7h15 b|0g i5 d3f1n173|y f0r y0u, 1f y0u c4n r34d 7h15!!!

31 December, 2010

Peekaboo 2.0

Had the Dissertation (Image Steganography) presentation today. It was good to have reviews, suggestions and improvement tips from our faculties regarding our dissertation stuffs. It feels good after doing immense work and research about the topic assigned and proposing a new algorithm!!! thousands of lines of code and study of hundreds of research papers pay back..huh!!! :-)

Now, heavily loaded with assignments... around 400 pages to write in 3 days... what the heck!!!

Some ppl ask me.. whats the plan for new year. I reply them "exams". Yes, that's the plan!!!

After assignment submission, we're gonna have final exams to go. So, here's the schedule hierarchy..

"AssignmentSubmission >> FinalExams_Theory>> FinalExams_Practicals >> JoinCoForProjectAsSoonAsExamEnds"

Heavly loaded!!

ok... done with blogging... back to SE assignment!!!

13 December, 2010

Peekaboo...

Hello Readers,

I'm back with a new post after a long pause of this blog. Well, there will be a long pause after this post too ;-)

Right now I'm heavily loaded with Assignments, Dissertation, Sessional Exams, Practicals, Presentations and lots of stuffs. Sessionals are in this month only... Well, Let's hope for the best!!!

Well, there is a news I am to give you all... Well, recently I got placed at Elitecore Technologies Pvt. Ltd. Elitecore is a Gujarat based company which is working on Network Security Product (Cyberoam), Telecommunication Billing Product (Crestel) and Access Gateway Product (24 Online). Elitecore (http://www.elitecore.com/) is the company which I was waiting for it to visit the campus for a long time. And finally, I got selected in such a company which is working on the technologies which I have zeal to work in [Java SE, Java EE, Network Security]. It will be great fun working with this co. Lets hope for the best! :-)

You know... this semester is seems to be a very fruitful in the LEARNING SENSE to me. I learnt so many things in this semester which I was willing to learn for a long time. This semester has very gr8 subjects as Network Security, TCP/IP Suite, AJAX, Prototype JS Framework, JSP, Struts Framework, J2ME, WML & Dissertation [on Image Steganography]. However there are certain boring subjects in this semester too... i.e. Software Engineering (blah blah theory only), though it is not as boring as the subjects of prev. sems. like COSM, CONM, CBOM etc.

Anyways, I think its enough for today as I have to prepare a presentation on Radio Layer & Baseband Layer of the Bluetooth technology... PPTs are boring... :-(

B R B after exams...!!!

Take Care....

-- CYbErCodE --

02 August, 2010

64 Things Every Geek Should Know

by Blair Mathis


If you consider yourself a geek, or aspire to the honor of geekhood, here's an essential checklist of must-have geek skills.

The term 'geek', once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn't satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you're that type of person and are looking for a few extra skills to pick up, or if you're a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

1. The Meaning of Technical Acronyms

  • USB - Universal Serial Bus
  • GPU - Graphics Processing Unit
  • CPU - Central Processing Unit
  • SATA - Serial ATA
  • HTML - Hyper-text Markup Language
  • HTTP - Hypertext Transfer Protocol
  • FTP - File Transfer Protocol
  • P2P - Person to Person data sharing
  • 2. How to Reset RAM

    If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. It's amazing how few people know how to do this. If you're unsure, hit up the link below to find out how:

    http://www.yousaytoo.com/sudjarwo/how-to-reset-ram-in-a-computer/29133

    3. Identify Keyloggers

    Internet cafes are the most likely place you'll find them, followed by library, perhaps, and maybe even you own house if you've some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?

    Here's what one looks like:

    Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:

    , http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/

    4. Surf the Web Anonymously

    We won't make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.

    Aside from the safest method--which is using a connection that is not yours--you will need the ultimate in proxies...Tor. Tor is an onion-routing system which makes it 'impossible' for someone to find out who you actually are.

    5. Bypass a Computer Password on All Major Operating Systems

    Obviously you shouldn't use this to gain unlawful access to a computer. If you're a geek, however, you'll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.

    See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.

    http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/

    6. Find a Users IP Address on AIM

    Knowing someones IP address is actually pretty useless in this case, but most people don't realize that. If someone is harassing you via AIM and you can't get them to stop, discovering their IP and sending it to them--with a nicely worded threat of law enforcement involvement should they not stop--is likely enough to send them scamping away with tail between legs.

    http://www.elitehackers.info/forums/archive/index.php/t-2827.html

    7. Hide a File Behind a JPEG

    So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but there's always the chance of them being discovered. A password protected RAR is the best choice, but it's a bit obvious despite the most boring title you could give it.

    A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.

    http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/

    8. Crack a Wifi Password

    This is one of those things you don't need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people don't want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.

    A good overall tutorial on wifi and cracking can be found here: http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks

    9. Monitor Network Traffic

    The Internet is a vast place with a bit of everything. Whether you're curious about what your roommate is downloading, your kid is getting into, or any leeches living around you who've unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.

    Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

    10. Recover Master Boot Record

    A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.

    Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm

    11. Retrieve Data off Hard Drive

    There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasons--physical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.

    To find out how to retrieve data off a damaged hard drive, read here: http://laptoplogic.com/resources/5-ways-to-retrieve-data-off-a-crashed-hard-drive

    12. Load Rockbox onto an MP3 Player

    The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If you're an audiophile--or simply frustrated with the lack of control over your music settings--Rockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.

    http://rockbox.org

    13. Unbrick a Smartphone

    No geek can resist the allure of flashing the newest beta firmware onto their shiny smartphone. The byproduct of that is sometimes a bricked phone, which would leave many sobbing into their pillow at night. To avoid rendering your $400 gadget into a door stopper, learn the fine art of unbricking and then flash away.

    As the method used to fix a phone will vary, this is the best place to start looking for answers: http://www.howardforums.com/

    14. Replace a Laptop Keyboard

    Keyboards get gummy after awhile. If you use yours a lot (aka: all day), then you probably eat over it at some point. Crumbs get into the keys and things are sticking, and before you know it, you need a new keyboard.

    http://www.refurbished-laptop-guide.com/how-to-remove-a-laptop-keyboard.html

    15. Rip Streaming Videos

    Streaming videos are officially in vogue. We're not going to make any assumptions about what type of videos you are streaming and may want to keep, but no matter what it is, any geek could rip them while sipping a Red Bull and watching the latest episode of BSG.

    Here's a hint to get you started: http://applian.com/download-videos/

    16. Strip Windows DRM

    DRM is incredibly annoying. With many online stores now offering DRM-free mp3 audio files, it would seem it's not as big of an issue as it used to be. That is not not the case, however, with all videos bearing a DRM as well as music of a higher-quality than MP3.

    Stripping Windows DRM is not legal. If you're a geek, your probably don't care: http://undrm.info/remove-DRM-protection/FairUse4WM-freeware-DRM-removal-Windows-software-Strip-copy-protection-from-WMV-ASF-WMA-Windows-Media-Player.htm

    17. Homebrew Hack Game Systems

    Gaming consoles are notorious for having features you can't use simply because the manufacturer decided to lock them down. As a geek, you can't just be satisfied with the features they decided to give you. No, you have to crack that case open and take a peek inside. Every geek should know how to homebrew hack their system and unlock it's full potential.

    18. Find a Website IP Address Without Web/Command Prompt Access

    Some school admins think they're being sneaky when they lock down the command prompt and block all major IP search websites and block all the websites you actually want to visit. Of course, that is child's play for any geek.

    First, to get a new command prompt, open Notepad and type: command.com. Then, save as "cmd.bat". You now have a command prompt.

    Now, open the command prompt and type "ping http://www.website.com/" to find the IP address of that website.

    Enter the website into the browser and you will officially have impressed all your friends.

    19. Bypass School or Work Website Blocks

    What is a horrific situation for an average computer user is a simple irritation for an everyday geek. To bypass a website block/filter, simply enter that websites IP address in instead of the actual site address.

    20. Screw with Wifi Leeches

    Nobody likes a wifi leech. At best, they're simply using up your valuable bandwidth. At the worst--and far more likely, they're stealing your identity and watching your activities. After watching your network and identifying the leech, use this trick to flip their browser upside down and let them know you don't appreciate the intrusion.

    http://tech.nocr.at/hacking-security/baffle-wifi-leeches-with-an-upside-down-ternet-2/

    21. Hexadecimal and Binary Number Systems

    Everyone knows the normal, everyday digit system used. It takes a special--possibly psychotic person--to also know hexadecimal and binary number systems.

    Here is an excellent interactive tutorial on learning the two systems: http://www.wisc-online.com/objects/index_tj.asp?objID=DIG1102

    22. How to Hot Wire a Car

    If your family always turns to you any time their computer hiccups, their DVD player needs fixed, or their home security system doesn't activate, it's only a matter of time before someone asks you how to hot wire a car. Wouldn't it be great to be able to answer them?

    To learn this unique skill, read here: http://howto.wired.com/wiki/Hot_Wire_Your_Car

    23. Increase Wifi Range

    With so many small portable gadgets gaining more and more sophisticated web browsers, in addition to gaming systems like the PSP and DS, getting the most use out of your wifi is practically a geek necessity.

    Here is a good guide on extending your wifi's range: http://www.mavromatic.com/archives/000451

    24. Carrying a Computer Cleaning Arsenal on Your USB Drive

    A good geek prepares for their friends stupidity. No matter how many times you tell them to stop downloading porn, they keep doing it until their machine is so infected it can't drag itself into a grave. An arsenal of portable malware cleaners, a portable task manager, anti-virus, etc, will make those impromptu purging sessions all the easier.

    25. Running an Operating System from a USB Thumb Drive

    Most people don't even understand what the magical operating system is. As a geek, you should transcend that basic knowledge and have a small operating system on your thumb drive handy for those times you need computer access but don't know the password to a nearby computer.

    http://www.pendrivelinux.com/

    26. Understand What "There's no Place Like 127.0.0.1" Means

    A lot of geeks wear this shirt as a short hand code for their computer finesse--or maybe just to screw with other people who stare but cannot figure out what it means. No matter the reason, if you'd like an answer, check out the link below.

    http://www.tech-faq.com/127.0.0.1.shtml

    27. Read 1337 At Normal Speed

    Sure, everyone knows about it and it's no longer cool, but if you're going to proclaim yourself as a geek, you should be able to read it full speed. Who wants to choke in front of the wannabe that learned to read it full speed and flaunts it in your face?

    http://www.wikihow.com/Read-and-Write-in-1337

    28. At Least One Fictional Language

    And not only should you know a fictional language, but you should use it to say something about yourself. Do you choose Klingon or Quenya?

    Here's a list of constructed languages: http://en.wikipedia.org/wiki/List_of_constructed_languages



    ##ADSENSE##

    29. How to Survive in a Linux Argument

    Linux is gaining an all around higher standing in the geeksphere, and it's bound to enter a conversation at some point (which will invariably end up turning into an argument). If you want to keep up, you'll need to understand the basic points of Linux, as well as the general info of all basic things.

    Here's a good place to read and gain a foothold: http://www.linux.com/articles/feature/

    30. Identify Major Constellations

    For those times you venture from the air-conditioned, computer filled basement of your parents house (or something like that), look up at the stars and have yourself a Galileo moment. The stars may just be dots to many people, but with the handy website below, you'll be stopping man-belts and lions in no time.

    http://www.sky-watch.com/astronomy-guide/major-constellations.html

    31. Use a Camera in Manual Mode

    Sure, you could just use auto mode like everyone else too afraid to learn what some letters and numbers mean, but then you wouldn't be much of a geek, would you? The oft-ignored dial on a camera is the key that unleashes the best quality photos possible, and every geek should be a whiz at using one.

    http://digital-photography-school.com/digital-camera-modes

    32. Who Mulder and Scully Are

    It seems that in the plethora of geek websites, there always appears a joke about Mulder and Scully, the two main characters from the X-Files. If you don't know who they are, you'll be left in the dark, alone, contemplating what exactly it was you were doing in the 90's that you wouldn't understand the joke.

    http://en.wikipedia.org/wiki/Mulder_and_Scully_(song)

    33. Javascript

    HTML is running the world (not really). Everyone knows some HTML and it makes them feel empowered. As a geek, you want to transcend that basic knowledge others share and know a little more. JavaScript is the answer--it is easy to learn if you're not actually interested in web programming, but simply curious, and it looks scary to anyone who doesn't know it.

    http://www.yourhtmlsource.com/javascript/basicjavascript.html

    34. How to Unlock an iPhone

    Sure, most geeks wouldn't be caught dead with an iPhone, but what about your friends? You're the smart techie, they'll expect your to know how to unlock it.

    http://www.pcworld.com/article/137223/how_to_unlock_an_iphone.html

    35. How to Install Mac OS X on a PC

    Just because you don't want Mac on your PC doesn't mean you shouldn't know how to do it. Knowledge is power, right? Go ahead, use this to stump your friends and family.

    http://dailyapps.net/2007/10/hack-attack-install-leopard-on-your-pc-in-3-easy-steps/

    36. Build a PC

    If you purchase a ready-made PC, you can be sure of one thing--you're paying more than you should. Assembling your own PC isn't too hard, and is the first thing you should be aiming to accomplish as a geek.

    Here is a massive article on assembling your own PC: http://www.pcmech.com/byopc/

    37. Tethering a Smartphone

    Nothing like a little wifi on the move, eh? Tethering a smartphone means using the Internet on your laptop/netbook via your cell phone. Of course, the method to do this depends on your phone, but here's an article to get your started:

    http://www.tech-recipes.com/rx/2276/smartphones_bb_treo_tether_modem_usa_carriers/

    38. Wiring a Home Theater System

    Home theater systems used to consist of a TV and a chair. Gone are those days of simplicity, however, and setting up a modern system can be pure mind-boggling horror. Where does the modulator go, why does the DVD player have no video and the cable box no sound?

    Here's a tutorial, including excellent diagrams, to show you how: http://www.prillaman.net/ht_info_8-wiring.html

    39. Replacing a Laptop LCD

    Laptop LCDs are vulnerable to many different mishaps: accidental pressure spots, shadows, airsoft pellets.... No matter, there will come a point when you need to swap your LCD for a new one. Now, as a geek, you probably don't have an extended warranty. If that's the case, here are some excellent pages and pictures on replacing the display:

    http://www.fonerbooks.com/laptop_4.htm

    40. Make a Laptop Cooling Pad

    Can you believe these cost $50?! A geek will need one, because data crunching/DVD ripping/videos playing/rendering at the same times tends to cause excess heat. Instead of shelling out your hard earned dollars, make your own like so: http://www.instructables.com/id/Lazy-mans-laptop-cooler/

    41. Unleash a Laser Pointer's full potential

    A normal person uses a laser pointer to drive their dog crazy. A geek uses it to melt butter for their grilled cheese sandwich. To unless a laser pointer's full strength, crack open the case, fry the resistor with a hot soldering iron, then snap it back together and keep it away from flesh/eyes/airplanes. The pointer will burn out after a few hours, but what a fun few hours they will be.

    Note: this is dangerous. Don't do anything stupid.

    42. Keyboard Shortcuts

    This will depend on your operating system and the apps you use, so there's no tutorial available. However, that is irrelevant--you're a geek, you can find them yourself. Shortcuts are the difference between a slow computer user and a geek. The geek will always will out in a speed contest, because they do practically everything from their keyboard.

    43. Soldering Glasses Together

    Nerds use tape on broken glasses; geeks use solder. 'Nuff said.

    44. How to Execute a Shell Script

    If you're a true geek, you'll need to do this at some point. Below are instructions on how to do so. Remember: always be cautious when running a script, you don't want your computer to turn into a door stop, now do ya?

    http://www.mcsr.olemiss.edu/unixhelp/scrpt/scrpt1.2.html

    45. How to Hack a Pop Machine

    Okay, so stealing isn't cool. Still, hacking is simply a misunderstood art, right? So hacking a pop machine isn't really stealing, because it's not about the pop, it about the pleasure of getting your way. Or something like that. (Newsflash, it is illegal, don't do it.) If you want to try your fingers at getting a free Coke, check out this link:

    http://skattertech.com/soda-machine-hack/

    46. Turn a Laptop into a Digital Picture Frame

    So you want to show off pictures of your dog and that girl you once met, but you want to do it in an uber geeky way. Any schmuck can go to Walmart and buy a digital picture frame for a grossly inflated price. But you...oh, you're too smart for that. No, instead you'll find an old laptop on eBay for $5 and turn it into a true work of art.

    http://repair4laptop.org/notebook_picture_frame.html

    47. How to Mod a Flash Drive Case

    All the geeks are doing it.... Whatever. The case your flash drive came in is probably weak and most certainly plain. Why not jazz it up with your own unique style?

    Here's one such case mod, and dozens of related projects: http://www.instructables.com/id/Metal-USB---Flash-drive-case-mod/

    48. Do Cool Things to Altoids Tins

    People are obsessed with these things. Altoids tins are durable, small, and just begging to be filled with LEDs, mp3 players, audio amps, and maybe some snuff. A good geek will find millions of uses for these little metal wonders. If you need a mental boost, however, here's some interesting links:

    http://www.squidoo.com/altoids-tins

    49. Convert Cassette Tapes to Digital Audio Files

    If your geekhood started in the 90's, then you probably have a least a few (dozen) cassette tapes still sitting around. Why not breathe digital life into them before they fall ill to mortal fate?

    http://lifehacker.com/software/mp3/alpha-geek-how-to-digitize-cassette-tapes-222394.php

    50. Lock Your Computer with a USB Drive

    You don't want anyone getting into your files while you're gone. A normal password would be enough to keep most people out, but what if you got super-secret X files on your computer? You can lock your machine down with a USB drive via these instructions:

    http://lionjkt.wordpress.com/2008/12/31/how-to-lock-your-computer-with-usb-drive/

    51. Run Your Own Ethernet Line

    Wifi has taken the place of a wired connection in many homes, and with good reasons--you can go anywhere, no cables necessary. What about those...sensitive...activities that you'd rather the neighborhood script kiddie didn't see on your wifi? An Ethernet cable is your solution.

    To wire your own Ethernet, hit up this link: http://www.ertyu.org/steven_nikkel/ethernetcables.html

    52. Set Up a Streaming Media Server

    With digital files becoming the ultimate medium, many people have hundreds of gigabytes worth of music, videos, and pictures. You could keep them on a portable hard drive, but then you're have to take it everywhere, and only one person could use it at a time. The solution is a streaming media server, something no geek can live without.

    http://www.n00tz.net/2008/07/vlc-media-server-ubuntu-hardy/

    53. Setting up a VPN

    If you're like most geeks, you can't live without your computers. They store your life in some poetic fashion, holding files you feel a personal connection with.... Anyway, if you are at work and suddenly realize you left an important picture at home (or you need blackmail material pronto), having a VPN ready to go will save you big time.

    http://www.computernetworkinghelp.com/content/view/41/1/

    54. Turn Webcams into Security Cameras

    Is someone stealing your Netflix DVDs? Do you suspect it is a fat hairy man in his boxers taking them each morning? If so, you can get your proof using a couple webcams and a bit of software.

    http://www.simplehelp.net/2006/09/27/how-to-use-your-pc-and-webcam-as-a-motion-detecting-and-recording-security-camera/

    55. Control Your House Lights with a Computer

    Controlling the lights in your house via computer is a great way to freak out the neighborhood kids ding-dong-ditching (assuming you wire up a Halloween scream motion sensor, also). If you reasons are less nefarious, you simply use it to turn on and off lights without having to life ye butt from thy seat, which is a good reason in itself.

    http://www.instructables.com/id/Control-lights-in-your-house-with-your-computer/

    56. Play Retro Games without Retro Consoles

    This applies to the geeks who enjoy gaming. Setting up an emulation PC on your TV is a great way to relive those games of old.

    57. Put LEDs Inside a Lightbulb

    The days of hot incandescent and mercury-laden fluorescent are gone, and in are the days of long lasting, low heat, low consumption LEDs. As any good geek, you want to be able to say "I was doing X long before it became mainstream." Here's your chance--the following link will show you how to put an LED inside a lightbulb, something sure to stump your friends the same way Grandpa's ship-in-a-wine-bottle used to stump you.

    http://blog.makezine.com/archive/2006/06/make_a_led_bulb.html

    58. Create Music with Keyboard

    How awesome is KeyBored? This little app gives all of your QWERTY keys a piano note. When you type, it sounds like an infant monkey punching a keyboard. If you've got some musical chops, it won't take you long to figure out the Star Wars theme or find a hidden musical message in Counter Strike control buttons.

    http://agdoa.net/ [edit:link updated]

    59. Make Your Office Ergonomic

    Face it--you spend a lot of time at your desk. You might even have a few extra pounds and pallid skin to show for it. While those things are temporary, far to common and more serious is the carpal tunnel, eye strain, and back problems you'll develop from having a poor workspace.

    Hit up this link to create a body-friendly workspace that will keep you limber and flexible: http://www.ergotron.com/tabid/305/language/en-US/default.aspx

    60. Adding a Third Monitor

    Studies show that dual monitor increase work productivity by 30%. As a geek, you'll need a third monitor to equal the dual setup of a layman (if that makes sense). While any hack with a VGA port can add a second monitor, it takes a true geek to add a third (or more). This will vary based on graphics/OS, so hit up Google for a tutorial or two.

    61. How to Convert a DVD to x264 (or XviD or DivX)

    It might seem like child's play to you, but many individuals do not understand the fine art of converting a DVD into a digital file, let alone the careful skills it takes to achieve a happy balance between size and quality.

    Here is an excellent tutorial demonstrating how to rip a DVD with the multi-platform free software Handbrake: http://howto.diveintomark.org/ipod-dvd-ripping-guide/

    62. Flash System BIOS

    Ya gotta do it some time, so stop putting it off and man up. Flashing the BIOS on your laptop might seem scary (as it should--fear keeps you on your toes and prevents mistakes), but it's not (actually, it is, but if you even understand why you need to do this, you've gotta have at least a few chops by now). Warning--you can seriously bork your computer doing this!

    http://www.pcstats.com/articleview.cfm?articleID=1605

    63. How to Irrecoverably Protect Data

    TrueCrypt, my friends. Learn to use TrueCrypt. If you have ask why, you don't need it.

    64. The Fastest way to Kill a Computer

    It's said that you have to get into a killers mind to understand their weaknesses, right? Same goes for the unfortunate boobs who always kill their laptops. Here's a list of all the different ways you can accidentally kill a computer--arm your family and friends, and save yourself grief (because it's surely you they will call when something goes horribly, horribly wrong).

    http://www.pcstats.com/articleview.cfm?articleID=1720


    Source: http://laptoplogic.com/resources/64-things-every-geek-should-know

    31 July, 2010

    EXAMs ARE OVER!!!


    Hello Folks,

    Its been a long time that I didn't pop around my blog. Yeah, yeah... the same old things again... The Exams...!!!

    Exams' been haunting MCA students like Ghosts. And it really gives us hard and a LONG time to get rid 'em off. That's why was busy with exams. Well, that's not the excuse, but the issue!!!

    Hmm, EXAMs ARE OVER! 4th Semester is over. Now, what to do first? Well, first thing I'm about to do is to delete all the useless emails from my "Inbox(226)". Then will rearrange the data scattered around my 1 TB hard drive. Then planning to watch "Inception" [ Yes, haven't seen that muvee yet :-( ]. And then wanna have buckets full of sleep at my Home,.. yeah......! And after 5 days, the hustle will start again, as the 5th semester is going to drive us again from the 5th of August.

    Till that time... Take Care.

    - CYbErCodE -

    20 April, 2010

    Microsoft debuts 'fix it' program

    Microsoft has launched "Fix It" software that keeps an eye on a PC and automatically repairs common faults.

    The software basically adds the automatic diagnostics system in Windows 7 to older versions of Microsoft's operating system.

    The software, currently available as a trial or beta version, is intended for users of Windows XP and Vista.

    The package also tries to anticipate how security updates will affect a PC before they are installed.


    Bug watch

    Once installed, the software gets updates about known issues with Windows or any connected devices, and regularly checks to see if a host machine has fallen victim. Once fixes become available it will tell users they are ready or attempt to apply them.

    The software has onboard fixes for about 300 of the most widely encountered problems that stop Windows working as it should.

    The software also maintains a list of the hardware and software on a machine so if the automatic fix does not solve a problem, it will be able to help users supply detailed information to Microsoft's support staff about what has gone wrong.


    Those signing up and downloading the Fix It software can use it on several different machines.


    The free software can be downloaded from Microsoft's support pages. Windows XP users wanting to use it must have Service Pack 3 for the operating system installed.


    The Fix It service began in late 2008, when Microsoft began using the logo to highlight automatic fixes on its support pages that dealt with very common problems.

    Anyone clicking on the logo kicked off a download that tried to fix that problem automatically.

    Microsoft, like many other software firms, has built a vast database of faults and problems as technology built into Windows reports back about crashes and other bugs that machines encounter.

    Source:
    http://news.bbc.co.uk/2/hi/technology/8629331.stm

    19 April, 2010

    Oracle patches JWS vulnerability

    by Steve Ragan

    On Thursday, Oracle released an update for the JWS vulnerability discovered by researcher Travis Ormandy less than a week ago. The patch comes after Ormandy was informed that there would be no rush to address the issue, as it was not a high enough priority, and after attacks targeting the flaw were being exploited online.

    Last Friday, Travis Ormandy posted to the Full Disclosure list an advisory that detailed a flaw located within the NPAPI ActiveX control/plug-in, called the Java Development Toolkit. The flaw would allow an attacker the ability to compromise a system simply by displaying a page. While most Java installations are on Windows-based systems, the same day Ormandy disclosed his findings, Rubén Santamarta reported the issue affected Linux as well.

    “The toolkit provides only minimal validation of the URL parameter, allowing us to pass arbitrary parameters to the javaws utility, which provides enough functionality via command line arguments to allow this error to be exploited,” Ormandy wrote in his post to Full Disclosure.

    “The simplicity with which this error can be discovered has convinced me that releasing this document is in the best interest of everyone except the vendor.”

    Ormandy noted that Sun (owned by Oracle) was informed of the vulnerability, but said that there was no cause to break quarterly patch cycles to address it, as it was not a “high enough priority.”

    “For various reasons, I explained that I did not agree, and intended to publish advice to temporarily disable the affected control until a solution is available,” Ormandy explained.

    A few days after Ormandy posted his advisory, AVG noticed that the code was being used in live attacks online.

    “The code involved is really simple, and that makes it easy to copy, so it's not surprising that just five days later, we're detecting that code at an attack server in Russia. The main lure so far seems to be a song lyrics publishing site, with Rihanna, Usher, Lady Gaga and Miley Cyrus being used, among others,” wrote AVG’s Roger Thompson.

    Perhaps the live attacks altered Oracle’s stance on patching, perhaps not. In the end, everyone with Java installed on their systems should head here to get the patch.


    Source: http://www.thetechherald.com/article.php/201015/5519/Oracle-patches-JWS-vulnerability

    Indigenous cryogenic engine didn't fail to ignite: scientists

    S. ANANDAN

    Senior Indian Space Research Organisation (ISRO) scientists, who met at the Vikram Sarabhai Space Centre in Thiruvananthapuram to examine the reasons for the failure of the GSLV-D3 mission with indigenous cryogenic upper stage, on Sunday ascertained that contrary to initial reports the cryogenic stage had doubtless ignited in the vacuum of the space.

    After deliberating on the performance parameters of the cryogenic stage (the third stage) of the unsuccessful GSLV development flight last Thursday, they arrived at the conclusion that the mission failed after the fuel turbo pump that supplied fuel to the cryogenic engine had stopped working a second after ignition. ISRO chairman K. Radhakrishnan chaired the two-day meeting.

    “The data clearly shows that combustion [of the cryogenic engine fuel, liquid hydrogen at minus 253 degree Celsius, and the oxidiser, liquid oxygen at minus 183 degree Celsius] had indeed taken place. The rocket's acceleration had increased for a second before it drifted off the designated flight path. Indications are that the turbine that powered the fuel turbo pump had somehow failed. [The propellants are pumped using turbo pumps running around 4,000 rpm.] There could be various reasons for its failure,” a senior ISRO scientist told The Hindu.

    The ISRO will now constitute a ‘Failure Analysis Committee' to close in on the exact reason for the failure. It will come out with its report by May-end, following which the national experts' panel, constituted to review and give clearance to the GSLV-D3 mission, will examine the report. The ISRO Chairman will brief the Prime Minister on Tuesday on what had gone wrong with GSLV-D3.


    Source: http://beta.thehindu.com/sci-tech/technology/article402907.ece

    17 April, 2010

    STUDSAT- ISRO's next venture by students

    Bangalore: After the disappointing failure of its recent space venture, the Indian Space Research Organization (ISRO) is now planning to launch a satellite in May this year that for the first time will solely be developed by students and would cost around Rs.55 lakh.

    The satellite has been developed by a team of students from around seven engineering colleges in Bangalore and Hyderabad. It will be used to capture high-resolution images from space that will be made available to students.

    The satellite named STUDSAT will be put in the Low Earth Orbit around 680 kilometers above the earth by ISRO's Polar Satellite Launch Vehicle (PSLV) from the Satish Dhawan Space Centre in Sriharikota. The satellite has a volume of just 1.1 litres and weighs just one kilogram.

    Source from ISRO has reported that the satellite is in the Pico category and would be attached on the back of the PSLV along with three other satellites.

    The STUDSAT has a built in camera to produce high-resolution photographic data for the purpose of remote sensing applications and vegetation studies for six months. This data would be commercially sold and would be inaccessible for students but will be given free to students to conduct research such as land mapping.

    Source: http://www.indiaedunews.net/Science/STUDSAT-_ISRO's_next_venture_by_students_11347/

    16 April, 2010

    Watch Out for Trojans Circulating in PDFs

    Techtree News Staff, Apr 16, 2010 1351 hrs IST

    Websense Security Labs warns of Zbot campaign; an information stealing trojan

    Websense Security Labs has received several reports of a Zbot trojan campaign spreading via email that connects your PC to a malicious remote server in China. They have seen over 2,200 messages so far.

    Zbot (also known as Zeus) is an information stealing trojan (infostealer) collecting confidential data from each infected computer. The main vector for spreading Zbot is a spam campaign where recipients are tricked into opening infected attachments on their computer.

    This new variant uses a malicious PDF file which contains the threat as an embedded file. When recipients open the PDF, it asks to save a PDF file called Royal_Mail_Delivery_Notice.pdf. The user assumes that the file is just a PDF, and therefore safe to store on the local computer. The file, however, is really a Windows executable. The malicious PDF launches the dropped file, taking control of the computer. At the time of writing, this file has a 20 perecnt anti-virus detection rate (SHA1 : f1ff07104b7c6a08e06bededd57789e776098b1f).

    Location of the Zbot:

    The Zbot trojan creates a subdirectory under %SYSTEM32% with the name "lowsec" and drops the "local.ds" and "user.ds" files. The "local.ds" and "user.ds" are configuration files for the threat. It also drops an executable "sdra64.exe" and modifies the registry entry "%SOFTWARE%\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" to launch itself during system startup. When it runs, it injects malicious code into the Winlogon.exe instance in memory. This Zbot variant connects to malicious remote sever in China using an IP address of 59.44.[removed].[removed]:6010.

    This is yet another hacking attempt pointing to China, which is kinda alarming and makes one wonder if China is quietly planning to go big on this. Make sure you've updated your anti-virus suites with latest definitions in order to keep your PC from malicious data. Also, avoid downloading any PDF from unknown senders.


    Source: http://www.techtree.com/India/News/Watch_Out_for_Trojans_Circulating_in_PDFs/551-110613-582.html

    GSLV failure: Work on cryogenic engine to continue


    Pallava Bagla, Friday April 16, 2010, New Delhi

    The government is seeing the GSLV failure on Thursday as a setback, but there is resolve that development of the indigenous cryogenic engine will continue, sources have told NDTV.

    India has no choice but to master this technology in the long run as it is technology that has been denied to the country, the sources said.

    It took the country more than 15 years to develop the cryogenic engine as technology for this was denied when, in the 1990s, America put pressure on Russia and forced the cancellation of an Indo-Russian technology transfer deal. The argument given was that India would use these engines to make missiles. Two decades later, none of the Indian missiles uses a cryogenic engine. A team of hundreds of scientists toiled day and night to master this technology.

    There will now be a thorough probe into why the cryogenic engine failed.

    Minister of State Science and Technology Prithviraj Chauhan is also expected to make a statement on the GSLV failure. (Read: Disappointment. India's GSLV D3 mission fails)

    On Thursday, immediately after a much-awaited launch of the Geosynchronous Satellite Launch Vehicle (GSLV), the indigenous cryogenic engine underperformed and rocket deviated from its path.

    ISRO chairman, K Radhakrishan, announced that the rocket had spun out of control and that the cryogenic engine may have ignited. He promised another attempt next year. (Read: ISRO statement on GSLV's failure)

    "Sorry to inform you that the cryogenic stage was not successful. The countdown was eventless. We are not very sure that the cryogenic main engine did ignite. The vehicle was tumbling, it lost its control and altitude and splashed down in the sea," Radhakrishan said.

    The cost of the mission was Rs 330 crore. The tall and majestic GSLV, if launched successfully, would have marked India's entry into the multi-billion dollar commercial launcher market on a fully indigenous rocket. A sophisticated new Indian technology called the cryogenic engine was being flown for the first time. In the five earlier flights, India had used pre-used imported Russian made cryogenic engines. It was this engine that underperformed.

    The failure will impact India's efforts at launching its own satellites, its first manned space flight and the planned launch of Chandrayan 2 in 2012.

    It's the second major setback months after the failure of Chandrayaan-1 - India's maiden mission to the moon. But on a positive note, ISRO has been able to come back with a bang in the past. It plans to attempt another launch in a year.

    Scientists also point out that cryogenic engines are a difficult technology to master and even countries like the US and Japan failed in their maiden attempts.

    The Indian-made Geosynchronous Satellite Launch Vehicle, at 50 meters tall would be as high as a 25-storey building, and weighing a whopping 416 tons. It is a three-stage rocket.
    At lift-off, the first stage ignites using one of the world's largest solid fuel motors and strap on boosters. (Read: GSLV - India's big launch)

    The first stage separates and the second stage, powered by a liquid engine takes over, while the heat shield is shed.

    At an altitude of about 130 kilometres, the second stage separates and the all-important cryogenic engine takes over. Using very cold liquid oxygen and liquid hydrogen as fuel, this special engine helps launch heavier satellites into space.

    After a 17-minute flight, the satellite was to have been put into its designated orbit above Earth.

    This mission was to have hoisted a sophisticated communications satellite called G-Sat, an Indian-made experimental satellite that weighs 2200 kg and would improve the global positioning system. It was also to have tested a new electrical propulsion system to keep the satellite in its orbit. It was also carrying a set of Ka band transponders, which would have increased the quality of television coverage.


    Source:
    http://www.ndtv.com/news/world/gslv-failure-work-on-cryogenic-engine-to-continue-20108.php