Social Icons

Wednesday, March 24, 2010

Consequences of Google's China Exit

1. This is a uncoiled lift from http://www.theatlanticwire.com.I thought worth putting it in here.For original post please click here.

2. The post has shown the following 4 consequences of exit :

(a) Cripples the Work of Chinese Scientists

A Nature News survey of Chinese scientists found that 84 percent of them thought losing access to Google would “somewhat or significantly” hurt their work process. Like their American counterparts, Chinese researchers use Google and Google Scholar to find papers and related information.

“Research without Google would be like life without electricity,” one Chinese scientist toldNature... If events do continue in that direction, truly global enterprises like science could suffer as information becomes harder — even if only moderately — to exchange.

(b)

Puts the Onus on China to Liberate the Internet

Puts the Onus on China to Liberate the Internet

, says Leslie Harris, president of the Center for Democracy and Technology: "[We applaud] Google for following through on its commitment to protect human rights and for its continued effort to enable China's people with unfiltered access to robust sources of information from all over the world. Whether the Chinese people will be able to take advantage of Google search now rests squarely with the Chinese government."

(c) Fully Exposes China's Censorship

Fully Exposes China's Censorship, writes Dan Nosowitz at Fast Company: "Google almostexpects China to block the crap out of the redirect. They'll even be creating a new site to monitor exactly how much of their new services are being forcibly blocked by the Chinese government, updated daily. Google is also showing a little concern about the future of its 600-person sales staff in China, and issuing a bit of a challenge to the Chinese government: if they shut down the redirect to Google HK, Google will have to lay off a percentage of its sales team, as they'll not be needed."

(d) Cleanses Google's Reputation

Cleanses Google's Reputation, cheers Preston Gralla at Computer World: "China will become the world's largest Internet market, and in taking this step, Google is endangering its standing there. True, it only has a relatively small market share at this point, but that would have changed over time, and even a relatively small market share of a large market means a lot of revenue. It's rare that a tech company --- or any company, for that matter --- takes a stand this principled, and Google should be congratulated for it. Other tech companies, notably Apple and Microsoft, should follow suit, although all signs point to them continuing to cooperate with Chinese censors."


GOOGLE finally is OFF from China

1. In my earlier post at this,this and this,the subject matter was under decision making....finally the result is out....Monday night, the cyberspace gargantuan shut its Chinese site and repositioned its search engine services to unexpurgated Hong Kong after two months of confrontation with Beijing over censorship and alleged hacking attacks.

2. The decision has its set of PROs & CONs....this will allow opportunity for others to make an attempt to compete with google which has largely overshadowed the cyber space to a large extent with discussions like one discussed for Data retention policy between Google and Bing.This is going to make China lesser dependent on Google for a large number of things which unknowingly we all have become used to.This will disallow google to retain data as per their existing policies from the complete area of CHINA unlike others who are happily allowing them to retain all data and surfing habits.....now for the CONs....Chinese will not be able to search with the precision they used to(...although will be a temporary phase...they may come up with something better....)...is that the only CON??????I feel it is worth it!!!!!!!!!

3. Indian Sarkaaar....pls let your IT IQ refresh........thanks http://images.smh.com.au and http://www.hindustantimes.com

Monday, March 15, 2010

LIQUID COOLING IS IN - FOR CPUs & GPUs


1. I heard about water cooling concept in servers specific to data centers some years back.With induction of i3 and
continuing high end series, water cooling kits are no more visualization and futuristic components of enthusiast and fancier machines. Now water cooling is all set to reach your desktops.Thus with the execution levels of the core components increasing, keeping the heat levels under control has no more remained as a challenge.

2. The Aquagate Max is the first Enthusiast System Architecture (ESA) simpatico liquid cooling kit which allows some amazing features . With multicontrol connected sensors located all around inside the case the architecturte design eliminates the need to manually check that it works properly.Together with the Cooler Master Cosmos ESA case it allows the advantage of being able to mount the liquid cooling kit inside the system case with no external parts. More from figure below



Thursday, March 11, 2010

OS CARD : For now just an idea sirjeeeeeeee!!!

1. Recently I came across this interesting idea article which introduced me to the OS Card.....yess...the operating system card....read on for some interesting info

(a) The "OS Card" would be inbuilt with a independant operating system that is installed or flashed onto a PCI-E card for computers.

(b) Complete operating system such as Windows/solaris/ubuntu etc would come preloaded one of these cards. Instead of booting and running your OS from your local hard drive, it would run most of the OS from the PCI-E card.

(c) The card would be read only, protecting vital system files from malware such as trojans or viruses. A small number of system files that would require read and write functions would be copied to your local hard drive where they could be modified and read by the card.

2. What would this do? For amateurs it would make installing an operating system much easier. Instead of having to deal with CDs, DVDs and serial numbers a person would simply buy the card and put it in their computer.

3. The best thing to be curbed is that this would be able to put a serious incision in piracy of operating systems. Furthermore, it would free up a considerable amount of space on your hard drive.

4. The OS Card could come with it's own independent CPU and Memory (RAM), which would completely remove the need for an operating system's system requirements. This would most likely speed up all other processes and events being run on the computer now that system processes are now no longer hogging PC resources.As on date some info on related product at http://www.gi-de.com

5. What an idea sirjeeeeeeee@ http://www.creativitypool.com

Sunday, March 07, 2010

Search Web by FACE recognition - Work is ON!!!: ONE ALBUM

1. Microsoft Israel Innovation Labs is currently working on ONEALBUM ,a project under development, that uses face-recognition technology to search for photos

2. "OneAlbum" scans faces that regularly appear in a user's OneAlbum photo collection, then searches his social networks (Facebook,Orkut, Windows Live and others) for more photos of these people. It then automatically finds relevant photos in other albums on the Internet and brings them to the user's album, and shows them side-by-side with his photos. Not only facial recognition, but OneAlbum also involves event-matching technology by analysing the people, dates, colours, and textures in a set of photos and will recognise these photos as being taken in on the same event.

3. Little confusing in the first reading.....what I understood is like one will be able to find a same persons photo when u bing(.. google)....so u put ur photo in the search bar and press enter...there u r......u see all content results of same person.....difficult to believe but....will be available soon in coming years!!!!

Friday, March 05, 2010

The Journey from MB to GB : Pen Drives

1. I bought my first pen drive in the year 2004 at a price of Rs 42oo/- and the capacity was a whoooping 256 MB....yeah that was so high those days.....today i came across a link to Kingston that has recently launched the world’s first 256GB Pen drive.The new pen drive is DataTraveller 300 USB Flash Drive.
2. I know the next thing that comes to mind is what about the cost?......the cost is just Rs 48000/-(i heard this is approx).

Tuesday, February 23, 2010

Intel® Core™ i3 Processor & Server 2003

1. Strange are the ways sometimes when we get troubled by the PC.In an attempt to upgrade one of the PCs to Intel® Core™ i3 Processor,I found a problem I never thought of.

2. Now just to give u a small brief,I have a small office complex with about 15 computers on Server 2003 which was running fine till one day when i just decided to upgrade my server machine to Intel® Core™ i3 Processor.I bought the combo pack of this processor with its motherboard for about 11k,i assembled it and started with the setup of server 2003.....started nicely but this would never install completly in my 'N' number of attempts and would hang halfways.....then i thought like Murphy is acting fine with me and their is some problem with the processor motherboard hardware...so replaced the same pack with a new one..but the problem persisted....i contacted the local dealer,surprised with the problem he himself attempted the same but met with the same end.....

3. I changed my installation CDs ,still met with the same problem...finally I could arrive that there may be some compatibility issue between server 2003 & Intel® Core™ i3 Processor.........and reverted back to core 2 duo,the earlier one.

4. I would request readers to augment their comments, if any, with such a problem being faced anywhere else.

Thursday, February 18, 2010

SVCHOST.EXE vs SCVHOST.EXE

1. Two approximately similar names but with poles apart function and reason to exist.If ever you have tried cleaning or accessing an infected pen drive you must have come across these names in the file names list.I would just try and make the difference clear in brief below.

2. SCVHOST.EXE is a process which is registered as W32/Agobot-S virus. This Trojan allows attackers to access your computer from remote locations, stealing passwords, Internet banking and personal data. This process is a security risk and should be removed from your system.

3. SVCHOST.EXE is located in the System32 folder and is an built-in part of Windows OS. It cannot be stopped or restarted manually. This process manages 32-bit DLLs and other services. At startup, Svchost.exe checks the services portion of the registry and constructs a list of services that it needs to load. Under normal conditions, multiple instances of Svchost.exe will be running simultaneously. Each Svchost.exe session can contain a grouping of services, so that many services can be run depending on how and where Svchost.exe is started. This allows for better control and debugging.

4. I hope this amply makes the difference clear

Wednesday, February 17, 2010

How to avoid an infected USB/PEN Drive?

1. The most common way for a virus to infect a healthy PC is through USB/Flash drives. Common viruses such as 'Ravmon' , 'New Folder.exe', etc spread through USB/flash drives . Invariably, anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Following are a step by step easy to do instruction

(a) A window appears similar to the one shown below…


(b) Don't click on Ok , just choose 'Cancel'.

(c) Open the Command Prompt by typing 'cmd' in the run box.

(d) In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.

(e) This will display a list of the files in the Flash drive or Hardisk. Check whether the following files are there or not

(i) Autorun.inf
(ii) Ravmon.exe
(iii) New Folder.exe
(iv) svchost.exe
(v) Heap41a
(vi) or any other .exe which may be suspicious.

(f) If any of the above files are there, then probably the USB drive is infected.

(g) In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files.

(h) Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with a latest anti-virus program like McAfee or TrendMicro's PCCillin to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the "Autorun.inf" file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections invariably spreads...but not if u take these precautions as mentioned above.

Tuesday, February 16, 2010

Steganography : Hide in a JPEG/BMP

1. Steganography is the art and science of writing hidden messages in such a way that no one,apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity while Cryptography is the practice and study of hiding information.

2. The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion,therefore, whereas cryptography protects the contents of a message,steganography can be said to protect both messages and communicating parties.

3. Just for how it works..i tried one free Steganography software "Invisible Secrets" that allows one to encrypt and hide files in other files (carriers) which are not suspect of encryption (JPG, PNG, BMP).The link I downloaded from can be accessed by clicking here.

4. Now this is a small 1.8 MB software good enough to do the job.The file u see below of golden temple is just not a jpeg,it consists of a text file with a message...the password to access the text file is 12_34....for those of u who r interested to experiment

5. The scope of utility involves provisioning solutions to the following queries of any user across :

(a) Are you afraid that someone else can see your sensitive and secret data stored on your computer ?
(b) Are you afraid that hackers or other people can penetrate your system and find your valuable information ?
(c) Your wife, boss and kids can see what you used the internet for?
(d) You have many passwords in your mind or spread all over your computer and you can't organize them?
(e) You want to send a secure email to your friend or partner and you want nobody to read or to access it?
(f) You want to password protect certain applications to be used only by you? Do you want them not to be visible in the Start Menu, but still have quick access to them?
(g) You want to delete an email or a file but you think someone else can restore it and use it against you ?
(h) You want to combine file encryption with steganography (hide files and folders) to better protect your documents and emails?
(j) You want to hide files on your computer so that nobody finds them?

Monday, February 15, 2010

WEB 2.0 SUICIDE MACHINE

1. An unheard term till now....WEB SUICIDE...what does it connote?


2. We all r slowly becoming addicted to internet for some use or the other...~85% of internet surfing being used for social networking..can u believe that!!!a number of identities on various social networking sites..orkut..facebook..twitter ,myspace,linkedin and the list is getting endless....and most of us are getting into habit of remaining online 24 hours...checking e-mails every 10-15 minutes or even less..frequently scraping to all friends....uploading pics on sites....and some one has realized that by doing so we all are missing on real people....parents,kids,wife and neighbours etc etc...thus has originated the concept of WEB SUICIDE......simply register with this site and u will kill,remove traces of each and every footprint u ever had on these sites....the name of the site is http://www.suicidemachine.org/

3. Extract from site

"Liberate your newbie friends with a Web2.0 suicide! This machine lets you delete all your energy sucking social-networking profiles, kill your fake virtual friends, and completely do away with your Web2.0 alterego. The machine is just a metaphor for the website which moddr_ is hosting; the belly of the beast where the web2.0 suicide scripts are maintained. Our service currently runs with Facebook, Myspace, Twitter and LinkedIn! Commit NOW!"

4. Well to some extent the intent is correct that we r slowly loosing on realizing the importance of physical world,but removing urselg from web.....hmmm!!!!!i m still a long way...how abt you?

Saturday, February 13, 2010

NVIDIA : Optimus technology

1. nVidia has come up with the OPTIMUS TECHNOLOGY for the mobile PCs ie Laptops, Notebooks etc. This technology selects and switches the graphics processor for an application, depending upon the type of application. It automatically swops between an integrated graphics and the discrete graphic card based upon whether the application running needs a brawny 3D chip, or not. This helps the device in offering improved performance in applications when required, while saving on battery by reducing power drain in applications that can do without 3D support.

2. Notebooks with nVidia technology as on date include Asus UL50Vf, N61Jv, N71Jv notebooks.

3. Thanks http://www.thinkdigit.com/

Sunday, February 07, 2010

TRACE INDIA

1. I came across this relatively good Data Base site in which someone has attempted to ensure most of the important things are traced to an area if not the street address.For eg when u enter a mobile number in the search query,u will get to know the city and the state from which the number belongs to or like pincodes of India are traceable to exact area identification or even vehicle numbers are traceable to the city....nice attempt but still looking for more in depth query geneartion...i m sure they are working on it...meanwhile enjoy what they offer now.Few links are given below :









Friday, February 05, 2010

Who's Who? : Terminology world of Portable Computers

1. The have been a pleothra of terms related to small portable computers in form of Laptop, Leaptop, Netbook, Notebook, Smartbook, Tablet,UMPC, Air Book etc all of which represent the segment that mass of the people call or refer to just as Lap Top's.But there exists a difference between all of these.....I have tried to extract out the thin line difference that exists between these all terms :

- Laptop :

Main Purpose : Device that serves either as a desktop replacement or a portable gaming rig.
Characteristics : Large screen,full QWERTY Keyboard.


Main Purpose : Device which is small and light weight device meant basically for internet and the cloud for the people on the move.
Characteristics : Small Size,Light Weight,Long Battery Life.

- Notebook :

Main purpose : Used basically for documents and presentations.
Characteristics : Sleek and Lightweight,large screen

- Smart Book :

Main purpose : Hybrid between smart phone and notebook with range of connectivity options.
Characteristics : Long battery life,Light weight.

- Tablet :

Main Purpose : Is like a digital slate with a full touc hscreen surface and no keyboard.
Characteristics : Basically a large touchscreen

- UMPC :

Main purpose : Stands for Ultra Mobile PC,a tablet with a sliding keyboard.
Characteristic : Low processing power.

- Air Book :

Main purpose : Macintosh AirBook by Apple which is positioned as the ultraportable in Apple's MacBook Family and was introduced at the Macworld Conference & Expo on January 15, 2008.

Characteristic : 13.3-inch glossy LED backlight TFT LCD widescreen display, 1280 x 800 pixel resolution and integrated nVidia GeForce 9400M graphics processor with 256 MB of DDR3 SDRAM shared with main memory

- Leap Top : Just a laptop branded by HCL India it has trademarks for the term leaptop.

2. I actually got confused in these thin boundary differences...but thats the way it is in the market of brands.

3. Thanks DIGIT and Wiki.

Wednesday, February 03, 2010

CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!!

1. The earlier mention on IP Spoofing and the pleothra of options and techniques available for attack,hack,sniff,crashing a network etc are well known for not reaching out to the origin of the person or hacker with the malaecious intention. DARPA (...please google or bing if u wish to know more on DARPA)has finally come out with the ‘Cyber Genome Program’ which will allow any digital artifact either in form of a document, or a piece of malware - to be poked into its very origins.

2. In in principle, it appears that almost any data fished from a relevant network, a computer, a pen drive, someone's phone or whatever is to be studied much as like a human genetic material. The code or document's relationships with other "digital artifacts" will be revealed, perhaps its origins, and other info of interest to a Pentagon admin defending military networks or a military/spook investigator tracing online adversaries.In other words, any code you write, perhaps even any document you create, might one day be traceable back to you - just as your DNA could be if found at a crime scene, and just as it used to be possible to identify radio operators even on encrypted channels by the distinctive "fist" with which they operated their Morse keys. Or something like that, anyway.

3. The concept is a cyber-equivalent of human finger-prints or DNA. The project will thus seek to develop a digital genotype as well as any inferred or observed phenotype in order to determine the identity of such digital artifacts and thus the users who left them behind.

4. DARPA is now looking for technologists to develop and use the cyber-equivalent of DNA to target the people behind cyber attacks. They are looking for geniuses in the fields of Cyber Genetics, Cyber Anthropology and Sociology and Cyber Physiology who can jointly work out the practical solutions to this project.The research involves creating lineage tree for digital artifacts, gaining better understanding of software evolution, and automatic analysis of social relationships between users and malware. Each of these researches will jointly develop the cyber equivalent of fingerprints or DNA.DARPA believes that this can identify the best-of-the-best hackers.

Monday, February 01, 2010

IP Spoofing : Legal Acceptance in India?

1. I have been reading about this term for many years,have known about what it is through various sites,read about types of IP spoofing incl Blind Spoofing,Non blind spoofing etc.One question that started me trying reach out details of this term was "WHY IS IT AVAILABLE?"What is the aim intended in spoofing an IP?Is it solely MALICIOUS?

2. Indian IT Act 2000 followed by amendments ie IIA 2006,IIA 2008 have not mentioned any thing on this surprisingly!!Is it legal to use this for any reason?Recently I tried one third party software for this to check out effectivity of this.As per the option available in this software I configured this to changing IP address every 8 minutes.Then after it started I checked out my IP address from 4 sites including whatismyip.com,whatismyipadress.com etc.And yes!!! one minute I was shown in USA and the other minute I was in Netherland followed by Russia,China etc.If a script kid like me can do this what can a professional person intended with malicious intention can do.

3. Remember the Mumbai Blast episode wherein the email sent to the police were tracked only with the help of IP address.God forbid,he knew of such tricks what would have we tracked out?

4. I will request any reader to just add his views or enlighten me on this!!
Powered By Blogger