Tuesday, June 29, 2010
Sunday, June 27, 2010
Hi friends. Recently I have come to know about a threat and it’s my responsibility to inform you all. In the coming days, DO NOT open any message with an attachment called: "Black in the White House", regardless of from whom you received it. It is a virus that opens an Olympics torch that burns the whole hard disk C of your computer. This virus comes from a known person who you have in your list. I wish you should send this message to all through any mode. It is better to receive this same news via e-mail 25 times than to receive the virus and open it.
If you receive a message called "Black in the White House" even if sent by a friend, do not open, and shut down your machine immediately. It is the worst virus announced by CNN. This new virus has been discovered recently it has been classified by Microsoft as the virus most destructive ever. This virus was discovered 21-june afternoon by McAfee. There is no repair yet for this kind of virus. This virus simply destroys the Zero Sector of the hard disk, where vital information function is stored.
Monday, June 21, 2010
Do you sleep everyday? This question may look rubbish to almost all the people, because everyone will sleep atleast a minimum of 20% of a day. But how many of you know what happens every time we get a bit of shut eye? Sleep occurs in a recurring cycle of 90 to 110 minutes and is divided into two categories: 4 stages of non-REM and REM sleep.
Stage 1 - Light Sleep: In this stage of sleep, we're half awake and half asleep. Our muscle activity slows down and slight twitching may occur. This is a period of light sleep, meaning we can be awakened easily at this stage.
Stage 2 - True Sleep: Within ten minutes of light sleep, we enter this stage, which lasts around 20 minutes. The breathing pattern and heart rate start to slow down which accounts for the largest part of human sleep.
Stages 3 - Deep Sleep: Here, the brain begins to produce delta waves, a type of wave that is large (high amplitude) and slow (low frequency). Breathing and heart rate are at their lowest levels.
Stage 4 - Deep Sleep: It is characterized by rhythmic breathing and limited muscle activity. If we are awakened during deep sleep we do not adjust immediately and often feel groggy and disoriented for several minutes after waking up. Some children experience bed wetting, night terrors or sleepwalking during this stage.
The first rapid eye movement (REM) period usually begins about 70 to 90 minutes after we fall asleep. We have around three to five REM episodes a night. Although we are not conscious, the brain is very active - often more so than when we are awake. This is the period when most dreams occur. Our eyes dart around, our breathing rate and blood pressure rise. However, our bodies are effectively paralyzed, said to be nature's way of preventing us from acting out our dreams. After REM sleep, the whole cycle begins again.
Monday, June 14, 2010
Here arises a solution for the problem faced by physically challenged person through an invention that enables them to play computer games as same as the normal people. The students of ICL have developed an open source game called 'Pong', where a player uses his eye to move a bat to hit a ball as it bounces around the screen. To play the game, the user needs to wear special infrared light glasses containing a webcam linked to a laptop that records the movement of one eye. This will take care of synchronization. Still the process is on to play lot of games and applications such as wheelchairs and computer cursors controlled by eye movements through this technology. I hope in future, people might be able to blink to turn pages in an electronic book, or switch on their favorite song, with the roll of an eye. The major benefit of this new technology is that it is inexpensive, using off-the-shelf hardware.
Tuesday, June 8, 2010
Can you show anyone roaming in streets without mobile phone as of now? We everyone knows the usage and importance of SIM card, whereas we are unaware of its cloning process. With the rapid development in technology cloning of SIM cards has become an easy task. To clone a SIM you need not to be a smart hacker. For cloning a SIM, the Ki and IMSI values have to be read. The SIM value can be encrypted by cracking the codes to get the Ki value without which cloning is impossible. Once the Ki value is obtained the SIM is ready to be cloned on a blank chip. Sometimes the Ki value even takes hours to crack. Cloning is not as simple as shown in the Bourne Supremacy as it requires lot of patience. If you go to market to get some gadgets for cloning the SIM, you will not have difficulty in finding them. We couldn’t get the SIM cloned because even the anti-social elements wouldn’t do it for any unknown person but the government and security agencies still seem to be in some kind of bliss about this threat. Recently I have come across this information and I hope this article is useful to all.
Friday, June 4, 2010
The Google Notifier is a nice tiny application used for Mac OS that regularly checks if you have any incoming email. It is pretty useful except for one tiny problem; there is no way to configure how many minutes you want the application to check your Gmail account. A simple way to get around it is to do the following:
1) Click on the mail icon 2) Hold down command (APPLE) and option (ALT) keys while clicking on preferences in the drop down box. you will be prompted with a box that has a key and value prompt 3) Type “AutocheckInterval” under key (case-sensitive) and then under value type in the number in minutes of how often you want it checked. 4) You will need to restart the application by quitting and opening it again. 5) If it does'nt work, manually modify the file in Library/Preferences/com.google.GmailNotifier.plist. 6) Add the new value AutocheckInterval and the string value is 1 (if you want the notifier to check every minute). It can be customized as per our convenience.
Tuesday, June 1, 2010
The iPad has gone international but the Asian market has now found a choice of two very similarly named options: the United States’ iPad or China’s new product, the iPed. And when I say similar, they really do almost look similar in looks. The packaging looks almost the same, the tablet casing looks almost the same. You can’t find the difference if you look at it for the first time as almost everything looks the same except the operating system that runs it and the name of the product. As far as physical parameter is concerned, the iPed is slightly heavier than the iPad but, it sells for around $105 while Apple’s iPad goes for a whopping $536 in nearby Japan, where the iPad is just launched. The iPed ironically, runs the Google Android operating system. The price difference is astounding and unless someone finds a fatal flaw with the iPed fast, there could be some real intense tablet competition. And we all know Android is one stable operating system. So, which would you buy? An iPad with even no USB slot Or an iPed, which actually has one. Really iPed is going to be a threat to iPad. Let’s wait and watch.