Friday, October 27, 2006

Some good links I came across : Part-2

Part 1 is here!!
Spotback.com
It does a very efficient job of getting together content from all over the Web. It also finds the information that will interest you the most.
You just need to enter a username and password.As soon as you log in for the first time, a pop up window will come up and ask you to enter the topics of your interest. It presents you with four empty fields in which you can enter the things that you would like to read about.Once you enter your interests and click Continue, Spotback instantly redirects you to a homepage.After this its just a kid's play.

To Watch/Download free TV shows and Movies
http://xsharex.info
http://www.allfq.org
http://www.isfree.tv

Ofcourse you all would be knowing about pv,bit torrent,peprmint,limewire,dm etc

To convert videos from one format to another
www.erightsoft.com/SUPER.html

Some Tips/Tricks for computer Users

**How to increase life of your DVD drive
Now almost everyone watch movies on their computer's Dvd rom drive.
There is a software called DVD Idle Pro which can really increase the life of your dvd drive.

By using the "Smart Read-ahead" Cache, DVDIdle saves DVD data which will be played soon onto the hard disk cache or RAM cache, and then feeds it to DVD player. This allows the DVD drive to rest. For example: a 6X-speed DVD drive will only work for 15 minutes when you are watching a 90 minutes DVD movie.

here is the link to get the software

**Some Mouse wheel tricks/tips
If you have a mouse with a scroll wheel on it, you can do some cool things listed below:

1.CTRL + Spin(I love this)
If you are in a web browser (Explorer or Netscape or Firefox) , hold down your Ctrl key and spin the wheel. It makes the text larger or smaller depending on which way you spin. For Opera users, it magnifies both the images and the text.

2.Shift + Spin
Ever wonder what happens when you hold down the Shift key on a web page and spin the wheel on your wheel mouse? Explorer goes either back or forward, depending on which direction you spin.
Give it a try. Open up Internet Explorer(or any other browser) and follow a few links. Then, hold down your SHIFT key and spin that wheel.

**Firefox extension to Translate
This is a small extension that translates Web pages (via the toolbar button) or selected text (via the context menu) from several different foreign languages into English.This plug-in (extension) uses babel fish to translate pages. It’s small, but it does the job effectively.
To install Translate, click here.

**Trick to lock your private folder

Many will be familiar with this simple trick.
What I am using here is windows renaming trick including any registry entry and DOS batch files.
Suppose you want to lock the folder "Games" in D: which has the path D:\Games -
In the same drive create a text file and type
ren games games.{21EC2020-3AEA-1069-A2DD-08002B30309D}

Now save this text file as ren.bat
--U can use any reg word like above from your registry(Run-->Regedit)

Create another text file and type in it
ren games.{21EC2020-3AEA-1069-A2DD-08002B30309D} games

Now save this text file as Key.bat
Now you can see 2 batch files Ren and Key.Press Ren.bat and the folder "Games" will change to control panel and you cannot view its contents.Press Key.bat and you will get back your original folder.
To save the above 2 bat files anywhere on comp ...to do that u can provide absolute path of your folder to be locked in batch files.

Thursday, October 26, 2006

Free E-Books on net - Best Links!!

Find here some of the best links to find online books/e-books on the net. Will be updating this regularly,keep visiting.

http://freecomputerbooks.com/
Free Computer Books online, Tutorials , Lecture Notes. This is the best site for free books.
It is updated regularly as new books become available.

Ebooksclub
Site has lot of ebooks you need registration to access.

Xpressionsz
Biggest collection of ebooks and CBTs.

Flazx
This site contains a huge collection for books on nearly all the topics related to programming or computers both new and old at the time of writing all the links on the site are working.

IT Ebook
This site contains huge collection for books on nearly all the topics related to programming or computers. Really a paradise for books lovers and professionals.

Ebooksclub
Site has lot of ebooks you need registration to access.

vijaymukhi.com
Books on latest and hot programming topics like Dot NET and J2EE etc.

Gmail mail id can be disected with a dot(.)!!

I recently came across very unusual/funny behaviour about the gmail email id.

Suppose that if you have a gmail id by the name of anonymousguy@gmail.com,then it is same as anonymous.guy@gmail.com and even same as anony.mous.g.u.y@gmail.com etc etc
This works because there is ABSOLUTELY NO DIFFERENCE between these differently spelt/dot separated mail ids.
Check yourself by sending mails to your id with "." at any place in ur name if u like!!

The reason for this is that the gmail server does not recognise the dot(.) character and so this thing works.

Also one more name for your e-mail id would be anonymous.guy@googlemail.com

Monday, October 23, 2006

Some good links I came across : Part-1

http://www.bugmenot.com/
login with the free web passwords available on this site to bypass compulsory registration. If you are furstrated in creating,forgetting login id's and passwords to "one time useful" sites like Imdb,nytimes,nypost,washingtonpost,latimes etc ,this is the site to be bookmarked.


HOWTO bypass Internet Censorship As on Sept-2006
A tutorial on how to bypass Internet Censorship using Proxies, Shells, JAP e.t.c. Different ways to beat the filtering in schools, countries or companies (blocked ports etc).Also see another article here.

MOTION MOUNTAIN
The Free PHYSICS Textbook on Quantum,empty space,Universe,Unsolved physics problems etc

Educational Java Applets
Educational java applets related to various concepts in math, physics, and engineering. You should be able to view them with any Java-capable browser.

Quantum Teleportation
IBM research

Media files on String theory
Find various media(video/audio) files on this site related to String Theory,Master equation,Parallel Universe,One theory,einstein's ideas,Big Bang,Gravity etc etc..

Zunafish
Trade DVD's,CD's,Audio books,video games etc

FullBooks
Thousands of free books

Virtual Kaleidoscope
Just timepass

Online Integration(Calculus) tool
For people who like Calculus!! Provide the equation to be integrated. If u understand and Calculus ,u can play with it whole day!!

DNS Stuff
To play with..

Find sounds
Download any kind of sounds available on web ranging from animals,birds,vehicles,movies,nature and many many more. You can search for any type too.

Free Computer Books,Lectures,Journals etc

Billiards and Pool Learning Videos using high speed camera

SandBoxie
Sandboxie intercepts changes to both your files and registry settings, making it virtually impossible for any software to reach outside the sandbox.Sandboxie traps cached browser items into the sandbox as a by-product of normal operation, so when you throw away the sandbox, all the history records and other side-effects of your browsing disappear as well.

Convert any image to ASCII characters

Internet on Audio
Good if a normal site is blocked or you are bored surfing net thru comp. Dial thru ur phone and surf.

How to send mails upto 512 MB??


I just came across a site which allows you to send mails with attachments upto 512MB to any mail id.
You dont need to register nor create an account,just upload a file and send it to a mail id.

IMPT: The attachment will be present in the mail server upto 5 days only[:(]
Want to know how this system works??

See the pic...
1. Sender uploads the file.
2. Recipient receives an email, with a link to download it.
3. Recipient downloads file.


Please visit the official site to know more

Tuesday, October 17, 2006

How to convert Windows applications into Portable (pseudo) applications?

Hi All,
I just found a very helpful article on using normal programs like any other portable applications.
Before that lets have some basics cleared.

What is a Portable Application?
Simply put "A portable application is a computer program that you can carry around with you on a portable device and use on any Windows computer."

From wikipedia "A portable application, or portable app for short, is a software program that does not require any kind of formal "installation" onto a computer's permanent storage device to be executed, and can be stored on a removable storage device such as a USB flash drive and used on multiple computers."

For examples: see Wikipedia

A portable application does not have to be installed on a Windows computer to be used. It can be used directly from the portable media (like USB flash drive) you are using. Without the hassle of installing on every machine, you can carry your favourite applications with you and start using them with a single click.

What are the advantages of Portable application?

*Speed. If you have an app, like an email program, which saves significant amounts of data, performance will be much better on a hard disk. Writing to flash memory is much slower, by several orders of magnitude.

*No Footprint. Due to the use of the registry and system DLLs, regular apps can only be installed using an installation program. Installing and uninstalling "portable" apps is simple and straightforward, and doesn't make your system any more complex and tangled than it already is. Also, many traditional programs require administrative rights to install, which is generally not the case with portable apps.[my favorite]

*
Portability. Even though the program is stored on a hard disk, if you want to move it (and its accompanying data) to another computer, you can just copy the directory in which the app resides. Because it doesn't use the registry, everything necessary to run that program can be easily moved.

*
No worry.You don't have to worry about the programs screwing with the registry or dumping crud in \windows\, you can delete them entirely just by selecting their directory and pressing delete, and if you reinstall windows they're ready to go, no reinstallation necessary. If you want to use them on a different computer, whether permanently or just via a network share, no problem.

*Clean.
They keep their configuration information in a file instead of the Windows system registry.This defnitely speeds up your system.[In fact, what is the justification for putting all the mundane settings in the registry? I can't think of one.]

*Privacy. You can use TrueCrypt to encrypt your USB drive. This will keep your email, browser history, etc. private while still using computers in various locations. It's nice to be able to let Firefox always save logins and passwords and know they'll stay private.

You can find the list of portable applications in my earlier blog. Seeing the extensive list you understand the scope of these apps. There are plans to include portable Operating systems in future!!



How to Upgrade, Repair, Disassemble ur Mobile Phone

Need to repair your mobile (cellular) phone? Need to fix a broken display? Want to know what chips are actually inside your mobile phone? Or just in the mood of modding your mobile gadget? Here is a collection of links to take apart instructions, disassembly pictures, upgrade and repair manuals, as well as do-it-yourself (DIY) tips and tricks for mobile phones.

Read the full article here...

From the article:
Below are the links you can directly goto your make of mobile/cell phone

Monday, October 16, 2006

All You wanted to know about YouTube.com -Tips/Tricks

YouTube is the most popular site to visit for viewing online videos, sharing your favourite videos with people and commenting on videos you like. Recently YouTube was acquired by Google for a few billion dollars. Here is a collection of several YouTube third party tools which enhance your YouTube experience.

Download and Save YouTube Videos

  • Video Downloader - a firefox extension that allows you to download videos to your computer from YouTube and most video sites.
  • YouTubeX - allows you to save and download YouTube videos easily using only your IE or firefox browser.
  • TubeSock - grabs YouTube videos from the web and copies them to your video iPod, Mac, or PlayStation Portable.
  • VideoDL - is a quick AJAX application that allows you to download online video into your computer. It supports top 3 video sites - YouTube, Google Video, and Break.com.
  • Download YouTube via bookmarklets - A collection of Greasemonkey scripts and bookmarklets to do the job.
  • Youtube-dl - is a small command-line program to download videos from YouTube.com. It requires the Python interpreter, version 2.4 or later.
  • KeepVid - Download videos direct from most video sites like YouTube.
  • YouTube Downloader - enter url and download YouTube videos.
  • Youtube Downloader - freeware tool to download and save movies from Youtube.
  • Youtube Grabber - is a free tool that downloads FLV files from youtube.
  • GooTube FLV Retriever - enter the video page URL, download the youtube video.
  • Capture Youtube and Google videos - save them as AVI files encoded in the MPEG4 format, using only one command.
  • http://www.saveyoutube.com

YouTube third party tools

  • YouTube Userscripts - a collection of scripts to perform several tasks with YouTube.
  • Youtube Video Slideshow - insert a username or a video tag below and it starts a slideshow.
  • fTube - a YouTube player that downloads the list of 25 most recent videos featured on the YouTube front page. The user can select a video from the list and hit the play button to play it in-Flash.
  • TubeCH - YouTube flash player.
  • iTube - grab Youtube videos, then convert and import them into iTunes. Requires .Net framework and works exclusively on Windows.
  • PodTube - a Mac OS X program, downloads, encodes, and adds YouTube videos to your iTunes library but requires Safari to fetch the videos.
  • TvTube - For Mac users. Allows you to browse YouTube, Google Video and Yahoo Videos, for movie clips that people upload, choose your favorite clips and add them to your shared library.
  • YouTube API - XML Feed Ripper - PHP script that taps into the YouTube API to deliver videos by tag, by username or what’s a current favorite.
  • YouTube Widget - brings all of YouTubes videos to your Mac Dashboard.
  • Search The Tube - A quick way to find videos for your website, blog or profile.

Top / Best YouTube Videos

  • PureVideo - collects top 10 videos from around the web
  • The World Internet TV charts - tracks the most popular video clips from four leading Internet TV sites.
  • Top YouTube Videos - a daily updated selection of the most popular videos from YouTube.
  • Vidspedia - is a collection of the best Google and YouTube videos, submitted and rated by users.
  • Youtube top-rated - a coverpop with the 1,001 top rated videos from YouTube updated every week.
  • Best of YouTube - a blog selecting the best Youtube videos.

Friday, October 13, 2006

Backing up a Unix(-like) system

User Halfgaar finally got sick of all the helpful users on forums and mailing lists who keep suggesting backup methods and strategies to others which simply don't, won't and can't work. According to him, this indicates that most of the backups made by *nix users simply won't help you recover, while you'd think that disaster recovery is the whole point of doing backups. So, now he explains to the world once and for all what's involved in backing up *nix systems.

Read the full introduction,"recommended" processes to be followed etc here.....

Hubble observations confirm that planets form from disks around stars

Read the full article here...

From the article:
" More than 200 years ago, the philosopher Emmanuel Kant first proposed that planets are born from disks of dust and gas that swirl around their home stars. Though astronomers have detected more than 200 extrasolar planets and have seen many debris disks around young stars, they have yet to observe a planet and a debris disk around the same star. Now, the NASA/ESA Hubble Space Telescope, in collaboration with ground-based observatories, has at last confirmed what Kant and scientists have long predicted: that planets form from debris disks around stars. "


"The Hubble observations by an international team of astronomers led by G. Fritz Benedict and Barbara E. McArthur of the University of Texas, Austin, USA, show for the first time that a planet is aligned with its star's circumstellar disk of dust and gas. The planet, detected in year 2000, orbits the nearby Sun-like star Epsilon Eridani, located 10.5 light-years from Earth in the constellation Eridanus. The planet's orbit is inclined 30 degrees to Earth, the same angle at which the star's disk is tilted. The results will appear in the November issue of the Astronomical Journal. "

Read the full article here...

Google Docs & Spreadsheets - Amazing feature from Google

Hope everyone are already using this amazing feature from Google. If not please start using it, its really very handy and simple to use.

Official site is http://docs.google.com/


Here's what you can do with documents:
- Upload Word documents, OpenOffice, RTF, HTML or text (or create documents from scratch).
- Use our simple WYSIWYG editor to format your documents, spell-check them, etc.
- Invite others (by e-mail address) to edit or view your documents and spreadsheets .
- Edit documents online with whomever you choose.
- View your documents' revision history and roll back to any version.
- Publish documents and spreadsheets online to the world, as Web pages or post documents to your blog.
- Download documents to your desktop as Word, OpenOffice, RTF, PDF*, HTML or zip.

Browsers supported :

1. Firefox 1.07, 1.5.0.6+ (Mac & Windows -- except for 1.0.8 on Windows and Mac, and 1.5b1 on Mac)
2. IE 6.0+ (Windows)
3. Netscape 7.2, 8.0
4. Mozilla 1.7.12+

Regardless of your browser type, you must:
Enable cookies.
Enable JavaScript.

Here's what you can do with spreadsheets:
- Import and export of .xls, .csv, and .ods formatted data (and export functionality for .pdf and .html).
- Enjoy intuitive navigation and editing, like any traditional document or spreadsheet.
- Use formatting and formula editing in spreadsheets so you can calculate results and make your data look the way you want it.
- Chat in real time with others who are editing your spreadsheet.


Web Password Hashing

Official website is here...

Whenever you access your bank account via the web, or login to eBay or any other web service that's access controlled, you trust that service to protect your account details.

In most cases your username and password pair are submitted to the web service in an encrypted form via the SSL protocol. Whereupon they are further encrypted before being stored in the account database. This process offers a relatively high degree of security and is used by many of the web services we use every day.

In most cases then, your trust is justified. If, however, you're one of the many millions of people who use the same username and password for different web services, then your security and privacy is at risk.

Hackers and scammers have a variety of tricks and tools that can, under the right conditions, obtain the usernames and passwords that you use online. The important thing to remember is that the bad boys only have to get lucky once. once your username and password (for one service) is acquired they can be tried at a variety of "secure" websites until another match is found. Such attacks are remarkably effective
.
The obvious way to protect yourself against this is to use a unique username and password for every website you visit.
However, in the real world, this just isn't practical However, in the real world, this just isn't practical so most of us will continue to put our bank accounts, and even our identities, at risk with a "global" username and password.

It doesn't have to be this way: Three cryptographers at Stanford University have devised a ridiculously simple solution to the problem.

PwdHash

Blake Ross, Dan Boneh and John C. Mitchell have produced an Internet Explorer plug-in, PwdHash that, in theory, allows you to use a common username and password at disparate websites with impunity.

Here's how it works:

1. You create an account at example.com. Whilst doing so, you specify the username and password that you want to use to access your account;
2. When you click the "Submit" button, PwdHash steps in. It takes the password you have entered, adds it to the website's domain name, and creates a one-way hash of the result;
3. That hash is then sent to the web-server where it is stored in a database (for the sake of brevity let's imagine that the web-server stores the username and password in plain text).

The web service now has a password on record that is not the same as the one you entered but, and here's the clever bit, the next time you login to that website, PwdHash will perform the same operations again - so the web-server will get the same (effectively garbled) password, match it against the one in its database and you will be able to access your account blissfully unaware of the entire process.

Now let's imagine that a hacker manages to get access to the account database at example.com. He takes your username and hashed password and tries to login to various secure websites with the stolen credentials.

Unfortunately for our crook, it's impossible for him login to your other online accounts because the credentials he's acquired have "example.com" encrypted within them. Your account at eBay has "ebay.com" tied to it, your online bank account is locked to "bigbank.com" and your Hotmail account can only be accessed with your special "hotmail.com" password. Remember: You've used the same password for all these websites - PwdHash has performed all the trickery.

As a result, the only account that the hacker can access is the compromised account at example.com. Score 1 for the good guys!
No Fishing!

There's a rather pleasing bonus to all this. Because the password you use is hashed along with the domain name it is registered to, you are also protected (to a degree) from "phishing" scams. Let's look at how phishing works:

1. You receive an email purporting to be from your bank;
2. The email states that the bank is updating their records and urges you click a link through to your bank's website to check/correct your account details. The link appears to point to your bank's domain name so you click through, being the conscientious customer;
3. However, its a scam! The URL is cunningly disguised, it actually takes you to the scammer's website which, remarkably, is an exact clone of your bank's home-page;
4. You dutifully enter your username and password and click "Submit";
5. At this point the credentials you entered are sent to the scammer, then his server redirects you to the real home-page of your bank (if the scammer's really cunning you'll see the bank's "Login Failed" screen);
6. You think you miss-typed your username and password so you try again and you successfully login - unaware that you have just surrended access to your life savings to a clever fraudster.

Now run through that same scenario with PwdHash in the equation: The scammer gets a password that is hashed against his domain - not your bank's! The credentials he has retrieved are absolutely useless to him. The good guys score again!
Deployment Challenges

There is a downside though: Users must reset their passwords for every website they have an account on (in order for the password/domain hash to be calculated and stored).

There is also a slight inconvenience when the user needs to login to a PwdHash-protected account from a computer where he can't install the PwdHash plug-in (at work, in a cybercaf�, etc). The Stanford team have at least recognised this problem and are working on a special "Remote Hashing" service to generate the correct password as required.
Summary

Password hashing, and the Stanford team's PwdHash implementation, represents a significant step forward for online security and it's reassuring to know that the common practise of using the same username and password for many online services need not be as risky as we know it to be.

I can only hope that PwdHash will soon be available for Mozilla/Firefox/Opera/Safari etc

XP's Little-Known 'Rebuild' Command

There's an easy fix for "Missing HAL.DLL," "Invalid Boot.Ini," and several other fatal startup errors.Use at your own risk if you have such problems, but it might be something worth jotting down for later on, as I have had to deal with many Windows XP problems where files were missing and I just had to start over with a fresh install.

From the article:
{
For example, if you already have some knowledge of the commands involved, many "Missing or corrupt HAL.DLL," "Invalid Boot.Ini," or "Windows could not start..." problems can be fixed with these five shortcut steps:

* Boot from your XP Setup CD and enter the Recovery Console
* Run "Attrib -H -R -S" on the C:\Boot.ini file
* Delete the C:\Boot.ini file
* Run "Bootcfg /Rebuild"
* Run Fixboot

It really can be as simple as that!
}

Also find the official method to do the same(which is bit tedious) and full details here.

Worm automates Google AdSense fraud

Click-fraud menace spreads using IM
Virus writers have crafted a malware threat that serves up expensive Google AdSense web pages related to mesothelioma, a rare cancer caused by exposure to asbestos.The cost-per-click for the term "mesothelioma" is among the highest in the online ads business ranging from $4 to $13 and higher on various keyword bidding networks.

This, in turn, makes the term a prime target for click-fraud. Google AdSense allows online publishers to make revenue by displaying Google ads relevant to the content of their site. Because Google pays the host Web site based on the number of clicks on their ads, the process can be susceptible to "click-fraud".

The KMeth worm, which targets Yahoo! Messenger users, directs infected users to a web site serving a barrage of Google AdSense advertisements related to mesothelioma. Financially-motivated malware writers apparently hope to cash on the ruse through shares in the resulting advertising commissions which we doubt will materialise. Fraud detection mechanisms employed by Google are more than likely to identify rogue sites generating suspiciously high returns using such illicit tactics but that doesn't eliminate the other security risks consumers face from the worm.

KMeth exploits IE vulnerabilities to infect surfers who visit malware infested sites controlled by hackers, promoted through IM messages sent to the Yahoo! Messenger contacts of infected users. The "status message" in Yahoo! Messenger can also be also hijacked, presenting potentially enticing messages to their contacts, such as "check out my blog" in order to trick potential marks into becoming infected, IM security firm FaceTime reports.

Meanwhile an infected user's IM control panel is disabled, and their home page is hijacked to point towards rogue web sites designed to generate maximum revenue through click fraud. Using malware to perpetrate click-fraud is an established technique but the KMeth worm extends this idea by employing a battery of social engineering techniques.

A full write-up of the threat can be found on FaceTime's security research blog here.

AOL releases free anti-virus tool - Its very good

AOL is giving consumers a free anti-virus software package, dubbed Active Virus Shield, powered by technology from Kasperesky Lab.
No AOL membership is required to use the service, though users are obliged to submit their email details in order to activate the technology.

Although free anti-virus packages already permeate the market, most notably Grisoft's AVG, coverage is far from universal, so AOL's entry is welcome.A US study by the National Cyber Security Alliance last December found that more than half (56 per cent) of the participants either had no anti-virus protection or had not updated it within the last week.


Active Virus Shield offers protection against viruses, spyware, malware and Trojans before they attack, as well as real-time scanning of files and email. Signature updates are updated "every hour", a significant difference from other free packages that offer far less frequent updates.

The software comes bundled with a free security toolbar for IE users. The toolbar includes a a password manager, pop-up blocking technology, and a link to the Whois domain registration database that allows users to find more information about potentially suspicious sites.

AOL's anti-virus software promo is the latest give-away in its strategy of becoming more like a portal, such as Yahoo!, and less like a conventional ISP. Last week, AOL announced plans to give away integrated email and software, security and other products as part of a strategy to drive more traffic to its sites and ramp up advertising revenue.

In recent days, AOL has offered web users 5GB of free storage online and a range of web-based security products (via AOL Safety and Security Centre) to which it is adding Active Virus Shield as a software download. Free products including personalised email domains, video and search, as well as an update of its AOL software, are promised over coming weeks.

Please post your comments on this anti virus if you have already used it. I feel its really good next to AVG free antivirus.

Thursday, October 12, 2006

Nokia's "full surface screen" cellphone concept - Just amazing!!

Came across this mobile(?!!) in Nokia R&D centre.



Nokia's research and development team have brought up an attractive "Full Surface Screen" concept phone currently in their R&D centre. The most prominent design feature of this is a touchscreen that stretches over the full surface area of the phone.It may take some more time to be in market.Very trendy,smart,sleek and happy to be on hand kind of mobile.

PS:Not yet in market(am also waiting just like you people!!)

*************************************************************************************

Use TransSend to wirelessly transfer content from a web browser to your mobile device


Read this amazing article from ZDNet. Very useful for Mobile users with bluetooth.
From the article:( Also see OFFICIAL SITE OF TransSend)
The Bluetooth Special Interest Group (SIG) issued a press release announcing its new TransSend client/server application that allows you to receive content via Bluetooth from the internet.
This seems to be an excellent way to get maps, addresses, phone numbers, images, and other content to your mobile device when surfing the net on your PC. It isn't designed to tranfer large documents or content tho'.
TransSend works by having the user initiate the transfer on the PC by right clicking or by click on a TransSend icon next to the content. TransSend uses the Object Push Profile (OPP) to send content from Windows XP and 2000 computers with Internet Explorer and Bluetooth radio. Mac and Linux support is currently not available, but is under consideration.

TransSend System Requirements:

The system requirements for using TransSend are modest. To use TransSend, you need the following:

1) A Bluetooth enabled PC with
a) Windows XP
+ Using one of the following Bluetooth software stacks:
# Broadcom/Widcomm (4.0 or higher)
# Microsoft
# Toshiba (version 3.20 or greater)
-- OR --
b) Windows 2000
+ Using one of the following Bluetooth software stacks:
+ Broadcom/Widcomm (4.0 or higher)
+ Toshiba (version 3.20 or greater)
c) Microsoft Internet Explorer 5.5 or higher
2) A Bluetooth enabled device that supports the:
a) Bluetooth Object Push Profile

See the oficial site linked above to know more about the product and how to register and download/install the software required.

Change in Earth's orbit linked to Mammal extinctions - A study

CLICK ON THE PIC TO SEE BETTER VIEW




A group of Dutch Scientists have recently released a study stating that they have found that changes in Earth's orbit around the sun are link linked to mammal extinctions.
They studied rodent fossil records in central Spain dating back 22 million years and found that the rise and fall of mammal species was linked to changes in the Earth's behavior which caused cooling periods.

From the article:

Wobbles or variations in the Earth's orbit and tilt are associated with extinctions of rodent and mammalian species, Dutch scientists said on Wednesday.

They studied rodent fossil records in central Spain dating back 22 million years and found that the rise and fall of mammal species was linked to changes in the Earth's behavior which caused cooling periods.

"Extinctions in rodent species occur in pulses which are spaced by intervals controlled by astronomical variations and their effects on climate change," Dr Jan van Dam, of the Utrecht University in the Netherlands, said.
The researchers found two cycles corresponding to the disappearance of rodent species. One lasts 2.4 million years and is linked to variations in the Earth's orbit. The other is a 1.2 million year cycle relating to shifts in the tilt on the Earth on its axis.

The cycles are associated with lower temperatures, changes in precipitation, habitats, vegetation and food availability which are the main factors influencing the extinction peaks, the study published in the journal Nature said.

"Rodents are very sensitive to seasonal changes because they have such a short lifespan," said Van Dam, adding that they represent one of the best mammal fossil records.

At the moment, the Earth is at the beginning of a cycle but the planet's climate system has changed so much in the past 3 million years that it is difficult to predict what will happen in the future.

"The environment is responsible to what happens to species," said Van Dam. "Biological factors are secondary, according to our results."

Wednesday, October 11, 2006

9 Biggest Robberies of world - 20th Century and later

This is a list of 9 greatest robberies. List includes only robberies in 2oth century to date.

Dunbar Armored (1997): inside man steals US$18.9 million

The Dunbar Armored robbery is the largest cash robbery to have occurred in the United States. It occurred in 1997 at the Dunbar Armored facility in Los Angeles, California. The thieves made off with some 18.9 million U.S. Dollars.

The robbery was masterminded by Allen Pace, who worked for Dunbar as a regional safety inspector. While on the job, Pace had time to photograph and examine the company's Los Angeles armored car depot. He recruited five of his childhood friends, and on the night of Friday, September 13, 1997, Pace used his keys to gain admittance to the facility. Pace had timed the security cameras and determined how they could be avoided. Once inside, they waited within the staff cafeteria, ambushing the guards one by one. Pace knew that on Friday nights the vault was open due to the large quantities of money being moved. Rushing the vault guards, the robbers managed to subdue them before they could signal any alarms. In half an hour, the robbers had loaded millions of dollars into a waiting U-Haul. Pace knew exactly which bags contained the highest denomination and non-sequential bills. He also knew where the recording devices for the security cameras were located and took these.

The police immediately realized it was an inside job and closely examined Pace, but could find nothing. The gang worked hard to conceal their new wealth, laundering it through property deals and phony businesses. Eventually, one of the gang members, Eugene Lamar Hill, erred when he gave an unknowing associate a stack of bills still wrapped with the original cash straps. The associate went to the police and Hill was arrested. Hill soon confessed and named his associates. Allen Pace was arrested and sentenced to twenty-four years in jail. Only a fraction of the money was ever recovered. Some $10 million is still unaccounted for.


************************************************************************************

Northern Bank (2004): bank officials threatened to help steal US$50 million

The Northern Bank robbery was a large robbery of cash from the headquarters of the Northern Bank in Belfast, Northern Ireland. Carried out by a large, proficient group on 20 December 2004, the gang seized £26.5 million in pounds sterling, making it one of the biggest bank robberies in British history. The police and the British and Irish governments claimed the Provisional IRA was responsible (or had permitted others to undertake the raid), a claim vehemently denied by the Provisional IRA itself and the Sinn Féin political party. The robbery, and the allegations and counter-allegations surrounding it, threw the Northern Ireland peace process into crisis.

On the night of Sunday December 19, 2004 groups of armed men called at the homes of two officials of the Northern Bank, one in Downpatrick in County Down, the other in Poleglass, near Belfast. Masquerading as police officers, they entered the homes and held the officials and their families at gunpoint. Bank official Chris Ward was taken from Poleglass to Downpatrick, the home of his supervisor Kevin McMullan, while gunmen remained at his home with his family. Subsequently Mr McMullan's wife was taken from their home and held, also at gunpoint, at an unknown location. The following day both officials were instructed to report for work at the bank's headquarters at Belfast's Donegall Square West as normal. They did so, and remained at work after the close of business, and later in the evening they gave admittance to other members of the gang.

The robbers entered the bank's cash handling and storage facility. This held an unusually large amount of cash, in preparation for distribution to ATMs for the busy Christmas shopping season. Cash was transferred to one or several vehicles (possibly including a white "Luton" van) at the premises' Wellington Street entrance, and the gang fled. Shortly before midnight the gang holding the Ward family left, and those holding Mrs McMullan released her in a forest near Ballynahinch.

The haul included £10m of uncirculated Northern Bank sterling banknotes, £5.5m of used Northern Bank sterling notes, £4.5m of circulated sterling notes issued by other banks, and small amounts of other currencies, largely Euros and U.S. Dollars.


************************************************************************************

Central Bank of Iraq (2003): Saddam took US$1 billion a day before the war

In March 2003, on several occasions beginning on March 18, the day before the United States began bombing Baghdad, nearly US$1 billion was stolen from the Central Bank of Iraq. This is considered the largest bank heist in history.

Approximately $650 million was later found hidden in walls in Saddam Hussein's palace by US troops. It is believed that this was the bulk of the stolen money. The remaining money is currently unaccounted for. Diyaa Habib al-Khayoun, general manager of the state-owned al-Rafidain Bank, claims that $250 million and 18 billion now worthless Iraqi dinars were also stolen, but by professional robbers unconnected to Saddam.

In March 2003, a hand-written note surfaced, signed by Saddam, ordering $920 million to be withdrawn and given to his son Qusay. Bank officials state that Qusay and another unidentified man oversaw the cash, boxes of $100 bills, being loaded into trucks during a five hour operation. Qusay was later killed by US troops in a firefight.



************************************************************************************

Kent Securitas Depot (2006): abducted the manager, then stole USD$92.5 million

The Securitas depot robbery was a robbery which took place in the early hours of 22 February 2006, between 01:00 and 02:15 UTC in England, an operation that succeeded in stealing the largest cash amount in British crime history. At least six men abducted and threatened the family of the manager, tied up fourteen staff members and stole £53,116,760 (about US$92.5 million or €78 million) in bank notes from a Securitas Cash Management Ltd depot in Vale Road, Tonbridge, Kent.

The manager of the depot, Colin Dixon, was abducted at about 18:30 on 21 February, apparently while driving his Nissan Almera to his home in Herne Bay. He was pulled over on the A249 just outside Stockbury, a village North East of Maidstone, by what he thought was an unmarked police vehicle due to the blue lights behind the front grill. A man approached him in high-visibility clothing and a police-style hat. The manager proceeded to get into the police imposter's car, thinking that he was a police officer, where he was then handcuffed by others in the vehicle. He was then driven west on the M20 motorway to the West Malling bypass where he was bound further, transferred into a white van and transported to a farm in an unknown location in west Kent.

As this was taking place, the manager's wife and eight-year-old son were being held hostage at their home in Herne Bay, after they answered the door to men dressed in police uniforms, who falsely informed them that the manager had been involved in a road traffic accident. They were then driven to the farm at which the manager was being held, where he was told at gunpoint that failure to cooperate could put him and his family in danger.

The depot manager, his wife and son were taken to the Securitas depot in Tonbridge at around 01:00, travelling in a plain white van, being held at gunpoint. At the depot, 14 members of staff were bound by robbers, armed with handguns and wearing balaclavas.

The heist came to an end at approximately 02:15, although it was still another hour before staff members, who had been tied up, managed to raise the alarm. Police officers arriving on the scene discovered staff, the manager and his family, bound but physically unharmed.



************************************************************************************


Boston Museum (1990): dressed as police officers, stole US$300 million worth in paintings

Hours after St. Patrick's Day festivities wrapped up in Boston on March 18, 1990, two men dressed as police officers knocked on the security entrance side door of the Isabella Stewart Gardner Museum at 1:24 a.m. "The policy has always been that you don't open that door in the middle of the night for God. Why on this one night they opened the door no one can explain," Lyle Grindle, the museum's current head of security, told Access Control & Security Systems, a security industry trade publication. Grindle was not in charge of security at the time of the 1990 heist. Just minutes after letting them in, the guards quickly learned that the late night visitors weren't real cops. Though they apparently did not brandish any weapons, the intruders managed to overpower the two guards. They handcuffed the guards, bound them with duct tape and left them in the basement.

In the fewer than 90 minutes that followed, the bandits went through the museum's Dutch Room on the second floor and stole three Rembrandts, including the Dutch artist's only seascape, "Storm on the Sea of Galilee." It was one of several works the thieves savagely cut to release it from its frame, leaving ragged edges of the canvas behind in otherwise empty frames, which continue to hang in the museum to this day. Also taken from that room was "The Concert" by Vermeer, as well as a Chinese bronze beaker located near the Rembrandt. The thieves also apparently tried to steal a fourth Rembrandt but were unsuccessful. Nearby, they also made off with "Landscape with an Obelisk," an oil painting by Govaert Flinck that was until recently attributed to Rembrandt, Flinck's mentor. On the other side of the floor, the thieves went into the Short Gallery and ripped five Degas sketches from the wall. Feet away a bronze eagle that adorned the top of a Napoleonic flag was also pillaged. A Manet portrait, located in the museum's Blue Room on the first floor, capped off the list of works the thieves stole.

It is not known in what order the rooms were ransacked, since the thieves ripped out the surveillance tape before fleeing the museum with it. To this day, the small museum isn't able to collect insurance, since it carried no insurance policy at the time of the heist.



************************************************************************************

Knightsbridge Security Deposit (1987): requested to rent a safe deposit box, then subdued the manager and stole US$111 million

The Knightsbridge Security Deposit robbery took place on 12 July 1987 in Knightsbridge, England, part of the City of Westminster in London. Two men entered the Knightsbridge Safe Deposit Centre and requested to rent a Safe deposit box. After being shown into the vault, they produced hand guns and subdued the manager and security guards.

The thieves then hung a sign on the street level door explaining that the Safe Deposit Centre was temporarily closed, whilst letting in further accomplices. They broke open many of the safe deposit boxes and left with a hoard estimated to be worth £40 million (equivalent to roughly US$66 million at the 1987 exchange rate; the inflation-adjusted value would be £63.6 million --$111 million-- as of 2005).

One hour after the robbers departed, one of the guards managed to escape his handcuffs to raise the alarm. Police forensic investigators at the crime scene recovered a fingerprint that was traced to the Italian Valerio Viccei. After a period of surveillance, Viccei and several of his accomplices were arrested during a series of coordinated raids on 12 August 1987 and later convicted of the crime. Viccei would later published a book on the robbery.


************************************************************************************

Great Train Robbery (1963): stole US$74 million without guns

The Great Train Robbery was the name given to a £2.3 million train robbery committed on 8 August 1963 at Bridego Railway Bridge, Ledburn near Mentmore in Buckinghamshire, England.

The Royal Mail's Glasgow to London travelling post office (TPO) train was stopped by tampered signals. A 15-member gang, led by Bruce Reynolds and including Ronnie Biggs, Charlie Wilson, Jimmy Hussey, John Wheater, Brian Field, Jimmy White, Tommy Wisbey, Gordon Goody and Buster Edwards, stole £2.3 million in used £1, £5 and £10 notes — the equivalent of £40 million (US $74 million) in 2006.

Although no guns were used in the robbery, the train driver, Jack Mills, was hit on the head with an iron bar, causing a black eye and facial bruising. The assailant was one of three members of the gang never to be arrested or identified. Frank Williams (at the time a Detective Inspector) claims to have traced the man, but he could not be charged because of lack of evidence. Mills recovered fully from the attack and died in 1970 from leukemia.

Thirteen of the gang members were caught after police discovered their fingerprints at their hideout at Leatherslade Farm, near Oakley, Buckinghamshire. The robbers were tried, sentenced and imprisoned. Ronnie Biggs escaped from prison 15 months into his sentence, settling in Melbourne Australia, and later moving to Rio de Janeiro, Brazil, when police found out his Melbourne address. Charlie Wilson escaped and was living outside Montreal, Canada on Rigaud Mountain. In the upper-middle-class neighbourhood where the large, secluded properties are surrounded by trees, Wilson was just another resident who enjoyed his privacy. Only when his wife made the mistake of telephoning his parents in England was Scotland Yard able to track him down.



************************************************************************************

Banco Central in Brazil (2005): tunneled 255 feet up to the bank, then stole US$69.8 million

On the weekend of August 6 and August 7, 2005 a gang of burglars, suspected to be either the Gang of the Tattooed or Primeiro Comando da Capital, tunneled into the Banco Central in Fortaleza. They removed five containers of 50-real notes, with an estimated value of 164,755,150 reais (US$69.8 million, £38.6 million, €56 million). The money was uninsured; a bank spokeswoman stated that the risks were too small to justify the insurance premiums. The burglars managed to evade or disable the bank's internal alarms and sensors; the burglary remained undiscovered until the bank opened for business on the morning of Monday, August 8.

The Banco Central is a national banking institution charged with control of the money supply. The money in the vault was being examined to see if it should be recirculated or destroyed. The bills were not numbered sequentially, making them almost impossible to trace.

Three months earlier, the gang of burglars had rented an empty property in the centre of the city and then tunneled 78 meters (255 ft) beneath two city blocks to a position beneath the bank. The gang had renovated a house and put up a sign indicating it was a landscaping company selling both natural and artificial grass as well as plants. Neighbours, who estimated that the gang consisted of between six and ten men, described how they had seen van-loads of soil being removed daily, but understood this to be a normal activity of the business. The tunnel, being roughly 70 cm (2.3 ft) square and running 4 meters (13 ft) beneath the surface, was well-constructed: it was lined with wood and plastic and had its own lighting and air conditioning systems.

On the final weekend, the gang broke through 1.1 meters (3.6 ft) of steel-reinforced concrete to enter the bank vault. The bank notes weighed approximately 3,500 kg (approx. 7,700 lbs) and would have required a considerable amount of time and effort to remove.

On October 22 the body of the suspected mastermind, Luis Fernando Ribeiro, 26, was found 9 October on an isolated road near Camanducaia, 200 miles (320 km) west of Rio de Janeiro. He had been shot seven times and had marks on his wrists as if he had been handcuffed. Five men were arrested September 28 with about $5.4 million of the money and told the police they had helped dig the tunnel. So far, authorities have recovered more than $7 million but $63 million remains unaccounted for.


************************************************************************************

Brinks Mat warehouse (1983): broke into warehouse to find ten tonnes of gold bullion worth US$45 million

The Brinks Mat Robbery occurred on 26 November 1983 when six robbers broke into the Brinks Mat warehouse at Heathrow Airport, England. The robbers thought they were going to steal £3 million in cash; however when they arrived they found ten tonnes of gold bullion (worth £26 million). The gang got into the warehouse thanks to security guard Anthony Black, who was the brother-in-law of the raid's architect Brian Robinson. Scotland Yard quickly discovered the family connection and Black confessed to aiding and abetting the raiders, providing them with a key to the main door and giving them details of security measures. Tried at the Old Bailey, Robinson and gang leader Michael McAvoy were each sentenced to 25 years imprisonment for armed robbery. Black got six years, and served three.

Prior to his conviction McAvoy had entrusted part of his share to an associate John Perry. Perry recruited Kenneth Noye (who had links with a legitimate gold dealer in Bristol) to dispose of the gold. Noye melted down the bullion and recast it for sale. However the sudden movements of large amounts of money through a Bristol bank came to the notice of the Treasury who informed the police. Noye was placed under police surveillance and in January 1985 killed an officer he discovered in his garden. At the resulting trial the jury found him not guilty on the grounds of self-defence. In 1986 Noye was found guilty of conspiracy to handle the Brinks Mat gold, fined £700,000 and sentenced to 14 years in prison.


************************************************************************************

Seinfelds 30 best comments - Must read



THE BEST COMEDY EVER AIRED!!!!

· That's the true spirit of Christmas; people being helped by people other than me

· There's very little advice in men's magazines, because men don't think there's a lot they don't know. Women do. Women want to learn. Men think, "I know what I'm doing, just show me somebody naked."

· According to most studies, people's number one fear is public speaking. Number two is death. Death is number two. Does that sound right? This means to the average person, if you go to a funeral, you're better off in the casket than doing the eulogy.

· Sometimes the road less traveled is less traveled for a reason

· The Swiss have an interesting army. Five hundred years without a war. Pretty impressive. Also pretty lucky for them. Ever see that little Swiss Army knife they have to fight with? Not much of a weapon there. Corkscrews. Bottle openers. "Come on, buddy, let's go. You get past me, the guy in back of me, he's got a spoon. Back off. I've got the toe clippers right here."

· Why do people give each other flowers? To celebrate various important occasions, they're killing living creatures? Why restrict it to plants? "Sweetheart, let's make up. Have this deceased squirrel."

· The idea behind the tuxedo is the woman's point of view that men are all the same; so we might as well dress them that way. That's why a wedding is like the joining together of a beautiful, glowing bride and some guy. The tuxedo is a wedding safety device, created by women because they know that men are undependable. So in case the groom chickens out, everybody just takes one step over, and she marries the next guy.

· My parents didn't want to move to Florida, but they turned sixty, and that's the law.

· I will never understand why they cook on TV. I can't smell it. Can't eat it. Can't taste it. The end of the show they hold it up to the camera, "Well, here it is. You can't have any. Thanks for watching. Goodbye."

· Somebody just gave me a shower radio. Thanks a lot. Do you really want music in the shower? I guess there's no better place to dance than a slick surface next to a glass door.

· See, the thing of it is, there's a lot of ugly people out there walking around but they don't know they're ugly because nobody actually tells them.

· Why do they call it a "building"? It looks like they're finished. Why isn't it a "built"?

· I was the best man at the wedding. If I'm the best man, why is she marrying him?

· It's amazing that the amount of news that happens in the world every day always just exactly fits the newspaper.

· What is a date really, but a job interview that lasts all night? The only difference is that in not many job interviews is there a chance you’ll wind up naked.

· You know you're getting old when you get that one candle on the cake. It's like, "See if you can blow this out."

· Men want the same thing from their underwear that they want from women: a little bit of support, and a little bit of freedom.

· What would the world be like if people said whatever they were thinking, all the time, whenever it came to them? How long would a blind date last? About 13 seconds, I think. "Oh, sorry, your rear end is too big." "That's ok, your breath stinks anyway. See you later."

· You know what I never get with the limo? The tinted windows. Is that so people don't see you? Yeah, what a better way not to have people notice you than taking a thirty foot Cadillac with a TV antenna and a uniformed driver. How discreet. Nobody cares who's in the limo. You see a limo go by, you know it's either some rich jerk or fifty prom kids with $1.75 each.

· You can measure distance by time. "How far away is it?" "Oh about 20 minutes." But it doesn't work the other way. "When do you get off work?" "Around 3 miles."


· Are there keys to a plane? Maybe that's what those delays are sometimes, when you're just sitting there at the gate. Maybe the pilot sits up there in the cockpit going, "Oh, I don't believe this. Dammit..I did it again." They tell you it's something mechanical because they don't want to come on the P.A. system, "Ladies and gentlemen, we're going to be delayed here on the ground for a while. I uh..Oh, God this is so embarrassing...I, I left the keys to the plane in my apartment. They're in this big ashtray by the front door. I'm sorry, I'll run back and get them."

· I once had a leather jacket that got ruined in the rain. Why does moisture ruin leather? Aren't cows outside a lot of the time? When it's raining, do cows go up to the farmhouse, "Let us in! We're all wearing leather! Open the door! We're going to ruin the whole outfit here!"

· Dogs are the leaders of the planet. If you see two life forms, one of them's making a poop, the other one's carrying it for him, who would you assume is in charge.

· Now they show you how detergents take out bloodstains, a pretty violent image there. I think if you've got a T-shirt with a bloodstain all over it, maybe laundry isn't your biggest problem.Maybe you should get rid of the body before you do the wash.

· People who read the tabloids deserve to be lied to

· Seems to me the basic conflict between men and women, sexually, is that men are like firemen. To men, sex is an emergency, and no matter what we're doing we can be ready in two minutes. Women, on the other hand, are like fire. They're very exciting, but the conditions have to be exactly right for it to occur.

· The big advantage of a book is it's very easy to rewind. Close it and you're right back at the beginning.

· I have a friend who’s collecting unemployment insurance. This guy has never worked so hard in his life as he has to keep this thing going. He’s down there every week, waiting on the lines and getting interviewed and making up all these lies about looking for jobs. If they had any idea of the effort and energy that he is expending to avoid work, I’m sure they’d give him a raise.

· To me, a lawyer is basically the person that knows the rules of the country. We're all throwing the dice, playing the game, moving our pieces around the board, but if there is a problem the lawyer is the only person who has read the inside of the top of the box.

· Men don't care what's on TV. They only care what else is on TV.

Top Ten Geek Wallets - just have a look!!!

Just have a look at these Wallets.Some are funny and some are really too good.

Productdose.com has a rundown of the the top ten wallets for geeks.The list includes an RFID blocking wallet, a DIY illuminating wallet and more.

Access the whole list here...

Some other picks of mine are below:

Google Purchases YouTube for $1.65Billion in stock

Google's stock rose about $10 per share after the purchase. On the other hand, YouTube increases Google's risk of copyright infringement, opening the door for significant liability...if Google cannot solve this issue

Read the full article here..

Also read this from another article on same topic:

"YouTube's policy is to remove copyrighted clips once alerted to their existence. Content providers say the company needs to be even more proactive ... Todd Dagres, general partner at Boston's Spark Capital, says that Google's large market cap of $130 billion makes it much more vulnerable to lawsuits than a private company such as YouTube. 'Once Google starts to apply its monetization machine, there is going to be more money at stake and people are going to go after it,.You cannot monetize other people's content without their approval.'"

AMD Unveils Barcelona Quad-Core Details

At Microprocessor Forum, AMD's media person Ben Sander laid out architecture details of the CPU maker's upcoming quad-core Opterons. The processors will feature sped-up floating-point operations, improvements to IPC, more memory bandwidth, and improved power management.AMD claims that its quad core is true quad core, while Intel's is two dual-cores grafted together.

Read more here...

Thursday, October 05, 2006

Illegal Vista OS to become crippled after 30 days

Unlike previous Windows OS,Vista is loaded with inbuilt abilities to stop piracy to some extent!!
HAHAHA...waiting when somebody hacks this feature itself and MS starts distributing patches every month!!!hehe
Anyway read the full article here

In summary the main features are:

  • Reduced Functionality Mode: this allows minimal use of the OS until it is validated. Microsoft has not disclosed full technical details, but they have indicated that the web browser (presumably IE) will work for about an hour before interrupting the session and forcing you to log off. Additional limitations are described below.
  • Buy a key online: Go online, buy a new key, and you're done.
  • Phone in for activation: instructions on how to activate over the phone rather than the Internet. (i really dont know who uses this feature now!!)
  • Enter your key : Yada yada yada!!!
In short, unless you input a legit key, or purchase one after 30 days of using the Operative System it will "lock down" it's best functionalities.

However, even if your key is identified as legit, Microsoft will continue to monitor your machine permanently, and if your key becomes invalid, or your system is identified as illegal you will receive a warning and it will lock down in 30 days from there onward.

Microsoft knows that this won't stop piracy completely, but at least they have a more realistic goal this time.

The company says it is interested in continuing to build tools that make it difficult and inconvenience to be a pirate.


Ajay

Making Computer Memory From a Virus

By coating 30-nanometre-long chunks of tobacco mosaic virus with platinum nanoparticles, it’s possible to create a transistor with very fast switching speed. Millions of these transistors could eventually be used in a memory chip to replace flash memory in mp3 players and digital cameras, for example....Read more here

First Teleportation Between Light and Matter

Beaming people in Star Trek fashion is still in the realms of science fiction but physicists in Denmark have teleported information from light to matter bringing quantum communication and computing closer to reality....Read more here
Also more info here too

Before reading it go through the below links to make sense what you are reading..
Quantum teleportation does not transport energy or matter, nor does it allow communication of information at superluminal speed.This is about the next generation of technology that may someday replace optic fibre for long-distance communication links.
Quantum_teleportation [wikipedia.org]

Also watch this video

Quantum teleportation does not transport energy or matter, nor does it allow communication of information at superluminal speed.This is about the next generation of technology that may someday replace optic fibre for long-distance communication links.

Put simply you can record the quantum states of an atom/particle(or your entire body) and then send this information using a classical channel like radio. Once this information gets to your destination(eg Mars) the guys at that end can use that information to affect some particles over there, and because of Quantum Entanglement, those particles on Mars will instantly take on the recorded state. The particles at the start will then lose their state due to the no cloning therom.[wikipedia] So you can teleport, but you can't teleport at greater than the speed of light because you still have to send the data to the destination.

Note that it's not technically "Teleportation", you are just changing the states at the quantum level.


This process allows you to copy quantum information from one set of atoms to another without measuring it, and thereby destroying it.

It's still isn't anywhere near dematerializing the matter and poof`ing it across the room/planet. However, what is happening is the quantum information (in this case, the spin state) of the matter has been instantly transported. That is a essential step in building a quantum computer or cryptography network.

This is not 'traditional' teleportation -It works at the speed of light, there's nothing strange going on here, although it is related to what you might have heard referred to as 'spooky action at a distance' With quantum teleportation you aren't teleporting a THING, you're teleporting a property of that thing without actually measuring that property. Sounds crazy but here's an example: suppose you have two helium atoms and using light you are somehow able to give the second atom the momentum and spin of the first atom but in the process you change the momentum/spin of the first atom. You've basically changed the second atom to be exactly like the first but they call that teleportation. And effectively it is. The reason its so nifty is you don't have to measure or know these properties to transfer them. Thats the quantum part of quantum teleportation. Beyond that, I have no clue how they're applying a property of light to an atom.

Wednesday, October 04, 2006

Some old GOOGLE HaCkS

Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find:
Credit Card Numbers
Passwords
Software / MP3's
...... (and on and on and on)
Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.

Try a few of these searches:

intitle:"Index of" passwords modified
allinurl:auth_user_file.txt
"access denied for user" "using password"
"A syntax error has occurred" filetype:ihtml
allinurl: admin mdb
"ORA-00921: unexpected end of SQL command"
inurl:passlist.txt
"Index of /backup"
"Chatologica MetaSearch" "stack tracking:"

Amex Numbers: 300000000000000..399999999999999
MC Numbers: 5178000000000000..5178999999999999
visa 4356000000000000..4356999999999999

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

METHOD 2

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.

Example: ?intitle:index.of? mp3 jackson

METHOD 3

put this string in google search:

inurl:microsoft filetype:iso

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

"# -FrontPage-" inurl:service.pwd
Frontpage passwords.. very nice clean search results listing !!

"AutoCreate=TRUE password=*"
This searches the password for "Website Accesss Analyzer", a Japanese software that creates webstatistics. For those who can read Japanese, check out the author's site at: http://www.coara.or.jp/~passy/

"http://*:*@www" domainname
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net

"http://*:*@www" bangbus or "http://*:*@www"bangbus

Another way is by just typing
"http://bob:bob@www"

"sets mode: +k"
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

allinurl: admin mdb

Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are!

allinurl:auth_user_file.txt
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)


intitle:"Index of" config.php
This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.

eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.

intitle:index.of.etc
This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!

filetype:bak inurl:"htaccess|passwd|shadow|htusers"
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.

Let's pretend you need a serial number for windows xp pro.

In the google search bar type in just like this - "Windows XP Professional" 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.

or if you want to find the serial for winzip 8.1 - "Winzip 8.1" 94FBR

List of Portable software programs that can be run on USB

Here is the list of portable applications,software programs including web browsers,email clients,download managers,IRC clients,P2P clients,word processors and many others useful stuffs that can be run on a USB flash drive.

A definite bookmark which comes in handy.

Bookmark this [wikipedia.org]

Also see this :
List from programurl.com

List from Darlvelvet.com

How would future gyms work/look like ? - An Idea

This is an interesting idea I found on net.


The difference here is that the machines would all be linked to a large central generator, so if you are really working out you will be generating much more energy than is needed to power the machine display.
The swipe cards would monitor how much time you spent on each machine then - depending on the efficiency of the machine - calculate whether you were a net user or contributor of energy to the building. At the end of the year, people get a rebate on their membership depending on how much energy their use of the treadmills and cardio machines has generated for the gym.