’from which to buy services.”......seems like it is still tooo early to rely 100 % on CLOUDS!!!!!!

198

Page 199: Blogger to E-Book

4. [3]More on this here.......

1. http://anupriti.blogspot.com/2010/10/caas-crime-ware-as-service-at-offer-now.html

2. http://blogs.computerworld.com/term/views/9089/comments

3. http://bit.ly/aYeOGR

Intel opens first chip plant in China?? (2010-11-01 18:01)

1. [1]The article at this post here informs in detail about the location,capacity of the first Intel chip set plantin China.The new plant fulfills Intel’s total investment commitment in China to $4.7 billion. Intel has alsoestablished an assembly and test site in Chengdu as well as R &D centers and labs in Beijing, Shanghai andelsewhere in China, it said.

2. What made me took a second read on this article was that since about last 6 years,whatever Motherboardsand Chipsets from intel I have bought and seen in various machines....all chip sets have a common imprintof MADE IN CHINA since then....so if this is the first plant being set up in china....where were the earlierones being made or printed???????

1. http://www.reuters.com/article/idUSTRE69P0TW20101026

Adobe flash Player hit!!!! (2010-11-01 18:45)

1. A critical vulnerability has been exposed in Adobe Acrobat 9.4 and earlier 9.x versions for Windows andMacintosh operating systems & Adobe Flash Player 10.1.85.3 and prior versions for Windows, Macintosh,Linux and Solaris operating systems; Adobe Flash Player 10.1.95.2 and earlier versions for Android; and theauthplay.dll component .

2. This exploit (CVE-2010-3654) could cause a crash and provision attacker into the drivers seat to takecontrol of the affected system.

3. Adobe has released recommendations of how to avoid becoming a target on the subject matter but is stillworking in labs to find a fix.....[1]click here for more

1. http://bit.ly/b1q6nB

Bredolab grabs Attention (2010-11-01 19:11)

1. A 27-year-old Armenian man has been charged as being the mastermind behind the Bredolab botnet, anetwork of millions of compromised computers worldwide.Main features of this trojan botnet are enumeratedbelow for info :

• Users of computers with viruses from this network will receive a notice of at the time of next login withinformation on the degree of infection.

• Bredolab, known for spreading spam and rogue antivirus, is thought by some experts to have infectedat least 30 million computers.

• Spread via drive-by attack websites and spam email attachments.

199

Page 200: Blogger to E-Book

• Infecting machines with a backdoor that downloads additional malware without the victim’s knowledge.

• Sends out spoofed password reset messages to Facebook users in an attempt to spread malware andinfect users of the social network.

• Has the power to obtain information on the user’s computer including the ability to copy, change ordelete files and other information,”

• Pushdo botnet uses Facebook to spread malicious email attachment: A phony message warns usersthat their Facebook password has been reset.

• Majority of infections are in the U.S. and the U.K. and many Western European countries.

• Discovered by the Dutch High Tech Crime Team in the late summer.

• Capable of infecting 3 million computers a month. The botnet network used servers hired in theNetherlands from a reseller of LeaseWeb, which is the largest hosting provider in the Netherlands, andone of the largest hosts in Europe.

• Able to constantly change its appearance to avoid detection by traditional antivirus signatures. Likeother botnets, the Trojan communicated with the command-and-control server using encrypted mes-sages.

Mozilla @ Prone again!!!! (2010-11-02 07:54)

1. Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, when JavaScript is enabled, allows remoteattackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, theappendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memorycorruption, as exploited in the wild in October 2010 by the Belmoo malware.

2. Thanks [1]http://www.us-cert.gov

1. http://www.us-cert.gov/

MICROSOFT & Failures!!! (2010-11-02 22:08)

1. For a IT giant like MicroSoft,this would not sync well,but for Microsoft,the year 2010 has seen more ofclosures of major projects launched with lots of promises and fanfare but somehow unfortunately it did notgo the way microsoft desired tooo...and so had to be shut down in the same year....the list goes like this withsome details in few lines ....

• February 2010 saw Microsoft announcing discontinuation of ”Xbox Live service for original Xbox con-soles and games.

• April 2010, Microsoft confirmed stopped working on tablet project, codenamed Courier which wastouted to be an Apple iPad rival.

• September 2010, Microsoft announced that the Windows Live Spaces blogging service will be Terminategradually in favour of WordPress.com.

200

Page 201: Blogger to E-Book

• May 2010, Microsoft announced halt on the Response Point phone system.

• June 2010 saw Microsoft announcing discontinuation its new generation of smartphones.

• September 2010, Microsoft announced closure of Vine, a service built to help keep friends and familyin touch during emergencies.

[1]

2. Thanks [2]TimesofIndia

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TNA-Gn9CvII/AAAAAAAAAus/m0PmGyoMdTE/s1600/Microsoft.jpg

2. http://timesofindia.indiatimes.com/

Get Paid to Hack GOOGLE (2010-11-04 17:31)

1. [1]Google has made it official now vide which Google willl pay $500 and $3,133 to people who discoversecurity vulnerabilities in its websites and online applications.......[2]Google calls the program ”experimental,”but says it gives security researchers new incentives to report Web flaws directly and in real time to Google’ssecurity team thereby improving upon zero day exploit matters.

[3]

2. This provisions Google a chance to fix the vulnerabilities before it is exploited the way it should be. So, inorder to qualify, security researchers must privately disclose new flaws to Google first before they go publicwith their research. Thus depending on the extent and scale of vulnerability made known to google,so will

201

Page 202: Blogger to E-Book

be the prize money awarded....And Google says that participants shouldn’t use automated tools to searchfor flaws

1. http://www.google.com/

2. http://news.techworld.com/applications/3246886/google-introduces-api-console-for-developers/

3. http://2.bp.blogspot.com/_z1QH8I3k9vk/TNKgAWx1wKI/AAAAAAAAAuw/aecAB15pirY/s1600/Google.jpg

Removing METADATA from JPEG & IMAGE FILES (2010-11-04 18:14)

1. Invariably we all find various images from the net for our routine use,download them,modify them anduse them in our sites and posts....but are we authorised to do so?...coz each jpeg and image file by a digitalcamera holds info in form of metadata and in few cases...the images may be copy right which may inadver-tently rule against the user....so what to do to ensure safe...simple ...remove metadata from the image....buthow?...here comes [1]jhead for your help.Read and follow the instructions below :

- Press Start & Run or Windows key + R to open Run menu, type cmd.exe and press OK

[2]

- Type cd\ [To reach root directory]

- Type C:\md removemetadata [To create a new directory by the name removemetadata]

- Type C:\cd removemetadata [To reach the directory and Copy all pictures whose metadata is to be removedto this directory ]

202

Page 203: Blogger to E-Book

[3]

- Download the program file jhead.exe to C:\removemetadata

- Type cd removemetadata

- To remove all metadata of all JPEG files in ”this dir, type: jhead -purejpg * and press enter

[4]

- Done

2. So doing this small,boring but important function will avoid case study like the[5] mumbai case mentionedat an earlier post.

203

Page 204: Blogger to E-Book

3. Another easy way is to simply take a screen shot of the image and paste it in paint brush.But this wouldbe cumbersome to do when the images are in bulk quantity.[6]To download JHEAD...click here

1. http://www.softpedia.com/progDownload/JPEG-PNG-Stripper-Download-30786.html

2. http://4.bp.blogspot.com/_z1QH8I3k9vk/TNKt4KZHluI/AAAAAAAAAvk/ZbZkMtPfets/s1600/1.JPG

3. http://1.bp.blogspot.com/_z1QH8I3k9vk/TNKtcmHi9ZI/AAAAAAAAAvc/LK3mx8rgt9s/s1600/3.JPG

4. http://1.bp.blogspot.com/_z1QH8I3k9vk/TNKthIcvGkI/AAAAAAAAAvg/2OUkYZEIfEQ/s1600/4.JPG

5. http://anupriti.blogspot.com/2010/10/image-ballistics-incredible-it.html

6. http://www.softpedia.com/progDownload/JPEG-PNG-Stripper-Download-30786.html

3.12 December

Full stop from being tracked online :An attempt from FIREFOX (2010-12-05 18:50)

1. Firefox is working on a system which will provision web surfers to stop from being tracked online.We allknow how behemoths viz Google,Facebook and a plethora of OWMs use such information to sell targetedadverts and make money without ever asking the consent of the user.Such a move would be welcomed byprivacy campaigners who have long complained that Google & Facebook are taking indecorums with theinformation .Currently these information seeking companies make use of ’cookies’ that automatically savethemselves onto users computer when they surf the web, and then keep a track of the browsing history.Thisdata is then sold on to advertisers who put highly lucrative targeted ads on the individual’s screen, dependingon what internet pages they have recently been looking at.

2. Vice president of engineering at Mozilla,Mike Shaver,summed up the plan by saying the aim was to ”putthe user in control but not overwhelm them”.And this would not only be a welcome step being used againstinformation thefts but also actually be a booon for users who have been taken on a ride for so long on whichthey never ever desired to also......

Operation Pay Back & LOIC (2010-12-28 22:29)

A good one to read about the link between Mega D Botnet,Operation Pay Back with the aid of LOIC @[1]here

1. http://mashable.com/2010/12/09/how-operation-payback-executes-its-attacks/

204

Page 205: Blogger to E-Book

Chapter 4

2011

4.1 January

Case of Albert Gonzalez : The Largest Online Fraud in U.S. History (2011-01-29 10:44)

1. This case that I recently read in brief pertains to an interesting online fraud case against Albert Gonzalez.Ihave made it in a sequential point to compress the complete story for easy reading and grasping : [1]

(a) Albert started using computers at an early age, and while in highschool, managed to hack into the [2]Government of India’s website[ :( ]. Sadly, he was not charged at thisstage and only warned to stay away from computers for six months. (b) At the age of 19, he started his owngroup of hackers, named [3]ShadowCrew, which trafficked over a million credit card numbers for use in onlinefraud. When the [4]FBI finally managed to shut the group down, Albert was charged. However, he workedwith the investigators and gave away vital information on his [5]cohorts and did not need to serve a sentence.(c) Still on,Albert after two years worth of hardwork(????) compromised on sensitive data including 45.6million credit and debit cards. (d) [6]TJX Companies notified the authorities of their data leakage. Alberthad the abilities to crack and hack his way through, but the low security measures didn’t help TJX. Albertwas able to install his malware and sniffing software onto the networks of TJX and all the stores operatingunder them, even outside of the United States. TJX discovered the breach in December of 2006 and wasunder the belief that they had only been losing data for the past six to seven months, dating back to May2006. After further investigation, they found that they were losing sensitive data since 2005. Albert hadalready moved on to bigger and better operations by the time TJX had even started discovering the extent oftheir security breach. (e) Gonzalez and his accomplices used [7]SQL injection techniques to create malwarebackdoors on several corporate systems in order to launch packet sniffing (specifically, [8]ARP Spoofing)

205

Page 206: Blogger to E-Book

attacks which allowed him to steal computer data from internal corporate networks. (f) During his spree hewas said to have thrown himself a $75,000 birthday party and complained about having to count $340,000 byhand after his currency-counting machine broke.(ha ha ha.....wow!!!!anyway) (g) Gonzalez had three federalindictments: - May 2008 in New York for the Dave & Busters case (trial schedule September 2009) - May2008 in Massachusetts for the TJ Maxx case (trial scheduled early 2010) - August 2009 in New Jersey inconnection with the Heartland Payment case. (h). On March 25, 2010, Gonzalez was sentenced to 20 yearsin federal prison. 2. For details of the case with many links please visit [9]HERE

1. http://3.bp.blogspot.com/_z1QH8I3k9vk/TUOgAijp4II/AAAAAAAAAwI/WrlMAsx9zmU/s1600/ALBERT.jpg

2. http://india.gov.in/

3. http://www.google.co.in/url?sa=t&source=web&cd=1&ved=0CBYQFjAA&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%

2FShadowCrew&ei=8p5DTdK5DcrWrQeyp9BD&usg=AFQjCNGaxUOWyCzrR4s0JMwN4eItxMpCow&sig2=AmdCsBWiUJDuMk29tgLbeQ

4. http://www.fbi.gov/

5. http://en.wikipedia.org/wiki/Cohort

6. http://www.tjx.com/

7. http://en.wikipedia.org/wiki/SQL_injection

8. http://en.wikipedia.org/wiki/ARP_spoofing

9. http://en.wikipedia.org/wiki/Albert_Gonzalez

FBI : A Parent’s Guide to Internet Safety (2011-01-29 11:00)

A must read guide from The Federal Bureau of Investigation (FBI), an agency of the [1]United States[2]Department of Justice for all the parents in the world, advising & trying to make them understand thecomplexities of online child exploitation.....please click [3]HERE

1. http://en.wikipedia.org/wiki/United_States

2. http://en.wikipedia.org/wiki/United_States_Department_of_Justice

3. http://www.fbi.gov/stats-services/publications/parent-guide/parent-guide

Trojan.Spy.YEK : The Corporate Spying Tool (2011-01-29 11:26)

1. The [1]Stuxnet trembles and quakes are still not over and unlikely to be forgotten for some years.After thestuxnet storm ,each one from the corporate sector IT bosses to IT admins in individual capacities,every onewas trying to be careful of any sign of outside intrusion . These days when some e-threat comes along andsniffs for critical data, it could mean billions & trillions of money IN/OUT in seconds. 2. Trojan.Spy.YEK isunlike a regular [2]Spying Trojan that looks for documents and archives that may hold private informationbut also sends it back to the attacker. 3. Trojan.Spy.YEK has both spying & backdoor features with anencrypted dll in its overlay, this Trojan is easily saved in windows\system32\netconf32.dll and once injectedin explorer.exe nothing can stop it from connecting (whenever necessary) to a couple of easy pings & sharingall with the attacker. 4. The backdoor component helps it register itself as a service so as to receive andfollow instructions from a command and control center, while the spyware component sends away dataabout files, operating system, while also making screenshots(trying to make a user freindly hand guide forlater action...isn’t it so caring?????) of the ongoing processes. 5. Some of the commands it is supposed toexecute are: sending the collected files using a GET request, sending info regarding the operating system andcomputer, taking screenshots and sending the results, listing the processes that run on the system and sendsthem away, finding files with a certain extension. Shortly put, it uploads all the interesting data on a FTPserver without the user’s consent. 6. The fact that it looks for all that it is linked to archives, e-mails (.eml,

206

Page 207: Blogger to E-Book

.dbx), address books (.wab), database and documents (.doc, .odt, .pdf etc) makes Trojan.Spy.YEKa primesuspect of corporate espionage as it seems to target the private data of the companies. 7. This infection willchange the registry settings and other important windows system files. If Trojan.Spy.YEK is not removed itcan cause a complete computer crash.Some Trojan.Spy.YEK infections contain trojan and keyloggers whichcan be used to steal sensitive data like passwords, credit card, bank account information etc. 8. On top ofthat, the Trojan can run without problems on all versions of Windows® from Win 95® to Seven®.

1. http://anupriti.blogspot.com/2010/10/stuxnet-milestone-in-malicious-code.html

2. http://www.f-secure.com/v-descs/pswsteal.shtml

BitDefender : Tips for Safe Shopping on Mobile Devices (2011-01-29 11:44)

A small piece of advice by [1]BitDefender on security aspects while using new generation mobile devices.Plsclick [2]HERE

1. http://www.bitdefender.com/

2. http://news.bitdefender.com/

NW1883-en--Tips-for-Safe-Shopping-on-Mobile-Devices-and-Social-Media-Sites-this-Holiday-Season.html

4.2 February

IE users stand vulnerable again : Warning from MICROSOFT (2011-02-01 20:43)

1. This one is a real eye (....or more simply account) opener of so many IE Web browser users across the globeand this one comes straight from the horses mouth....ie MICROSOFT which has warned that the approx900 million users of its Internet Explorer Web browser are at risk of having their computers commandeeredand their personal information stolen by hackers.Microsoft has issued a ’critical’ security alert over a newly-disclosed flaw that impacts all versions of the company’s Windows operating system, including WindowsXP (SP3), Windows Vista, Windows 7, Windows Server 2003 and Windows Server 2008 (R2). 2. Thetrouble is meant primarily for users of IE only since no other major web browser available supports MHTMLfiles.Microsoft also adds that the bug is inside Windows, (else who is going to use IE??????).Till date/hr as ofnow no hackers have been reported to exploit the vulnerability. 3. An attacker could construct an HTML linkdesigned to trigger a malicious script and somehow convince the targeted user to click it. When the user clicksthat link, the malicious script would run on the user’s computer for the rest of the current Internet Explorersession.Such a script might collect user information (e.g. email), spoof content displayed in the browser, orotherwise interfere with the user’s experience. 4. For the otherwise already loosing users at a quick pace,thisrelease would pacen up the loosing percentage of IE users across. 5. Thanks [1]http://www.smh.com.au

1. http://www.smh.com.au/

AMD comes up with FUSION (2011-02-01 21:05)

1. A small mention made earlier at this blog about [1]ISTANBUL,an AMD launch...now comes up with thenext gen processor known as FUSION. 2. The ’Fusion’ family will utilize a single-die design that combinesmulti-core CPU (x86) technology with a powerful DirectX 11-capable graphics and parallel processing engine.

207

Page 208: Blogger to E-Book

The APUs will also include a dedicated high-definition video acceleration block and a high-speed bus thattransmits data across differing types of processor cores within the same design and will include power-savingfeatures enabling all-day battery life. 3. More about[2] FUSION here

1. http://anupriti.blogspot.com/2009/07/amd-launch-of-istanbul.html

2. http://sites.amd.com/us/fusion/apu/Pages/fusion.aspx

Win32.Hlux : January 2011 ” King of worms” (2011-02-06 19:46)

1. Email-Worm.Win32.Hlux was talk of the E-town in January across the webosphere. This mail wormspreads via emails containing malicious links that prompt users to install a bogus Flash Player, supposedlyto view an e-card. The link leads to a dialog window that asks if the user agrees to download a file. Irrespectiveof the response, the worm sets about to penetrate the system. In addition to propagating via email, Hluxalso has bot functionality and adds infected computers to a botnet before connecting to its command centerand executing its commands, which are primarily directed at sending pharmaceutical spam. 2. KasperskyLab also detected a Trojan dropper masquerading as a key generator for the company’s products. The oldadage ”There’s no such thing as a free lunch” is particularly fitting here as the dropper goes on to installand launch two malicious programs. One of them steals program registration data and passwords for onlinegames. The second is a backdoor that also has keylogger functionality. 3. Kaspersky Lab also found themass distribution of malicious short links on Twitter. After a number of redirects, the attention-grabbinglinks led users to a page promoting a rogue AV program. 4. Apart from these two hardworkers(?????..i meanmal hardworkers) in january,the other shining star in the E-crime world is AdWare.Win32.WhiteSmoke.awhich if clicked, will download a program that demands payment to rectify errors it supposedly detects onthe system. 5. More detailed report on [1]http://www.kaspersky.com

1. http://www.kaspersky.com/

DRIVE BY ATTACK (2011-02-06 20:03)

1. A small and easy to infer article on DRIVE BY ATTACK [1]here2. Thanks [2]http://www.bitesofapple.com

1. http://www.bitesofapple.com/2010/01/25/whats-a-web-drive-by-attack/

2. http://www.bitesofapple.com/

DATA STORAGE IN BACTERIA : 9,00,000 GB stored in 1 gm of Bacteria(2011-02-08 21:24)

1. Earlier discussed [1]here & [2]here in my 2009 posts when the study,the concept and experiments wereon test bench have now touched reality.... 2. A team of undergraduates and instructors from the ChineseUniversity of Hong Kong (CUHK) has found a way to store a whole lot of data onto living bacteria cellsthrough a process they call “massively parallel bacterial data storage.” And in addition to storing hugeamounts of data, they have also figured out how to store and en/decrypt data onto living bacteria cells.

208

Page 209: Blogger to E-Book

[3] 3. The team has managed to squeeze more than931,322GB of data onto 1 gram of bacteria (specifically a DH5-alpha strain of E.coli, chosen for its extractedplasmid DNA size) by creating a massively parallel bacterial data storage system. Compared to 1 to 4GB pergram data density of conventional media, the 900,000GB per gram figure the team has returned is genuinelystupefying ie like to fit the equivalent of 450 2TB hard disks (900TB) on a single gram of E.coli bacteria. 4.A small ppt straight from the team can be seen [4]here.5. Thanks devilsduke.com for the pic

1. http://anupriti.blogspot.com/2009/07/data-storage-in-bacteria-astonishing.html

2. http://anupriti.blogspot.com/2009/06/storage-technolgy-graduating-trends.html

3. http://2.bp.blogspot.com/_z1QH8I3k9vk/TVFm4vkrG9I/AAAAAAAAAwQ/sVwaCZQmZEA/s1600/E.COLI.jpg

4. http://2010.igem.org/files/presentation/Hong_Kong-CUHK.pdf

Anonymous (2011-04-12 04:06:24)Its funny. What if we decided to store all of mankinds planet secrets into bacteria and send it into space. Thansomehow mutates with another organism creating artificial life and than creating a race that will destroy the planet...Just some out of reality thinking... =]

INTERNET KILL SWITCH???? (2011-02-09 20:34)

1. Recent events in Egypt and the debate over the “Cyber Security and American Competitiveness Act of2011”, has introduced the cyber world with a yet another jargon term “INTERNET KILL SWITCH”.Whatsthis all about and what does this mean.....crux in brief as i understood after going through few good infor-mative sites....read onnnnn!!!!! 2. The term would give US the best tools available to swiftly respond to asignificant CYBER threat.Thus if the U.S. detected a serious cyberthreat at some point of time, this switchwould enable the US President to instantly shut down any infrastructure connected to subject infrastruc-ture.It is not a mandate to be able to shut down the entire Internet but rather authorizes the president toorder turning off access to “critical infrastructure” . 3. Our interest here is to look at just one dimensionof the issue – the technical feasibility; the political and policy aspects, we’ll leave to others. 4. Thanks[1]http://www.switched.com

1. http://www.switched.com/

209

Page 210: Blogger to E-Book

MALWARE & AUTORUN : LOVE BIRDS OF PROPOGATION (2011-02-09 20:40)

[1]1. All the family members of trojans,malware and adwares few of which are mentioned above have onesimilarity in form of a common propagation method. They all ab”use” the autoplay feature of Autorun,many by creating or manipulating Autorun.inf files on network drives and removable media, so that whena user connects, the malware is automatically executed on their system. Newer operating systems, likeWindows Vista and Windows 7, have made changes to the way Autorun is configured (Windows Vista) andhow it works by default (Windows 7). These changes appear to have had a significant difference in the abilityfor autorun-abusing malware to successfully infect these newer operating systems, especially for Windows 7.2. More interesting details [2]here 3. Thanks [3]http://blogs.technet.com & [4]Microsoft Malware ProtectionCenter

1. http://1.bp.blogspot.com/_z1QH8I3k9vk/TVKu2xutvCI/AAAAAAAAAwY/5OlOggwDbfA/s1600/Capture.JPG

2. http://blogs.technet.com/b/mmpc/archive/2011/02/08/breaking-up-the-romance-between-malware-and-autorun.

aspx

3. http://blogs.technet.com/

4. http://www.microsoft.com/security/portal/

The Gawker case : EXPERIENCING A HACK (2011-02-13 20:00)

1. A six-letter password in lower-case text takes a hacker’s computer just 10 minutes to crack. But makethose letters upper-case and it takes 10 hours for it to randomly work out your password. Thus simplyupper-casing your password can minimise a hacker’s chance of finding out your account.Add numbers and/orsymbols to your password and the hacker’s computer has to work for 18 days.Despite widespread warning,50 per cent of people choose a common word or simple key combination for their password.The most usedpasswords are 123456, password, 12345678, qwerty and abc123. 2. I read about the Gawker case recentlywherein the subject media firm Gawker urged subscribers to change their passwords after its user databasewas hacked and more than 1.3 million passwords were stolen.Now imagine some one like Yahoo or Googlerequesting one fine day on a similar line....won’t our heart come out???? 3. The exact Gawker announcement goes like this “Our user databases appear to have been compromised. The passwords were encrypted.But simple ones may be vulnerable to a brute-force attack. You should change your Gawker password andon any other sites on which you’ve used the same passwords. We’re deeply embarrassed by this breach.We should not be in the position of relying on the goodwill of the hackers who identified the weakness

210

Page 211: Blogger to E-Book

in our systems. And, yes, the irony is not lost on us.” 4. The problem emanated when Gawker recentlylaunched a multi-site redesign thatthat failed spectacularly, leading visitors to blank pages. The culprit wasa misbehaving piece of JavaScript, but when a single line of JavaScript causes your entire suite of sites tofail you no longer have websites, you have, well, nothing.The problem with Gawker’s redesign is that it usesJavaScript to load everything. That means that, not only is there no chance for the site to degrade gracefullyin browsers that don’t have JavaScript enabled, the smallest JavaScript typo can crash the entire website. [1]

5. Now we all have seen it personally as we sometimestend to have the same password for multiple accounts on the web.....this could be a simple fall like a pack ofcards...one point failure leads to the complete fort coming down.....so guys...take care....change ur passwordsfor better and stronger security.....

1. http://3.bp.blogspot.com/-dwqkWmhm9xQ/TVfqn2OvJGI/AAAAAAAAAwg/EoTkgJdeLCo/s1600/gawker-media-websites.jpg

NOKIA & MICROSOFT : A MERGER TO READ ABOUT (2011-02-15 20:59)

1. In todays shrinking world when we hear of merger of giants...its part of normal breaking news whichhardly puts together rolling eyeballs 7 pop ups ....But this one is slightly different or if not different it isreally BIGGGGGGG.This is about merger of fantabulous phone hardware NOKIA and the operating systemgiant MICROSOFT coming toether to produce and try beating the phones across?2. The deal which was in the rumour rounds already went much ahead of the expectations.....in effect, Nokiais handing over its future - in smartphones at least - to Microsoft and Windows Phone 7. That means Goodbye & Happy journey Symbian . So can the combo really become the third horse in the race, giving Apple and

Android a run for their money ?I have my doubts.... [1]3. Crux of the acquisition pointwise listed below : - Nokia to embrace Windows Phone as its principalsmartphone. - Nokia to contribute its expertise on hardware design, language support. - Both would closely

211

Page 212: Blogger to E-Book

collaborate on joint marketing initiatives . - Bing would power Nokia’s search services(nobodys guess!!!) -Nokia Maps would be a core part of Microsoft’s mapping services. 4. Just to mention,[2]a year earlier whenthis merger was being talked about, was once declared an april fools rumour. And now about a year later itis on official Microsoft site.Thanks [3]Microsoft site for info

1. http://1.bp.blogspot.com/-AaCLSC7AcVw/TVqcGeIhQOI/AAAAAAAAAwk/PAzB26V8O6c/s1600/Nokia-and-Microsoft.jpg

2. http:

//www.mobileindustryreview.com/2010/04/microsofts-100-billion-nokia-acquisition-absolutely-unbelievable.html

3. http://www.microsoft.com/presspass/press/2011/feb11/02-11partnership.mspx

NOKIA should have merged with GOOGLE : Google CEO (2011-02-16 20:02)

This comes straight after the [1]earlier post news spread across about the merge of Nokia & Mi-crosoft......When asked about [2]Nokia’s choice of Windows Phone 7 as its smartphone system, Schmidtsaid ”Google would have loved to see Nokia pick Android instead. Google tried to convince Nokia to chooseAndroid, and it can still make that decision in the future”.....(ha ha ha....Google still has hopes of a futurerevertive action by NOKIA....and who knows...it may just happen..we are just the readers!!!!!)

1. http://anupriti.blogspot.com/2011/02/nokia-microsoft-merger-to-read-about.html

2. http://www.infoworld.com/d/mobilize/nokia-partners-microsoft-adopts-windows-phone-7-223

Easy Upgrade from USB 2.0 to USB 3.0 :Transcend’s USB 3.0 Express Card Adapter(2011-02-16 21:02)

1. Transcend has come up with a USB 3.0 Express Card Adapter, an easy-to-install add-in that allowsusers to speedup their notebook with blatant flying speed of USB 3.0 technology.The new USB 3.0 ExpressCard Adapter comes with 2 high-speed USB ports that fully support Super Speed USB 3.0 standard withbandwidth of up to 5 GB/s. In addition to this, its quick and easy 2 install, the card enables speed enthusiaststo experience data transfer rates up to ten times faster than USB 2.0 with optimized power efficiency. 2.Transcend’s PNU3 USB 3.0 Express Card Adapter is fully compatible with Windows 7 and comes at anaffordable price of approx Rs 1900 with 2 years Warranty(check out [1]Nehru Place rates before buying) 3.Thanks [2]http://itvoir.com

1. http://npithub.com/

2. http://itvoir.com/

Be veri careful : Recent cases of duping online in DELHI (2011-02-19 09:29)

1. Inspite of regular discussions,regular readings of various advisories,the tongue(greed) of lust for moremoney doesnt stop.. & it keeps looking for opportunities and thus keeps succumbing by loosing more ....Ina recent case both pertaining to saadi own dilli...two understandably IT educated pers were robbed of ahigh value money transaction...how????briefly mentioned below : - New Palam Vihar Resident case :The case pertains to the resident of New Palam Vihar at New Delhi, India, Mr Dalbir Singh who recentlyrecieved the typical e-mail of winning a lottery of ‘ 14 Crore ( $ 37,000 approx) in the UK.Mr Dalbir Singhcontacted the accused for ascertaining the lottery amount and was convinced to pay Rs 17 Lakh for exchangepurpose as foreign currency had to be converted to rupee.Mr Dalbir Singh instantly transferred money from

212

Page 213: Blogger to E-Book

his account to the account of the fraud.Since that day of transfer Mr Dalbir Singh has been only recievingCONDOLONCES from all his friends and relative circle around.A very typical case of cyber lottery fraud.....- E-mail Scam Tricks Student of JNU : This case pertains to the a Jawaharlal Nehru University (JNU)student who was recently defrauded off Rupees 3 lakhs when he fell for a malicious e-mail scam.Initiallyan e-mail came to the student apparently from an institution called Global Watch Institute, asking him forbeing present in dual seminars on the topic: Racism and Human Rights the Institute was holding one eachin Madrid and New York.The student stated that the first message came to him on December 17, 2010.And, according to him, since his field of study had a connection with the topic, he responded stating he wasinterested.The e-mail also promised about bearing the entire cost of the student’s trip. However, over timethe fraudsters started asking for money from him to take care of certain expenditures such as booking hishotel at Madrid along with health insurance asserting that they’d all be refunded when he’d arrive in NewYork.The student, believing the e-mail, wired the money, but neither heard of any seminar nor a trip abroad,he stated. Indeed, all the things written inside the electronic mail was false.Worryingly, the above mentionede-mail fraud, according to security specialists, is an edition of the 419 scam, which’s also called Advance-feeFraud.They (specialists) outline that the method of operation in these malicious e-mail campaigns involvesduping a victim with fake pledges about certain huge reward to such an extent that he acquiesces to remitmoney. For example, in the current instance, the scammers tricked the student into transferring cash afterpromising falsely about arranging his presence at the seminars abroad.This is more organised form of thefrauds and scams that are happening all across..... 2. A Netizen need to know that they cannot win a lotteryunless they have not invested money on it.Please always take care of what you do on the net specially whenu r doing some kind of finacial transaction 3. Thanks [1]http://www.hindustantimes.com/,[2]http://ww-w.spamfighter. com/

1. http://www.hindustantimes.com/

2. http://www.spamfighter.com/

4.3 March

ANDROID & GOOGLE : AT LOGGER HEADS???? (2011-03-02 19:29)

1. This news is bound for only one thing.....a first big dent on Google’s untouched Kingdom in the cy-ber world.There is a reported discord among the Android developers who are irked at Google’s AndroidMarket policies.They have formed the Android Developers Union to protest the policies.The new unionhas compiled a list of seven demands including renegotiation of the 32pc ‘Google Tax’ on app sales, pub-lic bug tracking, algorithmic transparency and increased payment options.They threaten Google that ifthese demands are not met they will cease development and move their efforts to rival platforms. [1]

213

Page 214: Blogger to E-Book

2. ”If the demands are not met, we will move our applicationsto alternative marketplaces or the web, cease Android development in favour of other more open platforms,we will dissuade other developers from developing Android projects, and we will work tirelessly to counterany of Google’s hypocritical claims about openness in the media.” 3. This seems to be the first kind ofbig set back to google who may find loosing an edge in its battle for the smartphone operating system andapplications market vis-a-vis Apple and Microsoft.[2]The seven demands of the android union can be seenhere... 4. This writeup does not reflect my views of standing against anyone or supporting anyone but wishesto inform the readers only for info........

1. https://lh3.googleusercontent.com/-iP3be5qqvKY/TW5Ma3WZBgI/AAAAAAAAAww/2wagX3CBzLI/s1600/logo_shadowone.

png

2. http://www.andevuni.org/

QUALITIES OF A GOOD ANTIVIRUS (2011-03-13 20:16)

1. Each Antivirus software in the web market today claims as the First and the topmost rated antivirusamongst all.Each has a claim that says ”We check what others don’t”.A large percentage of typical userhave actually got no way to check out who is the actual one...Who is the BEST? They then generally selectthe one that is based on the recommendations of their social circle and the convincing factor generated bythe site of the product or simply put...it can ba random selection at last. In fact in my quest to searchthe best one amongst all....the number of QRs that one needs to check for one antivirus is a long one.Fewof the qualities that should not be missed at all are briefly enumerated below. WEST COAST LABSANTI-VIRUS: The West Coast Labs Checkmark certification for antivirus effectiveness. WCL stands asa global leader in research, testing and certification for information security products and services. Theyhave market-leading technology and testing facility in the UK, USA and india.Their services are being usedby the leading global brands to create market advantage and by large business enterprises for obtainingcrucial technical insight into product performance.WCL provides an authoritative and independent service,delivering sound, meaningful technical information on which critical business decisions can be made.Moreat [1]http://www.westcoastlabs.org/ ICSA CERTIFIED : The ICSA is an independent organization thathas a set criteria for certifying antivirus software. AV COMPARATIVES : Anti-Virus Comparativetest conducted in 2010. Overall scores are presented as Advanced + (A+), Advanced (A), Standard, andTested. SCOPE OF PROTECTION :Does the product protect from every threat? This rating evaluates

214

Page 215: Blogger to E-Book

the breadth and depth of security from the software. While most security solutions tout “multi-layered”protection, “360 degree” defense and/or even “100 %” security, some are certainly more thorough than others.The best antivirus solutions will include traditional protection from viruses, worms, Trojans and spyware,but should also include defense from keyloggers, phishing scams, email-borne threats and rootkits. Whileantivirus programs are by no means full-blown internet security suites, they should protect from as manythreats on as many fronts as they can. EFFECTIVENESS : How effective is the application at protectingyour computer from harmful viruses and other malware? This rating combines various tests and certificationsto determine how well the software performs. Antivirus is specifically designed to protect your computer, so ifit doesn’t do that well, what good is it? All the features, bells and whistles, or sleek interface can’t make up forpoor performance. We look at results from the industry-standard security software testers and professionalsecurity organizations to find the most effective software available and evaluate overall effectiveness. Ingeneral, our highest ranked programs are also the most effective. HACKERS : Anyone trying to takecontrol of your computer for malicious purposes. PHISHING : These criminal scams attempt to obtain youridentifying information by disguising as legitmate sources (like your bank, eBay, or facebook). ACTIVEX :Several Microsoft programs use ActiveX controls for good, but these components can also be taken advantageof. USER PROFILES : The software includes distinctive interfaces or features for particular users (oftenbeginners or advanced users). SELF-DEFENSE : The software monitors itself and the computer, effectivelyprotecting from intrusions or unauthorized changes. SCHEDULING : The ability to schedule specific scansto occur at a specific time or interval. HISTORY/REPORT LOGGING : The software keeps a recordof the performed tasks and results for future reference or reporting. SILENT / GAMER MODE :The ’gamer’ mode allows you to use the computer in full-screen mode (for games, presentations, or videos)without interruptions from the security software. LAPTOP / BATTERY SAVING MODE : Thesoftware can be set to delay scans or intensive processes for later in order to increase battery life. LINKSCANNER : An integrated web tool that monitors web links and prevents/warns users from clicking onmalicious sites. BOOTABLE RESCUE CD:In the event of a complete system crash, you can use thebootable rescue disc to preempt the OS and clean the system. FREE VIRUS SCAN ONLINE: Thesecurity manufacturer offers a free virus scan online (often with incentive to purchase their products forremoval capabilities). AUTOMATIC DEFINITION UPDATES: The program automatically updatesvirus definitions or DAT files. A virus definition is basically the formula that the software uses to determineif a file is infected by a specific virus. MANUAL DEFINITION UPDATES: You can manually checkfor virus definition updates. SCHEDULED UPDATES: Updates can be scheduled to run at a specifictime or interval. PULSE/PUSH UPDATES: Small, regular updates are initiated by the manufactureras needed to deliver important updates. ROLLBACK : The ability to revert to a previously working stateif the most recent update causes a problem. MANUAL SCANNING : Manual Scanning is the ability tostart a scan of your hard drive at any time. QUICK & DEEP SCAN : Manual and/or scheduled scans caneither be quick (scan most important areas) or deep (full scan of computer). OPTIMIZED SCANNING: The software is configured to scan efficiently, only scanning areas and files that have changed since thelast scan. SCAN INDIVIDUAL FILE(S) : The software can scan an individual file for viruses. Thisis often available by right-clicking on the file and choosing to scan. EXCLUDE FILES : The softwareallows the user to designate certain files, folders, or drives NOT to include in the virus scan. SCANCOMPRESSED FILES : Scans zipped (.zip) or other compressed files that are usually obtained throughemails or downloaded from the web. QUARANTINES INFECTED FILES : If a file is suspected ofbeing infected with a virus, it moves the file to a ”quarantine” area where you cannot accidentally access it.AUTO-CLEAN INFECTED FILES : The anti-virus program will automatically clean or fix files that areinfected. SCAN USB (AND OTHER EXTERNAL DRIVES) : The software is capable of scanningexternal drives for viruses. PASSWORD PROTECT SETTINGS : Prevents the Anti-Virus settingsfrom being modified by other users. ADJUSTABLE SECURITY LEVELS : Security can be customizedand set to a particular level of potency. VULNERABILITIES : Microsoft and third-part software vendorsare constantly providing security patches or other updates. Some software takes a proactive approach andhelps you stay on top of the most recent updates. COOKIES : Though not typically malicious, cookies

215

Page 216: Blogger to E-Book

are little chunks of code stored on your computer from web sites. SCRIPTS : Script Blocking technologymonitors Java and VBS scripts and alerts users of virus-like behavior. They stop these viruses before they caninfect a system without needing virus definitions. SPAM : Spam is unwanted email, whether it’s annoyingadvertisements or a link to a virus. AUTO USB DETECT: Most antivirus software can scan USB drives,but some automatically detect when an external drive is plugged in and will block malware from automaticallyrunning. VIRUS SIGNATURES: Traditional virus detection is based on identifying malware by matchingit with known viruses. BLACKLISTING : Setting a file or website on the ”blacklist” means that it shouldnever be allowed. WHITELISTING : Setting a file or website on the ”whitelist” means that you trustit and don’t need the security software to scan/block it. HEURISTICS : Proactive virus blocking ispossible with behavioral analysis, file emulation, and/or generic signature detection. REAL-TIME : Real-time protection means that the software protects you from viruses automatically, while the data is beingaccessed. SECURITY NETWORK : This security approach involves the software manufacturer gatheringanonymous information about your system in order to benefit everyone. If a virus is found on your computer,they can quickly find the cause and update definitions for all users. ON-ACCESS SCANNING : Yourfiles are scanned when you receive them and when you try to access them. ON-DEMAND SCANNING: You can determine which files and when to scan for viruses. It’s like manual scanning but you can be morespecific and scan a file at a particular time. Simply right-click on the filename. ADWARE : Though notalways harmful, these annoying programs cause advertisements to display on your computer without yourpermission. EASE OF INSTALLATION : How easy is the product to download, install, and setup? Thisrating is determined by install speed and simplicity. Security software shouldn’t be a chore to install, andshould have you protected as soon as possible. From download to install, to the first scan; implementingantivirus software should be quick and easy. EASE OF USE :How usable is the product? The Ease of Userating reflects how easy the product is to use, run, and maintain. Antivirus software is complex stuff, butshouldn’t require a degree in computer security. The best security programs have all the features securityexperts want, but are just as easily used by a beginner. Everyday computer users want a security solutionthat they can install and forget about; software that doesn’t require constant maintenance or have annoyinginterruptions. The best antivirus software is flexible enough to do exactly what you want to (even if thatmeans running by itself). FEATURES : Does the software include additional benefits? Whether for addedsecurity or simple convenience, more features usually means better software. A well-rounded feature settakes a security solution from good to great. More than bells and whistles, added features provide security,usability and performance benefits. UPDATES : Are timely updates delivered effectively? This rating isbased on the frequency and versatility of virus database updates. Security software is only as good as itslatest update. Viruses are being identified and added to signature databases all the time, so it’s importantthat your virus definition list updates accordingly. Modern antivirus software are equipped with automaticupdates that perform regularly enough that you get faster updates that don’t slow down your system. Thebest security providers even “push” updates to you as soon as they’re available. HELP & SUPPORT :Does the product offer additional support and helpful resources? This rating is based on the quantity andusefulness of additional product support. The best software doesn’t require reading an in-depth manual touse, but still has one available. For specific questions, troubleshooting, and additional help, the best antivirusmanufacturers provide superior product support online and off. Additional support for software may comein the form of assistance over the 24x7 phone, email, live chat, or through a number of additional resources(knowledgebase, FAQs, tutorials). BACKDOOR : A special type of trojan (often called remote accesstrojan or RAT), they essentially give control of your computer to a hacker. THREAT DETECTIONincludes : Virus,Worm,Trojan,Spyware,Malware,Rootkit. BROWSER EXPLOITS :malicious code thattakes advantage of an internet browser vulnerability to make the browser do something you don’t want(freeze, crash, change settings, etc.) OS EXPLOITS: Malware that is designed to take advantage ofa vulnerability in the Windows Operating System. KEYLOGGERS : A virus designed to track andmonitor user keystrokes, often used to steal passwords, credit card numbers, etc. INBOUND EMAILPROTECTION : The anti-virus software scans files received through incoming emails on a POP3 account.OUTBOUND EMAIL PROTECTION : The software scans outbound email attachments so you don’t

216

Page 217: Blogger to E-Book

spread viruses to others. INSTANT MESSAGING PROTECTION : The anti-virus software scans filesreceived through instant messaging (MSN Messenger, AIM, Yahoo Messenger). P2P/FILE SHARINGPROTECTION: The software protects from malicious files downloaded and/or accessed from peer-to-peer file sharing programs. REGISTRY STARTUP PROTECTION : The software provides protectionbefore the OS loads, or has the ability to scan registry files. DIALERS : Malicious program that takes controlof your computer and uses it to dial expensive phone numbers. SUPPORTED CONFIGURATIONS:Does it incl compatibility with Windows 7 (32 bit),Windows 7 (64 bit),Windows Vista (32 bit),WindowsVista (64 bit),Windows XP (32 bit),Windows XP (64 bit) 2. Thanks [2]http://www.toptenreviews.com/ andfor those who want a pdf click here to access [3]http://www.scribd.com/doc/50645603/Qualities-of-a-Good-Antivirus

1. http://www.westcoastlabs.org/

2. http://www.toptenreviews.com/

3. http://www.scribd.com/doc/50645603/Qualities-of-a-Good-Antivirus

How to Disable/Enable Use of USB Storage Devices in Windows (2011-03-15 13:18)

1. How often in office and home, we desire to lock our USB drives from not being used by the regular circlearound to avoid any compromise on data.I m sure its many a time....either we resort to keeping the 3 levelregular strong password option or try out some third party USB Blocker option or more simply leave toGOD and trust.But their is a way out from this...and a real easy one to atleast defy the circle with a smalltrick....it goes this way.....2. The situation to block the USB will fall in either of the categories : (a) USB storage device is not installedin system (b) USB storage device is already installed in system CASE -1 : USB STORAGE DEVICEIS NOT INSTALLED IN SYSTEM - Type %windir %\inf in Explorer address bar or RUN dialog boxand press Enter. It’ll open ”inf” folder. - Now look for following 2 files: usbstor.inf usbstor.pnf 3. Now tochange their user permissions setting Right-click on each file and select ”Properties”. Goto ”Security” taband select the desired user or group in ”Group or user names” list which you want to restrict from using USBdrives. Now in ”Permissions for Users” list, click on ”Deny” checkbox next to ”Full control” option and thenclick on OK.

217

Page 218: Blogger to E-Book

[1]NOTE : - In Windows Vista, click on ”Edit” button after selecting the user or groupin ”Group or user names” list and then again select the same user or group in new di-alog box. Now you can click on ”Deny” checkbox. 4. That’s it. Now users will not beable to install any USB storage device in system. CASE 2 : IF THE USB STORAGE DE-VICE IS ALREADY INSTALLED IN SYSTEM 5. Type regedit in the run taskbar and reachat : HKEY LOCAL MACHINE\SYSTEM\CurrentControlSetackslashServices\UsbStor [2]

6. In right-side pane, change value of ”Start” to 4 7. Now whenever a user will attach a USB storage devicewhich is already installed in system, Windows will not detect it and it’ll not be shown in My Computer.NOTE: If you want to revert it back to default, then change the value of ”Start” to 3.

1. https://lh3.googleusercontent.com/-EEqPy4A7ZrU/TX8ZfUqevtI/AAAAAAAAAw0/V8tjgLdBkfA/s1600/delete1.jpg

2. https://lh4.googleusercontent.com/-AxLJjJGxVv0/TX8ZlL7I2MI/AAAAAAAAAw4/eokFxkeeoeg/s1600/delete2.jpg

218

Page 219: Blogger to E-Book

4.4 April

The weak password problem : Now solved???? (2011-04-03 21:48)

1. We are part of the first phase of IT revolution across the globe where every thing is happening....methodsto secure...methods to hack....stronger and powerful servers....patching vulnerabilities....fighting mal-ware....analysing stuxnets genre...and what not....every thing is happening.....now the following text (org from[1]http://lanl.arxiv.org/abs/1103.6219) opens another dimension to make the passwords secure..... ”Vulner-abilities related to weak passwords are a pressing global economic and security issue. We report a novel,simple, and effective approach to address the weak password problem. Building upon chaotic dynamics,criticality at phase transitions, CAPTCHA recognition, and computational round-off errors we design analgorithm that strengthens security of passwords. The core idea of our method is to split a long and securepassword into two components. The first component is memorized by the user. The second component istransformed into a CAPTCHA image and then protected using evolution of a two-dimensional dynamicalsystem close to a phase transition, in such a way that standard brute-force attacks become ineffective. Weexpect our approach to have wide applications for authentication and encryption technologies.” 2. Thanks[2]http://lanl.arxiv.org

1. http://lanl.arxiv.org/abs/1103.6219

2. http://lanl.arxiv.org/

The weak password problem : Now solved???? (2011-04-03 21:55)

1. We are part of the first phase of IT revolution across the globe where every thing is happening....methodsto secure...methods to hack....stronger and powerful servers....patching vulnerabilities....fighting mal-ware....analysing stuxnets genre...and what not....every thing is happening.....now the following text (org from[1]http://lanl.arxiv.org/abs/1103.6219) opens another dimension to make the passwords secure..... ”Vulner-abilities related to weak passwords are a pressing global economic and security issue. We report a novel,simple, and effective approach to address the weak password problem. Building upon chaotic dynamics,criticality at phase transitions, CAPTCHA recognition, and computational round-off errors we design analgorithm that strengthens security of passwords. The core idea of our method is to split a long and securepassword into two components. The first component is memorized by the user. The second component istransformed into a CAPTCHA image and then protected using evolution of a two-dimensional dynamicalsystem close to a phase transition, in such a way that standard brute-force attacks become ineffective. Weexpect our approach to have wide applications for authentication and encryption technologies.” 2. Thanks[2]http://lanl.arxiv.org

1. http://lanl.arxiv.org/abs/1103.6219

2. http://lanl.arxiv.org/

Revenge : YouTube Style (2011-04-04 22:16)

1. Now this one is really good....we already know that IT has revolutionized our lives in so many as-pects...all aspects like banking,office work,exchanging mails” ,blogging.....making a social networking iden-tity....keeping updates etc etc...but how many thought out the way to take REVENGE in such a effec-tive manner that the culprit bows down...and pleads GUILTY....GUILTY..... 2. An original lift from[1]http://www.securitynewsdaily.com is putup below for details..... “A computer thief in Boston learnt the

219

Page 220: Blogger to E-Book

hard way that performing an embarrassing victory dance is not the best way to celebrate your crime. Afterhis MacBook Air laptop was stolen two months ago, Bentley University freshman Mark Bao took digitalrevenge, accessing a cloud server on which his computer’s data was stored to identify the culprit who’d takenhis computer, Gawker reported. According to messages posted on Bao’s Twitter account, Bao used thebackup server Backblaze to download the thief’s Safari Web browsing history and Facebook profile.

IFRAME: [2]http://www.youtube.com/embed/8c8W1NDYf38

The sweet revenge, however, came when Bao found a video the thief had made of himself dancing to theTravis Porter song “Make it Rain.” Bao uploaded the video to YouTube with the title “Don’t steal computersbelonging to people who know how to use computers.” The video, posted on March 19, quickly became aviral hit, and has been viewed more than 376,000 times. “Come on, if you’re about to record a video ofyourself dancing on a stolen laptop, at least be good at dancing!” Bao wrote on Twitter on March 19. Fromhere, the story of savvy techie versus celebrating crook takes an unexpected turn. Embarrassed that hisdancing routine was made public and open to ridicule, the thief returned Bao’s laptop to the police andwrote an email to Bao expressing his regret and asking for the video to be taken down. In an email the thiefwrote to Bao, which Bao then posted on Reddit.com, the crook said, “I know I am in no position for askingyou for favors but Can [sic] you please put down the videos that you have put up of me. I know what I didwas wrong and if I was a different person fine leave it up but I do have two Professional jobs that iif [sic]something like that gets leak I can get in more [sic] trouble and be more embarrass [sic] as well.”3. So what does the episode mean…we should all start taking backups in cloud…or do we start usingBackblaze or….or….or what?....the best way to keep out from this …is to KEEP A CLOSE TAG OF YOULAPTOP…… Thanks [3]http://www.securitynewsdaily.com

1. http://www.securitynewsdaily.com/

2. http://www.youtube.com/embed/8c8W1NDYf38

3. http://www.securitynewsdaily.com/

Beware of ’Radioactive’ Emails (2011-04-05 07:51)

1. Japan has been struck with the worst ever crisis in all aspects of human lives,infrastructure dam-age,economy slowdown and sadly the list goes on.....now to add to worries this is being exploited by criminalsseeking access to your personal online information. 2. Spam emails titled, “Japan Nuclear Radiation Leak-age and Vulnerability Analysis,”claiming to have a detailed reports on the nuclear radiation being emittedfrom the Fukushima-1 nuclear power plant are being circulated across under the false origin from Officeof Nuclear Security and Incident Response with the U.S. Nuclear Regulatory Commission.The alleged nu-clear report is included in a Microsoft Excel file attached to the email. 3. Now anyone actually wantingto know what course of events took place might be allured to open the Excel file, but the file is corrupted.Opening it exposes users to a bug that allows a hacker to remotely exploit an Adobe Flash vulnerabilityand execute malicious code on the victim’s computer.Rest can be easily then taken control by the back endcriminal..... 4. Now aren’t we seeing a number of cases coming up in form of hacker trying to remotelyexploit an Adobe Flash vulnerability .......too many have come up in past 2-3 years.......infact the case of[1]SHADOWS IN THE CLOUD & [2]TRACKING GHOSTNET were largely based on this......so whats themessage.....BEWARE...keep yourself updated of such spams.....keep your antivirus updated

1. http://anupriti.blogspot.com/2010/09/shadows-in-cloud-cyber-espionage.html

2. http://www.nartv.org/mirror/ghostnet.pdf

220

Page 221: Blogger to E-Book

HOW DO U FIND IF YOUR PC IS HACKED?- PART 1 (2011-04-27 20:47)

1. We all keep ourselves worried over issues pertaining to our PC security including issues like if or not it is azombie or if the same is already a compromised one etc. But how would you find the answer to these......callan expert and pay from your pocket? NO....the answer is MS it self...yesss!!....Microsoft Windows has aseries of commands with the help of which a normal PC user would be able to find out the answers..... 2.Following are the list of commands which would be used WMIC Command - C:\> wmic process - C:\>wmic process list brief - C:\> wmic process list full - C:\> wmic startup list full - C:\> wmic QFE list full- C:\> wmic process list brief /every:1 The net Command - net localgroup - net localgroup administratorsOpenfiles Command - C:\> openfiles /local on Netstat Command - C:\> netstat –nao - C:\> netstat -s -picmp - C:\> netstat -na 2 Find Command For more details on these commands...click here....

HOW DO U FIND IF YOUR PC IS HACKED?- PART 2 (2011-04-27 20:52)

1. WMIC stands for Windows Management Instrumentation Command-line It lets administrative usersaccess all kinds of detailed information about a Windows machine, including detailed attributes of thousandsof settings and objects. WMIC is built into Windows XP Professional, Windows 2003 and Windows Vista.C:\> wmic process 2. When you run this command, the output may not be an easy to understand formatbut the same can be formatted in several different ways, but two of the most useful for analysing a systemfor compromise are the ”list full” option, which shows a huge amount of detail for each area of the machinea user is interested in, and the ”list brief” output, which provides one line of output per report item in thelist of entities, such as running processes, autostart programs and available shares. For example, we canlook at a summary of every running process on a machine by running: C:\> wmic process list brief 3. Thatcommand will show the name, process ID and priority of each running process, as well as other less-interestingattributes. C:\> wmic process list full 4. This command shows all kinds of details, including the full path ofthe executable associated with the process and its command-line invocation. When investigating a machinefor infection, an administrator should look at each process to determine whether it has a legitimate use onthe machine, researching unexpected or unknown processes using a search engine. 5. Beyond the processalias, users could substitute startup to get a list of all auto-start programs on a machine, including programsthat start when the system boots up or a user logs on, which could be defined by an auto-start registry keyor folder: C:\> wmic startup list full 6. A lot of malware automatically runs on a machine by adding anauto-start entry alongside the legitimate ones which may belong to antivirus tools and various system trayprograms. Users can look at other settings on a machine with WMIC by replacing ”startup” with ”QFE”(an abbreviation which stands for Quick Fix Engineering) to see the patch level of a system, with ”share” tosee a list of Windows file shares made available on the machine and with ”useraccount” to see detailed useraccount settings. 7. A handy option within WMIC is the ability to run an information-gathering commandon a repeated basis by using the syntax ”/every:[N]” after the rest of the WMIC command. The [N] here isan integer, indicating that WMIC should run the given command every [N] seconds. That way, users canlook for changes in the settings of the system over time, allowing careful scrutiny of the output. Using thisfunction to pull a process summary every 5 seconds, users could run: C:\> wmic process list brief /every:1Hitting CTRL+C will stop the cycle. More good examples [1]here

1. http://support.microsoft.com/servicedesks/webcasts/wc072402/listofsampleusage.asp

HOW DO U FIND IF YOUR PC IS HACKED?- PART 3 (2011-04-27 20:55)

1. While WMIC is a relatively new command, let’s not lose site of some useful older commands. One ofmy favourites is the venerable ”net” command. Administrators can use this to display all kinds of useful

221

Page 222: Blogger to E-Book

information. For example, the ”net user” command shows all user accounts defined locally on the machine.The ”net localgroup” command shows groups, ”net localgroup administrators” shows membership of theadministrators group and the ”net start” command shows running services. 2. Attackers frequently addusers to a system or put their own accounts in the administrators groups, so it’s always a good idea to checkthe output of these commands to see if an attacker has manipulated the accounts on a machine. Also, someattackers create their own evil services on a machine, so users should be on the lookout for them. Morehere.....

HOW DO U FIND IF YOUR PC IS HACKED?- PART 4 (2011-04-27 20:59)

OPENFILES COMMAND 1. Many Windows administrators are unfamiliar with the powerful openfilescommand built into Windows. As its name implies, this command shows all files that are opened on thebox, indicating the process name interacting with each file. It’s built into modern versions of Windows, fromXP Pro to Vista. Like the popular ls of command for Linux and Unix, it’ll show administrators all openfiles on the machine, giving the process name and full path for each file. Unlike lsof, however, it doesn’tprovide many more details, such as process ID number, user number and other information. 2. Consideringthe volume of information it gathers, it’s no surprise that the openfiles command is a performance hog.Thus, the accounting associated with openfiles is off by default, meaning users can’t pull any data fromthis command until it is turned on. This function can be activated by running: C:\> openfiles /local on 3.Users will need to reboot, and when the system comes back, they will be able to run the openfiles commandas follows: C:\> openfiles /query /v 4. This command will show verbose output, which includes the useraccount that each process with an open file is running under. To get an idea of what malware has beeninstalled, or what an attacker may be doing on a machine,users should look for unusual or unexpected files,especially those associated with unexpected local users on the machine. 5. When finished with the openfilescommand, its accounting functionality can be shut off and the system returned to normal performance byrunning the following command and rebooting: C:\> openfiles /local off

HOW DO U FIND IF YOUR PC IS HACKED?- PART 5 (2011-04-27 21:01)

NETSTAT COMMAND 1. The Windows netstat command shows network activity, focusing on TCPand UDP by default. Because malware often communicates across the network, users can look for unusualand unexpected connections in the output of netstat, run as follows: C:\> netstat –nao 2. The -n optiontells netstat to display numbers in its output, not the names of machines and protocols, and instead showsIP addresses and TCP or UDP port numbers. The -a indicates to display all connections and listening ports.The -o option tells netstat to show the processID number of each program interacting with a TCP or UDPport. If, instead of TCP and UDP, you are in interested in ICMP, netstat can be run as follows: C:\> netstat-s -p icmp 3. This indicates that the command will return statistics (-s) of the ICMP protocol. Althoughnot as detailed as the TCP and UDP output, users can see if a machine is sending frequent and unexpectedICMP traffic on the network. Some backdoors and other malware communicate using the payload of ICMPEcho messages, the familiar and innocuous-looking ping packets seen on most networks periodically. 4. LikeWMIC, the netstat command also lets us run it every N seconds. But, instead of using the WMIC syntax of”/every:[N]”, users simply follow their netstat invocation with a space and an integer. Thus, to list the TCPand UDP ports in use on a machine every 2 seconds, users can run: C:\> netstat -na 2

222

Page 223: Blogger to E-Book

HOW DO U FIND IF YOUR PC IS HACKED?- PART 6 (2011-04-27 21:03)

FIND COMMAND1. Most of the commands I have discussed so far spew a lot of output on the screen, which could be hardfor a human to look through to find a specific item of interest. But, Windows comes to the rescue. Userscan search through the output of a command using the built-in find and findstr commands in Windows. Thefind command looks for simple strings, while findstr supports regular expressions, a more complex way tospecify search patterns. Because the regular expressions supported by findstr go beyond the scope of thistip article, let’s focus on the find command. By default, find is case sensitive - use the /i option to makeit case insensitive. 2. The find command also has the ability to count. Invoked with the /c command,it’llcount the number of lines of its output that include a given string.Users often want to count the number oflines in the output of a command to determine how many processes are running, how many startup itemsare present or a variety of other interesting tidbits on a machine. To count the lines of output, users couldsimply pipe their output through find /c /v ””. This command will count (/c) the number of lines that donot have (/v) a blank line (””) in them. By counting the number of non-blank lines, the command is,ineffect, counting the number of lines. 3. Now, with the find command, users can look through the output ofeach of the commands I’ve discussed so far to find interesting tidbits. For example , to look at informationevery second about cmd.exe processes running on a machine, type: C:\> wmic process list brief /every:1 |find ”cmd.exe” Or, to see which autostart programs are associated with the registry hive H KLM, run: C:\>wmic startup list brief | find /i ”hklm” To count the number of files open on a machine on which openfilesaccounting is activated, type: C:\> openfiles /query /v | find /c /v ”” Whenever counting items in this way,remember to subtract the number of lines associated with column headers. And, as a final example, to seewith one-second accuracy when TCP port 2222 starts being used on a machine, along with the process IDusing the port, run: C:\> netstat -nao 1 | find ”2222” THANKS www.amazingit.blogspot.com

4.5 May

McMurdo station & more DATA CENTRE Locations (2011-05-16 21:47)

1. We all keep reading on issues like heating when we discuss data centres......now with the problems thatdatacenters have with cooling, the Antarctic is perhaps the ideal site for such a facility....i thought thatwas a joke before i first read about this and saw the pics on site at [1]here 2. The station’s datacentre isdedicated to supporting scientific work and running the station - with 64 servers and more than 2PB ofstorage connected to hundreds of desktops by a gigabit Ethernet network.McMurdo Station is the telecomshub for science projects, field camps and operations in western Antarctica funded by the National ScienceFoundation (NSF).To provide these services, it has a central telephone exchange and a wide spectrum ofnetwork, radio-frequency and satellite-communication systems.At the South Pole, every day up to 100GB ofscience data is transferred from the station to the US via satellite-communication links in support of multipleNSF-funded science projects. 3. Thanks DIGIT.

1. http://www.zdnet.com/photos/strangest-locations-for-datacenters-photos/6215122?tag=nl.e589

223

Page 224: Blogger to E-Book

4.6 June

INSPIRED FROM INDIA : CHINAs ATTEMPT ON TAKING ON CORRUPTION(2011-06-13 14:45)

1. In recent last few months,a lot has been happening in India in form of anshans,demonstrations,dharna’sto bring back the black money freezing in swizz banks and to reduce corruption...so far so good...the sparkhappened and is now gradually bowing to the Government which ensure and loves STATUS QUO.....atleastthier wasy of working confirms this....instead of supporting the movement...they took the key persons involvedhead on and now in another about a week or so we will be back to STATUS QUO... 2. But China’sesurient Internet users are taking a leaf from India’s anti-corruption drama by opening websites so citizenscan confess, sometimes in pitiless detail, to buying off officials.Several Chinese confess-a-bribe websites,including ”I Made a Bribe” ([1]www.ibribery.com), have been inspired by an Indian website ”I paid a bribe”([2]ipaidabribe.com)......china ranks 78th in the corruption list whereas we list at the 87th rank...m sureit is much worse.....apna nahee to kisi aur ka to bhala hoga........jai ho INDIAAAAAAAAAA 3. Thanks[3]http://www.reuters.com

1. http://www.ibribery.com/

2. http://ipaidabribe.com/

3. http://www.reuters.com/

BULLET PROOF HOSTING (2011-06-13 15:06)

1. Bulletproof hosting refers to a technique wherein web hosting firms permit their customers appreciableleniency in the kinds of material they may upload and distribute. 2. Many service providers have ”Termsof Service” that do not allow certain materials to be uploaded/distributed, or the service to be used in aparticular way, and may suspend a hosting account, after a few complaints, to minimize the risk of their IPsubnet being blocked by anti-spam filters using Internet Protocol (IP) based filtering. Additionally, someservice providers may have ethical concerns that underpin their service terms and conditions. 3. Bullet ProofHosting allows people who want to promote their product, service on their web site by sending Commercialand Bulk Emails. As well known, Email Marketing has emerged as one of the most effective and economicalmarketing tool. It gives you the power to broadcast your message to millions of prospects across the worldand it works! 4. This leniency has been taken advantage of by spammers and providers of online gamblingor pornography.Case in point is the case of ”McColo ISP takedown in November 2008”.McColo was one ofthe leading players in the so-called ”bulletproof hosting” market — ISPs that will allow servers to remainonline regardless of complaints. 5. Thanks [1]http://bulletproof-server.net/

1. http://bulletproof-server.net/

SYMANTEC SPOTS ONE INTERESTING E-MAIL CAMPAIGN (2011-06-13 15:24)

1. A fresh spam outbreak has been detected online that’s drawing attention widely and effects users withe-mails laced with malicious software. Reportedly, there’s one web-link embedded in the spam messagessupposedly providing details, while the same messages try to pull down a .zip file attachment.The interestingaspect regarding the new spam mail relates to the inclusion of a password that the recipient earlier used.Nowif I see a passowrd which at one point of my cyber surfing I had used it is bound to stirr up doubts ofit being actually genuine.Once i donwload this zip file ,the eventual aim is achieved ie downloading the

224

Page 225: Blogger to E-Book

inevitably malware. 2. Reportedly, the malware as mentioned above has been identified as Trojan.Zbotor Zeus a Trojan which tries to grab secret data after compromising an end-user’s PC. Further, it maytake down updates and configuration files online, according to Symantec. 3. Additionally the e-mail idsand their corresponding passwords within the above unsolicited electronic mails, arrive from one prominentsocial gaming website, known internationally and currently being most widespread inside Asia. 4. Hence,Symantec advises all those who think they’ve fallen prey to compromised accounts to scan their PCs with anAV program followed with resetting all vital passwords, particularly online banking passwords. Additionally,they must also keep a watch over their accounts should they suspect any fraudulent operation. 5. Thanks[1]http://www.spamfighter.com

1. http://www.spamfighter.com/

FLIRT BOTS (2011-06-13 15:56)

1. I am sure most of you at at some point of time in your cyber surfing would have come acrosschat/messenging softwares like MSN or yahoo to mention a few....now although pretty old technique butthought of mentioning it here in my blog of how many of us succumb to the meanly desires of hackers viaFLIRT BOTS.....u heard it correctly they are known as FLIRT BOTS.... 2. Here’s how Flirt Bots work:- The Bot strikes up a conversation in a chat room - The Bots use a series of easily configurable ”dialoguescenarios” with pre-programmed questions and discussion topics to compile a report on every person it meetsE.g.: [email protected] says: ”hey, whats up?” and further to this conversation they are invited to visita website which could be used for any variety of malicious activity. E.g.: [email protected] says: ”Ok goto http://??????.??/?????? and accept the invite on the page baby” 3. In this case the victim is sent to awebsite ”?????????.com” and is asked to provide personal information including credit card details in orderto view the ”webcam.” 4. The site can be used for many things - to host malicious downloads, or to tryto sell you Fake AntiVirus software. The URL can do and host whatever the ”bot master” specifies it tobe .Frequently cyber-criminals collect a database of personal information and sell it to the highest bidderor anyone who will pay 5. These ”Flirt Bots”, were first reported as a proof of concept by PC Tools in2007.Thanks http://www.pctools.com

FLIRT BOTS (2011-06-13 16:03)

1. I am sure most of you at at some point of time in your cyber surfing would have come acrosschat/messenging softwares like MSN or yahoo to mention a few....now although pretty old for the regu-lar security guys, but thought of mentioning it here in my blog of how many of us succumb to the meanlydesires of hackers via FLIRT BOTS.....u heard it correctly they are known as FLIRT BOTS.... 2. Here’show Flirt Bots work: - The Bot strikes up a conversation in a chat room - The Bots use a series of easilyconfigurable ”dialogue scenarios” with pre-programmed questions and discussion topics to compile a reporton every person it meets E.g.: [email protected] says: ”hey, whats up?” and further to this conversa-tion they are invited to visit a website which could be used for any variety of malicious activity. E.g.:[email protected] says: ”Ok go to http://??????.??/?????? and accept the invite on the page baby” 3.In this case the victim is sent to a website ”?????????.com” and is asked to provide personal informationincluding credit card details in order to view the ”webcam.” 4. The site can be used for many things - tohost malicious downloads, or to try to sell you Fake AntiVirus software. The URL can do and host whateverthe ”bot master” specifies it to be .Frequently cyber-criminals collect a database of personal information andsell it to the highest bidder or anyone who will pay 5. These ”Flirt Bots”, were first reported as a proof of

225

Page 226: Blogger to E-Book

concept(Evidence that demonstrates that a business model or idea is feasible.) by PC Tools in 2007.Thanks[1]http://www.pctools.com

1. http://www.pctools.com/

MAKE incognito YOUR DEFAULT SETTING (2011-06-13 18:38)

1. We all know how to browse hidden ie Pages you view in this window won’t appear in your browserhistory or search history, and they won’t leave other traces, like cookies, on your computer after you closethe incognito window. Commonly it is known as ”incognito” or ”privacy browsing”.......an avid user ofchrome ....I always had to open the browser and then select ”New Incognito Window” to work...but nottill today....a simple amendment in the target setting of properties of chrome shortcut will always makeyou open the incognito window......simply append ”–incognito” at the end of the link address as shownbelow : C:\Users\???????\AppData textbackslashLocal\Google\ChrometbackslashApplication\chrome.exe–incognito 2. More clearly ...right click on the chrome shortcut on the task bar or on the desk top and clickproperties.In the target text box append ”–incognito” to what is already there defining the location of thechrome browser.... 3. Thats it......

Your VOICE to charge your MOBILE (2011-06-13 21:38)

1. Amazing as it may sound reading.....but here is the way thats gonna please us all to get resolved on issuesof mobile charging...so many times it has happened that on our way out either we think the mobile is fullycharged or when we talk too much on phone.....or just when one small query will resolve us of a standingproblem...the mobile goes offffff......problem : MOBILE BATTERY IS DRAINED ....no more.....please read

ahead for brief details on the subject.... [1]2. The new technique developed by Korean engineers for turning sound into electricity - technology thatcould allow cell phones to be charged while users chat(...bak bakk).Thus Phones equipt with the technologycould generate power from any kind of background noise — meaning the phone could be charging even whenyou’re not speaking directly into the phone. The need to carry around an outlet charger could be supplantedby time spent listening to music, or perhaps even the sound of the wind roaring past your car window.Thetechnology is made possible by tiny strands of zinc oxide that are sandwiched between two electrodes. As asound-absorbing pad atop the device vibrates to ambient noise, causing the zinc oxide wires to compress andrelease. This movement is what generates the electrical current.A prototype has already converted sound ofabout 100 decibels into about 50 millivolts of electricity. That’s not enough to charge a phone, but it’s anencouraging test, and researchers are optimistic that the technology could soon be developed into somethingmore powerful. 3. Thanks [2]http://blogs.forbes.com/ and [3]http://inhabitat.com

226

Page 227: Blogger to E-Book

1. http://3.bp.blogspot.com/-d3V0YKmsdA8/TfY19KZxIMI/AAAAAAAAA4k/eTUuSKNxSJQ/s1600/chargefromsound.JPG

2. http://blogs.forbes.com/

3. http://inhabitat.com/

ANDROID APPLICATIONS CLONED : Developers make it spam (2011-06-27 21:44)

1. The latest to add on to the growing web of spams is repackaged android applications.....though till nowmost of the descried repackaged applications are not reported to have any malicious code in them and alsolike the genuine ones they are also made available for free. These effected applications have the same moduleas the original, but include an advertisement module ,thus developers of these apps try making money off

the clicks on the advertisements. [1] 2. The thing iseasy on part of the developers since it is easier on thier part to just fiddle with original Android apps whichare written in Java and are, therefore, easily cloned..... 3. Thanks [2]www.f-secure.com

1. http://2.bp.blogspot.com/-WIfEO5215oQ/Tgirt3PSWNI/AAAAAAAAA4o/JtkFY87Cr10/s1600/android.gif

2. http://www.f-secure.com/

4.7 August

JAVA SE DEVELOPMENT KIT NOT FOUND!!!! (2011-08-19 22:42)

1. On way to experiment with android application with the stand SDK toolkit....i got messed up with theinstallation procedure so much that i thought of just leaving it..... in spite of all java installed i got this

227

Page 228: Blogger to E-Book

screen..... [1]2. I read all trouble shoots of on JAVA site.....some diverted me to registry editors and what not.......till igot the correct answer...simply click BACK and then NEXT again......khatam...thats the end of it.....

1. http://1.bp.blogspot.com/-ilz1OdHKOZk/Tk6Yxz8RHSI/AAAAAAAABCI/rxaRecx3kNg/s1600/Capture.JPG

IBM developing PCs that may run 30 times faster (2011-08-21 12:44)

1. A one-atom-thick layer of carbon has currently become the focus of interest of IBMand the U.S. military to build computers that function at near the speed of light. [1]

2. The focus is actually based on GRAPHENE, the thinnest and toughest material ever produced, thatconducts electricity, a breakthrough that opens the door to its use in digital electronics 3. Some key findingon GRAPHINE : - Graphene is the basic structural element of some carbon allotropes including graphite,charcoal, carbon nanotubes and fullerenes. - Graphene conducts electricity 30 times faster than silicon –approaching the speed of light - Until recently, use of graphene was limited to development of more-efficientbatteries and foldable touch screens. - Nokia, the world’s largest maker of mobile phones by volume, isinvestigating the material’s potential use in cell phones, touch screens, and printed electronics. - Graphene’sflexibility and strength is astonishingly 300 times tougher than steel - may lead to the Nokia Morph, the first

228

Page 229: Blogger to E-Book

foldable phone. - “With a graphene battery the same amount of weight and volume as a current one, youcould drive 300 miles instead of 100,” said Yuegang Zhang, a principal investigator at the lab. - Graphene hasthe ideal properties to be an excellent component of integrated circuits. Graphene has a high carrier mobility,as well as low noise, allowing it to be used as the channel in a FET. 4. Thanks [2]Wiki and [3]electroiq

1. http://3.bp.blogspot.com/-ZhEl5kbHv2s/TlCwKwBt_7I/AAAAAAAABCg/hB0oMcNFMm4/s1600/Graphene.jpg

2. http://en.wikipedia.org/wiki/Graphene

3. http://www.electroiq.com/news/2011/08/1483052531/ibm-researching-on-thinnest-chips-to-create-faster-pcs.

html

Now Aerial cyber attack!!!!r u safe anyway? (2011-08-21 13:40)

”Imagine sitting in a cofee house with your laptop and chatting with your dear friend.....and then callinga friend on your phone and then paying your bill and moving out for ur regular work” 1. Now imaginesome thing u never imagined.....all what you chatted and all what you spoke on phone in the cafe houseis compromised....all saved at a location unknown to you.... 2. Two security professionals proved as muchat the Black Hat cybersecurity convention in Las Vegas.This has been made possible after investing a fewthousand bucks, a tool box and some technical skill like these two security professionals,Richard Perkins andMike Tassey have done.These two guys have assembled a small, unmanned airplane that is capable of some

truly remarkable and potentially disastrous hacks. [1]3. Perkins is a security engineer supporting the U.S. government and Tassey is a security consultant for WallStreet firms. But after work, the long-time buddies would take off their cyber attack prevention hats, puton their evil hacker thinking caps, and build their airplane in Perkins’ garage. 4. The plane can wreak lotsof havoc. - For instance, it can fly over a Starbucks (SBUX, Fortune 500) and steal the personal informationof everyone connected to the coffee shop’s free Wi-Fi network. It can intercept your cell phone conversationsand even reroute your calls to another number. It can trace the location of specific people and follow themhome. - Perkins and Tassey spent a total of just $6,190 to build the plane. They made a point to keepit relatively cheap and to buy components that were readily available to prove that literally anyone couldmake one.”You don’t need a Ph.D. from MIT to do this,” said Perkins. ”There are no custom parts, it wasfabricated using hand tools, and very little coding is required. All you need is dedicated people.” 5. Thanks[2]CNN

1. http://3.bp.blogspot.com/-WpAmKZ137x4/TlC9MOimO3I/AAAAAAAABCk/Ok8XTqE95Ps/s1600/cyber-plane.top.jpg

2. http://money.cnn.com/2011/08/03/technology/aerial_cyber_attack/

229

Page 230: Blogger to E-Book

touched........20,000 (2011-08-22 11:31)

[1] thanks 2 all visitors.....

1. http://3.bp.blogspot.com/-4xolqLU5hk0/TlHwsFIWf2I/AAAAAAAABCo/k_cMPCw7dlg/s1600/def.JPG

4.8 September

CHINA CAUGHT ON WRONG FOOT in its own MARCH (2011-09-03 19:22)

1. Across the globe ,across all the cyber attacks investigated one thing that comes out common is the sourceof attack ie CHINA.As always China has been always denying all claims and has been doing reverse pro-poganda of actually deep rooted spoofing and involvement of other countries.But recently it was caught onthe wrong foot in front of the international nietizens.... 2. Below is the extract straight from [1]FEDERALCOMPUTING WEEK penned as China provides smoking gun against itself in cyberattacks by John BreedenII” But now, thanks to China itself, I have proof that the People’s Liberation Army does attack the UnitedStates, and likely does so on a regular basis.China’s claims of innocence have come crashing down because of an apparent mistake in editing in a docu-mentary on the country’s own state TV that should never have gone live. The PLA presentation demonstratedits military capabilities. Amid all the tanks and planes, the propaganda piece showed a mere four secondsinside the group’s cyber warfare center.Without narration, one has to think that the cybersecurity part of thepiece was only put into the video by accident, a technical background shot placed between segments for a bitof extra color. However, those four seconds are both telling and damning to the Chinese lie that they don’tattack the United States.Here is the incredible part: During those four seconds, we clearly see a Chinese soldier use a drop-down listto choose from preset target websites around the world. Then he actually attacks a website in Alabama.In this case, the website was setup to support Falun Gong, a spiritual movement outlawed in China thatpractices meditation and a philosophy that emphasizes moral responsibility.Even though all the targets shown in the four-second video were Falun Gong sites around the world, the factthat they were in a drop-down menu is telling and appalling. You don’t set up drop-down menus with attackbuttons unless you plan to use them. And the Chinese military did push the attack button in the video, soapparently it has no problem pulling the trigger.So to all you people who wanted to know where my smoking gun was, watch the video. It’s clear to me that

230

Page 231: Blogger to E-Book

we are under attack from China right now.It’s time for China to own up to what it is doing. Or it’s time for the United States to do something aboutit.” 3. The video link is shown below for info of all.Watch it carefully!!!!

IFRAME: [2]http://www.youtube.com/embed/IoCoVTwBr1E

4. Thanks [3]http://fcw.com

1. http://fcw.com/articles/2011/08/26/china-us-cyberattacks-smoking-gun.aspx?utm_source=twitterfeed&utm_

medium=twitter

2. http://www.youtube.com/embed/IoCoVTwBr1E

3. http://fcw.com/

HDFC CLEAN BOWLED by Hidden SQL Injection Vulnerability (2011-09-03 20:12)

1. Howoften do we find ourselves getting irritated with the constant reminders from banks to change pass-words every 15 days...to include few small cases,few caps,few numbers and few special characters and moreoften then not 40 % of the account holders forget keeping a tab on what was the last password.....Inspiteof heavy claims by most of the banks that they have the highly secured banking netwrok here comes aboomrang for HDFC...inspite of ample number of warnings by [1]zSecure , a firm committed in providingcomprehensive and cost-effective Penetration Testing services Networks, Servers and Web application,HDFChad no inkling of what they were warned about and what was supposed to be done....simply banking onsome third party solution and getting into a SURRENDER SITUATION.....the story goes like this HDFCwas warned about Hidden SQL Injection Vulnerability by the firm ZSECURE.The subject vulnerability wasdiscovered on 15-July-2011 and was reported on 17-July-2011 (reminder sent on 24-July-2011). The HDFCBank’s team took around 22 days to respond to our e-mail and their first response came on 08-August-2011with a message:“Thank you for sending us this information on the critical vulnerability. We have remediated the same.“After their e-mail, we again checked the status of said vulnerability and found that the vulnerability was stillactive on their web portal. We immediately replied to their email with additional proof of vulnerability andasked them to fix the same asap. Later on, after 2 days we again received an e-mail from their team with amessage:“We have remediated all the vulnerability reported on our website. Also we have got the application vulnera-bility assessment performed through one of our third party service provider and they confirmed that there areno more SQL Injection vulnerability.“Their above response left us with an unexpected surprise. We were not able to believe that such a big organi-zation doesn’t have proper vulnerability assessment in place because we already reported the vulnerability tothem and even after conducting vulnerability assessment from a third party (as claimed) they were not ableto find the active vulnerability in their web-portal.Thereafter, we sent complete inputs about the vulnerabilityto their security team and finally the vulnerable file was removed from HDFC’s web-server. 2. The story goeson to confirm how much vulnerable we all are to such holes.Not blaming the bank singly,but the policies andthe measures supposed to be taken and adopted have no firm policies on date.It is entirely left to the thirdparty dependency solution....its high time for all banks to constantly take measures and keep itself updatedto all new vulnerabilities hanging around...... 3. Thanks [2]http://www.zsecure.net

1. http://www.zsecure.net/security-blog/vulnerabilities/hdfc-bank-sql-injection-vulnerability.html

2. http://www.zsecure.net/

231

Page 232: Blogger to E-Book

CYBER SECURITY : ACTIVE ATTACKS (2011-09-20 20:57)

An active attack involves probing the netwrok to discover individual hosts to confirm the information gatheredin the passive attack phase.A lsit of tools i recently read are listed below for info.These are small but great toolsfor experimenting....m doing it on a VMware machine...... arphound arping bing bugtraq dig dnstracer dsnifffilesnarf findsmb fping fragroute fragtest hackbot hmap hping httping hunt libwhisker mailsnarf msgsnarfnbtscan nessus netcat nikto nmap pathchar ping scanssh smbclient smtpscan tcpdump tcpreplay thcamaptraceroute urlsnarf xprobe2

XSS and CSS : Whats the difference ? (2011-09-20 22:33)

I often used to read XSS and CSS being read in the same context when i knew that CSS stands for CascadingStyle Sheets.There has been a lot of mixing up of Cascading Style Sheets (CSS) and cross site scripting. Butactually when people are speaking of CSS in context of Cross site scripting what they actually mean is XSSonly....its the same.....

DEEP FREEZE : A way to protect ur system!!! (2011-09-20 22:57)

1. Deep Freeze, by Faronics, is an application available for the Microsoft Windows, Mac OS X, and SUSELinux operating systems which allows system administrators to protect the core operating system and con-figuration files on a workstation or server by restoring a computer back to its original configuration eachtime the computer restarts.The other interesting salient features are mentioned below : - Deep Freeze is akernel-level driver that protects hard drive integrity by redirecting information being written to the harddrive or partition. - Leaves the original data intact. - The directed information is no longer referenced oncethe computer is restarted, thus restoring the system to its original state at the disk sector level. - Allows usersto make ’virtual’ changes to the system, giving them the appearance that they can modify core files or evendelete them, and even make the system unusable to themselves, but upon reboot the originally configured’frozen’ state of the operating system is restored. - To make changes, a system administrator must ’thaw’the protected partition by disabling Deep Freeze, make any needed changes, and then ’freeze’ it again byre-enabling Deep Freeze. These changes become part of the protected partition and will be maintained afterrestarts. 2. Deep Freeze can also protect a computer from harmful malware, since it automatically deletes(or rather, no longer ”sees”) downloaded files when the computer is restarted. The advantage of using anapplication such as Deep Freeze antivirus / antimalware is that it uses almost no system resources, anddoes not slow your computer significantly. The disadvantage is that it does not provide real-time protec-tion, therefore an infected computer would have to be restarted in order to remove malware. 3. More at[1]http://www.faronics.com/.Thanks [2]WIKI......

1. http://www.faronics.com/

2. http://en.wikipedia.org/wiki/Deep_Freeze_(software)

DEEP FREEZE : II (2011-09-20 23:04)

In continuation with the [1]earlier post here....would like readers to read this for info and value addition[2]http://forums.techguy.org/all-other-software/708554-other-pro gams-like-deep-freeze.html

232

Page 233: Blogger to E-Book

1. http://anupriti.blogspot.com/2011/09/deep-freeze-way-to-protect-ur-system.html

2. http://forums.techguy.org/all-other-software/708554-other-progams-like-deep-freeze.html

Common Malware Symptoms (2011-09-25 20:43)

If you are malware hit....u r likely to see one or few or all of these symptoms:Your programs and files are suddenly missing.Homepage of your web browser has changed.Search results are being redirected.You start ending up at websites you didn’t intend to go to.New icons & programs appear on the desktop that you did not put there.Your desktop background has changed without your knowledge.Your programs won’t start.Your security protection have been disabled for no apparent reason.You cannot connect to the internet or it runs very slowly.Strange or unexpected toolbars appear in your web browser.Takes longer to start and runs more slowly than usual.Computer shows strange error messages or popups.Freezes or crashes randomly.Computer is performing actions on its own.You cannot access security related websites.

maxcomputer (2011-10-04 12:34:56)Wonderful! you are so right and I needed to hear this. maxcomputer.info

When malware prevent you surfing internet : MALWARE REMOVAL -1(2011-09-25 20:50)

4.9 October

nVidia GeForce GPU cracks six character password in four seconds (2011-10-10 20:26)

1. An nVidia GeForce GT220 graphics card, which costs about £30, is capable of cracking strong passwordsin a matter of hours. Security experts were able to crack a 6 character password in 4 seconds, a 7 characterpassword in less than 5 minutes, and 8 character password in four hours.So guys ...have mentioned it so manytimes earlier...even a password upto 14 character in length has been shown easy to crack when i discussedat a post[1] here about one year back....so better take care of ur passwords...small case with few caps andspecial characters with numbers upto a length of 10-15 should do it for the time being....things r gettingnasty in the hacking world.....take care.... 2. more about this at...[2]here...[3]here...[4]here....[5]here...

1. http://anupriti.blogspot.com/2010/10/crack-14-character-passwords-in-seconds.html

2. http://www.google.co.in/url?sa=t&source=web&cd=3&sqi=2&ved=0CCkQFjAC&url=http%3A%2F%2Fwww.computerweekly.

com%2FArticles%2F2011%2F10%2F04%2F248075%2FGPU-cracks-six-character-password-in-four-seconds.htm&ei=

233

Page 234: Blogger to E-Book

9vySTtfXOcLtrAez3YSMAQ&usg=AFQjCNEDHFi7jK0vIVrSlwl95bg4PA9uNQ

3. http://www.google.co.in/url?sa=t&source=web&cd=5&sqi=2&ved=0CDUQFjAE&url=http%3A%2F%2Fwww.airdemon.net%

2FnVidiaGeForceGT220.html&ei=9vySTtfXOcLtrAez3YSMAQ&usg=AFQjCNEmyMQdqqYvOdnciCago4Rn2kFhMA

4. http://www.google.co.in/url?sa=t&source=web&cd=9&sqi=2&ved=0CE0QFjAI&url=http%3A%2F%2Fwww.overclock.net%

2Fhardware-news%2F1134915-thn-gpu-cracks-6-character-password.html&ei=9vySTtfXOcLtrAez3YSMAQ&usg=

AFQjCNHv6L-paSi0Bs25129ZCuN3fmbMSA

5. http://www.google.co.in/url?sa=t&source=web&cd=11&sqi=2&ved=0CF4QFjAK&url=http%3A%2F%2Fhackingzones.in%2F%

3Fp%3D1172&ei=9vySTtfXOcLtrAez3YSMAQ&usg=AFQjCNGvLBntfOAavLG_zPsZ7W1vXvE3Dg

HIBERNATION MODE : HOW SAFE FOR YOU? (2011-10-11 22:26)

1. How often while using your PC u use the hibernation mode?I am sure that after reading the text belowu r hardly going to use it owing to the serious compromise of your info of what you do and when you do? 2. Ok…what do we mean by hibernation mode?......it simply means that via using this mode we arebasically creating a snapshot of the contents of the computers RAM which is then saved to the root of thehard drive as “hiberfil.sys”!!!!This would now mean that the then current running applications and otherdata in RAM will be written to the hard disk. 3. For example, if we went into the hibernation modewith our browser still open…..then textual strings such as the last Google search performed or text froman open web page will be written to hard drive as the computer “hibernates”. 4. The Windows hiberfil.sysalso become an issue while using encryption software such as TrueCrypt. If a Windows system is placedinto hibernation mode without unmounting encrypted containers or volumes then the encryption keys usedto access these containers will likely be left in RAM in plain-text. RAM will then be saved to the harddrive in the hiberfil.sys. This means that we will be leaving the keys (passwords) to all of your privatecontainers and volumes free for the finding. 5. Ok…..if at all we get hold of the hiberfil.sys…is it going to bethat easy to read all that hex dec info?...no certainly not…here come sandmen project for assistance….nowwhats SANDMEN PROJECT….pls google….in short it is a library which assists in parsing data from thehiberfil.sys. Disable Hibernation mode on Windows XP: • Right-click empty area on desktop •Choose “Properties” • Select the “Screen Saver” tab • Click “Power…” • Select the “Hibernate” tab •Uncheck “Enable hibernation” Disable Hibernation mode on Windows 7: • Open “Control Panel” •Click “Power Options” • Click “Change plan settings” for you current power plan • Click “Change advancedpower settings” • Expand “Sleep” • Expand “Hibernate after” • Enter “0″ for “Setting:” to set hibernate to“Never” 6. Thanks [1]http://www.anti-forensics.com

1. http://www.anti-forensics.com/

anti-forensics (2011-10-26 11:33:55)Thank you for the reference Anupam :) I do a lot of business in India (non-forensics), very hard workers.Regards,Maxhttp://anti-forensics.com

WIRESHARK Troubleshoot (2011-10-22 23:19)

1. The most common trouble that comes up first time users of [1]Wireshark is that CAPTURE INTER-FACE drop down shows the NPF not running and thus the interface list shows NIL..... 2. The small workto be done is that you need to install and then run [2]WinPcap.So after you have installed [3]Wireshark

234

Page 235: Blogger to E-Book

and u have a shortcut of the application on the desktop...just right click the [4]Wireshark and run as theadministrator.....should solve....

1. http://www.wireshark.org/

2. http://www.winpcap.org/

3. http://www.wireshark.org/

4. http://www.wireshark.org/

DUQU : FROM THE GEN STUXNET???? (2011-10-30 23:10)

1. Do u remember the gr8 [1]STUXNET...who hit the cyber theatres about a year back?....i call it gr8 sincethat was the first piece of trojan which the experts called with words like marvelous,the world’s first ’opensource weapon’.....the code which shocked the experts...though it was meant to target Siemens industrialsoftware and equipment running Microsoft Windows....but the percentage affected was enough to do theearly damage and show the trailor of what can come ahead....now comes another in the offering whichResearchers from Symantec say is likely written by the same authors and based on the same code.This isknown as DUQU.....also coming to be known as “Son of Stuxnet” and a “precursor to a future Stuxnet-likeattack.” 2. But another analyses by security researchers from [2]Dell suggest Duqu and Stuxnet may not beclosely related after all. That’s not to say Duqu isn’t serious, as attacks have been reported in Sudan andIran. But Duqu may be an entirely new breed, with an ultimate objective that is still unknown.“Both Duquand Stuxnet are highly complex programs with multiple components,” Dell says. “All of the similarities froma software point of view are in the ‘injection’ component implemented by the kernel driver. The ultimatepayloads of Duqu and Stuxnet are significantly different and unrelated. 3. The security vendor Bitdefenderhas also cast doubt on the supposed Duqu/Stuxnet link in its Malwarecity blog. “We believe that theteam behind the Duqu incident are not related to the ones that released Stuxnet in 2010, for a numberof reasons,” BitDefender’s Bogdan Botezatu writes. While a rootkit driver used in Duqu is similar to oneidentified in Stuxnet, that doesn’t mean it’s based on the Stuxnet source code. 4. Now till date,DUQU wasreportedly seen infecting machines in and around IRAN......but now the Symantec version reported is thata server machine in aamchi Mumbai is effected by this new VIRUS!!!!!!!Indian authorities seized computerequipment from a data center in Mumbai as part of an investigation into the Duqu malicious software thatsome security experts warned could be the next big cyber threat. Two workers at a web-hosting companycalled Web Werks told Reuters that officials from India’s Department of Information Technology last weektook several hard drives and other components from a server that security firm Symantec Corp told them wascommunicating with computers infected with Duqu. 5. So DUQU is here in INDIA.......and I m sure with thehigh percentage of pirated software users in India....we r the most vulnerable to such kinds of threat.....beupdated...buy genuine....keep taking updates to avoid being EXPLOITED by EXPLOITS.................. 6.Thanks [3]http://arstechnica.com

1. http://anupriti.blogspot.com/2010/10/stuxnet-milestone-in-malicious-code.html

2. http://www.secureworks.com/research/threats/duqu/

3. http://arstechnica.com/

BACKTRACK 5 : How to use ? (2011-10-30 23:24)

Recently uploaded a step by step with screen shot on how to use and benefit from BACKTRACK 5 on avirtual lab platform.....[1]Backtrack 5

235

Page 236: Blogger to E-Book

IFRAME: [2]http://www.scribd.com/embeds/69619754/content?start page=1 &view mode=slideshow&access key=key-1qs7tqsfr2wfgabsp0zu

1. http://www.scribd.com/doc/69619754/Backtrack-5

2. http:

//www.scribd.com/embeds/69619754/content?start_page=1&view_mode=slideshow&access_key=key-1qs7tqsfr2wfgabsp0zu

SOME MORE ON DUQU (2011-10-31 20:50)

Some more good info and FAQs on DUQU.....AT[1]http://www.secureworks.com/research/threats/duqu/

1. http://www.secureworks.com/research/threats/duqu/

RED PHONE : ENCRYPTED VOICE FOR ANDROID!!! (2011-10-31 21:52)

Here is something every android user would lov to use....AIM IS TO LISTEN AND SPEAK ON YOURANDROID HANDSET WITH INBUILT ENCRYPTION OF RED PHONE APPLICATION.......isn’t itgr888888!!! ” RedPhone provides end-to-end encryption for your calls, securing your conversations so thatnobody can listen in. It’s easy to use, and functions just like the normal dialer you’re accustomed to.RedPhone uses your normal mobile number for addressing, so there’s no need to have yet another identifieror account name; if you know someone’s mobile number you know how to call them using RedPhone. Andwhen you receive a RedPhone call your phone will ring just like normal, even if it is asleep. ” Got this infofrom [1]http://www.anti-forensics.com/blog.More at [2]http://www.whispersys.com/index.html

1. http://www.anti-forensics.com/blog

2. http://www.whispersys.com/index.html

4.10 November

DUQU’s MICROSOFT LINK!!! (2011-11-02 20:21)

1. While as on date the security and anti virus teams and experts across the globe are racing to findand unlock the details on DUQU,some useful information on the subject bug has been released by Mi-crosoft,which says that hackers exploited a previously unknown bug in its Windows operating system toinfect computers with the Duqu virus.”We are working diligently to address this issue and will release asecurity update for customers,” Microsoft said.But on the other hand the odds are that Microsoft won’tpatch the Windows kernel bug next week that the Duqu remote-access Trojan exploits to plant itself ontargeted PCs. 2. Meanwhile,Symantec researchers said they consider hackers sent the virus to targetedvictims via emails with infected Microsoft Word documents attached. If a recipient opened the Word docu-ment and infected the PC, the attacker could take control of the machine and reach into an organization’snetwork to propagate itself and hunt for data, Symantec researcher Kevin Haley told Reuters. 3. Thanks[1]http://itknowledgeexchange.techtarget.com and [2]http://www.computerworld.com

236

Page 237: Blogger to E-Book

1. http://itknowledgeexchange.techtarget.com/

2. http://www.computerworld.com/

Our Browsing History Is Leaking into the Cloud!!!! (2011-11-02 21:29)

1. You do it on INCOGNITO mode or the PRIVACY mode or keep removing cookies to ensure that you arenot being tracked or u think like your browsing history does not exist....this is going to shock you.....watch thisvideo ”DEFCON 19: Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud”....clickdown to see....

IFRAME: [1]http://www.youtube.com/embed/BK E3Bjpe0E

2. The summary goes like this.... - 350 services get at least 1 % of your browsing activity - 33 servicesget at least 5 % of your browsing activity - 16 services get at least 10 % of your browsing activity 3.Any solutions for avoiding......yes...the video itself gives you the solution ....and as on date millions havealready adopted it...now that includes me tooo.....download the plugin for your respective browser from[2]http://www.disconnect.me/

1. http://www.youtube.com/embed/BK_E3Bjpe0E

2. http://www.disconnect.me/

DISCONNECT URSELF (2011-11-15 21:20)

1. The issue of privacy browsing is a growing worry for internet users including me.Various attemptsin form of third party utilities,browsers offering incognito/privacy mode have been made and are beingmade in the current webosphere.In the search for handling these issues I recently came across thisplugin...DISCONNECT.ME at [1]http://disconnect.me/ 2. Next is straight lift extract from the site : Ifyou’re a typical web user, you’re unintentionally sending your browsing and search history with your nameand other personal information to third parties and search engines whenever you’re online.

Take control of the data you share with Disconnect!.

From the developer of the top-10-rated Facebook Disconnect extension, Disconnect lets you:

• Disable tracking by third parties like Digg, Facebook, Google, Twitter, and Yahoo, without requiringany setup or significantly degrading the usability of the web.

• Truly depersonalize searches on search engines like Google and Yahoo (by blocking identifying cook-ies not just changing the appearance of results pages), while staying logged into other services — e.g., so youcan search anonymously on Google and access iGoogle at once.

• See how many resource and cookie requests are blocked, in real time.

237

Page 238: Blogger to E-Book

• Easily unblock services, by clicking the toolbar button then services (and reloading current pages)— e.g., so you can play games on Facebook.

To learn more about online privacy and protecting yourself and find out when additional browsers aresupported, subscribe to the Disconnect Newsletter at http://disconnectere.com/.

Disconnect is open-source software — you can get the code at http://j.mp/dsource.

Known Issues:

• The scary installation warning is explained at http://j.mp/dinstall (the text refers to Facebook Dis-connect but also applies to Disconnect).

• Click the “d” button then the “Depersonalize searches” checkbox to turn search depersonalizationon (or back off in case you have trouble getting to Google or Yahoo services).

• Search depersonalization isn’t yet implemented for international Google domains — google.fr, google.co.jp,et cetera.

• Yahoo has to be unblocked while you’re logging into Flickr or Delicious but can be blocked again af-terwards.

• Unblocking Facebook isn’t possible while Facebook Disconnect is running — that extension will beautoupdated to be compatible with Disconnect in the next few days.

• You should unblock Google and Yahoo before disabling or uninstalling Disconnect — doing so willrestore your cookies to their original state.

3. I have started using it without issues till now....download this at [2]http://disconnect.me/4. Thanks [3]disconnect.me

1. http://disconnect.me/

2. http://disconnect.me/

3. http://disconnect.me/

238

Page 239: Blogger to E-Book

DISCONNECT.ME in Incognito mode (2011-11-15 21:26)

I asked the site owner at disconnect.me of how to use this plugin while surfing in privacy/incognito modesince I use incognito all the time...its default....i got this replyHey Anupam, you have to explicitly enable extension to run inincognito mode in Chrome. Right- or Ctrl-click the ”d” button, pick”Manage extensions...”, click the arrow next to Disconnect, and checkthe ”Allow in incognito” box.Thanks [1]disconnect.me

1. http://disconnect.me/

THREATS TERMINOLOGY & GLOSSARY : PART 1 (2011-11-24 22:50)

1. The term VIRUS is still used in talks amongst the victims of so many threats which are relatively unknownto the normal user.Here I am putting down the commonly known present day threat terminology.I am missingout on the regular ones that include Malware,adware,spyware,spam etc....BACKDOOR 2. A remote administration utility which bypasses normal security mechanisms to secretlycontrol a program, computer or network. These utilities may be legitimate, and may be used for legitimatereasons by authorized administrators, but they may also be misused by attackers. A backdoor is usuallyable to gain control of a system because it exploits vulnerabilities, bugs or undocumented processes in thesystem’s code. A Variation: The IRC Backdoor 3. There also exist IRC backdoors, which are controlledvia bots hidden in specific invite-only IRC channels accessible only to the attacker; these bots serve as theclient component of the traditional client-server backdoor arrangement. BLUE TOOTH WORM 4. Aplatform-specific type of worm that propagates primarily over a Bluetooth network. This type of wormis almost always designed to function on mobile devices, which make more use of Bluetooth connectivitythan computers. BOT 5. A malicious program that, on being installed onto a computer system, allowsthe attacker to enslave the system into a network of similarly affected systems known as a botnet. Theindividual computers in a botnet may also be referred to as a bot or a zombie. BOTNET 6. A portmanteauformed from the words robot and network, a ’botnet’ is a network of infected computers that can be remotelycontrolled by an attacker, usually via a command-and-control (C &C) server. Each infected computer may beknown as a bot , a zombie computer , or a zombie . BROWSER HELPER OBJECT (BHO) 7. A type of webbrowser plug-in specifically designed for use with the Microsoft Internet Explorer browser. A Browser HelperObject (BHO) executes automatically every time the browser is launched and provides functionality that isnot built-in to the browser. CROSS SITE SCRIPTING 8. A type of attack in which malicious scripts areinjected into a legitimate website in oder to be served to subsequent site visitors. Cross site scripting (XSS)attacks can result in a variety of effects, including hijacked web browsing sessions, stolen session cookies,information theft and more. As more people become increasingly dependent on web-based services, XSSattacks are becoming increasingly common. DENIAL OF SERVICE 9. A type of Internet-based attackthat aims to deny legitimate users access to a service (for example, a website or a network) by overloadinga relevant computer resource or network device. The most common type of Denial of Service (DoS) attacktakes the form of a massive amount of requests being sent from a host machine to the target, for example,a government website server. ICMP Flood 10. The attackers sends out a flood of ICMP ECHO packetsto the target, swamping CPU usage and effectively rendering the target unusable until the flood is ended orthe target is reset or restarted. Peer to Peer attack 11. Attacker exploit bugs in peer-to-peer servers andredirect clients from the peer-to-peer server to the target server instead, flooding the target with thousands ofconnections and overwhelming its resources. Application level floods: A DoS attack carried out via particularapplications, most commonly Internet chat systems. The most common kind of flood is an IRC flood, whichis carried out on the popular IRC chat system. DISTRIBUTED DENIAL OF SERVICE (DDOS)

239

Page 240: Blogger to E-Book

12. A type of attack conducted over the Internet, using the combined resources of many computers tobombard, and frequently crash, a targeted computer system or resource (e.g., a program, website or network).GENERIC DETECTION 13. A new type of sophisticated detection that is being increasingly used byantivirus programs to identify programs with malicious characteristics. Unlike more traditional detections(also known as signature-based or single-file detections) a Generic Detection does not identify a unique orindividual malicious program. Instead, a Generic Detection looks for broadly applicable code or behaviorcharacteristics that indicate a file as potentially malicious, so that a single Generic Detection can efficientlyidentify dozens, or even hundreds of malware. POLYMORPHIC VIRUS 14. A virus that mutates, ormodifies, its own code at various intervals. The changes in code typically occur each time the virus replicates,or infects a new machine. Detection and disinfection of a polymorphic virus can be very challenging, asmutating code makes traditional signature-based detection methods ineffective. Nowadays, many antivirusprograms instead use heuristic analysis to identify polymorphic viruses. POLYMORPHISM 15. The act ofa virus ’mutating’ parts of its code at various intervals in order to evade detections. By constantly changingits code, a virus ensures that each iteration of its code looks different from the preceding one, making itimpossible for traditional signature-based antivirus programs to identify the two iterations as one and thesame virus. These so-called ’mutating viruses’ can be divided into polymorphic and metamorphic viruses.Polymorphic Versus Metamorphic 16. A metamorphic virus works performs its mutation routinedifferently. Rather than using encryption to obfuscate its virus body, a metamorphic virus ’rearranges’entire chunks of actual code between iterations in order to create a seemingly different virus. The changes incode are directed by a metamorphic engine and despite the alterations, do not affect function - that is, thevirus is still able to perform the same malicious actions through each iteration. Fortunately, the major codechanges performed by a metamorphic virus require a high degree of technical skill from the virus author,and there are very few such viruses in the wild so far. ZERO DAY 17. A type of attack that exploits arecently publicized vulnerability or security loophole, before program vendors or the security community areable to develop a patch for the vulnerability. The period between the public announcement of a vulnerabilityand the first release of a patch fixing the vulnerability is also sometimes referred to as ”zero hour” – even ifthe actual timespan is longer than an hour. Dealing With Zero-Day attacks A zero-day attack can be verydestructive, as vulnerable systems generally have few defenses against it.

COOKIES & TYPES ? (2011-11-27 21:58)

1. How often we blame it on cookies for tracking,invading our privacy.......but whats these cookies allabout?How many types exist?Are all of them dangerous?What can I do to avoid them? All answers aheadin my posts ahead....2. A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website tosend state information to a user’s browser and for the browser to return the state information to the originsite.The state information can be used for authentication, identification of a user session, user’s preferences,shopping cart contents,or anything else that can be accomplished through storing text data.Cookies arenot software.They cannot be programmed, cannot carry viruses, and cannot install malware on the hostcomputer . SESSION COOKIE A session cookie only lasts for the duration of users using the website.A web browser normally deletes session cookies when it quits. A session cookie is created when no Expiresdirective is provided when the cookie is created. PERSISTENT COOKIE A persistent cookie will outlastuser sessions. If a persistent cookie has its Max-Age set to 1 year, then, within the year, the initial value setin that cookie would be sent back to the server every time the user visited the server. This could be usedto record a vital piece of information such as how the user initially came to this website. For this reason,persistent cookies are also called tracking cookies or in-memory cookies. SECURE COOKIE A securecookie is only used when a browser is visiting a server via HTTPS, ensuring that the cookie is always encryptedwhen transmitting from client to server. This makes the cookie less likely to be exposed to cookie theft via

240

Page 241: Blogger to E-Book

eavesdropping. HTTP ONLY COOKIE The Http Only session cookie is supported by most modernbrowsers.On a supported browser, an Http Only session cookie will be used only when transmitting HTTP(or HTTPS) requests, thus restricting access from other, non-HTTP APIs (such as JavaScript). FIRSTPARTY COOKIES A first-party cookie either originates on or is sent to the Web site you are currentlyviewing. These cookies are commonly used to store information, such as your preferences when visiting thatsite. THIRD PARTY COOKIES Third-party cookies are cookies being set with different domains thanthe one shown on the address bar.For example: Suppose a user visits www.example1.com, which sets a cookiewith the domain ad.foxytracking.com. When the user later visits www.example2.com, another cookie is setwith the domain ad.foxytracking.com. Eventually, both of these cookies will be sent to the advertiser whenloading their ads or visiting their website. The advertiser can then use these cookies to build up a browsinghistory of the user across all the websites this advertiser has footprints on. ZOMBIE COOKIE A zombiecookie is any cookie that is automatically recreated after a user has deleted it. TEMPORARY / SESSIONCOOKIES A temporary or session cookie is stored only for your current browsing session, and is deleted fromyour computer when you close your browser. UNSATISFACTORY COOKIES Unsatisfactory cookiesare cookies that might allow access to personally identifiable information that could be used for a secondarypurpose without your consent. 3. Thanks [1]www.allaboutcookies.org and [2]http://www.f-secure.com

1. http://www.allaboutcookies.org/

2. http://www.f-secure.com/

CONTROL COOKIES TAKING CONTROL FROM UR BROWSERS (2011-11-27 22:12)

1. In my earlier post [1]here about cookies and types,I had mentioned about types and some relevantdetails.Now this one mentions about the steers and control available in prominent browsers to disable cookiesdigging into ur privacy !!! Google Chrome Go to ’Tools Menu’ Click on ’Options’ Click on ’Under theHood’ ’Cookie Setting’ should be selected. Once done select ’Block all Cookies’ Now all cookies should beblocked on your Google Chrome To clear existing cookies: Go to ’Tools Menu’ Click on ’Options’ Click on’Under the Hood’ Under ’Privacy’ section select ”Show Cookies’ A new window should open called ’Cookies’In here you can see all the cookies within your Google Chrome Browser. Click on ”Remove All” to remove alltraces of cookies If you wish to only remove a certain cookie, simply highlight and click ”Remove” FirefoxGo to ’Tools’ in the menu bar Click on ’Options’ Click on ’Privacy Tab’ Disable the box that says ’AcceptCookies From sites’ To clear existing cookies: Go to ’Tools’ in the menu bar Click on ’Options’ Click on’Privacy Tab’ Click on ”Clear Now” Select ”Cookies” Click on ”Clear Private Data Now” Internet Explorer(IE) 9.0+ Go to ’Tools’ in the menu bar which should drop down then click on ’Internet Options’ Clickon ’Privacy’ Tab on top Move the slider up to the ’Block all Cookies’ button Important Notice: Blockingall cookies may prevent you from entering alot of sites. The next two Internet Explorer privacy levels, Highand Medium High, may be more suitable. To delete existing cookies: Go to ’Tools’ in the menu bar whichshould drop down then click on ’Internet Options’ Click on ’General’ tab which should be under ’BrowsingHistory’ and click ’Delete’ 2. Thanks [2]http://www.allaboutcookies.org

1. http://anupriti.blogspot.com/2011/11/cookies-types.html

2. http://www.allaboutcookies.org/

Cookienator : Option to control cookie menace (2011-11-27 22:26)

1. Cookienator is a tool that will helps us remain anonymous from search engines such as Google and otherweb-usage trackers such as Doubleclick or Omniture.This a simple program that will leave most of cookies

241

Page 242: Blogger to E-Book

alone but will remove the ones that put your privacy at risk. The best part about this is the size and ease ofinstallation.....It is lightweight; it’s a single executable, when run, it will tell you how many cookies it wouldlike to remove. It is available for free to download and is available in two forms : msi windows executable

and a zip file [1]2. More at [2]http://codefromthe70s.org/cookienator.aspx

1. http://2.bp.blogspot.com/-9pgwlDPj6vw/TtJrPIt5buI/AAAAAAAABHU/-BYyrmGRoVc/s1600/cookienator.jpg

2. http://codefromthe70s.org/cookienator.aspx

4.11 December

Windows 8 Developer Preview : Pre Beta Version for Developers (2011-12-01 07:10)

I recently downloaded the Windows 8 Preview Developer edition from [1]http://msdn.microsoft.com/en-us/windows/apps/br229516 and then tried running it as a virtual machine.Found the following issues : -does not run on [2]VMWARE 7 - runs on [3]VMWARE 8 - Donno y...but runs at a pathetic speed onVMWARE 8 inspite of a good resourceful machine with upto 1.5 GB of RAM. - Even on installation onVMWARE 8...doesnt show the NIC card so it has no access to Internet.So no updates. - Runs at a horse’space in [4]VIRTUAL BOX. - No NIC issues in virtual box.

1. http://msdn.microsoft.com/en-us/windows/apps/br229516

2. http://www.vmware.com/

3. http://www.vmware.com/

4. https://www.virtualbox.org/

LogMeIn HAMACHI (2011-12-02 22:04)

1. The law of market keep seeing fights to be at par with each other ie DEMAND & SUPPLY.Today whensecurity in IT is a burning issue,we have so many utilities floating that there is no way one can be trustedblind foldly.Here come another security utility that actually stands out to work in a direction not taken upby so many prominent software security utillities in market.This is HAMACHI 2. Hamachi is a nice ,free2 try,tool that connects two computers via the internet by creating a virtual private network (VPN) andprotecting it with proven industry-standard encryption algorithms.This will ensure that all communicationsbetween the two PCs at a time are safe from the spying eyes.It easily sets up in 10 minutes, and enables secureremote access to network, anywhere there’s an Internet connection.The basic advantage that immidiatelystand out are : - LAN over the Internet - Arrange multiple computers into their own secure network, justas if they were connected by a physical cable. - Files and Network Drives - Access critical files and networkdrives. - Zero-configuration - Works without having to adjust a firewall or router. - Security - Industryleading encryption and authentication. - Cost Effective - Free for non-commercial use. 3. It features asimple interface that enables to create personal safe networks in just a couple of steps. Also the connectionis conveniently protected by an AES-256 algorithm.The problem lies that it supports only chat....and not

242

Page 243: Blogger to E-Book

yet what we desire most ie ”FILE SHARING”.A new,nice attempt to take on security but still a long way togo.... 4. Thanks [1]https://secure.logmein.com

1. https://secure.logmein.com/

Snake oil Cryptography (2011-12-02 23:01)

1. While reading a post about unhackable codes [1]here , I came across a interesting term know as SNAKEOIL CRYPTOGRAPHY......as Alex Gostev, chief security expert at Kaspersky Labs, dismissed ENIGMA-DS ”snake-oil cryptography,”....so found out in brief from wiki...where else!!! In cryptography, snake oil is aterm used to describe commercial cryptographic methods and products which are considered bogus or fraudu-lent. The name derives from snake oil, one type of quack medicine widely available in 19th century UnitedStates.Distinguishing secure cryptography from insecure cryptography can be difficult from the viewpoint of auser.2. Thanks [2]WIKI

1. http://money.cnn.com/2011/09/02/technology/unhackable_code/index.htm?hpt=te_bn4

2. http://en.wikipedia.org/wiki/Snake_oil_(cryptography)

Windows 8 Developer Pre BETA : How to get full screen on a VM? (2011-12-03 14:04)

In continuation with my [1]earlier post here about windows 8 Pre Beta edition,one thing that bugged mefor a while was not getting the display across full screen in spite of choosing ”view full screen” from dropdown.The answer to this goes like this ..SIMPLY CHOOSE A HIGHER RESOLUTION AND U WILL GETIT.... Simple to get till u know!!!!!!!!!!!

1. http://anupriti.blogspot.com/2011/12/windows-8-developer-preview-pre-beta.html

”LIKE” Button in Facebook : Tracks u!!! (2011-12-03 21:54)

1. Internet users tap Facebook Inc.’s ”Like” and Twitter Inc.’s ”Tweet” buttons to share content with friends.But these tools also let their makers collect data about the websites people are visiting. 2. These so-calledsocial widgets, which appear atop stories on news sites or alongside products on retail sites, notify Facebookand Twitter that a person visited those sites even when users don’t click on the buttons, according to astudy done for The Wall Street Journal.Few things about these widgets : - Prolific widgets - Already addedto millions of web pages in the past year. - The widgets, which were created to make it easy to share contentwith friends and to help websites attract visitors, are a potentially powerful way to track Internet users. -They could link users browsing habits to their social-networking profile. - For example, Facebook or Twitterknow when one of their members reads an article about filing for bankruptcy on MSNBC.com or goes toa blog about depression called Fighting the Darkness, even if the user doesn’t click the ”Like” or ”Tweet”buttons on those sites. - A person only needs to log into Facebook or Twitter once in the past month.The sites will continue to collect browsing data, even if the person closes their browser or turns off theircomputers, until that person explicitly logs out of their Facebook or Twitter accounts. - Facebook places acookie on the computer of anyone who visits the Facebook.com home page, even if the user isn’t a member.3. Thanks [1]http://online.wsj.com

1. http://online.wsj.com/article/SB10001424052748704281504576329441432995616.html

243

Page 244: Blogger to E-Book
Page 245: Blogger to E-Book

BlogBook v0.4,LATEX 2ε & GNU/Linux.

http://www.blogbooker.com

Edited: December 3, 2011