Tuesday, July 14, 2009
PC IN A FLOWER VASE : ECS's MING VASE
Saturday, July 11, 2009
EYE-FI : GETs YOUR CLICK UPLOADED
Friday, July 10, 2009
E-WASTE : DEPOSIT & GET PAID
Tele: 022 26510708/26510687.
M- 09833175486.
Contact Person: Mr. Abhishek.
Logix Express
8908/2 Multani Dnada. Opp. Rangoli Guest House.
Pahargung. 110055.
Tele: 011 32617289.
M- 09999796936.
Contact Person: Mr. Govind.
(e) AHMEDABAD
Logix Express
Block No. 71 to 76, Sagar Estate Part 3.
Opp. Ekta Hotel. Sarkhej Bavala Road.
Sarkhej- Ahmedabad. 380210.
Contact Person: Govind.
Tele: 079 26890419.
M- 09979865961.
(f) HYDERABAD
Logix Express
C/o Fast Freight Courier
1-10-9/3, Airport Road, Opp. IBP Petrol Bunk,
Begumpet, Hyderabad-500016.
Contact Person : Mr. Anil Reddy
M- 9848017335
(g) CHENNAI
Logix Express
13/Devsigamani Street.
Chulaimedu.
Chennai.94.
Contact Person: Mr. Silverraj.
M- 09841418946.
(h) BANGALORE
Logix Express
C/o Ever Green Logistics
6, 4th Cross, 5th Main,
S R Nagar, Bangalore-560027.
Contact Person : Mr. Ravi
M- 09845836058.
(i) PUNE
Logix Express
Survey no 755, Kalpana warehouse.
Opp. Hotel Ram kamal, Pune Nagar Road.
Katkewadi, Wagholi, Dist. Haveli
Pune-412207.
Contact Person: Mr. Raja Ram.
M- 09850604994/09730073535.
(j) SURAT
Logix Express
Ground Floor, Swagat Complex.
Kadodara Chokdi.
Surat.
Contact Person: Jayendra.
M- 9979865968.
6. GOOD WORK...SO FREE PUBLICITY!!
Wednesday, July 08, 2009
KYPS : HELPS AVOID BEING VULNERABLE!!
Monday, July 06, 2009
AMD : The Launch of ISTANBUL
Saturday, July 04, 2009
USB DHAMAAAL!!!
- Works w/ Soft Drinks, Coffee, Tea, and More
- High Efficiency - Works in Just a Few Minutes after Plugging into USB Port
- Draws Power Directly from USB Interface
- Plug and Play (No Driver Required)
- On Board Button to Switch from Warm to Chill
- Weight : 440 gm
- USB Cable length : 1.1 m
Friday, July 03, 2009
Check your ANTIVIRUS'es Loyalty : EICAR Way
2. Now this was able to provide me a real cool trick that of testing the reliability of the antivirus being run. I tested the same on two computers. One with a antivirus loaded and the other one badly infected. I will now share the cream instead of minting words.
3. It is just a matter of simple cut & paste.Just do the following steps and the matter of how reliable your antivirus is will be taken care of.
5. That’s it!!!!!So simple.So my infected computer was able to save the same and the F - secured one caught the moment I tried saving it and deleted it too!!!!!!!!Screen shot in set
6. Thanks EICAR and http://www.technotips24x7.co.cc/
Sunday, June 28, 2009
UNIQUE IDENTIFICATION PROJECT : UID
1. We all know how the launch of PAN Cards and Voter ID Cards in the initial period say about 7-8 years or may be slimly earlier created discombobulation amongst the aam janta. Photos clicked, Data base created and then all got inter amalgamated and I got somebody else's pan card with a different pic and altogether different address with the age of my grandfather endorsed in BOLD.The thing and the vision seems to have ameliorated today.
2. Now on top of this Sarkaar plans to make a Unique Identity Card.Since the sarkaar never wanted to take a chance this time ,the onus of the culmination of the project has been given to INFOSYS and the over all coordinator is none other then Mr Nandan Nilekani,the co chairman of infosys.
3. The UID (Unique Identity) project is one of the most aspirational projects of the UPA government. The UID programme will provide an identity card to every citizen to establish citizenship and address security concerns.
8. This proposal that took almost a decade to become a project. And now the government is reportedly looking at a three-year term to complete the entire programme. I am slightly positive about this deadline being met as the project is in the hands of INFOSYS.
9. Info from http://infotech.indiatimes.com and http://www.ciol.com
Saturday, June 27, 2009
NOW CHIP IN BATHING SOAP!!!!
Friday, June 26, 2009
Are you secure at your friendly neighbourhood CYBER CAFE ?
2. PORTABLE WEB BROWSER : A portable web browser as the name suggests would be able to allow you to take bookmarks and passwords with you while not writing any information on the host computer. This allows to bypass key loggers who would be expecting that all that you type would be logged in one separate file unknown to the user. So this feature of the portable browser would allow you to access your accounts without typing and thus preventing from leaking your crucial info. But at the same time you have to be aware that PENDRIVE would be equal to your most precious thing in life….so don’t ever try and attempt loosing it.Mozzilla,Opera have these free softwares ready for download at the click of a button and Chrome is working still!!!!!
3. Another thing about the key logger software’s available in the market, yes they include OPEN SOURCE TYPE ALSO………so all the more vulnerable the user becoming a quarry. Key logger can be of two types :
a. Hardware Type – By using a small chip in the keyboard which makes by passing impossible.As shown in the figure below,we see a normal CPU rear from back and another PC with the malicious chip placed in between the cable.
b. Software Type – Can be activated with the help of a Trojan or with the help of a simple installation.
4. A software based key logger can either keep a record of what is being typed or would be able to take periodic screen shots while the user is using the PC.All this being sent to a remote server without the knowledge of the bechara user.Hai na kamaaal ke baat!!!!!!!!!!
5. VIRTUAL KEYBOARD : Although the endeavor of the cyber cafe PC user should be to ensure that in no circumstance, credit card details should be typed,but if at all it is marta kya na karta wali baat,then use of virtual keyboard should be exploited. This would be available as Start > Accessories > On Screen Keyboard.Although there are ways and means to even break this,but then there would never be a guarantee of sort…after all U R ON THE WEB BHAISAAAB…..every thing is accessible.
6. I would like to mention one more thing here….VIRTUAL KEYBOARDS/ON SCREEN KEYBOARDS are not a guarantee for ensuring safety. There are key loggers which are even configured to log only details from on screen key boards. There is a solution to this also and that is OBFUSCATION.
7. OBFUSCATION : This basically allows key loggers to log a certain combination of keys,while keying in different combination. There are some programs that are targeted at different obfuscation algorithm and thus by pass typing in the meat thing. Obfuscation is actually the deliberate hiding of the software's behavior, is used by malware authors as well as legitimate software developers. They both use code obfuscation techniques to keep curious souls from understanding how their software works and what it is doing to the computer on which it runs.A complex thing in itself but who needs to know that….aaam khao….not to worry of guthli!!!!!!!!!!!How to use it?Pl BING or Google.
8. Another important thing to be ensured is to protect your USB drive from Viruses.The first thing to do when you plug in your USB Drive into a public computer is to identify and disable malicious processes running. Process Explorer is a good utility for doing this.This is actually like windows task manager but with few more good options to work on. A Screen Shot from my lap top shown below.
9. Securely deleting data : Last but not the least…ensure using a good software that ensures that no trace of activity on the used computer is left behind.I recommend using ERASER and Free Commander ……tried and tested……………