THQ broken up........



Oh no! I still remember the only game of THQ which I played for years RAW!!! But now I think I will not get that effective effect when I will play RAW....After having so much loss in financial field THQ has now been broken up into little bits and sold off to gaming publishers around the world. Their assets are in virtual transit, and the publishing brand no longer exists.
The news was delivered to employees by way of a letter from the now former THQ President Jeff Rubin and CEO Brian Farrell.
THQ is no longer a thing.....

0 comments:

Difference......

Here is the difference between a programmer and a hacker......


0 comments:

Google faces legal actions......

Yes....Google is facing legal actions against alleged secret tracking of the internet habits of millions of iPhone users.This is the first time Google has been threatened with a group claim over privacy in the UK
A news stated,"10 million UK iPhone users could have grounds to sue Google after it sidestepped Apple security settings to monitor web habits......."
A Facebook group called Safari Users Against Google's Secret Tracking has vowed to hold Google to account for the tracking. It said: "Google deliberately undermined protections on the Safari browser so that they could track users' internet usage and to provide personally tailored advertising based on the sites previously visited. There was no way to know that Google did this. In fact, they made it clear that they did not do this on the Safari browser."
The legal action comes just months after Google was hit with a $22.5m (£14m) fine in the US over a privacy breach between summer 2011 and spring 2012.

0 comments:

App guide to FaceWash......



A awesome app for being professional.........which is available for desktop only and that to free!!!!
Most Facebook users have embarrassing comments or status updates hidden in the depths of their social network profile — long forgotten but not gone. So why not tidy up a little with the new FaceWash Web app?
Too easy to use ...... you just have to go to the FaceWash website and log in with Facebook Id and password and just clean up all the dirt.
FaceWash is easy to use and the website provides a quick and thorough overview on how to use it in case you have questions before you get started. However, it is important to know, the app remains in Beta stage, so you can expect some minor glitches here and there. Still, the developers plan to continue to roll out improvements over the coming months. Chances are you or someone you know on your Facebook page posted something somewhere you would rather not have to explain to a hiring manager … so why not freshen up your profile?

0 comments:

Awesome animated GIF.....

1.When you are feeling sarcastic.


2.When you are proud of yourself.


3.When you see something that pleases you only.


4.When something deserves a thumb down.


4.When you feel disappointed.


5.When someone needs to mind their own business.


6.When you’re not sure what you just heard


7.When you are getting progressively angrier


8.When You Can’t Decide


9.When Even the Cat is Surprised


10.When You Don’t Want Someone to Say Something




0 comments:

Not one man show............


Yes ......my dear friends E=mcwas not only the work of great scientist Albert Einstein but some more physicist were involved for the discovery of this formula.......
A news paper article says.........
Two American physicists outline the role played by Austrian physicist Friedrich Hasenöhrl in establishing the proportionality between the energy (E) of a quantity of matter with its mass (m) in a cavity filled with radiation. In a paper about to be published in the European Physical Journal H, Stephen Boughn from Haverford College in Pensylvannia and Tony Rothman from Princeton University in New Jersey argue how Hasenöhrl's work, for which he now receives little credit, may have contributed to the famous equation E=mc2.............
For complete news you can follow the website.........http://www.sciencedaily.com/releases/2013/01/130125103931.htm

Thank you ............ ;) :)

0 comments:

Cool Stuff.........iRig HD

http://www.youtube.com/watch?feature=player_embedded&v=JxApeSKoTNI

iRig HD, announced at NAMM on Thursday, has made it easy for all the musicians to record themself on one go.......YEah thats true!!

Hope u will like the video........ ;) :)

0 comments:

Internet Explorer Reloaded!!


Microsoft has recently advertised Internet Explorer and some awesome things of the 1990's. Please do watch it if you are a child of the 90's .....it will give you a very amazing experience.
Technology is all about innovation and this video tells you that you should use something from the 90's to do work of today....
Enjoy the trip down the memory lane and Hope u will like it.....
http://www.youtube.com/watch?v=qii34pPG8JM

0 comments:

U Made it possible.......

Oh yes.....All that idiocy and awful behavior you see online is at least partially your fault, and by that I mean the very broad "you" that also includes me. I'm so sorry.

#3. You Invented the Troll by Arguing With Crazy People



To be clear, no one has ever walked away from one of  spirited comment debates whatever may be the topic(including me) and that only gave rise to Trolls ....hmm..u should feel proud that u were a great help for the inventions of trolls.






#2. Your Relentless Pursuit of Novelty Ruined News

The only way for lean and desperate news outlets to get traffic from aggregators and blogs is if each article is absolutely shocking. As a result, the stories get fudged a little until they're more sharable for an online audience.But here's the problem: The stories still have to originate somewhere. Someone has to do the fact checking, and the source checking, and the interviews, and break the stories, but those people are all getting fired left and right because we've ensured that journalism isn't a viable career option anymore.


#1. You Reward People for Stealing Content

People nowadays are just using the technics of cut,copy and pate.Unfortunately, what can only earn that secondhand poster a handful of thumbs-up icons is actually costing the original creator a whole lot more. Those people are stealing the success of the thing they love and actively trying to tuck the artist away in their own personal dark corner of the Internet.

0 comments:

Project Glass.....

I would like to quote myself "Technology has no limitations."
Yes,friends true that technology is endless whatever you invent you always get a idea of something that is better that the previous one.
So here is a project by Google known as PROJECT GLASS.....

Project Glass is a Google program aimed at developing augmented reality technology, where information is directly in the field of view on a pair of glasses - like RoboCop or The Terminator.

Here is a video of the project .........you really will be amazed.




0 comments:

Maybe Google is Building a Smart Watch

Google, somewhere down the line, may have a sparking interest in changing the way we use watches. Plenty of companies are already trying this now, including Casio, Sony and Pebble Technology, but Google has a mobile operating system to work with, plenty of engineers and plenty of cash. So will it happen?



According to Business Insider, yes. The news outlet says it recently spoke with a source who said Google is “actively exploring the idea” of developing a device that will probably do more than tell time. Will it let us surf the web? Video chat with friends? Shoot lasers across the room? That much we don’t know, and “exploring the idea” could be as simple as sketching a picture of a watch on paper.

Still, Google is already actively trying to develop wearable technology through its Google Glass augmented reality project, so it’s not so far fetched the firm may want to spruce up our wrists as well.

0 comments:

Apple's Middle Finger........



YES......you read it right the middle finger of apple is pointed at you.

Apple makes some absolutely fantastic products.That is for sure. The issue is not with the quality of their products, but the attitude in which the company operates.

They are giving their customers the middle finger, and for some reason the customers are thanking them for it.
That seems AWKWARD!

I make the argument that it doesn’t have to be this way. If we want Apple to stop treating their customers with disrespect, we need to stop praising them for doing so.Start it from today.

Apple makes luxury products. They are built to last for only a short time and cost more than they should. This is okay, but it’s not okay to look down on someone, simply because they have chosen not to buy Apple. I can’t say this enough times: The photo, webpage, video or song you’re working on has no idea what brand-name your computer is.

0 comments:

The 3 second Phenomenon


Click the button to wait 3 seconds and then alert "Hey!".

0 comments:

Whats your name??

Click the button to get prompt.



0 comments:

Hey???

Click the button for alert!



0 comments:

Awesome to learn......

Click the button to get a confirm box.



Learn this awesome trick by me by following me ....... ;)

0 comments:

Google Bomb: The Atom Bomb of The Internet


Have you ever heard about the term ‘GOOGLE BOMB?’ I personally believed that this term is unfamiliar with most of you. Instead of not knowing the term, everyone experiences this while using internet. Here I explain to those who are unknown by this term. The main purpose of the youth is to gain more and more knowledge about each and every small thing. There is always a source to gain knowledge. Youth consider ‘GOOGLE’- as the Ultimate Guru. With their education, Googling is also the main part of their life.

Generally if we want to get some information about any topic or the matter, we prefer Google first. Do we think about it that why we prefer Google first? The reason behind this is before we think on that topic or matter, mastermind Google already think upon it and gives us the best consequences. Similarly, if Google already knows that what we want to know, why do we not try to know more and more about the Google.

What is Google bomb?

“Google bomb refers to the process of designing a large number of web links that increases the ranking for searches on unrelated keywords or phrase that we use in Google search engine which turn up in inaccurate result.” Simply it is a practice to calculate the page rankings. This type of practice is done for the comical, humorous or satirical purposes. Google bomb was first come in existence in 1999 when a search is made for a phrase ‘More evil than Satan himself’ which resulted in the web page of  Microsoft.

Google bomb is generally on the political issues or some are related to pranks and some are related to ego and self promotion. Google bomb damages the good name or business name to direct people to negative information. These negative informations are in the form of any comment posted in the blogs or any other site or by creating own web page to destroy and damage  the reputation of any business or any famous name.

The biggest example of the Google bomb was the phrase ‘Miserable failure.’ This bomb was created in 2003. When the phrase ‘miserable failure’ was searched, it resulted in the biography of George W. Bush although this phrase does not use anywhere in his biography.


Famous example of Google Bombing :

1.    Talentless hack:

Adam Mathes launched the first Google bomb by linking the website of his friend Andy Pressman to the phrase ‘Talentless hack.’ He mentioned the term ‘Google bombing’ in the article that appeared on 6 april  2001.

2.    French military victories:

This Google bomb was created by Steve Lerner n 2003.  When the phrase ‘French military victories’ entered in the search engine and hit I’m feeling lucky then the search said ‘Your search- French military victories- did not match any document’ and ask “Did you mean: French military victories.”


3.    Terrorist sympathizer:

A Google bomb was created to the personal website of Bill O’Reilly in November 2005. Bill O’Reilly is famous for social and political views. By placing Bill O’Reilly.com on website than it resulted as ‘Terrorist sympathizer.’

4.    Chuck Norris finds you :

Arran Schlosberg created a site ‘No Chuck Norris’ for making fool of this website users. When they entered the ‘Chuck Norris’ and hit I’m feeling lucky, it informs you “Google won’t search for Chuck Norris because it knows you don’t find Chuck Norris, he finds you.”


5.    Tony Blair- a liar:

In 2005, a search for the word ‘liar’ resulted in the official biography of British Prime Minister- Tony Blair. In his Biography, there is detailer information of war in the Iraq and search for the weapons of mass destruction.


What is the response of Google on this activity:

Google says that it defends its algorithm which is not damaging the quality of services. An attempt is made to reduce the effect of google bombing and try to eliminate many google bombs.

In 2005, the statement by the Google conclude with:

“We don’t condone the practice of Google Bombing, or any other action that seeks to affect the integrity of our search results, but we’re also reluctant to alter our results by hand in order to prevent such items from showing up. Pranks like this may be distracting to some but they don’t affect the overall quality of our search service, whose objectivity as always remains the core of our mission.”

What are the negative impacts of google bombing:
Mostly, grudging and ambiguous people who are mentally unstable do such type of act on the internet. These kind of persons make a fake site and linked with your personal site for their entertainment and directly attacks on your reputation.

If you have your own business and have a lots of contact with the large number of mass then this could happen with you anytime. Such type of people mistreated with your site by doing such illegal action. So it is very important for you to keep complete protection of your site and keep away such type of grudging people. The google bombing is generally done by those people whom you trusted a lot and you know them very well.

What are the steps to get protection from google bomb:

It is necessary to protect yourself from google bombing to save your reputation and you fame. To stop negative information from the search results create your own ‘Google bomb’ which contains the positive information about you.

Or you can create your own blog, create your own websites, create your own personal pages on social networking sites life Facebook, orkut , My space etc. to resort you reputation.

Is Google bomb ended now:

Well this is the best question that arises in everyone’s mind generally who were suffering from the Google bomb. Google , in January 2007, announced that they had mangled their search algorithm to exploit the Google bombs. They also announced that the Google bomb of phrase ‘miserable failure’ was stop working now.

But this time the answer of this question is ‘No, the Google bomb is not at all ended.’ It again came in existence in April 2007, when the bomb of miserable failure again reappeared. This was happen just because The White House website made a mistake of using the word ‘Failure’ in their featured article.

To come out from this problem, Barack Obama again designed the website of White House and did not link with its older website. In this way Google Bomb of phrase ‘miserable failure’ finally destroyed. And if we enter this phrase, the search results either the explanation of this Google bomb or the exact meaning of  this phrase.




0 comments:

How Hacking Can Take Your Life


In 2008 a group of hackers highlighted how someone could use an antenna, radio hardware and a PC to deliver a lethal shock to an implantable cardiac defibrillator (ICD).

In Hollywood there is a movie about the assassination of a political target. The hacker cum assassin exploited wireless vulnerabilities in pacemakers and insulin pumps to stop them from working leading the victim to die.

Radcliffe said to the press “My initial reaction was that this was really cool from a technical perspective. The second reaction was one of maybe sheer terror, to know that there’s no security around the devices which are a very active part of keeping me alive.”

How This Kind Of Hack Works?

In order to hack medical devices, an attacker could intercept wireless signals and then broadcast a stronger signal to change the blood-sugar level readout on an insulin pump so that the person wearing the pump would adjust their insulin dosage. If done repeatedly, it could kill a person. Radcliffe also suggests scenarios where an attacker could be within a couple hundred feet of a victim, like being on the same airplane or on the same hospital floor, and then launch a wireless attack against the medical device. He added that with a powerful enough antenna, the malicious party could launch an attack from up to a half mile away.

Security Researchers all around the world are taking this seriously are worried of these potentially fatal hacking attacks.  They are working on some security measures like password protection for such medical devices.

It is not just the medical field which is feeling the heat. Computer viruses are also responsible for many indirect deaths.

In 2008, the Spanish newspaper El Pais reported that computer viruses may have contributed to the Spanair plane crash which killed 154 people in Madrid two years ago. The 12,000 page accident summary report explains that the Spanair central computer was trojan-infected and therefore failed to trigger an alarm which would have grounded the plane. After this accident, FAA (Federal Aviation Administration) showed its inability to effectively monitor air traffic control from such cyber-attacks.

0 comments:

How to Access Blocked Website Anywhere?

1). TOR


Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. TOR helps to keep websites from tracking and to access blocked websites by their local internet providers.

How TOR Works?

Tor distributes your packet transactions over several places on the Internet, so no single point can link you to your original destination. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it’s going.

2) VPN (Virtual Private Network)


VPN short for Virtual Private Network is also a good way to get access to blocked websites or blocked content by circumventing geo, IP or other blockades. You can roam the Internet freely and uncensored, visit geo restricted web sites, watch blocked videos and investigate all topics of interest unhindered from your government, your school, your university or your employer. A simple example: If a content item, like a music video clip, is not available in your country, just log-in to one of our outside-your-country servers and virtually become an inhabitant of the respective nation.

3). Google Public DNS

As some of the blocks are DNS (Domain Name System) based, so if you change the DNS you can get access to the blocked website. Google Public DNS is a free, global Domain Name System (DNS) resolution service that you can use as an alternative to your current DNS provider. It will get the results you expect with absolutely no redirection. Google Public DNS complies with the DNS standards and gives the user the exact response his or her computer expects without performing any blocking, filtering, or redirection that may hamper a user’s browsing experience.

How to Use It?

1. Go to Control Panel
2. If you’re on Category view, click on View network status and tasks
3. If you’re on Large or Small icons view, click on Network and Sharing Center
4. Click on Change adapter settings that are on the left hand sidebar.
5. Right click on Broadband Connection and select Properties
6. Go to Networking tab
7. Select Internet Protocol Version 4 (TCP/IPv4) to highlight it and click the Properties button.
8. Select “Use the following DNS server addresses” and enter the following DNS servers:

Preferred DNS server: 8.8.8.8
Alternate DNS server: 8.8.4.4

9. Click OK on all windows.

4). Proxy Websites

It works as a kind of wall between your server so that you can access things that you’re not allowed to access on certain computers you type in a web site address and it will take you straight to it this is good for when it won’t let you access through the internet

Here is the complete list of proxy websites http://about.piratereverse.info/proxy/list.html.

5). Using IP Address Instead of the Website URL

This depends on the software/application used. Sometimes blocked sites are stored as a list of URLs (eg. www.yahoo.com, www.donwload.com,etc) and typing the IP instead of the URL might sometimes work. In a local computer, doing a ping domain.com command in Command Prompt (Mac users use Terminal) will return you the IP address. You can also do it online via www.whatsmyip.org.

6). Using URL Shorteners

Sometimes the URL you intend to browse might be ban, but converting them to another a shorter URL with short URL services might just help you to bypass the settings.

Here are some of the most famous URL shortners Service providers: Goo.gl, Bit.ly, and Tinyurl.com.

7). Using HTTPS Instead of HTTP

We also noticed that by using https instead of http in the url address, we get bypass the firewall that blocks certain website. It might be due to the fact that the firewall treats http://google.com and https://google.com as totally different websites.



0 comments:

Predictions That Came True in 2012


1. A Cyborg Competes Against Able-Bodied Athletes at the Olympics
For the first time ever in Olympic history, a double-amputee raced alongside able-bodied athletes. Nicknamed "Blade Runner," South African sprinter Oscar Pistorius's remarkable achievement raised as much enthusiasm as it did concern — some observers felt that his advanced prosthetic "Cheetahs" gave him an unfair advantage over the other athletes. But while Pistorius failed to medal, his remarkable achievement signified the dawn of the cyborg age.

2. NASA Starts to Work on a Faster-Than-Light Warp Drive

Speaking at the 100 Year Starship 2012 Public Symposium earlier this year, physicist Harold White stunned the aeronautics world when he announced that he and his team at NASA had begun work on the development of a faster-than-light warp drive. His proposed design, an ingenious re-imagining of an Alcubierre Drive, may eventually result in an engine that can transport a spacecraft to the nearest star in a matter of weeks — and all without violating Einstein's law of relativity. Though still in the proof-of-concept phase, White and his colleagues are trying to turn theory into practice — and potentially change the nature of space travel as we know it.

3. Scientists Enhance the Intelligence of Primates with a Chip

Back in September, scientists demonstrated that a brain implant could improve thinking ability in primates — and by a factor of 10 percent. By implanting an electrode array into the cerebral cortex of monkeys, researchers were able to restore — and even improve — their decision-making abilities. The implications for possible therapies are far-reaching, including potential treatments for cognitive disorders and brain injuries. And it also means the era of animal uplifting has begun.

4. The Earth Experiences its First True Superstorm

Back in 1999, Art Bell and Whitley Strieber published a book titled The Coming Global Superstorm. It predicted that global warming would eventually result in sudden and catastrophic climatic effects — including the onset of unusually large storms. Now, 13 years later — although some are still loathe to admit it — the Atlantic Ocean experienced its first bona fide superstorm. Sandy was a colossal hurricane that occupied a space measuring 1.8 million square miles (4.6 million square kilometers), and stretched from the Mid-Atlantic to the Ohio Valley, and into Canada and New England. It may have been the first, but it certainly won't be the last.

5. The World's First Cybernetic Hate Crime Occurs at a McDonalds in France

Steve Mann, the "father of wearable computing," was physically assaulted while visiting a McDonalds in Paris, France. The Canadian university professor was at the restaurant with his family when three different McDonalds employees took exception to his "Digital Eye Glass" device and attempted to forcibly remove it from his head. Mann was then physically removed from the store by the employees, along with having his support documentation destroyed. It was the first ever recorded assault of a person instigated by the prominent display of a Google Glass-like wearable computer.

6. Augmented Reality Goes Mainstream

Speaking of Google Glass — this was the year that augmented reality finally hit the big time. Back in April, Google unveiled preliminary designs and a short concept piece showcasing the technology — an initiative to create smart shades straight out of Vernon Vinge's Rainbows End or Warren Ellis and Darick Robertson's Transmetropolitan. Soon thereafter, beta testers could be seen cruising the streets of California with their sweet wearable devices.

7. Researchers Create a Robot With Legs That Can Run Faster Than any Human

Boston Dynamics, along with funding from DARPA's Maximum Mobility Program, significantly revved up their Cheetah Robot this year. The previous iteration ran at a speed of 18 mph (29 kph), but the new version clocked upwards of 28.8 mph (46.3 kph) — demolishing its previous record, and even surpassing the fasted recorded human speed on Earth. Not content to stop there, Boston Dynamics also upgraded their robotic pack mule (a.k.a. "Big Dog") so that it can respond to vocal commands.

8. The First Successful Commercial Cargo Delivery to Space Goes Off Without a Hitch

Early on the morning of October 10, SpaceX's supply-hauling Dragon capsule was successfully captured by astronauts aboard the International Space Station, marking the first-ever commercial cargo delivery to the manned space outpost. With 11 resupply missions remaining in the SpaceX/NASA contract, it seems the private company's billion-dollar delivery deal with The Agency is off to a good start — as is the prospect for commercial space flight in general.

9. An Electric Car is the Year's Best

If anyone ever doubted that electric cars were the future, those concerns were officially laid to rest in 2012. Tesla's luxury Sedan, the Model S, captured one of the auto industry's most prestigious awards by taking home Motor Trend's Car of the Year honors. It marked the first time that an electric car has taken the top prize — a vehicle that doesn't run on gas or have an internal combustion engine.


10. Doctors Communicate With a Man in a Coma

Back in 2010, neuroscientists confirmed that it was possible to communicate with some patients locked in a vegetative state by using an fMRI scanner. Though limited, the breakthrough suggested that more meaningful dialogue with patients in a coma could someday be possible. And now, two years later, it finally happened. A Canadian man in a vegetative state used his thoughts to tell scientists that he is not in any pain, marking the first time a patient in such a condition has relayed information relevant to their care.

11. The First Large-Scale Geoengineering Project is Detected Off Canada's West Coast

This wasn't how it was supposed to play out, but a massive and illegal geoengineering project was detected off Canada's west coast in October — the product of a "rogue geohacker" named Russ George. Backed by a private company, the U.S. businessman unilaterally conducted the world's most significant geoengineering project to date by dumping around 100 tonnes of iron sulphate into the Pacific Ocean, a technique known as ocean fertilization. The experiment, which is in violation of two United Nations moratoria, outraged environmental, legal, and civic groups.

12. A Child Attends School By Sending a Robot in His Place

The rise of telecommuting robots has increasingly allowed stay-at-home workers to create a virtual presence at their remote workplaces. It now appears, however, that working professionals aren't the only ones taking advantage of telepresence technologies: A six-year old boy with severe allergies from Seneca Falls, NY, is using a VGo robot to attend school — and it's an experiment that appears to be working. The technology is quickly attracting the attention of other educators, including districts in Colorado, Arkansas, and Pittsburgh. It may only be a matter of time before VGo and other telepresence robots will make their way into other schools.

13. A Paralyzed Woman Controls a Robotic Arm Using Only Her Mind

Researchers made significant improvements to BrainGate this year — a brain-machine interface that allows users to control an external device with their minds. Cathy Hutchinson, who has been paralyzed from the neck down for 15 years, was able to drink her morning coffee by controlling a robotic arm using only her mind. Hutchinson is one of two quadriplegic patients — both of them stroke victims — who have learned to control the device by means of the BrainGate neural implant. It's the first published demonstration that humans with severe brain injuries can control a sophisticated prosthetic arm with such a system.

14. Self-Driving Cars Become Legal in Several States

Slowly but surely we're entering into the era of the driverless car. 2012 marked an important year as three states made autonomous vehicles legal, including California, Nevada, and Florida. Upon signing the bill into law in California, Governor Jerry Brown said they're "turning today's science fiction into tomorrow's reality." Self-driving cars, once perfected and produced en masse, will help with traffic congestion and significantly reduce the chance of auto accidents through the use of GPS, radar, and other technologies.


15. Scientists Create an Artificial Retina

Two British men who were completely blind for years were able to regain some of their vision after undergoing surgery to fit eye implants. The pioneering treatment is at an early stage of development, but it marks an important step forward in an effort to help those who have lost their sight from a condition known as retinitis pigmentosa. And in related news, other researchers successfully streamed Braille patterns directly onto a blind person's retina, allowing him to read letters and words visually, with almost 90% accuracy. Developed by researchers at Second Sight, the headset-like device is set to revolutionize the way degenerative eye diseases are treated.

16. Researchers Create the First Complete Computer Model of a Living Organism

Stanford researchers created the first complete computational model of an actual organism — Mycoplasma genitalia, a sexually transmitted disease and the world's smallest free-living bacteria at 525 genes. The breakthrough represented a significant step forward in the field of artificial life - and the promise of developing entirely new organisms. Through future work, scientists may be able to develop new approaches for the diagnosis and treatment of disease — including the creation of yeast or bacteria designed to mass-produce pharmaceuticals — and to create personalized medicine. And in other computer news, researchers successfully simulated a nuclear explosion down to the molecular level.

0 comments:

Top Four ways in which Malware and Virus are spread....


1). Torrents

I bet you saw this coming. But do you know the latest movie which you ripped last night and seeding it away in glory right now could potentially be a carrier of viruses? Yes, it’s possible if your computer was already infect by a virus which had the capability of binding itself to torrent files. Looking at it from the other side, the trusted members of a torrent site could also theoretically infect you without them even known it. Not to mention about bogus and fake files binded with viruses uploaded every day to torrent site by fake profiles. The point is danger is always lurking on Torrent sites. They best to minimise them is to take precautions while downloading torrents. Always check the uploader, his previous uploads, the comments given by other users and how old the torrent is. It’s also a good idea to google the name of the torrent and check its description and pictures with those given in the Torrent site.


               
                             2). Youtube

Youtube and Dailymotion: Search “ ‘Any Software name here’ Crack” in  Youtube or DailyMotion, you will be literally flooded with hundreds of video tutorials showing you how to run the crack file. Almost 90% of the videos will be accompanied by a download link and in most of the cases the file offered in the download link will be binded with a Trojan. Use your common sense in such cases.



                         3). Facebook

Yes, you read that right. With over 901 million active users at the end of March 2012, Facebook is one of the favourite hunting grounds for hackers. They are actively pulling out new and innovative tricks to lure the users into downloading their virus. Be those spammy links like “OMG! I can’t believe this!” or  “Go to this website to get your free iPhone”, they are constantly coming up with clever ideas to entice the users in click their malicious links. So they next time you are tempted to click on a link in Facebook, think twice about it.

                                          
                                                           4). Chat Room

 This method is also rampant on the internet right now. There are thousands of chatrooms, right from Omegle, Yahoo to numerous teen chat rooms. Most of the time it’s not even a  human but an automated software called bot that does all the spamming of the chatrooms with infected links. This is a very easy method and requires little or no effort on part of the hacker to infect hundreds of users within a single day. It’s better to avoid such chatrooms whenever possible, if not, then make it a point to never click any link on such chatrooms next time you visit.


To avoid being hacked, you have to think like a Hacker!

0 comments:

How to Deal with Adware


Cyber security has become a major concern for many people in recent years. Web users are always searching for new and better ways of shielding themselves from identity theft and fraud. One of the greatest threats to cyber security is adware. These are programming codes which invade your computer and replicate themselves without your consent. However, many people don’t know how adversely adware can affect their computers. Most see adware as a small inconvenience which can be dealt with casually or overlooked. However, if left unchecked, adware can have significant negative impacts on your computer, and even lead to permanent damage.

So, how exactly does adware affect your computer?

Adware is one of the biggest threats to your efforts towards internet security and privacy. When these rogue programs find their way into your computer or laptop, your sensitive and personal details might end up being leaked on the internet. This is a major cause of concern for many people, especially those who do a lot of transactions online.

Adware uses a lot of disk space in a computer. As a result, it clogs up your computer systems, thus interfering with their operations. Applications and processes which worked very fast will be slowed down significantly. At times, your computer could even become completely unresponsive. Besides slowing down your computer, adware can also reduce the speed of internet connection. This can end up causing a major inconvenience to users, especially people who use computers to work or study. In your attempt to free up space in your computer, you might end up losing some of your important documents in your hard disk.
Dealing with the problem of hardware is a must for anyone who is serious about enhancing the operation, as well as safety of their computer.

So how do you deal with the problem of adware?


First, you need to realize that removing adware completely is a difficult task. For people who use the internet very frequently, avoiding adware or eliminating it totally is not possible. Even with the most advanced detection systems, some rogue programs will still find their way through. However, you need to do your best to deal with these programs.
The best way of dealing with adware is by installing adware removal software on your computer. Trying to find and eliminate these rogue programs on your own is futile. You will find a lot of good and affordable adware software in the market. You could even start with one of the many free downloadable programs available online. Installing such programs will have several effects. First, your computer will be kept safe from these bad programs. By freeing up space in your hard disk, your computer will be able to run more efficiently without getting slowed down. Besides cleaning up your system, adware removal software will also help you get rid of spam email by blocking the source of such emails.

0 comments:

Basics of HTML 5


HTML 5 is basically a next generation of HTML. The previous versions of HTML (HTML, HTML 4.01) were introduced in 1999. After that, a lot of changes have been made in the web. HTML 5 is still in working process. But many main browsers still support HTML 5 elements and API’s.

How it get started:
HTML 5 is basically cooperation between World Wide Web Consortium (W3C) and Web Hypertext Application Technology Working Group (WHATWG). Initially, WHATWG was working with web application (web forms). On the other W3C was working with XHTML 2.0. But later they decided to collaborate and work as a team for new version of HTML.

After that, some rules for HTML 5 were established. Here are these rules:

Some New Rules For HTML 5 Are:

All the new features will be based on HTML, CSS, DOM and Java Script.
In HTML5, there will be a reduction of external plug-ins (like flash).
It will handle different errors effectively and efficiently.
It will have more mark ups to replace scripting.
It will be device independent.
Its development process will be visible to the public.
But with the passage of time, some new features are also introduced in HTML 5.

Some New Features Introduced In HTML 5 Are:

For 2D drawing, it has <canvas> element feature.
For media playback it has <audio> and <video> elements.
It has also support for local storage.
It has some new content-specific elements such as <article>, <header>, <footer>, <nav>, <section> etc.
It has also some new forms of control such as date, time, email, search, URL etc.
But it is not yet an official standard. At the moment, there is no browser who has full HTML 5 support. However, all the main browsers like Safari, Chrome, Firefox, Opera and Internet Explorer are trying hard to add new features of HTML 5 to their latest and updated versions.

HTML 5 <! DOCTYPE>:

Currently HTML 5 has only one DOCTYPE declaration. But this declaration is pretty simple.

<! DOCTYPE html>


Minimum HTML 5 Document:

The minimum HTML 5 document has the following data.

<! DOCTYPE html>

<html>

<head>

<title> document title </title>

<body> content of the document </body>


</html>

0 comments:

What Are Magnet Links?



On 29th February 2012, Pirate Bay, the world’s leading BitTorrent website said goodbye to the .torrent links, and gave an option to its user in the form of magnet links. Now the question is what are magnet links? How are they different from normal torrent links? Let’s find out what are Magnet Links.

Magnet Links

After the govt. started taking some serious action against the file sharing and torrent websites, there was a strong need to make torrents more secure as the agencies could easily track the torrent origin.

So that’s why most of the torrent websites are preferring magnet links. Magnet links uses a technology called DHT (Distributive hash Table). DHT technology is often called as “trackless torrents”. DHT is used to find the IP address of peers.

Magnet links does not require tracker to download a separate file before starting the download. It means that magnet links abolishes the centralized system used in the torrent links for tracking purpose.Magnet Links allows a group of users to share a file faster amongst themselves without having to rely on a server.

.Torrent File

Whereas the .torrent file holds is information about the location of different pieces of the target file. Torrents work by dividing the target file into small information chunks, found on an unlimited number of different hosts. Through this method, torrents are able to download large files quickly.

A torrent file contains the URLs of many trackers and integrity metadata about all the pieces. It can also contain additional metadata defined in extensions to the BitTorrent specification. These torrent files include metadata for stating who created the torrent, and when.

Benefits of Magnet Link:

1) The information about the uploader and the server remains anonymous.
2) Magnet links are just links that have no file associated with them.
3) While using magnet links, BitTorrent indexers don’t have to store any file.
4) Magnet Links can be shared as plain text. That means you can share them via email, chat or on social media website.

Case Study: The Pirate Bay

When TPB (The Pirate Bay) announced that they will be using Magnet Links from now on, there was lot of smoke all over. Everyone wanted to know the reason behind it.

TPB is using magnet links to avoid all their legal problems over copyright issues. So now TPB won’t be hosting anything that contains some copyright material. As magnet Links are not traceable so no one can blame TPB for the copyright material.

Downloading Files Using Magnet Links:

It is as simple as you download normal torrent file. When you will open the TPB website and will go to a download page you will see a link “Get This Torrent”, just simply click on it.

0 comments:

Misspelling........











0 comments: