July 2009

This hilarious comic strip by xkcd illustrates one of the most important rules of system security: never trust user input. All user input to a program or website should be sanitized by checking and processing it to make sure that it will not do damage to the system.

There are several reasons why this is necessary. First of all, programmers have to deal with user ignorance that may lead to user input breaking the system. Second, programmers have to stop deliberate attacks designed to break the system.

How Input Can Be Used to Hack a System

In the xkcd comic strip the computer savvy mother hacked the school database by naming her son a MYSQL statement that causes the database to destroy the student records.Read more..

Your rating: None Average: 2 (1 vote)

Introduction In this modern world people are forced to use electronic devices in their daily life. Now day's electronic voting machines are used for election. Here we introduced a cellular voting machine based on micro controller. In this system there are two units, a master unit and a voting unit. The voting unit is placed anywhere and the master unit is placed in a control room. The voting unit contains a DTMF coyer, which generates a DTMF tone and is transmitted to the master unit through the FM transmitter. The master contains a FM receiver, DTMF decoder, Micro controller and Display units. The tone from the voting unit is received by the receiver and is decoded and specific functions are carried out by micro controller and then it is displayed.
Your rating: None Average: 3.4 (19 votes)

If you’re anything like us, you’re plugging and unplugging your USB thumb drives (and other usb devices) all day, multiple times a day. 
Hopefully you’re right clicking on the little “Remove Hardware Safely” icon in your system tray in order to remove and avoid damaging or losing data from your USB drives/devices. The problem is, it becomes kind of a pain if you’re constantly switching out or removing USB drives. This tutorial will show you how to create a shortcut for the “Safely Remove Hardware” dialog, and as if that weren’t cool enough, we’ll even show you how to create a hotkey to bring up the dialog with one keystroke.Read more..
Your rating: None Average: 4 (3 votes)

Windows Activator ALL-OS Ultimate Edition Series June 2009 Build 5168 is a new window activation tool.Using Windows Activator ALL-OS Ultimate Edition Series June 2009 Build 5168 tool u guys can activate any version of Window.Read more..

Your rating: None Average: 3.5 (4 votes)

If you have a website too big for a web host or you want to be able to quickly make changes on your website, you may want to try to run your own web server on the computer you are viewing this page from. This guide will tell you home web server basics and not tell you how to work with a particular software.Read more..

Your rating: None Average: 2 (1 vote)

Sometimes when you finish installing your Windows operating system you are missing drivers. The easy ones like chipset,network and graphics are easy to find, but what about the rest? Below is a screenshot of the details on the Intel Gigabit network card. Nothing special there, it’s installed and it’s working fine.


If Windows wouldn’t be able to find drivers for it the Details pane would still be visible and you would se the Device Instance Id. From that one line we can get everything we need. So let’s try it out.Read more..

Your rating: None Average: 3.5 (2 votes)

Prey is a lightweight program that will help you track and find your laptop
 if it ever gets stolen. It works in all operating systems and not only is it Open Source but also completely free.

Read more..

Your rating: None Average: 2 (1 vote)

Is your security worth its salt? Try this assessment strategy to find out.
Read more..
Your rating: None Average: 2 (1 vote)

Let's talk about the fun stuff. The first trick I will discuss is an activity that is becoming quite prevalant, SIM cloning. If you have paid attention to any cell phone related tutorials in the past, then you may remember cloning being made popular by certain public figures like Kevin Mitnick in order to place calls on the bill of another subscriber. Well, even with GSM this trick still holds relevant. How could such a flaw exist in a system that is obviously concentrated on preventing such fraudulant use? The flaw is within the COMP128 authentication algorithm used as an instantiation of A3/A8 widely used by gsm providers. Unfortunately for these providers, the COMP128 algorithm is just not strong enough to prevent fraud. We attack the algorithm by using a chosen-challenge attack, which works by forming a number of specially-chosen challenges and querying the SIM card for each one. Then by analyzing the responses from these queries, we are able to determine the value of the secret key that is used for authentication.Read more..
Your rating: None Average: 4.3 (16 votes)


Attribute Manager is a simple program that you can use to customize all the properties of a file. These properties include:

  • Read-only property
  • Hidden property
  • System property
  • Archive property
  • The time and date that the file was made
  • The time and date that the file was modified
  • The time and date that the file was last accessed

The interface and functionality are really easy-to-understand that even the naive person can understand it. Just open a file. Set/customize/change its different properties and save settings.


Download Attributes Manager

Your rating: None Average: 3 (2 votes)

Forget about winrar and winzip. Compress data to the maximum limit. You can convert data in GBs into few Mbs of size with this little devil. KGB Archiver is the compression tool with an unbelievably high compression rate. One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives. This is one of the strongest encryption known so far. And its free. All you need is a bit stronger hardware. It takes time but its worth it. I have compressed many movies into few mb of size to fit these in my 1GB USB drive with this software. I mean from 5GB to 400mb size conversion; That's something. Talk about backing up all hard drive into few GBs to fit in a DVD drives.

Download KGB Archiver
No votes yet

Now we download stuff almost daily. New products pop out so often. You can use any software forever you want. You can download trial version, right. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software to not count days or do not bother about time. The software will stay and keep working like original software forever and will not expire or cease to work. You do not have to change your system clock. This little software does it all.

Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software. Read more..

No votes yet

Your rating: None Average: 2.8 (10 votes)

The GPRS is a new service that provides actual packet radio access for mobile Global System for Mobile Communications (GSM) and Time-Division Multiple Access (TDMA) users. The main benefits of GPRS are that it reserves radio resources only when there is data to send and it reduces reliance on traditional circuit-switched network elements. The increased functionality of GPRS will decrease the incremental cost to provide data services, an occurrence that will, in turn, increase the penetration of data services among consumer and business users.

Read more..

Your rating: None Average: 4.2 (6 votes)

COOPERATIVE LINUX, abbrieviated as coLinux, is a software that lets Microsoft Windows cooperate with the Linux kernel, to run both in parallel, on the same machine. Cooperative Linux utilizes the concept of a Cooperative Virtual Machine (CVM). In contrast to the traditional Virtual Machines(VMs), the CVM shares, the resources that alCOOPERATIVE LINUX, abbrieviated as coLinux, is a software that lets Microsoft Windows cooperate with the Linux kernel, to run both in parallel, on the same machine. Cooperative Linux utilizes the concept of a Cooperative Virtual Machine (CVM). In contrast to the traditional Virtual Machines(VMs), the CVM shares, the resources that already exist in the host OS. In traditional (host) VMs, resources are virtualized for every (guest) OS.Read more..
No votes yet

MRAM, the new breed of semiconductor memory uses magnetic properties to store data. This new kind of chip will compete with other established forms of semiconductor memories such as Flash memory and random access memory (RAM). Most engineers believe, that the technology called magnetoresistive random-access memory(MRAM) could reduce the cost and power consumption of electronics for cell phones, music players, laptops and servers.

The feature, that makes MRAM an alluring alternative to other forms of semiconductor memories, is the way it stores data. For example, flash memory and random-access memory(RAM) hold information as electric charge. In contrast, MRAM uses the magnetic orientation of electrons to represent bits.Using MRAM, reading and writing of data can be done unlimitedly with in nanaoseconds. MRAM can also hold the data with out a power supply.

Your rating: None Average: 4.2 (12 votes)

Generic visual perception processor is a single chip modeled on the perception capabilities of the human brain, which can detect objects in a motion video signal and then locate and track them in real time. Imitating the human eye s neural networks and the brain, the chip can handle about 20 billion instructions per second. This electronic eye on the chip can handle a task that ranges from sensing the variable parameters as in the form of video signals and then process it for coGeneric visual perception processor is a single chip modeled on the perception capabilities of the human brain, which can detect objects in a motion video signal and then locate and track them in real time. Imitating the human eye s neural networks and the brain, the chip can handle about 20 billion instructions per second.Read more..
Your rating: None Average: 2.9 (9 votes)

Information Technology (IT) departments are looking for cost-effective storage solutions that can offer performance, scalability, and reliability. As users on the network increase and the amounts of data generated multiply, the need for an optimized storage solution becomes essential. Network Attached Storage (NAS) is becoming a critical technology in this environment.

The benefit of NAS over the older Direct Attached Storage (DAS) technology is that it separates servers and storage, resulting in reduced costs and easier implementation. As the name implies, NAS attaches directly to the LAN, providing direct access to the file system and disk storage. Unlike DAS, the application layer no longer resides on the NAS platform, but on the client itself. This frees the NAS processor from functions that would ultimately slow down its ability to provide fast responses to data requests.Read more..

Your rating: None Average: 2.8 (8 votes)

This paper describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today s systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer.

1.1 HISTORYRead more..

Your rating: None Average: 4.5 (2 votes)

A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem s Java Ring was introduced at their JavaOne Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor.

Workstations at the conference had ring readers installed on them that downloaded information about the user from the conference registration system. This information was then used to enable a number of personalized services. For example, a robotic machine made coffee according to user preferences, which it downloaded when they snapped the ring into another ring reader.Read more..

Your rating: None Average: 2.5 (4 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Years teach us more than books.

Explore Tags

Follow Us