Quick Access

User login

Who's online

There are currently 0 users and 0 guests online.

Visitors Map

Site Counter

  • Site Counter: 493345
  • Registered Users: 57243
  • Published Nodes: 330
  • Your IP: 162.158.78.195
  • Since: 2008-09-09

Link Exchange

BlogCatalog Blog Directory
Technology Business Directory - BTS LocalTop stories
Click here
         SecGeeks
       Megapanzer

Live Traffic Info

August 2009

FireCAT (Firefox Catalog of Auditing exTension) is a mindmap collection of the most efficient and useful firefox extensions oriented application security auditing and assessment

FireCAT 1.5 will be the last release of this 1.x branch. In fact, we are working on a new improved version 2.0 (management of plugins, instant download from security-database, ability to add new extension, extension version checker, Firefox 3.X compatible extensions..)


Changes for FireCAT 1.5Read more..

Your rating: None Average: 3.6 (7 votes)

pwntooth (pown-tooth) is designed to automate Bluetooth Pen-Testing. It scans for devices, then runs the tools specified in the pwntooth.conf; included blueper, bluesnarfer, Bluetooth Stack Smasher (BSS), carwhisperer, psm_scan, rfcomm_scan, and vcardblaster.

pwntooth is a fully automated "search and destroy" tool for advanced users who wish to run a series of tests against each device in the target area. While there are some pre-configured lines in the pwntooth.conf file, it is mostly designed for users to specify their own pen-testing configuration. pwntooth can be used in conjunction with mant other tools not included in the package.

Included utilities in the toolsetRead more..

Your rating: None Average: 2.5 (2 votes)

Thinking build your own social network, here is a list of free social network application  that able to build online social network for you own online Community similar like successful website such as MySpace, Bebo, and Facebook features.
Read more..
Your rating: None Average: 2.8 (4 votes)


When you hear of computer forensics, the first thing that pops to mind might be a Crime Scene Investigator, pulling the plastic sheet off of a computer and inspecting for signs of a struggle. Nobody really ever talked about forensics in daily life until they started making those scientifically accurate primetime cop shows, so of course, simple word association generally leads us to forensic sciences being “Something cops do, right?”

Incidentally, the science behind computer forensics really isn’t much different from the science between crime scene forensics. In both instances, the forensics team or expert is looking for a trail of evidence. In either case, the investigator looks at what has happened, determines how it happened, and from that, deducts who might be responsible.

The major difference between the two is that, while an investigator on the scene of a robbery or a violent crime is looking for physical evidence, the computer forensics investigator is looking for digital evidence.

Interestingly, where physical evidence can often be misleading, confusing, ambiguous, and difficult to put together without the help of witness statements, digital evidence tends to present itself in a much more direct manner.

Read more..

Your rating: None Average: 4 (3 votes)

WirelessHD is an effort of the consortium led mainly by LG , Matsushita, NEC, Samsung, SiBEAM, Sony and Toshiba to define a standard for the next generation wireless digital network interface specification for wireless high-definition signal transmission for consumer electronics products and they intend to finalize on one standard by spring 2007. The WirelessHD (WiHD) is designed and optimized for wireless display connectivity thereby achieving high-speed rates from 2 Gbit/s to 5 Gbit/s for the CE, PC, and portable device segments in its first generation implementation. This standard aids in uncompressed, digital transmission of HD video and audio signals, making it like wireless HDMI, in theory. data rates as high as 20 Gbit/s (compared to 10.2-Gbit/s for HDMI 1.3)are possible with its core technology, permitting it to scale to higher resolutions, color depth, and range.Read more..

Your rating: None Average: 3.5 (130 votes)

Having both the standard and high definition data content in the MPEG-2 format, the D-VHS digital video format was first introduced by JVC with the support of Hitachi, Matsushita and Philips. The format first used in 1998 employs the same physical cassette format and recording mechanism as VHS. Released in the UK as JVC D-VHS deck, the instrument became very popular with domestic video recordings. The instrument best known as a digital recorder for traditional analog inputs such as domestic analog TV and digiboxes for digital broadcasts was not a bitstream recorder, although it did have a DV input. Using the deck, high quality and cost effective pictures were recorded from D-VHS to S-VHS tapes. The biggest short coming of this D-VHS tape where the D stands for data was the lack of a DV output and RGB input via the SCART connector (PAL territories only as the NTSC versions had component outputs). Though became a huge hit among the domestic users, it failed to compete with its successors like the DVD and the HDD in the wholesale video market.
Your rating: None Average: 3.7 (52 votes)

Developed by McDonnell-Douglas in 1984, the laser filmisa transmissive laser based playbackmedium. Working on the topology that laser has to shine through one side of the disc to a receiving sensor on the other side, where the beam of the laser would be interrupted by a spiral of small dots on the disc,which can then modulate the laser beam to represent the video and audio information, which was then interpreted by the receiving sensor receiving the beam on the other side Made of the ordinary photographic film, similar to the Selectavision CED videodisc system, this wasn’t successfully marketed by McDonnell-Douglas, thesole manufacturer of the laser film player. Having originated from ARDEV, which was originally a subsidiary of Atlantic Richfield until 1981, this format is usually employed in flight stimulators.
Your rating: None Average: 4 (47 votes)

Television systems that have a resolution that meets standards but not considered high definition, this is what Standard-definition television or SDTV refers to. This usually refers to digital television, especially while broadcasting at the same (or similar) resolution as analog systems. In ATSC, SDTV can be broadcast in 704 pixels × 480 lines with 16:9 aspect ratio (40:33 rectangular pixel), 704 pixels × 480 lines with 4:3 aspect ratio (10:11 rectangular pixel) or 640 pixels × 480 lines with 4:3 ratio (and square pixels). The refresh rate can be 24, 30 or 60 pictures per second. Digital SDTV in 4:3 aspect ratio has the same form as the regular analogue TV (NTSC, PAL, PAL2, SECAM) excluding the ghosting, snowy images and static noises but however with poor reception one may encounter various other artifacts such as blockiness and stuttering. Though ATSC and ISDB were originally developed for HDTV, they later proved their ability to deliver multiple SD video and audio streams via multiplexing, than to use the entire bit stream for one HD channel.Read more..
Your rating: None Average: 2.8 (23 votes)

Artificial Neural Networks commonly referred to as ‘Neural Networks’ is a new branch of AI, that enabled a crude simulation of the structure of human brain electronically or in software. The inherent properties of human brain enable it to analyze complex patterns consisting of a number of elements, those individually reveal little of the total pattern, yet collectively represent easily recognizable objects. The concepts of Neural Networks have been motivated right from its inception, by the recognition that the human brain computes in an entirely different way from the conventional digital computers. The brain modeling techniques opens a new era of Computer System that learns, from experience and uses its experiential knowledge next time. This biologically inspired method is being touted as the wave of the future in computing, relieving the programmer from the cubicle of traditional algorithmic problem solving. Inherent non-linearity property of Neural Networks makes it particularly suitable in many signal-processing applications like sound, image processing etc.
Your rating: None Average: 3.8 (52 votes)

Display devices form an important group of devices in the electro industry. With the evolution of high definition TV (HDTV), video conferencing and other advancements in video applications, their importance is increasing. Traditionally cathode ray tubes (CRTs) are used in display devices. But the industry is searching for devices with high resolution and fill ratios that cannot be achieved in CRTs. LCDs can be use an alternative but they are not cost effective. An entirely new type of devices based on Grating Light Valve technology solves all the problems concerning resolution, fill ratio, cost, size and consumption. In addition to this GLV devices can provide digital gray scale and color reproduction. The GLV technology is based on micro electromechanical system (ME technology and can be manufactured using mainstream IC fabrication technology. providing controlled diffraction of incident light, a GLV device will produce bright dark (or even coloured) pixels in a display system. The seminar should cover, 1. Fundamental concepts 2. Architecture of GLV 3. Controlling the GLV device 4.Read more..
Your rating: None Average: 3.8 (25 votes)

Holographic associative memory can be considered as a type of artifical neural network, which is having close association with the family of analog, correlation-based, stimulus-responsive memories. In Holographic associative memory, the information is mapped on to the phase orientation of complex numbers operating. The ability of holographs in carrying out effective associative memory tasks, generalization and pattern recognition with changeable attention has given holographic memory the cutting edge over others. Natural memory has the capacity for dynamic search localization. As an example if we take the human visual perception, we the humans always have the tendency to focus on specific objects in pattern, that too we can do it with changing the focus from object to object. The computational model also does the same as the human does it, where the heart of this memory has a novel bi-model representation of pattern and a hologram like complex spherical weight state space.Read more..
Your rating: None Average: 2.9 (8 votes)

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password.. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this method quickly becomes useless. Do you ready to wait for two months while your 9-character password is cracked? What about one hundred years for an 11-character password? Besides the maximal length of the character set you should also specify the character set i.e. the list of characters that will be included in the combinations. The longer the character set is, the longer the required period of time is. Here is the problem: usually you have no idea of what characters are present in the password.Read more..
Your rating: None Average: 3.8 (4 votes)

Have you ever wanted to try the Android OS? but didn’t have the device that supports it, don’t worry you can still try the Google Android OS on your PC with the help of Live Android Image, just burn it on a disc and you are ready to experience the Android world, Insert the Disc and reboot your PC, Boot into Android OS, During Bootup you can use alt+F1 or alt+F7 to switch between GUI and console.


Google Chrome OS has also been announced, and it could be a better version of Android OS or may be completely different form of Linux OS specially designed for netbooks during its initial phase (releasing in second half of 2010), later it will also become available for mainstream desktop PCs.Read more..

Your rating: None Average: 4.6 (29 votes)

It is an optical disc technology in the infant state of research, that utilizes the revolutionary collinear holography technique that has one red laser and one blue-green laser collimated into a single beam. The data that is programmed as laser interference fringes from a holographic layer at the top of the disc is read by the blue-green laser where as the servo information from the common CD style aluminum layer near the bottom is read by the red laser, which is used as the reference beam. This disc capable of storing 3.9 terabytes of data also has a dichroic mirror layer between the holographic data and servo data, that can reflect the blue-green laser while allowing the red laser to pass through. This feature has enhanced the performance of this storage media compared to the past holographic storage media where there was lot of interferences due to both the laser passing through also lacked in its compatibility to the current CD and DVD technology.Read more..
Your rating: None Average: 3.4 (16 votes)

For the past six years, Digital Light Processing technology from Texas Instruments has made significant inroads in the projection display market. With products enabling the world’s smallest data and video projectors, HDTV’s, and digital cinema, DLP technology is extremely powerful and flexible. With success of the DMD as a spatial light modulator for projector applications, dozens of new applications are now being enabled by general- use DMD products that are recently available to developers. The same light switching speed and “on-off” (contrast) ratio that have resulted in superior projector performance, along with the capability of operation outside the visible spectrum, make the DMD very attractive for many applications, including volumetric display, holographic data storage, lithography, scientific instrumentation, and medical imaging.Read more..
Your rating: None Average: 4 (18 votes)


Steganography is the art and science of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life. Computer-based steganographic techniques introduce changes to digital covers to embed information foreign to the native covers.Digital steganography involves the hiding of data inside a sound or image file.Steganography works by replacing bits of useless or unused data in regular computer files such as graphics, sound, text, HTML, or even floppy disks with bits of different, invisible information. Steganography strips less important information from digital content and injects hidden data in its place. This is done over the spectrum of the entire image. Computer-based steganographic techniques introduce changes to digital covers to embed information foreign to the native covers. This hidden information can be plain text, cipher text or even images. The hidden information may be communicated in the form of text, binary files, or cipher text.Read more..
Your rating: None Average: 3.9 (29 votes)

The Digital Transmission Content Protection (DTCP) defines a cryptographic protocol for protecting audio /video entertainment content from illegal copying, intercepting and tampering as it traverses high performance digital buses, such as the IEEE 1394 standard. DTCP ensures that the copy protection mechanism is built into Digital Audio/Video devices themselves (in addition to Traditional Encryption). This seminar will outline the basic principles of cryptography; and tells us about the cryptographic functions used in it. It will briefly look at the IEEE1394 standard where it is being implemented. This seminar will nevertheless discuss DTCP including different layers of copy protection and some implementation aspects. This seminar also provides a case study of typical use of content protection in Digital TV and Digital VCR implementation. A product solution could include hardware and software implementation for the Digital Transmission Content Protection mechanism
Your rating: None Average: 3.2 (10 votes)

Electronic paper (E-paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) by electronic means , thousands or millions of times. E-paper will be used for applications such as e-books, electronic newspapers, portable signs, and foldable, rollable displays. Information to be displayed is downloaded through a connection to a computer or a cell phone, or created with mechanical tools such as an electronic "pencil”. The Electronic Paper Display is reflective and can be easily read in bright sunlight or dimly lit environments while being able to be seen at virtually any angle - just like paper. Its black and white ink-on-paper look gives an appearance similar to that of the most widely read material on the planet newspaper. The unique technology results in a compact and lightweight form factor allowing it to be ideal for highly portable applications. This seminar aims to throw light on the different technological approaches working toward the complete realization of the E-paper concept.
Your rating: None Average: 3.7 (32 votes)

In the development of packaging of electronics the aim is to lower cost, increase the packaging density, and improve the performance while still maintaining or even improving the reliability of the circuits. Flip chip microelectronic assembly is the direct electrical connection of face-down electronic components onto substrates, circuit boards, or carriers, by means of conductive bumps on the chip bond pads. Flip chip is also called Direct Chip Attach (DCA), since the chip is directly attached to the substrate, board, or carrier by the conductive bumps. Flip chip has advantage in size, performance, flexibility, reliability, and cost over other packaging methods. There are three stages in making flip chip assemblies: bumping the die or wafer, attaching the bumped die to the board or substrate, and, in most cases, filling the remaining space under the die with an electrically non-conductive material. Several varieties of flip chip assembly are solder bump, plated bump, gold stud bump, and adhesive bump suit flip chip which are used in a wide range of applications.Read more..
Your rating: None Average: 3.8 (11 votes)

It’s quite natural that new technologies are emerging from time to time. The technology leader should not be backward in this process. Intel has been showing its leadership by developing new and new technologies like processors. This time Intel shows its power by the development of a new chipset series. Chipsets are not always cared by everyone. All focus on the Processors. But a processor without a good chipset to support its capabilities is not of full use. Here Intel makes a breakthrough by the development of new 9XX series chipsets. This seminar talks on the new chipsets of Intel, the 9XX series. The seminar discuss the breakthrough capabilities of the new Chipsets, The PCI Express Bus, The Graphics Media Accelerator 900, The Matrix storage technology, Intel High Definition Audio etc with a focus on the PCI Express Bus. It is because of the fact that there is no merit gained by using a very fast processor and fast memories or graphic cards with a slow interconnect between them. There PCI Express Bus comes into play.Read more..
Your rating: None Average: 3.5 (2 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

If you born as a poor, its not your mistake.But if you dead as a poor, its your own mistake
— Bill Gates

Explore Tags

Follow Us