Sunday, March 31, 2013

Scientists come a step closer to 'invisibility cloak'.

Scientists working on methods  to make  objects "Invisible" :

Some scientists seem to take their cues from science fiction or fantasy novels.
Physicists in Texas have developed a method to make objects "invisible" within a limited range of light waves. It's not Harry Potter's invisibility cloak just yet, but scientists say it has a lot of potential.
The desire to become invisible dates back to the ancient Greeks, if not further. In mythological literature, gods and goddesses donned a headdress to disappear from sight. Like Potter's cloak, the "cap of invisibility" was imbued with magical powers.
A fixture in magic, the invisibility cloak has now advanced to science.
New technology makes troops invisible
Researchers at the University of Texas in Austin have developed a thin material called a 'mantle cloak,' according to a report published in the New Journal of Physics Tuesday.
If an object is wrapped in it, it 'disappears,' but the effect only applies to a limited range of light waves -- specifically microwaves.

The future is not here just yet
In their experiment, the physicists covered a cylinder about a foot long and an inch or so in diameter with the material. Microwave detectors could no longer plainly 'see' it, although it was still visible to the human eye. But the same principle could be transferred to the range of perceptible light, researchers say.
Doing so would then make objects invisible to the human eye.
The effect only covers a very small band of electromagnetic waves at one time, and in the visible range of light, it would only work on objects much thinner than a single strand of hair.

Useful in nanotechnology
Scientists find this development exciting because it could prove useful in nanotechnology by letting light bypass microscopic objects that would otherwise block it.
The discovery could advance the fields of specialty optics and biotechnology, according to the physicists.
This is not the first time scientists have made an object 'invisible,' but previous methods have involved hulking devices and more cumbersome methods.
The new cloak is made of a sheer, handy material that can be applied to many surfaces, even irregular ones, according to the report.

Light and invisibility
We see things because light reflects off of them and hits our eyes. Or, in this case, microwaves bounce off of them and hit a detection device.
Light has properties that can be manipulated, which is how objects can be rendered invisible. It can be reflected away, for example. Illusionists such as David Copperfield can use mirrors to make an object disappear.
Light also refracts -- or breaks -- when it passes through a prism or raindrops, resulting in the palette of colors we see in a rainbow. It also bends ever so slightly due to gravity, when it passes by a planet.
Previous attempts at achieving invisibility have involved bending or reflecting light around the object that is meant to vanish.
The mantle cloak takes a new approach.
Light is a wave that can be disturbed. That's what the mantle cloak does.

The cloak's material
It is made by combining copper tape with polycarbonate, a material commonly used in DVD's and CDs. The resulting cloak has a miniscule pattern -- like a finely checkered shirt -- that neutralizes the waves bouncing off of it.
For it to work, the material's pattern has to be roughly the size of the wavelength of light to be canceled out. That gives it a tightly limited range of waves it will work on.
It has no effect on a vast array of electromagnetic waves, which come in a myriad of sizes. The light waves we can see make up only a thin sliver of them.
Although the scientists say the principle behind the cloak could currently only be used to hide objects from the human eye that are so tiny it can't see them anyhow, they say it could "pave the way" to the development of advanced "camouflaging and invisibility."
Microwaves, which the mantle cloak currently does neutralize, are used in radar detectors.
Perhaps the cloak would make a good ingredient in car paint.

Source:CNN

Thursday, March 28, 2013

Top 12 Gadgets That Changed The World .

 

1 Hi-Fi Receiver

The first integrated hi-fi receiver (short for "high fidelity") was designed by Sidney Harman and Bernard Kardon. Companies like RCA, Marconi and Westerrn Electric were designing systems during the 1930's to make a successful receiver. The first was created in 1954 and was known as the Festival D1000.

2 Brownie Camera

The Brownie cameras were some of the first point and shoot cameras available. This was the way to bring snapshots to the masses in 1900. In the first year of production, they sold 100,000 of them.

3 Sewing Machine

Singer created a portable version of the first mechanical stitcher. It was unveiled at Chicago's 1933 Century of Progress fair 80 years after the stitcher. At 11 pounds, the life-changing device took the time down from 14 hours to one hour to sew a shirt.

4 Laptop

The first successful laptop was an 11-pound computer from 1982 known as the GRiD Compass 1101. Though, it took a while to laptops to catch on, they are now owned by more than 52% of adults.

5 Answering Machine

The Phone-Mate Model 400 was the world's first answering machine. Introduced in 1971, these changed the ways we used the phone and received messages. Though the answering machine could only hold 20 messages, it was a revolutionary device for users at the time.

6 Remote Control

In 1950 the first remote control was created by Zenith, the popular electronics company. Originally sold separately, now remote controls come with their television sets. They originally make a clicking sound when operated and that is what gave them their nickname, "the clicker"

7 Modem

The first modems were made to convert U.S. Air Force data from radar into sounds. At the time, in 1949, the transmissions were slow. In the 1990s, modems began to hit 56 kbps and have been crucial to the way we live ever since!

8 VCR

Video cassette recorders (VCRS) were a household item in the late 1970s. Even though they were very popular by 1982, some of Hollywood had copyright concerns. Jack Valenti, the president of the Motion Picture Associate of America even said “I say to you that the VCR is to the American film producer … as the Boston Strangler is to the woman home alone"

9 The Alarm Clock

Primitive alarms were used by Plato and the first mechanical alarm clocks were established by the 15th-century and used in Europe. These days alarm clocks can use sound, light or sensors to alert the user.

10 Vacuum Cleaner

The vacuum cleaner was invented by James Murray Spangler in 1907. This was a gadget created with an electric fan, pillowcase and rotating brush. Though this great invention didn't come cheap. It was $60, which is close to $1,500 in 2012 dollars. 

11 Handheld GPS

GPS was originally a U.S. military tool. It was an important way of tracking and finding directions. It became available for civilian use in 1983 and the first handheld unit was sold in 1989. 

 

12 Typewriters

Christopher L. Sholes created the modern-day keyboard. In the 1870s he studied letter-pair frequency and came up with what we now know as the QWERTY keyboard. In 1874, the Remington Standard 2 typewriter became the first to use this keyboard and that sparked the popularity of this style. 


Source: Tinybites.

Wednesday, March 27, 2013

History of laptops.


A Brief History about the origin of Laptops.

Before laptop/notebook computers were technically feasible, similar ideas had been proposed, most notably Alan Kay's Dynabook concept, developed at Xerox PARC in the early 1970s. What was probably the first portable computer was the Xerox NoteTaker, again developed at Xerox PARC, in 1976. However, only 10 prototypes were built.

1. Osborne1:
 
The first mass-produced microprocessor-based portable computer was the Osborne 1 in 1981, which used the CP/M operating system. It was large and heavy compared to today's laptops, with a tiny 5" CRT monitor, it had a near-revolutionary impact on business, as professionals were able to take their computer and data with them for the first time.

More History of Laptop Firsts
  • Also released in 1981, was the Epson HX-20, a battery powered portable computer, with a 20-character by 4 line LCD display and a built-in printer. 
  • In January of 1982, Microsoft's Kazuhiko Nishi and Bill Gates begin discussions on designing a portable computer, based on using a new liquid crystal display or LCD screen. Kazuhiko Nishi later showed the prototype to Radio Shack who agree to manufacture the computer.
  • In 1983, Radio Shack released the TRS-80 Model 100, a 4 lb. battery operated portable computer with a flat and more of a laptop design.
  • In February 1984, IBM announced the IBM 5155 Portable Personal Computer.
  • Three years later in 1986, Radio Shack released the improved and smaller TRS Model 200.
  • In 1988, Compaq Computer introduces its first laptop PC with VGA graphics - the Compaq SLT/286.
  • In 1989, NEC UltraLite was released, considered by some to be the first "notebook style" computer. It was a laptop size computer which weighed under 5 lbs. (second photo)
  • In September 1989, Apple Computer released the first Macintosh Portable that later evolved into the Powerbook. 
  • In 1989, Zenith Data Systems released the Zenith MinisPort, a 6-pound laptop computer. (more Zenith laptops)
  • In October 1989, Compaq Computer released its first notebook PC, the Compaq LTE.
  • In March 1991, Microsoft released the Microsoft BallPoint Mouse that used both mouse and trackball technology in a pointing device designed for laptop computers.
  • In October 1991, Apple Computers released the Macintosh PowerBook 100, 140, and 170 - all notebook style laptops. (more on Powerbooks)
  • In October 1992, IBM released its ThinkPad 700 laptop computer.
  • In 1992, Intel and Microsoft release APM or the Advanced Power Management specification for laptop computers.
  • In 1993, the first PDAs or Personal Digital Assistants are released. PDAs are pen-based hand-held computers.
 Source: Wikipedia and About.com

Monday, March 25, 2013

Common Internet Slangs-Part Two


Continued from N-Z

N


NE1 - "Anyone"
NFI - "No fuc*ing Idea"
Newbie, noob, or n00b - An inexperienced user of a system or game,or an annoying person.
NIFOC - Naked In Front Of Computer
NM - (Sometimes written N/M) Not much, Never mind or no message, used on message boards or in e-mails to indicate that everything is already said in the subject line.
NP - No problem
NSFW - Not safe for work. Warning about content that may get the viewer in trouble with his employer or co-workers.
NVM, NVMD, or nm - Nevermind, not much

O


O RLY - Oh really?
OIC - Oh, I see
OFN - Old fuc*ing news
OMG - Oh my god
OMFG - Oh my fuc*ing god
OMW - On my way or Oh my word
OP - Original poster / Operator / Outpost
OS - Operating system
OT - Off topic
OTOH - On the other hand
OTP - On the phone or One true pairing

P


P2P - Peer to peer, or pay to play
PAW - Parents are watching
PEBKAC/PEBCAK - Problem exists between keyboard and chair
Ping - From the popular network monitoring tool, used as a greeting similar to "Are you there?".
PITA - Pain in the arse / ass
PLMK - Please let me know
PMSL - Pissing myself laughing
POS - Piece of ~love~, or parent over shoulder.
POTS - Plain old telephone service
POV - Point of view
PPL - People
PTKFGS - Punch the Keys For God's Sake
pr0n - Intentional misspelling of porn
PW - Persistent World (gaming)
pwned - Intentional misspelling of owned

Q


QFT - Quoted for truth. Used on internet message boards to show agreement from a previous message


R


Rehi (or merely re) - Hello again
RL - Real Life
RO(T)FL - Rolling on (the) floor laughing
RO(T)FLMAO - Rolling on (the) floor laughing my ass off
RO(T)FLOL - Rolling on (the) floor laughing out loud
RSN - Real soon now (used sarcastically)
RTFB - Read the fuc*ing binary (or book)
RTFS - Read the fuc*ing source
RTFM/RTM - Read the (fuc*ing) manual

S


SCNR - Sorry, could not resist
sk8/sk8r - skate/skater
Smiley - Another name for emoticons
SMH - Shaking my head
SNAFU - Situation normal: all (fuc*ed/fouled) up
Snail mail - Normal paper mail service
SOHF - Sense of humor failure
Spider - The program behind a search engine
STFU - Shut the fuc* up
STFW - Search the fuc*ing web

T


TANSTAAFL - There ain't no such thing as a free lunch
TBF - Time between failures
TBH - To be honest
TG - That's great
TGIF - Thank god it's Friday
TH(N)X, TNX or TX - Thanks
TIA - Thanks in advance
TINC - There Is No Cabal, a term discouraging conspiracy theories
TMI - Too much information
TOS - Terms of service
TTBOMK - To the best of my knowledge
TTFN - Ta ta for now
TTT - To the top, used in forums to bump a thread
TTYL - Talk to you later (also spelled TTUL, T2UL or T2YL)
TTYTT - To Tell You The Truth
Tweedler - One who has deep love for all computer related technology and gadgets
TWIMC - To Whom It May Concern
TY - Thank you
TYT - Take your time
TYVM - Thank you very much

U


U - You
UTFSE - Use the fuc*ing search engine

V


W


w00t, w00T or WOOT - First two express exuberance, the latter is a backronym for the term "We Own the Other Team".
W/ or W/O - With or without
WB - Welcome back
W/E - Whatever
WRT - With respect / regard to
WTB - Want to buy
WTF - What the fuc*
WTG - Way to go
WTH - What the hell
WTS - Want to sell
WTT - Want to trade
WUG - What you got?
WoW - World of Warcraft (game)
WUBU2 - What (have) you been up to?
WUU2 - What (are) you up to?
WYSIWYG - What you see is what you get
W8 - Wait


Y

YARLY - Yeah Really
YHBT - You have been trolled
YKW - You know what?
YMMV - Your mileage may vary.
YTMND - You're The Man Now, Dog
YW - You're welcome.
YOYO- You're On Your Own.


Z
ZOMG - An intentional misspelling of the acronym shorthand for "Oh My God/Gawd" and pronounced "Zoh My God/Gawd" This version is mainly used in jest or to ridicule people who use abbreviations like OMG and OMFG.


Source:http://thehotfix.net/forums/index.php?/topic/17824-list-of-common-internet-slang-phrases/ 

Common Internet Slangs- Part one

Here are some commonly used internet slangs that we use while Chatting or in Mails and anything in the e-World.
Some Words may sound Unpleasant, ignore them.

These are the first half  0-9, A-M

0-9


1337 (written in ASCII) - From the word Leet, derived from the word elite
2 - too, or to
4 - For

A


AFAICR/S/T - As far as I can recall / remember / see / tel
AFAIK - As far as I know
AFK - Away from keyboard
ANFSCD - And Now For Something Completely Different. Used to change the subject of conversation.
ASAP - As soon as possible
ASL - Age / sex / location
ATEOTD - At The End of the Day
ATM - At the moment
AWOL - Absent Without (Official) Leave
AYBABTU (also abbreviated as AYB) - All your base are belong to us (from the video game Zero Wing)

B


B2B - Business to Business
B& and/or B7- Banned
BBIAB - Be back in a bit
BBL/S - Be back later / shortly / soon
BCNU - Be seein' you
Blog - Also known as web log or an online journal
BOFH - Bastard operator from hell
Bot - Any type of automated software in chatrooms and web-cataloging software
BRB - Be right back
BSOD - Blue Screen of Death
BTDT - Been there done that
BTW - By the way
Bump - Increment (For example, C's ++ operator.)or a backronym for "Bring Up My Post"

C


Crawl - To retrieve a web page along with the hyperlinks that reference it
Crapplet - A poorly written computer application
CU - See you (later)
CYA - See ya OR Cover Your Ass
Cyber (prefix) - A term used to connect the subsequent word loosely to the world of computers or the Internet or sex over a computer
Cyberspace - Virtual reality, the Internet, the World Wide Web, and other kinds of computer systems. Science fiction author William Gibson popularized the term in his novel Neuromancer. Gibson used the word to describe a virtual world of computer networks that his cyberpunk heroes 'jacked into'

D


DFTT - Don't feed the trolls
DGAF - Don't give a fuc*
DIAF - Die in a fire
DILLIGAF/D/S - Does it look like I give a fuc* / dic* / damn / sh*t
DND - Do not disturb
DOA - Dead on arrival. Refers to hardware that is broken on delivery.

E


EOF - End Of File
EOM - End of Message
EOL - End of Life. Device or hardware that is at the end of its product life cycle.
EQ - EverQuest
ETA - Estimated time of arrival

F


FAQ - Frequently Asked Question(s)
FFS - For fuc*'s sake
Flamer - Someone who makes inflammatory, abusive or directly offensive comments. Similar to, but not quite the same as an Internet troll
FMCDH - From My Cold Dead Hands
FOAD - Fuc* off and die
FOAF - Friend of a friend
FTL - For the loss
FTW - For the win
FU - Fuc* you
FUBAR - Fuc*ed Up Beyond All Repair up beyond all recognition / repair (from military slang; pronounced "foo-bar")
FUD - Fear, Uncertainty and Doubt (the purposeful spread of misinformation)
FWIW - For what it's worth
FYI - For your information

G


GBTW - Get back to work
GF - Great/good fight/girlfriend
GFU - Good for you
GFY - Go fuc* yourself
GG - Good game, used at or near the conclusion of a gaming match
GJ - Good job, often used in online gaming when a teammate performs an act benefitting his team, such as killing an opponent or enabling that kill
GMTA - Great minds think alike
Godwin's Law - Dictates that the longer a thread, the more likely someone will post a comparison involving Nazis or Hitler
Gratz - Congratulations
GTFO - Get the fuc* out
GTG or G2G - 'Got to go' or 'Good to go'
GR -Good Race
GR8 - Great

H


HAND - Have A Nice Day
Handle - Name used in online chat, (AKA nick(name), alias, screen/user name)
HF - Have fun
Haxor or H4x0r (1337) - Hacker
Hit - A request made to the web server, (noun) the results of an internet search, (verb) loading a Web page. Hits are not equivalent to visitors of a webpage.
Home page - The website's introduction page, starting point, and guide. The technical term is "index"
Hot list - A collection of publicly available URLs (World Wide Web site addresses), sometimes available as text files.
HTH - Hope this / that helps
H8 - Hate

I


IANAL - I am not a lawyer
IBTL - In before the lock
IDC - I don't care
IDK - I don't know
IIRC - If I recall / remember correctly
IIUC - If I understand correctly
IMO/IMHO/IMNSHO/IMAO - In my (humble / honest / not so humble / arrogant) opinion
Information superhighway - The Internet (AKA: I-way, infobahn)
IONO - I don't know
IOW - In other words
IRC - Internet Relay Chat
IRL - In real life
ITYM - I Think You Mean
IWSN - I want sex now
IYKWIM - If you know what I mean

J


Jaggy - Aliased computer graphics
JK or j/k - Just kidding, or joke
JFGI - Just fuc*ing/freaking Google It

K


k or kk - OK
KISS - Keep it simple stupid.
KS(ing) - Kill-Steal(ing)
KOS - Kill on sight
KTHX - OK, thanks
KTHXBAI or KTHXBYE - OK, thanks, goodbye, used either to cut short a conversation or to express displeasure with being cut short

L


L2P - Learn to play; an admonishment to MMORPG players who are incompetent and/or whine
L8R - Later, L8R also sometimes abbreviated as L8ER is commonly used in chat rooms and other text based communications as a way of saying good bye.
Lag - Slang term for slow Internet speeds or high Internet latency; Lag is sometimes due to a server problem, but more frequently due to the connection between client and server. A slow or intermittent connection may often be referred to as laggy
Lamer - A know-nothing, one who is lame.
Leet - Often spelled as l33t or 1337 in ASCII form. It originally meant elite
LFG - Looking for group
LFM - Looking for more
LM(F)AO - Laughing my (frigging) ass off
LMIRL - Let's meet in real life.
LMK - Let me know
LOL - Laughing out loud, laugh out loud
LTNS - Long time no see
Lurker - Someone who frequents a Usenet group without participating in discussions

M


MMORPG, MMO - Massive Multi-player Online Role Playing Game
MMOFPS - Massive Multi-player Online First Person Shooter
MOTD - Message of the day
MS - MapleStory, an MMORPG
MTFBWY - May The Force be with you
MUD - Multi-User Dungeon
MUSH - Multi-User Shared Hallucination
MYOB - Mind your own business
M8 - Mate

Saturday, March 23, 2013

Android Security.

 10 Ways to Protect Your Device From Malware, Theft

Android is the world's most popular smartphone OS, but it's also the platform that hackers love to attack most.
Here are some tips on what can be done to improve Android security protection for your device, apps and data.

1. Bring on the apps:
In order to improve Android security, be sure to download security apps.  There are plenty available, and mSecure Password Manager and Lookout Mobile Security are among the better ones

2. Set device passwords: 
 Unfortunately, a large number of users simply do not put simple password protection on their handsets or tablets to make it more difficult for intruders to break into their devices. It's common sense: Android must be password-protected 

3. Stay up on the latest news:
Nowadays, it seems there is a new story on Android security each day, and threats keep popping up at an alarming rate. Knowing about those threats and being prepared is extremely important.

4. Surf only to safe sites:
According to a recent report from security researchers, one of the leading causes of malware infection in Android is surfing to adult content Websites. It is extremely important that users surf only to safe sites and eschew any of those that might seem a little less-secure. Not doing so would be a huge mistake.

5. Download apps from respected sources:All smartphone users should try to avoid malicious and compromised mobile apps. That may be easier said than done. But the Google Play marketplace has a solid selection of reputable programs. But some malicious software can slip through the cracks. And because Android is open-source, some users are tempted to download programs from other stores that are not as well-vetted as Google Play. In those cases, watch out.
6. Remember the network:When looking at Android security, folks often forget about the network. How safe is a connection from an Android handset to a corporate network with all kinds of sensitive information? Ensuring that an effective VPN is in use and accessing corporate data only from reputable network resources is absolutely necessary. 

7. Tracking is important:Sometimes, Android handsets or tablets can be misplaced. In those cases, it's important to have some type of device-tracking application deployed and accessible on your phone. Tracking allows users to find out where their devices are and, even more importantly, remotely wipe them so those in possession of them can't steal information.

8. Update:
Google periodically releases updates to Android that address bugs and security problems. The trouble is there are quite a few Android users who don't actually update their software. That's a mistake. As soon as updates are made available, they should be applied. Failing to do so leaves users at greater risk.

9. Encryption is always necessary:
Encrypting data is just as important as keeping it safely hidden behind a firewall. Encryption means keeping data safe even when the information is in the hands of the wrong person. Several encryption programs are available to Android users, but ensuring that they have the highest level of encryption possible is extremely important.

10. Stop believing you're safe:
The mobile malware threat started a several years ago. Yet serious discussions about keeping people safe really only started in 2012. What's worse, the uninformed think that they can do what they want when they want with their Android devices and be just fine. That's just plain wrong. It's time all Android users and users of all types of mobile devices stop thinking they're safe and admit that really bad things can happen.

Source: eweek.com
By:  Don Reisinger

Friday, March 22, 2013

10 Deadly Computer Viruses That Shook The World.

1. I Love You:

I love you 

 The three words that can at most motivate you to cross the seven seas - or at least tempt you to open en email. This very temptation was the downfall of many computer users when this multipurpose-multi skilled virus hit the web. It had the ability to replicate itself via IRC chat and email, transfer and hide itself in different files and folders, and infect the registry keys once you opened an email in you inbox declaring I Love You. The virus thought to be originated somewhere in the Philippines, caused damage which was estimated to be around $8-10 billion.
  

2. Melissa:

Melissa
The creator of this virus received a 20 month jail sentence and a $5000 fine. Generated over a decade ago, this clever piece of virtual disease operated through Microsoft Outlook. This is how it worked: you receive an email titled .Here is the Document you asked for  from an unknown sender, you got infected as soon as you opened the email, and the virus would replicate and delivers itself to the top 50 people on your list without you getting a hint of it. Some major US government departments were hit and the damage is thought to be around $1 billion at least. A 20 month jail sentence well deserved.

3. MyDoom:

MyDoom
MyDoom was instigated somewhere in mid 2004 and it actually prompted US senator to propose the creation of a �National Virus Response Centre�. The virus attacked in two phases; the first phase infected different Operating Systems, creating inroads and backdoors and making them vulnerable to external users. Once this problem was sorted out, the MyDoom struck again after few months, this time targeting the Search Engines like Google, slowing them down considerably, and crashing a few.

 4. Nimda:

Nimda
Spell it backwards and you will understand its prime targets: yes, the Admin and servers. It was basically a worm and has the record of being the fastest ever virus to spread; it took only 22 minutes to break into the list of top ten most deadly viruses of all times. It basically targeted internet servers and websites, creating a mass crater through which thousands of computers were affected at the same time. Once infected, the systems became exposed to open attacks by the outsiders.

 5. Code Red:

Code Red
Damages of almost $200 million a day, and affecting the computers inside the White House are the degree of achievements of this virus. It subjugated the Windows by acting as a buffer overflow, sending humongous amount of information to the computer so that it spilt over, eventually forcing a shut down by overlapping the memory of the computers. The problem wasn't solved until Microsoft issued a revival package to cater for this virus.

 6. SQL Slammer/Saphire:

SQL Slammer/Saphire
Another swiftly spreading virus, it hit 75,000 computers in the first 10 minutes of its inception, taking down and severely damaging numerous American Banks, Security systems and organizations, and Airline networks. And the virus wasn't just privy to the US; it ruthlessly damaged the internet capacity of South Korea for at least half a day. The damage was estimated around at least a billion dollars.

 7. Storm Worm:

Storm Worm
One of the latest and most recent viruses to strike the internet, the Storm Worm employed a similar strategy to the one used by the Melissa; the mail's title mentioned a current natural disaster like an earthquake (but most often a storm). Once the email was opened, the virus spread around like wild fire, affecting registries and documents across the hard disk. It turned out to be a mother-virus, instigating numerous hidden programs in the background which made the PC vulnerable and enticing to hackers.

 8.  Klez:

Klez
With the mix characteristics of a virus, worm and a Trojan horse, Klez gave the antivirus programs a real headache by simply disabling them and making them look like a joke. However this is only the beginning of its trickery; after it was thought it be defeated, it was taken over, decoded and customized by black hat hackers (hackers who specialize in unauthorized penetration). Its ability was enhanced by providing it with the capability to "spoof" from the user's address book and make it look like that an email came from them, increasing the chances of the receiver opening the email and becoming the next casualty.

 9.  Sasser:

Sasser
Damaging the computer through network ports, Sasser mostly targeted Windows 2000 and XP. It's main casualties were the news agency Agence France-Presse (AFP) which had all its satellite communications jammed for hours , U.S. Airlines which had to reschedule its flights because of the worm had depleted their computers, a Finnish insurance company which was forced to close down 130 of its offices on emergency basis, Goldman Sachs, and Deutsche Post were all badly affected as well. However its unique feature was that it did not spread through emails, but rather observed computers and kept a look out for their vulnerabilities. On the basis of its knowledge, it would scan random IP addresses from the database and send itself to the next victim.

10. Autorun:

Autorun
This virus primarily targeted USBs and flash drives and established them as its major source of movement and propagation. It affected networks and all the computers present on them. Once affected, the folder options would be disabled, the task manager too would be unavailable and the virus itself would become the system administrator. The virus would replicate itself in all the folders, therefore eating up useful space on the hard disk and making it eventually extremely slow. The loss was in terms of useful data on millions of computers across the world. 
 
Source:elistmania.com
By: Bilal.

 

Thursday, March 21, 2013

New tools for web design and development 2013.

1. game {closure} devkit

Price: Free

Thinking of producing a game for iPhone or Android? Make sure you add the game{closure} devkit to the list of frameworks you try out. It's been two years in closed beta and that time has not been wasted.

A JavaScript framework which extends the language to cope with a more class-based architecture, devkit compiles code to either iOS or Android targets, optimising as it goes. The docs are excellent, the dependencies (git, node, java, chrome) are easily managed and the API itself is refreshingly concise and intuitive.

First the moles, next the world. Devkit puts mobile game development within reach

2. Twitter Flight

Price: Free

With Flight, Twitter brings its own brand of no-nonsense utility to the web application framework. Lightweight, JavaScript-based and event-driven, Flight gives you enough structure to ensure your apps function well, then lets you make the backend and rendering decisions.

The basic object in Flight is an event, everything is organised around this. There's no model structure placed between DOM and responding logic - components emit events and functions/components listen for particular flavours of event as they bubble up the document.

There's obviously more to it than this, but at it's heart, what Flight does is enforce and facilitate a few sensible design decisions while at the same time leaving you to decide how data is delivered and outcomes are rendered.

Flight - the wind beneath Twitter's wings?

3. DURANDAL 1.1.1

Price: Free

Durandal takes the structure and simplicity that AMD architecture enforces and uses this as a firm foundation for its application scaffolding. The framework is itself a collection of modules and you add to these as your needs dictate, combining them at runtime using the 'composition' system.

Durandal uses Knockout.js data-binding to pull together your views and view models. Built on top of this, the compositing system handles layout, animation and transition rendering. This enables the injection of components to be dynamic and locally customisable. It sounds like it could get messy, but is in fact pretty straightforward once you get the hang of the composition module. Excellent documentation takes the sting out of this task.

Durandal helps you overcome the challenges off the single page app

4. ALLOYUI 2.0

Price: Free

It cannot have escaped your attention by now that there are a large number of JavaScript frameworks out there. The trouble is, they're a very mixed bunch. Some handle templating, others give you MV*, occasionally you get components themselves as with jQueryUI. But few give you everything. Built on top of YUI3, AlloyUI is one of these rare 'all-things-to-all-men' solutions.

Surprisingly, being so comprehensive hasn't bloated AlloyUI to the point of obesity. Loading is modular and components are added quickly and easily. Carousel, audio, toolbar, pagination, it's all there, ready to be dropped into your project. And it all works nicely together because it was built together.

The friendly mascot for one is not a lie. AlloyUI is pretty nice.

5. Speedof.me

Price: Free

Speedof.me answers the interesting question: how fast is your connection? And it does so using HTML5. No plug-ins, no virtual machines - just a series of increasingly large, contiguous files to download or upload. It's fast, accurate and, in it's own way, fun.

There's also the added benefit that speedof.me isn't laden with advertising. So, next time someone in your household says, "What's wrong with the internet?", you know where to go.

Speedof.me tells you whether it's worth bothering with that massive download

6. php.js

Price: Free

Rewriting PHP's core functions in JavaScript seems like an odd thing to do. But, if you have some experience of writing PHP, and you find yourself working with JavaScript, there may be times when you think 'oh, I wish I had something as simple as the php function for this'. php.js is for exactly those occasions.

Some people may get a bit upset by such things, but having a function like PHP's htmlentities() on hand is quite reassuring somehow. You're encouraged to take only what you need, so there's no single archive to dl. It's all done on a function by function basis.

php.js. Interesting reading, even if you never use the functions

7. GroundworkCSS Beta

Price: Free

No doubt about it, GroundworkCSS is a handsome piece of kit. A CSS framework that delivers elegant base components ready to be wrangled by a grid system you'll find it hard to top.

There's a growing number of CSS frameworks out there, each with its own take on how to organise an app, how much to do for you, how much customisation is possible … Groundwork (though still in beta) looks to have found a nice balance. Good docs too.

Minimal but not characterless - the GroundworkCSS has been laid

8. Adobe Edge Reflow

Price: Free

When you first look into it, responsive design can seem a little opaque. The idea's clear enough (responding to device parameters) but in action there's a lot to consider. Trying to 'think it out' is tough. However, Edge Reflow lets you do the heavy lifting visually.

Set your choice of columns (up to sixteen). Drop in your panels, resize the window to a break point and move stuff around till you're happy. Repeat. There are basic typography and CSS tools too. But these are there to give you an accurate feel for how your layout is working.

Reflow produces a good framework layout on which you can build

9. RoughDraft.js

Price: Free

Got an idea for some new project and you want some way to quickly throw together a page or two without firing up a database? Enter RoughDraft.js, with a seemingly endless supply of random data, pretend users and picture stand-ins.

RoughDraft generates its content based on an element's data- attribute. Most of the controls are obvious: data-draft-repeat, data-draft-image and so on. There's a choice of lorem generators and fake users can have full names, emails, twitter handles … you name it. The project continues to grow. You may even like to contribute?

RoughDraft.js makes for smooth previews

10. IE10 for Windows 7

Price: Free

It's been available in preview mode for quite a while, but finally, IE10 has made it to a full release. Windows 7 and 8 users will be auto-updated to the shiny new code, bringing super-fast JavaScript, broader support for web standards and a built-in Flash Player to some percentage of Windows users. Hooray!

If you've been away from IE for a while (who could blame you if you had?) then IE10 will come as a pleasant surprise. It's stripped down UI, fast JavaScript engine and steadily improving standards support make for an enjoyable experience. The dev guide is encouraging, if verbose.
S


Source: net magazine.
By Mark Penfold.

Tuesday, March 19, 2013

Common Oracle error codes.


ORA-00001 Unique constraint violated. (Invalid data has been rejected)

ORA-00600 Internal error (contact support)

ORA-03113 End-of-file on communication channel (Network connection lost)

ORA-03114 Not connected to ORACLE 

ORA-00942 Table or view does not exist 

ORA-01017 Invalid Username/Password

ORA-01031 Insufficient privileges 

ORA-01034 Oracle not available (the database is down)

ORA-01403 No data found

ORA-01555 Snapshot too old (Rollback has been overwritten)


ORA-12154 TNS:could not resolve service name
ORA-12203 TNS:unable to connect to destination
ORA-12500 TNS:listener failed to start a dedicated server process
ORA-12545 TNS:name lookup failure
ORA-12560 TNS:protocol adapter error
ORA-02330 Package error raised with DBMS_SYS_ERROR.RAISE_SYSTEM_ERROR

Other error prefix codes

PLS-????? PL/SQL Error
IMP-????? Import error
EXP-????? Export error
MOD-????? SQL Module error
FRM-????? Oracle Forms error
SQL-Loader-??? SQL Loader error
 
Source: ss64.com
 

Monday, March 18, 2013

Cyberbullying on the rise, 19-year-old boys most common victims.


Cyberbullying has emerged as one of the most-discussed issues related to the Internet safety, especially because its victims are mostly minors and teenagers. Various reports over time have shown cyberbullying is on the rise. And now a new study shows cyberbullying is now affecting the 19-year-olds boys as well.
The study, carried out for knowthenet.org.uk (a free website that provides advice on how to stay safe online), covered more than 2,000 teenagers. The study revealed about 85 percent of 19-year-old men had suffered some form of online bullying. Of all the teenagers who confirmed being bullied, about 37 percent of said it happened on the social networking sites.
About 87 percent said they were bullied on Facebook, while 19 percent on Twitter and 13 percent on BlackBerry Messenger. Only 17 percent said their first reaction after being bullied would be to inform their parents, while 1 percent said they would inform their teachers.
"Bullying both on and off-line continues to be a serious problem for a huge number of teenagers and we cannot ignore its often devastating and tragic effects," said Emma-Jane Cross, CEO and founder of the charity BeatBullying, adding many were suffering in silence.
"We work with hundreds of young people being cyber-bullied or trolled so badly that it can lead to depression, truancy, self-harm, or even force them to contemplate or attempt suicide."
According to Media psychologist Arthur Cassidy, cyberbullying may have a huge impact on older male teenagers.
"Suicide rates are particularly high amongst this demographic, so it's worrying to hear that teenagers on the whole are choosing to deal with internet abuse themselves rather than speaking to parents or teachers for help. Whilst some might expect girls to be more vulnerable online, this study shows that older boys are more at risk from trolling and cyber-bullying,” he said.
"Many boys feel under pressure to demonstrate their bravado, particularly on the web, but this attitude and male deficiency in coping strategies can make them more vulnerable and open to trolling."

Source: Telegraph.co.uk

Sunday, March 17, 2013

Some News Headlines.

  • Researchers Find 25 Countries Using Surveillance Software
  • Web Browsers Consider Limiting How Much They Track Users
  • Internet's 'Bad Neighborhoods' Spread Scams and Spam
  • Netflix Offers $100,000 for Cloud Computing Improvements
  • Predictive Analysis
  • Users Flock to Japan Student's Firewall-Busting Thesis Project
  • Google Wants to Replace All Your Passwords With a Ring
  • AT&T Smashes Distance Record for 400Gbps Data Connection
  • Steganography Is No Laughing Matter
  • Research on the Use of Robots in the Pediatric Ward of an Oncological Hospital
  • New Study Exposes Gender Bias in Tech Job Listings
  • Creating Indestructible Self-Healing Circuits
  • PARC Hard at Work to Solve Problems in Healthcare, Batteries, Traffic.
Source: Technews.acm.org

Thursday, March 14, 2013

Top 10 New Technology Gadgets 2013.

Here is a brief introduction about some coolest Gadgets. All are available in Amazon.com.

Alienware M14x laptops:

Alienware M14X 14

Alienware M14X 14" Laptop
2.0 GHz Intel Core i7-2630QM Processor.
 8 GB RAM. 
750 GB Hard Drive.
 Windows 7 Home Premium 64-bit.
 Black.
                This would make a great gift any time for those that like to game, do graphic design or just want to surf the net in style.

TSir Wristband charger:

TsirTech Universal Wrist Band Gadget Charger With Built-In Battery For Ipod Touch, IPad, IPad 2, IPhone4/4SMP3/MP4, PSP, NDS, Samsung, Nokia, LG, HTC (Black).

TsirTech Universal Wrist Band Gadget Charger With Built-In Battery For Ipod Touch, IPad, IPad 2, IPhone4/4SMP3/MP4, PSP, NDS, Samsung, Nokia, LG, HTC (Black) 

The gadget has a polymer and wristwatch design with a no load and a time off function to save energy and its alarm will remind you when it needs to be charged. It is compatible with many gadgets including; mp3, mp4, PSP, Nintendo, ipad, iPod .iphone and many other new technology gadgets.

Neural Impulse Actuator:

OCZ OCZMSNIA NIA - Neural Impulse Actuator

OCZ OCZMSNIA NIA - Neural Impulse Actuator

In simple terms, by using the reflex based game play; you can cut your reaction by 50% and outdo your opponents. You can be one of the first people to have this advantage and be the envy of your gaming friends.

Wi-spy spectrum analyzer:

Wi-Spy 2.4x USB Spectrum Analyzer

Wi-Spy 2.4x USB Spectrum Analyzer

This gadget that wireless network consultants and IT professionals will love, is easy to use. It is a perfect choice if you are looking for a solution to analyze, troubleshoot and optimize your wireless networks.

HD media router:

 D-Link Systems HD Media Router 3000 (DIR-857)

D-Link Systems HD Media Router 3000 (DIR-857) 

The amplifi comes with 4 gigabit Ethernet ports for seamless video streaming and gaming if you want to wire directly to it and watch streaming video form anywhere in your home. The main feature that sets it apart from the rest is its SD slot that allows you to share media files, documents and pictures fast.

Wearable video cam LX2:

 Looxcie LX2 Wearable Video Cam for iPhone and Android - Retail Packaging - Black

Looxcie LX2 Wearable Video Cam for iPhone and Android - Retail Packaging - Black 

You can wirelessly upload clip lasting up to 30 seconds to your favorite site or YouTube. The camera is so convenient that you won't need your normal digital camera and you can capture your favorite moments instantly without the hassle of having to take the camera out of your bag.


Iphone/Itouch Mobile game controller ICG07:

Ion iCade Mobile Game Controller for iPhone/iPod Touch (ICG07)

Ion iCade Mobile Game Controller for iPhone/iPod Touch (ICG07)

The game controller is a classic figuration with four buttons facing the front, 4-way directional pad and shoulder buttons that can withstand any kind of button mashing. You can connect the controller to your phone via Bluetooth if you are hoping for a tangle free game.

Gunnar computer eyewear:

GUNNAR Computer Eyewear - Sheadog Onyx Frame

GUNNAR Computer Eyewear - Sheadog Onyx Frame

These glasses will not only protect you against computer vision syndrome, it will also prevent digital eye fatigue and increase your visual performance. There are different styles to suit all people.

 Celluon Laser projection keyboard:

Celluon Magic Cube Laser Projection Keyboard and Touchpad

Celluon Magic Cube Laser Projection Keyboard and Touchpad

The Celluon magic cube will work well with your touch phone or tablet and is compatible with iOS 4.3.5+,windows XP, vista, and Mac 10.4+.you have up to 150 minutes of use with its lithium battery and with its 'mouse mode' you can project a standard multi touch pad but this is only compatible with windows 7.

TREND net USB hub:

TRENDnet USB to RS-232 Serial Converter TU-S9 (White)

TRENDnet USB to RS-232 Serial Converter TU-S9 (White)

If you are looking for new technology gadgets to a techie then this would be a good choice or you can just gift yourself if you want a solution to managing multiple PCs.

Source: Squidoo

 

 

 


 


 


 

 


 




Wednesday, March 13, 2013

Google Glass for prescription frames coming.

Google confirms that it's creating a version of Glass that allows for the addition of frames and lenses to match your prescription.
Greg Priest-Dorman, a member of the Glass team, models a prescription version of the wearable tech.
https://www.blogger.com/blogger.g?blogID=7271588805341770202#editor/target=post;postID=4676764950396831727(Credit: Google Glass)
Google Glass fans who wear actual glasses will also be able to don the wearable tech, without abandoning their prescription glasses, according to a Team Glass post today.
The company said one of the most asked questions about Glass was whether Google is making a prescription version. Clearly, Google has seen the value of making Glass versions for those beholden to their corrective lenses.
"The Glass design is modular, so you will be able to add frames and lenses that match your prescription. We understand how important this is and we've been working hard on it," Project Glass wrote on its Google+ account.
The team also posted a photo of Greg Priest-Dorman, a member of the Glass team, wearing a prescription Google Glass prototype.

The team said it's still "perfecting the design for prescription frames," so they won't be ready for the Explorer Edition's release, but consumers can expect to see this version later this year.
Google said previously that it was working on a prescription glasses solution, but this is the first time the company's provided a peek at this prescription lens model.

Source: CNET News
By: Donna Tam.

Monday, March 11, 2013

Some of the Coolest new gadgets this month.





1. Tylt Vu

It’s not a designer shoe horn or a fun slide for mice; it’s the Tylt Vu, and if your smartphone charges wirelessly using the Qi standard, it’s your next must-have accessory. Drop a handset into its 45-degree cradle and microscopic nanobots pass from the 5W charger directly into your battery and restore it to health. Comes in yellow, blue, red or black, for whatever phone side you’re batting for this contract term..

2. Asus WL-330NUL USB

 

Proclaimed “the world’s smallest router” and clocking in at roughly the size of a packet of Extra chewing gum, this pocket rocket connects to your laptop via USB and to the web via ethernet and also has N Wi-Fi up to 150Mbps. Thus, ownership means you become a walking wireless access point for all laptops and portable devices in the local area when the crappy B&B your work checked you into for the away-day has Ethernet but not WI-Fi.

3. BlackBerry Q10

 

Are you a BlackBerry fan but finding that the all-touchscreen Z10 isn’t doing it for you? The Q10 retains the full keyboard that made BlackBerry what it is today – no, not a laughing stock, behave. It’s got a 1.5GHz dualcore CPU, a 3.1-inch touchscreen and the swipe-happy new BB10 OS, with more apps and media stuff, plus 4G and NFC.

4. Epson EH-TW9100

 

This projector beams images in 3D at 2,400 Lumens with a contrast ratio to 320,000: 1 (that’s what scientists call “quite bright and rather contrasty”). A bespoke system helps quell judder, with 3D crosstalk also kept in check. Two pairs of active 3D specs are thrown in, so you can show your new-big-TV owning mate exactly how much better your setup is.

5. Roth OLi POWA-5

 

The 80W amp in this active loudspeaker combines with Bluetooth connectivity to create a fearsome addition to your audio arsenal. If your traditionalist roots still won’t acknowledge wireless audio as a “thing”, though, wired connections include twin USB ports, optical digital inputs, a stereo analogue connection and the trusty 3.5mm jack. The one-inch soft dome tweeter is complemented by a five-inch Kevlar woofer and a single cable that connects the active speaker to its passive twin for dual 40W output. Technobabbled out? Luckily, the relevant page on Roth’s website has some more layman’s advice: “Place either side of your TV for really involving audio to your movies.