Thursday, April 28, 2005

Blue DvD

We've seen DVDs replacing CDs,But what next??The next on arena are HD-DVD and Blue-Ray Disc.Both use a blue-laser for read-write instead of the usual red laser in curreb\nt generation DVDs.Blue rays have the shortest wave lenght among the visible spectrem.So it can pack more data within the same space.Both HD-DVD and Blure-Ray DVD use Blue laser ,but they use the technology in two ways.Lets go deep into two of'em Blue-ray discs are more efficient with using the blue laser and pack at least 25GB per layer,whichcan be increased in multiples of 25 as you add more layers and use both sides of the media.The developers are saying that they could introduce 50GB this year and then by 2007 it will reach 200GB.To achieve this they use a completely new technology and hence it costs lot for mass production....lot means...sony released a 23GB Blue ray drive with SCSI and USB interface and the cost is well above 1.25Lakhs Rs. HD-DVD on the other hand starts with 15 GB per layer and the capacities wud therefore increase in multiples of 15.Blue_ray is definitly a superio technology.But technology alone wont save a product.Production and marketing costs are also important.But HD-DVD maintains some backward compatability with DVD,so the same production facilities can be used to manufacture its products,meaning lesser production cost ,faster time to market and low cost to products.And there is a rumour that Microsoft will ship its upcoming OS Longhorn on HD-DVDs.But Blue-ray is more activewith more than 70 MNCs suppoting it including giant Sony,Hp,JVC,TDK ...So at moment it seems like that inspite of the price ,future is with Blue-Ray.But it will not be a surprise if both technologies co-exists like the DVD+R/RW and DVD-R/RW formats.

Wednesday, April 27, 2005

Internet2 P2P

I think every one knows about P2P file sharing...You can get any(legal & illegal) files frm a P2P (peer to peer) network. Even thogh it claims that P2P networks works efficiently by utilising full bandwidth available it will take ages to get a movie or a game.Now here is Internet2.Its still in developing stage and is under test on universties across US where it is mainly used for research purpuses.Now Students are using it for illegal file transfer.They transfer Movies and song collections with in a second(6GB+/Sec).College campuses are the front lines of the recording industry's anti-peer-to-peer (P2P) crusade, and many schools have placed technical restrictions on student downloading. However, students often find a workaround. And Internet2, known as i2hub, may prove to be that work around. Unlike the Internet itself, i2hub enables student file-swappers to transmit large files -- like song collections or movies -- almost as fast as you can say "Avril Lavigne." Earlier this month, a team of international researchers broke an i2hub record by transferring data over 7,000 miles at a speed of 6.25 GB per second –- approximately 10,000 times faster than an average broadband connection. Using the i2hub for the unauthorized transmission of copyrighted material is forbidden, Internet2 universities have been at the forefront of working with the recording industry and motion picture industry to make prevent those things from happening. Many universities, under pressure from recording and film companies, now include bandwidth-limiting software on their campus networks. This can slow file swapping to a crawl -- or stop it altogether. Some schools, like the University of California at Los Angles (UCLA), are experimenting with software that automatically restricts student Internet access in response to a copyright-holder complaint. Other colleges are considering applications that filter network traffic on an individual basis in an attempt to block illegal file swapping. The high-speed network is the product of a consortium of about 200 universities, working in concert with technology companies and government, intended to develop and use advanced network technologies. Using i2hub,Scientists and researchers are able to do things like TV-quality video conferencing...and access supercomputers for grid computing in ways the commercial Internet can't support.. Te network infrastructure of many universities would allow them to apply restrictions at a campus level to Internet2 as well as the commercial Internet.Because all of a campus's networks are tied together, the tactics universities use to fight unauthorized swapping would be "equally effective" on both the Internet and Internet2, he said. The bottom line is clear: University Internet access is not the ticket to free-for-all file swapping it once was. For more info about internet 2 gto there home page

Monday, April 25, 2005

Now they can tap ur phone!!

An Israeli scientist.Elad Barkan and his team found a flaw in the GSM(Global System for Mobile communications) code that allow you to break into mobile phone calls and even take over callers identity.According to Barkan,The GSM code gives high prority to call qualities and noise interference correction after which it encrypts the call.This enabled the hackers to break into the call. The GSM association said that they know about this vulnerability,and had even released a patch to fix the encryption algorithm.However the hackers claimed that they managed to surpase the new encryptin system. So its not safe to carry out confidential conversation over GSM networks as your rivals can easily tap it.

Friday, April 22, 2005

Modify system properties tab

When you rightclick 'My Computer' and choose properties, or on the Control Panel click System, there's your systems' properties. The first tab you might consider your machines' id. Underneath the screen might be a picture already, provided by the manufacturer of your machine.So what about hacking it?? Like this........ Free Image Hosting at www.ImageShack.us [click the image to view in full size] Interested in trying it in ur system???...okay...but be prepared... 1.Check for a file Oemlogo.bmp on system32 folder 2.If it is there then just edit tht pic,else create a bmb image below 160*160 size and save it in system32 folder with the name Oemlogo.bmp. 3.If the file was there already then there will ben a file named Oeminfo.ini.If not there, create a .txt file there and rename it .The syntax of the file would be [General] Manufacturer=Your fake company like srijith v Model=Whatever you call your machine SupportURL=http://www.virtualplastic.net/ LocalFile=Path to local html file [ICW] Product=Tell us, please! [OEMSpecific] SubModel=More branding to edit SerialNo=xxxxxxxxsrijith v yyyyy OEM1=Srijith V OEM2=rules!! [Support Information] Line1=If item is there, and Line2=at least one line set, Line3="Support information button" appears Line4=and info in the lines appears. Line5= Line6=Use empty lines for a spacebreak, Line7=as many lines as you'd like, Line8= ...etc The first two lines, Manufacturer and Model, are displayed on this tab. Actually, you can leave the model line empty; it's the manufacturer line that is required to display oemlogo.bmp. Anything else is optional, and when an oeminfo.ini is found initially, mostly the [ICW] and [OEMSpecific] sections aren't even there, neither are the SupportURL/LocalFile lines. Now i know u may hav some doubts ;) Well...I know ..You may may have doubts about how to change ..........ok post a comment here...i'll check it..no time now!!

Wednesday, April 20, 2005

juWireless tangle

There is so much noise about wireless today..,that it has raised a new problem-that of choosing the right technology! In near future u may find companies contending for the same space.The best example of this is GSM and CDMA. CDMA was introduced at time,when GSM was well established.Remember the heated discussions about who is best?? Now both technologies coexit.The same is what happening over short-range wireless technologies.Now only bluetooth is available(strong in market).But two other technologies are likely to make there way into our digital life! These are ZigBee and Wireless USB.Out of these wireless USB is targeting similar applications as bluetooth and ZigBee has a different segment of market,though with a bit of overlap.
Today,bluetooth is the technology of choice for many PAN(personal area networks).You can find a huge list of applications and products for bluetooth at there home site.This in effect means that it is a well established technology.Here is where Wireless USB is expected to be introduced.It has a whooping speed of 480Mbps where Bluetooths latest release v2.0EDR(Enhanced Data Rate) have a speed of max 3Mbps.So its clear that wireless USB is targetting at the products that use a wired usb now.So soon we could see our digital camera send a print order to the printer thru air!
Let's come to ZigBee.This one is positioning itself as a low data rate wireless technology! Which is interesting that other technologies are moving the opposite way.The reason for this is its targeted market-remote monitoring of lighting,heating,air-conditioning,etc of a home,office or industry. For this it needs only a little data rate,but should have an efficient power consumption.No one would like to charge the bateries of a/cs and bulbs!.So it might also end up playing in at least some of the market segments enjoyed by bluetooth.
In essence,Bluetooth is being squeezed by Wireless USB from bottom and ZigBee from the top.May be it should also consider othet market segments,which others have'nt yet considered.
For more info:

Monday, April 18, 2005

Du u Have a samsung phone??-- Tweak it!!

Being a loyal samsung fan i collected a lot of facts about samsung phones.Lemme share it wth u!. Some samsung codes(may not work with some models) **if 9998 doesnt wrk for u then try 8999
*#0228# -Battery %
*#87927#- Wap
*#87927#-Setup mms
*#9999# -for your firmware version
*#9998*bat# for battery
*#9998*vib# vibrator
*#9998*0000#
*#9998*9999#
Now some e700/715 codes...may work in other phones..try it...but be carefull...it can cause real HARM!!!Du at ur own risk!
*#8999*8378# [All in one Code]
*#4777*8665# [GPSR Tool]
*#8999*523# [LCD Brightness]
*#8999*3825523# [External Display]
*#8999*377# [Errors]
#*5737425# [JAVA Something{I choose 2 and it chrashed}]
*#2255# [Call List]
*#7465625# [Sim Lock Test?]
*#8999*8376263# [Phone Info]
#*6420# [Mic Off]
#*6421# [Mic On]
#*6422# [Mic Data?]
#*6428# [Mic Measurement]
#*536961# [Java Status Code]
#*536962# [Java Status Code]
#*536963# [Java Status Code]
#*53696# [Java Status Code]
#*5663351# [Phone Model]
#*5663352# [Java Model]
#*566335# [WAP Model ID]
Plus there are these RESET codes DO NOT USE IF YOU DO NOT WANT TO DELETE SOME INFO FROM YOUR PHONE If someone knows (or wants to test) all of these codes and write what they do it would be great.
*2767*66335#
*2767*3700#
*2767*7100#
*2767*8200#
*2767*7300#
*2767*2877368#
*2767*33927#
*2767*85927#
*2767*48927#
*2767*37927#
*2767*28927#
*2767*65927#
*2767*29927#
*2767*78927#
*2767*77927#
*2767*79927#
*2767*82927#
*2767*787927#
*2767*73738927#
*2767*33667#
*2767*85667#
*2767*48667#
*2767*37667#
*2767*28667#
BE CAREFUL WITH THE ABOVE CODES! THEIR MEANING IS NOT CERTAIN. I'm not sure, but some of these codes can also delete some info from your phone.
Well......Am tired now...cant type any more... :)More details on next post!!

Sunday, April 17, 2005

Image Hosted by ImageShack.us

Do you have a cellphone??....Well... what a question!!...Every one seems to have one!!... And there is the point! Every one has it.. This is what a virus writer checks.If the platform is common and easily accessable then there is a potential danger of finding a virus for that platform.It happend wn Unix was thr..then for dos..then now for windows.But now ,the number of mobile phone users is far more highr than number of pcs.And as feared, a virus for the cellphones is here- "Cabir". A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. Although mobile phone virus hoaxes have been around for years, the so-called Cabir virus is the first verified example. The virus was created by a group from the Czech Republic and Slovakia called 29a, who sent it to a number of security software companies, including Symantec in the United States and Kapersky Lab in Russia. Cabir is considered a "proof of concept" virus, because it proves that a virus can be written for mobile phones, something that was once doubted. Cabir was developed for mobile phones running the Symbian and Series 60 software, and using Bluetooth. The virus searches within Bluetooth's range (about 30 meters) for mobile phones running in discoverable mode and sends itself, disguised as a security file, to any vulnerable devices. The virus only becomes active if the recipient accepts the file and then installs it. Once installed, the virus displays the word "Caribe" on the device's display. Each time an infected phone is turned on, the virus launches itself and scans the area for other devices to send itself to. The scanning process is likely to drain the phone's batteries. Cabir can be thought of as a hybrid virus/worm: its mode of distribution qualifies it as a network worm, but it requires user interaction like a traditional virus. Cabir is not considered very dangerous, because it doesn't cause actual damage, and because users can prevent infection by simply refusing to accept suspicious files. However, the virus's code could be altered to create more harmful malware that might, for example, delete any information stored on phones it infects, or send out fake messages purporting to be from the phone's owner. Because the worm requires Bluetooth technology to travel, it is geographically constrained to a radius of about 30 metres. Then it is dependent on someone having Bluetooth turned on within that range. And as a final blow to its progress, any unsuspecting phone user in the vicinity would have to accept the virus which would be preceded by a warning that the source of the file is unknown. But it hd managed to make a severe blow to the security firms!.So another threat is up..Soon we cud see the antivirus s/w running on our cell phones.Some firms already introduced Antivirus s/w for symbian and nokia 60 phones... And now i understand how dangerous is it to turn on bluetooth on trains and buses to chat with "charaks".I never ever du that (its known as toothing).

Saturday, April 09, 2005

Play with Smileys!!

Have you ever tried to change ur yahoo smileys??well... Then here it is..its simple..ctrl+c and ctrl+v :) any one can du it!. ok... 1-->open C:Program FilesYahoo!MessengerMediasmileys 2-->find the smiley u want to change(set view to thumbnails) 3-->Note the file name...it will be a number 4-->Then Rename it to anything u like(just for a back up!!) 5-->Then Rename the .gif file that you want to use as the filename in step<3> copy and paste it to the C:Program FilesYahoo!Messenger Mediasmileys Thats all......Now everytime the particular smiley is used u will see the replaced image.. So done?? If u have any doubt pm me @ frmneo999 ...and i have collected some smiley set..enuf to replace the whole yahoo smileys.Now i have no time to upload it.So if u really want to try out it contact me..okaay??

Friday, April 08, 2005

Wired (Weird ??? ) Dream

Image Hosted by ImageShack.us

i'm having this dream frequently...a techy geeky dream..about living in a perfect geek home!! I dont knw from where i got these idea..but .... it may seem rubbish..but i'm sure some day this will become reality...naa..i thnk its already a reality now..Ok...the dream is that i'm having a digital home...with Intelligent equipments and furnitures...And a central node controling the home.... Suppose if i want to go out for a party at night...With a single button the entire house shud secure itself by closing maindoors...windows..alerting security bots(!!!)..Shutting down music systems ,ACs to save Ebill,open the garrage doors and closing it ... seems a bit crazyy?? And when i return back ,the gate recognize my car by checking its RFid and open itslvs.The room coolers will be turned on and the temps will be maintained to my preset level..The control system recognize my mood and play the the music system accordingly...and after all a perfect sleep and ...ahem...i cud choose the dreams from a dream machine which is connected to my brain :).. so no more horror stuuffsss!!
The heat is on The heat is on again in the processor war,and this time it's not just clock speed,but many other factors..After AMD went out with its "64-bit to the desktop" campaign,its now intel's turn--and the answers seems to be the new 6xxx series of P4 processors.The key features built into these processors include a 64-bit extension called EM64T(Extended Memory 64 Technology),Speed Step and XD(eXecute Disable) technology. With EM64T,Intel now supports 32-bit apps in a64-bit OS,very similar to AMD's offering!More over its backward compatable with Socket 775,meaning they can work 0n the 915 & 925 based chipsets.And L2 cache has been rised to 2MB. Speed Step is not a new technology.Its been around in mobile processor versions from intel.Here,the processor will step down to a lo wer clock speed when lying idle,thus saving power and avoids overheating! XD is intels intiative to bring secuirty to hardware level to compat the growing threats .This feature helps control buffer overflows,the most common technique used by security threats.AMD also has a similar feature in its 64-series ,known as EVP(Enhanced Virus Protection). With new P4 series ,Intel also joined the 64-bit race to desktop with AMD.And for any one reading this having a 64-bit processor,a free beta testing version of Windoes XP 64-bit edition RC2 is available for download(360 days trial)to enjoy true 64-bit computing.I think we might see a shift to 64-bit desktop sooner than we can imagine!