Friday, September 18, 2009

Top 5 Computer Hackers of All Time

Jonathon James
Born in South Florida in 1983, Jonathon James was only 15 years old when he began hacking into various systems in 1998-1999. What really got the attention of authorities was when James hacked into the computers of the Defense Threat Reduction Agency (DTRA), a special division of the Department of Defense.
James later admitted he installed a packet sniffer on a server via an unauthorized backdoor. The sniffer allowed him to intercept passwords (10 considered critical) and over 3,000 messages passing to and from DTRA employees.
James also hacked into NASA computers, where he downloaded software worth $1.7 million. NASA was forced to shut down their computers for 3 weeks once the threat was detected, costing NASA an additional $41,000.
On January 26, 2000, James house was raided by agents from the Department of Defense, NASA, and local authorities. James eventually pleaded guilty to 2 counts of juvenile delinquency in exchange for a lesser sentence of 6 months of prison and probation until the age of 18.
Today, currently 24, James is looking to start his own computer security company.
Computer Used: Gateway Pentium 266Online Alias: c0mradeInteresting Fact: First juvenile incarcerated for cyber crime in the United States
Adrian Lamo
Lamo was born in Boston Massachusetts in 1981. Adrian Lamo is famous for his attempts to identify security flaws on the networks of Fortune 500 companies and notifying them if he found them. Although very noble, the practice is still highly illegal in most places without permission.
He generally took advantage of improperly configured proxies to gain access to networks. His list of targets included:The New York TimesMicrosoftYahoo!CingularCitiGroupBank Of AmericaMcDonaldsLamo is most famous for his 2002 success of breaking into the New York Times computer network and adding his name to databases of expert sources. The Times did not find his actions amusing, and after a 15 month investigation, a warrant was filed for Lamos arrest. Lamo spent a few days in hiding, eventually surrendering to US Marshals.
Lamo pleaded guilty to 1 count of computer crimes against Microsoft, Lexis-Nexis and The New York Times in January 2004. He was sentenced to 6 months detention at his parent's home and 2 years probation, and ordered to pay $65,000 in restitution.
Today Lamo is a senior staff writer at the American River Current.
Interesting Fact: Lamos was removed from a NBC Nightly News segment when NBC asked him to perform his skills on camera and ended up gaining access to NBC's internal network.
Kevin Mitnick
Mitnick is a very interesting addition to the top 5 list because most of his notorious acts came about via social engineering rather than abusing security flaws. He was able to obtain user names and passwords, modem phone numbers, and other various pieces of information solely through social engineering.
His first arrest was a result of a Memorial Day weekend in 1981 incident. Mitnick and two friends talked their way past a security guard at Pacific Bell's phone center and found databases of passwords to access computers and door locks. They even planted pseudo names in various places to setup future social engineering. The case was later solved when an ex-girlfriend of one of the men went to the police.
It has been proven Kevin Mitnick managed to do all the following using social engineering (many more things were never proven):Use the LA Bus system to get free rides at the age of 12Evade the FBIGain admin privileges to an IBM minicomputerGain access to the systems of Motorola, NEC, Nokia, Sun & FujitsuIn 2000, Mitnick was released from prison after serving 5 years (4 ½ years in pretrial, 8 months of solitary confinement). He was initially not allowed to access the internet until 2003, but fought the decision in court and won.
Mitnick now runs Mitnick Security Consulting, where his fame has gained the occasional attention of hackers to occasionally break his company's website.
Kevin Poulsen
First Computer To Hack With: TRS-80 color computer
In 1982, at the age of 17, Poulsen managed to hack into the US Department of Defense's Arpanet, the ancestor of the internet. He wasn't prosecuted, and later ended up working for Sun Microsystems as a programmer.
Poulsens best known hack was when he took over the telephone lines of Los Angeles radio station KIIS-FM, guaranteeing that he would be caller 102 and winning a Porsche. He also used the same scheme to win $20,000 and 2 Hawaiian vacations.
In 1988, Poulsen came into real heat in when the FBI suspected Poulsen of hacking sensitive federal investigation databases. He immediately disappeared off the radar. When NBC featured Poulsen on Unsolved Mysteries, the shows 1-800 phone lines 'mysteriously' crashed.
Poulsen was eventually caught in a supermarket in 1991, after shoppers recognized this famous hacker and tackled him in the store. Poulsen pleaded guilty in 1994 to 7 counts of mail, wire and computer fraud and was sentenced to 51 months in prison and ordered to pay $56,000 in restitution. At the time, 51 months was the longest ever sentence given to hacker.
More recently, Poulsen used his skills to find 744 sex offenders with MySpace profiles leading to 1 arrest. Poulsen has not had trouble finding work due to his highly desired abilities.
Robert Morris
Morris, son of a former NSA chief scientist, is notoriously known for creating the first computer worm spread via the internet.
Morris created the worm in 1988 as a graduate student at Cornell University. According to Morris, he created the worm with the intent of gauging the size of the internet. He programmed the worm to detect if the infection was already present on the computer and compute a tally. Morris believed administrators would defeat his worm by instructing the computer to send a false signal back to worm. Morris decided the best method to solve that issue was to instruct the worm to infect the computer 14% of the time regardless. This resulted in exponential spreading of the worm, destroying thousands of machines.
Morris was indicted in 1989 under the Computer Fraud and Abuse Act, the first Peron to be indicted under this act. In 1990 Morris was sentenced to 3 years probation, 400 hours of community service and a $10,050 fine.
Today, Morris is an associate professor at MIT in the Engineering and Computer Science Department, focusing mainly on computer network architecture.

Top 20 Replies by Programmers

Top 20 Replies by Programmers to Testers when their programs don't work
20. "That's weird..."
19. "It's never done that before.."
18. "It worked yesterday."
17. "How is that possible?"
16. "It must be a hardware problem."
15. "What did you type in wrong to get it to crash?"
14. "There is something funky in your data."
13. "I haven't touched that module in weeks!"
12. "You must have the wrong version."
11. "It's just some unlucky coincidence."
10. "I can't test everything!"
9. "THIS can't be the source of THAT."
8. "It works, but it hasn't been tested."
7. "Somebody must have changed my code."
6. "Did you check for a virus on your system?"
5. "Even though it doesn't work, how does it feel?"
4. "You can't use that version on your system."
3. "Why do you want to do it that way?"
2. "Where were you when the program blew up?"
And the Number One Reply by Programmers when their programs don't work:


GuessGuess.............
Come on, even u say it ......


Guess.............

"It works on my machine"

London Stock Exchange acquires Millennium IT for US$30m

The London Stock Exchange Group plc today announced in a statement on its website that it has agreed to acquire Millennium IT, a Sri Lankan-based technology services company serving the capital markets industry, for US$ 30 million.Millennium IT’s high performance technology will provide the Group with a highly scalable and very low latency in-house developed trading system with multi-asset class functionality and quicker product speed to market. In addition, the transaction will give MillenniumIT the backing of the Group to enable it to develop further its global exchange technology business. MillenniumIT will retain its culture of innovation and creativity, build on its commercial operations and continue serving its existing clients, with its CEO, Tony Weeresinghe, reporting directly to Xavier Rolet. Xavier Rolet, Chief Executive of London Stock Exchange Group, said:“Improving our technology and increasing our competitive position in the fast-moving trading environment is vital. This transaction enables the Group to implement a new, more agile, innovative and efficient IT capability for our future business development as well as running a new cash trading platform which will provide substantially lower latency, significantly higher capacity and improved scalability. “It will also offer cost saving opportunities in the future and give the Group a footprint in Asia. Moreover, MillenniumIT is a proven business, already serving multiple clients in multiple geographies, including some of the best known in their fields. The potential from this transaction is considerable for both parties.”Tony Weeresinghe, CEO of MillenniumIT, said:“This transaction with London Stock Exchange Group is a tribute to the innovative culture of our company, the quality of our technology solutions and our deep pool of talented staff. The Group’s backing gives us the resources to continue supporting our existing customers, expanding the company into other markets and investing for the future.”David Lester, Director of Information and Technology, London Stock Exchange Group, said:“MillenniumIT are a leader in developing low cost high performance trading platforms and financial markets software. Going forward, as well as serving existing and new clients, they will be the Group’s in-house software development team, gradually replacing our current suppliers and bringing intellectual property and know-how fully within the company. We look forward to introducing their proven trading platform before the end of 2010, which will provide our clients with sub-millisecond trading latencies and give the Group a very fast, multi-product, cost-efficient, scalable trading platform. The transition will be carefully managed, with further enhancements to TradElect planned in the interim.”The Group will begin migrating clients to MillenniumIT’s trading system from the end of 2010, replacing TradElect, Infolect, and other interfaces. The new platform will allow the Group to enrich its functionality, in particular for Italian clients, with the possibility of accommodating both trading after hours and stop loss orders.IT development and operational costs for the Group will be reduced, resulting in estimated annual cost savings of at least £10 million from FY2011-12.Depreciation of investment in the current TradElect trading platform will be accelerated as a result of the transaction, and further planned upgrades that take place in the interim will be taken as operating expenses in the period they occur. In total, these are expected to represent non-recurring incremental costs of £25 million in FY2010 and £6 million in FY2011. Under the terms of the Offer, the Group has offered to acquire 100 per cent of MillenniumIT’s shares for cash consideration with a share alternative. It is estimated that 73 per cent of the total deal consideration will be paid in cash, with the rest in new LSEG shares to be issued, estimated at around 600,000 shares.The Group has already received irrevocable undertakings representing over 90 per cent of the shares in MillenniumIT.

Sri Lanka IT firm to be bought by London Stock Exchange: report

Sept 15, 2009 (LBO) - Sri Lanka's Millennium IT will be acquired by London Stock Exchange and its faster trading software would replace the British bourse's existing platform, a media report said.

The report said LSE could pay around 50 million sterling pounds (about 9.4 billion rupees) to buy the technology firm.
Britain's Financial Times newspaper said MillenniumIT's system was claimed to the fastest in the world, handling a trade in 130 microseconds, compared with 250 microseconds for the Nasdaq's OMX system.

The MillenniumIT system can handle up to one million messages per second, compared with 20,000 on the London Stock Exchange's TradElect system and Chi-X Europe's system which processes 225,000 messages per second, the report said.

Mr Rolet told the Financial Times this month that lack of capacity was holding the LSE back.

"We have to [upgrade] because the technology specifications are no longer competitive and that’s impacting our ability to support volume growth," Xavier Rolet, chief executive of the London Stock Exchange as saying.


MilleniumIT, founded by Sri Lankan Tony Weerasinghe developed the Colombo Stock Exchange trading software, making it the most advanced trading platform in the region at the time.

The firm was financed by venture capital funds. There were expectations at one time of an exit through a public listing.

Tuesday, July 28, 2009

The mobile phone gun

Most of us see airport security as a pain.. Some of us even feel violated. When you see the below pictures, you'll understand why they want our cell phones through the x-ray machine. If you get asked to test your cell phone at the airport, this is the reason. Cell phone guns have arrived.

AND they are real..

Beneath the digital phone face is a .22 caliber handgun capable of firing four rounds in rapid succession using the standard telephone keypad. European law enforcement officials are stunned by the discovery of these deadly decoys. They say phone guns are changing the rules of engagement in Europe. Only when you have one in your hand do you realize that they are heavier than a regular cell phone.

Be patient if security asks to look at your cell phone or turn it on to show that it works. They have a good reason! Wake up to our NEW WORLD!! We shouldn't complain about airport security 'invading your privacy.

Sunday, June 28, 2009

How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system

This article describes how to determine whether a computer is running a 32-bit version or 64-bit of the Windows operating system. Generally, a computer's bit count indicates how much data it can process, the speed with which it can process the data, and the memory capacity. In order to optimize the computer's performance, the bit count of the operating system that is installed on the computer should match the bit count of the computer itself.

Determine the operating system bit count
loadTOCNode(2, 'moreinformation');

Locate the operating system that is running on your computer in this section, and then follow the steps to determine the bit count of your operating system.
Windows Vista
loadTOCNode(3, 'moreinformation');

If you have Windows Vista, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System window in Control Panel
loadTOCNode(4, 'moreinformation');

Click Start
Collapse this imageExpand this image
, type system in the Start Search box, and then click system in the Programs list.
The operating system is displayed as follows:
For a 64-bit version operating system: 64-bit Operating System appears for the System type under System.
For a 32-bit version operating system: 32-bit Operating System appears for the System type under System.
Method 2: View System Information window
loadTOCNode(4, 'moreinformation');

Click Start
Collapse this imageExpand this image
, type system in the Start Search box, and then click System Information in the Programs list.
When System Summary is selected in the navigation pane, the operating system is displayed as follows:
For a 64-bit version operating system: x64-based PC appears for the System type under Item.
For a 32-bit version operating system: x86-based PC appears for the System type under Item.If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.
Windows XP
loadTOCNode(3, 'moreinformation');

If you have Windows XP, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel
loadTOCNode(4, 'moreinformation');

Click Start, and then click Run.
Type sysdm.cpl, and then click OK.
Click the General tab. The operating system is displayed as follows:
For a 64-bit version operating system: Windows XP Professional x64 Edition Version <> appears under System.
For a 32-bit version operating system: Windows XP Professional Version appears under System. Note is a placeholder for a year.
Method 2: View System Information window
loadTOCNode(4, 'moreinformation');

Click Start, and then click Run.
Type winmsd.exe, and then click OK.
When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
If the value that corresponds to Processor starts with ia64 or AMD64, the computer is running a 64-bit version of Windows.If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.
Windows Server 2003
loadTOCNode(3, 'moreinformation');

If you have Windows Server 2003, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel
loadTOCNode(4, 'moreinformation');

Click Start, and then click Run.
Type sysdm.cpl, and then click OK.
Click the General tab. The operating system is displayed as follows:
For a 64-bit version operating system: Windows Server 2003 Enterprise x64 Edition appears under System.
For a 32-bit version operating system: Windows Server 2003 Enterprise Edition appears under System.
Method 2: View System Information window
loadTOCNode(4, 'moreinformation');

Click Start, and then click Run
Type winmsd.exe, and then click OK.
When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
If the value that corresponds to Processor starts with EM64T or ia64, the computer is running a 64-bit version of Windows.If you cannot determine the operating system bit count by using these methods, go to the "Next Steps" section.Notes
To find the computer’s bit count, see the documentation that was included with the computer, or contact the hardware manufacturer.
Intel Itanium-based computers can run only 64-bit versions of Windows. Intel Itanium-based computers cannot run 32-bit versions of Windows. Currently, 64-bit versions of Windows run only on Itanium-based computers and on AMD64-based computers.

Saturday, May 30, 2009

Difference among CV, Resume and BioData

People use the words RESUME, C.V., and BIO-DATA interchangeably for thedocument highlighting skills, education, and experience that a candidatesubmits when applying for a job. On the surface level, all the threemean the same. However, there are intricate differences.
RESUME
Resume Is a French word meaning "summary", and true to the wordmeaning, signifies a summary of one's employment, education, and otherskills, used in applying for a new position. A resume seldom exceeds oneside of an A4 sheet, and at the most two sides. They do not list out allthe education and qualifications, but only highlight specific skillscustomized to target the job profile in question.A resume is usually broken into bullets and written in the third personto appear objective and formal. A good resume starts with a briefSummary of Qualifications, followed by Areas of Strength or IndustryExpertise in keywords, followed by Professional Experience in reversechronological order. Focus is on the most recent experiences, and priorexperiences summarized. The content aims at providing the reader abalance of responsibilities and accomplishments for each position. AfterWork experience come Professional Affiliations, Computer Skills, andEducation

C.V CURRICULUM VITAE
C.V Is a Latin word meaning "course of life". CurriculumVitae (C.V.) is therefore a regular or particular course of studypertaining to education and life. A C.V. is more detailed than a resume,usually 2 to 3 pages, but can run even longer as per the requirement. AC.V. generally lists out every skills, jobs, degrees, and professionalaffiliations the applicant has acquired, usually in chronological order.A C.V. displays general talent rather than specific skills for anyspecific positions.
BIO-DATA
Bio Data the short form for Biographical Data, is the old-fashionedterminology for Resume or C.V. The emphasis in a bio data is on personalparticulars like date of birth, religion, sex, race, nationality,residence, martial status, and the like. Next comes a chronologicallisting of education and experience. The things normally found in aresume, that is specific skills for the job in question comes last, andare seldom included. Bio-data also includes applications made inspecified formats as required by the company.
A resume is ideally suited when applying for middle and senior levelpositions, where experience and specific skills rather than education isimportant. A C.V., on the other hand is the preferred option for freshgraduates, people looking for a career change, and those applying foracademic positions. The term bio-data is mostly used in India whileapplying to government jobs, or when applying for research grants andother situations where one has to submit descriptive essays.
Resumes present a summary of highlights and allow the prospectiveemployer to scan through the document visually or electronically, to seeif your skills match their available positions. A good resume can dothat very effectively, while a C.V. cannot. A bio-data could stillperform this role, especially if the format happens to be the onerecommended by the employer.
Personal information such as age, sex, religion and others, and hobbiesare never mentioned in a resume. Many people include such particulars inthe C.V. However, this is neither required nor considered in the USmarket. A Bio-data, on the other hand always include such personalparticulars.

Sunday, May 24, 2009

EMAIL TRACKING - Useful Infromation


1) Any time you see an E-Mail that says forward this on to '10' (or however many) of your friends, sign this petition, or you'll get bad luck, good luck, you'll see something funny on your screen after you send it, or whatever, it almost always has an E-Mail tracker program attached that tracks the cookies and E-Mails of those folks you forward to.
The host sender is getting a copy each time it gets forwarded and then is able to get lists of 'active' E-Mail addresses to use in SPAM E-Mails, or sell to other spammers. Even when you get emails that demand you send the email on if you're not ashamed of God/Jesus .....that's E-mail tracking and they're playing on our conscience.
These people don't care how they get your email addresses - just as long as they get them. Also, emails that talk about a missing child or a child with an incurable disease - "how would you feel if that was your child"....E- mail Tracking!!! Ignore them and don't participate!

2) Almost all E-Mails that ask you to add your name and forward on to others are similar to that mass letter years ago that asked people to send business cards to the little kid in Florida who wanted to break the Guinness Book of Records for the most cards.
All it was, and all any of this type of E-Mail is, is a way to get names and 'cookie' tracking information for telemarketers and spammers - - to validate active E-Mail accounts for their own profitable purposes.
You can do your friends and family members a GREAT favor by sending this information to them; you will be providing a service to your friends, and will be rewarded by not getting thousands of spam E-Mails in the future! If you have been sending out (FORWARDING) the above kinds of E-Mail, now you know why you get so much SPAM! Do yourself a favor and STOP adding your name(s) to those types of listings regardless how inviting they might sound!...or make you feel guilty if you don't!...it' s all about getting email addresses - nothing more! You may think you are supporting a GREAT cause, but you are NOT! Instead, you will be getting tons of junk mail later and very possibly a virus attached! Plus, you are helping the spammers get rich! Let's not make it easy for them! Also: E-Mail petitions are NOT acceptable to White House, Congress or any other organization - i.e. social security, etc.
To be acceptable, petitions must have a signed signature and full address of the person signing the petition, so this is a waste of time and you're just helping the Email trackers.

NEW: eSurveysPro.com offers now the possibility to create online polls!

Step 1: Create Surveys
Using just your browser you can easily create the most complex surveys.
eSurveysPro.com will help you design your surveys with our easy to use survey editor. We offer you 14 question types and the possibility to control the flow of your surveys.
Step 2: Collect Responses
Collect responses by sending email invitations or by placing a link to your survey on any website.
We offer a powerful mailing system that will help you send and track email invitations to your surveys. Alternativelly, you can just place a link anywhere on the web to your survey.
Step 3: Analyze Results
View your results as they are collected in real-time using our reports.
Use our reports to summarize and analyze your responses. Dig down to a specific answer. Export your data if you want to process it offline using tools like Excel or SPSS.

Try this

It's time to phone a friend for a little math fun ...get your calculator....this works!
(Note: Ignore your area code and use only your seven digit phone number. Ex: if your phone # is 077******* then forget about the first 3 digits (077) & start the game with the rest. Enjoy!!!)


1) What are the first 3 digits of your phone number? (do NOT include the area code)
2) Multiply by 80
3) Add 1
4) Multiply by 250
5) Add in the last four digits of phone number
6) Add in the last four digits of phone number again
7) Subtract 250
8) Divide by 2.

Is the result your phone number?

Wednesday, May 20, 2009

Microsoft, Google in healthy competition

STORY HIGHLIGHTS
Microsoft and Google carry high-tech race into the health care industry
The tech rivals launched similar personal health record services in 2007
Both face issues -- privacy, bureaucracy, and technological intransigence
Experts say it will be natural for Facebook generation to go online for records

For More Details Please visit:-http://edition.cnn.com/2009/TECH/biztech/05/19/cnet.google.microsoft.health/index.html

What Will the World Do with More Search Engines?

Microsoft says it will introduce its new search engine within the next few days. The world's largest software company has called the project "Kumo." It may change that name before the public sees it. Yahoo! (YHOO) and Google (GOOG) seem like odd names for search engines, but those choices never seemed to affect their success. Another company recently launched a search product called Wolfram Alpha. At least in the case of this software, the inventor, Stephen Wolfram, put his name on it.
Aside from the major search engines, which include Google, Yahoo! and Microsoft, there are a number of minor companies in the competing for users' attention. Some claim they are not search engines, probably because they do not want to seem so small compared to Google. A very few web surfers use Ask.com, Answer.com, and About.com. Search company, GoshMe, claims that there are half a million search engine products. That figure seems high, but it is impossible to disprove.
Microsoft argues that if its search engine brings back more relevant results than Google or Yahoo! that people will eventually migrate to the "best" product. That may not be true. Google has become a habit for more than two-thirds of the people who use search engines in the United States. It is generally considered the best product, but in the final analysis that decision is subjective. Google is certainly the search program that gets the most positive votes if use means anything.
"Kumo" may be just as good as Google, although the largest search engine keeps improving and adding to its functions. It is far too early to tell whether Microsoft can pick up a single new user even if its product is 99% as good as Google in the eyes of most people who look for things online. A cult has developed around Google, the company and the product, just as it has around Apple (AAPL) and its Mac and iPhone products. Loyalty is not always the by-product of function, although function often creates loyalty.

Microsoft is running out of time in the search business. It only has 8% of the US market, and even that has been shrinking. The company would like to form a partnership with Yahoo! so that together they can challenge Google. If Microsoft gets a good response to "Kumo", it may walk away from any relationship with Yahoo! and the No.2 search engine company's shareholders will have lost a chance to make money the way that they did when their board rejected Microsoft's offer to buy Yahoo! more than a year ago.
The trouble with the search business is that its future may have almost nothing to do with whether search results get more accurate. Google's information is already more than adequate for the huge majority of people who are trying to find information online. At some point, and that point has probably been reached, people cannot tell the difference between flying in an airplane that is at 32,000 feet and one that is flying 1,000 feet higher. The change in perspective means nothing to them. All they know is that they are as high as they have to be to get where they are going.
Search is facing the same problem as the chip business. Intel (INTC) and AMD (AMD) make semiconductors that are so powerful that very few PC buyers can use all of their computational power. A lot of what the chips can do is wasted. Upgrading to a more powerful processor does not mean much to people who cannot tell the difference. That leaves a few corporations and people who play complex video games as the only discriminating buyers of PCs with ultra-powerful processors. Just three or four years ago, the difference between one generation of semiconductor and another meant something to the casual PC user. The chips are too good now. Almost no one cares that a new Intel product can make one billion computations a second. Almost no one even knows what that means.
Creating a new search engine is a tremendous risk at this stage because it is remarkably expensive to build and market one that has any chance in the mass market. To make the proposition harder, not only do people prefer Google to other products, but most people will not be able to tell whether a search product coming to market now is better or not. Good is so excellent that it is not good any more.
— Douglas A. McIntyre
source:-http://www.time.com/time/business/article/0,8599,1899804,00.html

Israel warns citizens to beware Facebook spy requests

STORY HIGHLIGHTS
Terrorist groups using social networking to recruit spies, Israel says
Subjects are offered money to pass along secrets, security agency says
Groups looking for personal information to contact Israeli citizens

For more details please visit:-http://edition.cnn.com/2009/WORLD/meast/05/18/israel.facebook.spies/index.html

Sunday, May 17, 2009

Toshiba sues Imation, others over DVD patents

NEW YORK (Reuters) - Japan's Toshiba Corp (6502.T) said it sued Imation Corp (IMN.N) and several recordable DVD manufacturers and distributors, claiming they are infringing on its patents.
The lawsuit, filed in the U.S. District Court for the Western District of Wisconsin, says Imation and the other companies do not have licensing agreements with Toshiba for patents that it says are essential for meeting DVD format specifications.
Toshiba wants damages for past infringement and is asking the court to bar the sale, manufacture or import into the United States of recordable DVD media by the companies that it named in the lawsuit, it said in a statement.
The DVD media are sold under the Imation and Memorex brand names in the United States, Toshiba said.
The other defendants are Moser Baer India Ltd (MOSR.BO), CMC Magnetics Corp (2323.TW) and Ritek Corp (2349.TW) of Taiwan, and Glyphics Media, Hotan Corp, Khypermedia Corp and Advanced Media Inc in the United States, Toshiba said.
(Reporting by Robert MacMillan, Editing by Ian Geoghegan)
source:-http://www.reuters.com/article/technologyNews/idUSTRE54E41A20090515

Google eases trademark restrictions on some U.S. ads

SAN FRANCISCO (Reuters) - Google Inc is lifting restrictions on the use of trademarked terms in its U.S. online advertising system, a move that could increase friction between the Internet giant and brand owners.
The new policy will allow businesses to place trademarked terms directly in the copy of text advertisements that run in the U.S. starting next month, the company announced in a blog post on Thursday.
The move, which Google said will improve the quality of its advertisements, comes as advertisers have begun bidding less money for the individual search terms that their ads appear alongside and as Google's revenue growth slows in the dismal economic climate.
Until now, Google has forbidden companies from placing trademarked terms in their advertising copy unless they owned the trademark or had explicit permission from the trademark owners.
That policy was the equivalent of a supermarket promotion in a Sunday newspaper that only listed generic products like "discount cola" instead of the actual products for sale, Google said in its blog post on Thursday.
The new policy will allow resellers and informational Web sites to use trademarked terms in their copy in certain situations without seeking permission from the trademark owners.
The move represents the second recent loosening of Google's policies on trademark use. Earlier this month, Google said it would allow companies in 190 countries outside the US to bid on trademarked keywords that act as the triggers for their own advertisements.
Google is also facing new legal challenges from trademark owners.
On Monday, Firepond, a Texas software company, filed a trademark infringement suit against Google seeking class action status for all Texas trademark owners.
Brand owners have historically had serious concerns about Google's policy with regards to trademarks, said Eric Goldman, Associate Professor of Law at Santa Clara University School of Law.
Google's latest policy change is "kind of like pouring gasoline on the fire," he said.
The change may help consumers better understand sponsored search results, by allowing the advertiser to reference trademarks in their marketing pitches, Goldman said. But he predicted that the change could spark more legal challenges.
Google Senior Trademark Counsel Terri Chen acknowledged some people might be unhappy with the change, but she said she believed the ads would be well-received overall.
Chen said the policy was well-established legal principle in the US. Google is changing the policy now, she said, because it was more comfortable it had a process in place to monitor situations that don't comply with the new policy.
(Reporting by Alexei Oreskovic; Editing by Anshuman Daga)
Source:-http://www.reuters.com/article/technologyNews/idUSTRE54B6R020090515

Hackers launch phishing attack on Facebook users

By Jim Finkle
BOSTON (Reuters) - Hackers launched an attack on Facebook's 200 million users on Thursday, successfully gathering passwords from some of them in the latest campaign to prey on members of the popular social networking site.
Facebook spokesman Barry Schnitt said on Thursday that the site was in the process of cleaning up damage from the attack.
He said that Facebook was blocking compromised accounts.
Schnitt declined to say how many accounts had been compromised.
The hackers got passwords through what is known as a phishing attack, breaking into accounts of some Facebook members, then sending e-mails to friends and urging them to click on links to fake websites.
Those sites were designed to look like the Facebook home page. The victims were directed to log back in to the site, but actually logged into the one controlled by the hackers, unwittingly giving away their passwords.
The purpose of such attacks is generally identify theft and to spread spam.
The fake domains include www.151.im, www.121.im and www.123.im. Facebook has deleted all references to those domains.
Schnitt said that Facebook's security team believes the hackers intended to collect a large number of credentials, then use those accounts at a later time to send spam hawking fake pharmaceuticals and other goods to Facebook members.
The site fought off a similar attack two weeks ago, he said.
Privately held Facebook and rival social network MySpace, which is owned by News Corp, require senders of messages within the network to be members and hide user data from people who do not have accounts. Because of that, users tend to be far less suspicious of messages they receive.
Hackers used a phishing attack last year to spread a malicious virus known as Koobface (a reference to Facebook). It was downloaded onto Facebook members' PCs when they clicked on a link sent to them in an email that looked like it had been sent by a friend on Facebook.
(Reporting by Jim Finkle; Editing by Toni Reinhold)
Source:-http://www.reuters.com/article/technologyNews/idUSTRE54D6BN20090515

Tuesday, April 21, 2009

Monday, April 20, 2009

2009 FORTUNE 500

Our annual ranking of America's largest corporations
And the winners are...
See the full list of America's largest corporations, including detailed company profiles and contact information. Plus, post your thoughts on our Fortune 500 blog.
1. Exxon Mobil
2. Wal-Mart Stores
3. Chevron
4. ConocoPhillips
5. General Electric
6. General Motors
7. Ford Motor
8. AT&T
9. Hewlett-Packard
10. Valero Energy

Rank 1
Company Exxon Mobil
Revenues($ millions) 442,851.0
Profits($ millions) 45,220.0

Rank 2
Company Wal-Mart Stores
Revenues($ millions) 405,607.0
Profits($ millions) 13,400.0

Rank 3
Company Chevron
Revenues($ millions) 263,159.0
Profits($ millions) 23,931.0

Rank 4
Company ConocoPhillips
Revenues($ millions) 230,764.0
Profits($ millions) -16,998.0

Rank 5
Company General Electric
183,207.0
Profits($ millions) 17,410.0

Full List :-http://money.cnn.com/magazines/fortune/fortune500/2009/full_list/index.html

source:-http://money.cnn.com/magazines/fortune/fortune500/2009/

Oracle to buy Sun for $9.50 a share

Business software company says it will acquire server maker's stock for $7.4 billion.
By Ben Rooney, CNNMoney.com staff writer
Last Updated: April 20, 2009: 12:22 PM ET


NEW YORK (CNNMoney.com) -- Business software maker Oracle Corp. said Monday it has entered into a definitive agreement to buy server builder Sun Microsystems in a deal worth $7.4 billion.
Oracle said it will buy Sun common stock for $9.50 per share in cash, a 42% premium from Friday's closing price of $6.69.
After accounting for Sun's cash and debt, the deal's value is $5.6 billion, the companies said.
The announcement comes after Sun reportedly rejected a $7 billion buyout offer from IBM (IBM, Fortune 500) earlier this month.
The Redwood Shores, Calif.-based Oracle said it expects Sun to contribute over $1.5 billion to its operating profit this year, and over $2 billion in the second year.
On a per share basis, Oracle expects Sun to add 15 cents to its adjusted earnings in the first full year after closing. The deal is expected to close this summer.
Shares of Oracle (ORCL, Fortune 500) fell nearly 5.5% to $18, while Sun (JAVA, Fortune 500) soared nearly 36% to $9.10 in early trading.
"The acquisition of Sun transforms the IT industry," said Oracle chief executive Larry Ellison, in a statement. "Our customers benefit as their systems integration costs go down while system performance, reliability and security go up."
Oracle, which has made 52 acquisitions since January 2005, said it sees "strategic customer advantages" to owning two of Sun's most popular software products: the programming language Java and the Solaris operating system.
"This is a fantastic day for Sun's customers, developers, partners and employees across the globe," said Jonathan Schwartz, Sun's chief executive. "[By] joining forces with the global leader in enterprise software to drive innovation and value across every aspect of the technology marketplace."
However, the deal belies Oracle's need to prevent Java from being controlled by a rival software company, according to Brent Williams, an analyst who covers the tech sector for The Benchmark Company in New York.
"This deal strikes me as an extremely defensive move," Williams said. "This is all about who owns Java technology, which is the core of most enterprise applications."
Williams said rival buyers, such as IBM, could have made Java a non-proprietary "open source" software. That would have posed a "major price threat" to Oracle, the world's largest enterprise software company, he added.
On the other hand, the deal reflects the tech industry's move towards more bundled products, according to Shaw Wu, an analyst at Kaufman Brothers Equity Research.
"We believe this [acquisition] supports our industry thesis that vertical integration works, meaning having an integrated stack of hardware, software, and services to sell to customers," Wu wrote in a research report.
According to Wu, companies such as Hewlett-Packard (HPQ, Fortune 500), IBM, Apple (APPL), and blackberry maker Research in Motion (RIIM) have had success with such models.
Still, analysts said questions remain about Oracle's ability to digest Sun's server business, which has been losing market share to larger rivals such as IBM and H-P.
The deal is subject to Sun stockholder approval, certain regulatory approvals and customary closing conditions.
First Published: April 20, 2009: 7:45 AM ET

Source:-http://money.cnn.com/2009/04/20/technology/Oracle_Sun/index.htm?postversion=2009042008

Wednesday, April 15, 2009

Management Lesson

One fine day, a bus driver went to the bus garage, started his bus, and drove off along the route. No problems for the first few stops-a few people got on, a few got off, and things went generally well.
At the next stop, however, a big hulk of a guy got on. Six feet eight, built like a wrestler, arms hanging down to the ground. He glared at the driver and said, "Big John doesn't pay!" and sat down at the back. Did I mention that the driver was five feet three, thin, and basically meek? Well, he was. Naturally, he didn't argue with Big John, but he wasn't happy about it. The next day the same thing happened-Big John got on again, made a show of refusing to pay, and sat down.
And the next day, and the one after that, and so forth. This grated on the bus driver, who started losing sleep over the way Big John was taking advantage of him. Finally he could stand it no longer. He signed up for body building courses, karate, judo, and all that good stuff.By the end of the summer, he had become quite strong; what's more, he felt really good about himself. So on the next Monday, when Big John once again got on the bus and said, "Big John doesn't pay!," The driver stood up, glared back at the passenger, and screamed, "And why not?" With a surprised look on his face, Big John replied, "Big John has a bus pass."

Management Lesson:" Be sure there is a problem in the first place before working hard to solve one."

Wednesday, April 8, 2009

Make your PC talk

Open a text file in notepad and write:
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Save the file with a (*.vbs) extension,
it will create a VBScript File.
Now open the saved file, input the text and press ok.
"u will hear what u typed J

this works in xp,may be in vista also.

Thursday, March 26, 2009

Be Secure:No joke in April Fool's Day computer worm

Story Highlights
The Conficker C computer worm is expected to activate on April Fool's Day
The worm lets a master computer take over infected zombie PCs
It's unclear what the program's author plans to do with all the power
A group called the Conficker Cabal is trying to hunt down solutions

(CNN) -- A computer-science detective story is playing out on the Internet as security experts try to hunt down a worm called Conficker C and prevent it from damaging millions of computers on April Fool's Day.
The anti-worm researchers have banded together in a group they call the Conficker Cabal. Members are searching for the malicious software program's author and for ways to do damage control if he or she can't be stopped.
They're motivated in part by a $250,000 bounty from Microsoft and also by what seems to be a sort of Dick Tracy ethic.
"We love catching bad guys," said Alvin Estevez, CEO of Enigma Software Group, which is one of many companies trying to crack Conficker. "We're like former hackers who like to catch other hackers. To us, we get almost a feather in our cap to be able to knock out that worm. We slap each other five when we're killing those infections."
The malicious program already is thought to have infected between 5 million and 10 million computers.
Those infections haven't spawned many symptoms, but on April 1 a master computer is scheduled to gain control of these zombie machines, said Don DeBolt, director of threat research for CA, a New York-based IT and software company.
What happens on April Fool's Day is anyone's guess.
The program could delete all of the files on a person's computer, use zombie PCs -- those controlled by a master -- to overwhelm and shut down Web sites or monitor a person's keyboard strokes to collect private information like passwords or bank account information, experts said.
More likely, though, said DeBolt, the virus may try to get computer users to buy fake software or spend money on other phony products.
Experts said computer hackers largely have moved away from showboating and causing random trouble. They now usually try to make money off their viral programs.
DeBolt said Conficker C imbeds itself deep in the computer where it is difficult to track. The program, for instance, stops Windows from conducting automatic updates that could prevent the malware from causing damage.
The program's code is also written to evolve over time and its author appears to be making updates to thwart some of the Conficker Cabal's attempts to neuter the worm.
"It is very much a cat and mouse game," DeBolt said.
It's unclear who wrote the program, but members of the Cabal are looking for clues.
First, they know that some recent malware programs have come from Eastern European countries outside the jurisdiction of the European Union, said Patrick Morganelli, senior vice president of technology for Enigma Software.
Worm program authors often hide in those countries to stay out of sight from law enforcement, he said.
In a way, the Conficker Cabal is also looking for the program author's fingerprints. DeBolt said security researchers are looking through old malware programs to see if their programming styles are similar to that of Conficker C.
The prospects for catching the program's author are not good, Morganelli said.
"Unless they open their mouth, they'll never be found," he said.
So, the most effective counter-assault simply may be damage control.
One quick way to see if your computer has been infected is to see if you have gotten automatic updates from Windows in March. If so, your computer likely is fine, DeBolt said.
Microsoft released a statement saying the company "is actively working with the industry to mitigate the spread of the worm."
Users who haven't gotten the latest Windows updates should go to http://safety.live.com if they fear they're infected, the company's statement says.
DeBolt said people who use other antivirus software should check to make sure they've received the latest updates, which also could have been disabled by Conficker C.
The first version of Conficker -- strain A -- was released in late 2008.
That version used 250 Web addresses -- generated daily by the system -- as the means of communication between the master computer and its zombies.
The end goal of the first line was to sell computer users fake antivirus software, said Morganelli.
Computer security experts largely patched that problem by working with the Internet Corporation for Assigned Names and Numbers to disable or buy the problematic URLs, he said.
That process-of-elimination approach isn't likely to be effective with Conficker strain C, Morganelli said. The new version will generate 50,000 URLs per day instead of just 250 when it becomes active, DeBolt said.
The first iteration of Conficker is thought to have grown out of a free function for security programs created by Dr. Ronald Rivest, a computer science professor at the Massachusetts Institute of Technology.
"Any technology can be used for good or evil, and this is just an example of that," Rivest said.
Many viruses have taken pieces of benevolent programs and used them for ill. But overall the "open source" environment online promotes computer security far more than it enables hackers, DeBolt said.
"I don't blame the open-source community at all" for virus attacks, he said.
CA said it recently found a piece of code in Conficker C that says the worm will become active on April 1. Previous versions of the malicious software launched on specific dates noted in the program code, so the April Fool's Day launch date is not likely to be a trick, DeBolt said.
"The best minds in the industry are working on this to protect customers," he said. "We're trying to reduce the impact of the April 1 date as best we can. But we know ... this malware will continue to evolve."
source:-http://edition.cnn.com/2009/TECH/03/24/conficker.computer.worm/index.html?iref=mpstoryview

Thursday, March 19, 2009

IBM in talks to buy Sun Microsystems

For more Details:-http://news.yahoo.com/s/nm/20090318/bs_nm/us_sunmicro_takeover_ibm

Microsoft releases Internet Explorer 8

SEATTLE (Reuters) - Microsoft is set to publicly launch Internet Explorer 8 early on Thursday, the latest version of its market-dominating Web browser.

The application, an integral part of Microsoft's eagerly awaited Windows 7 operating system, can be downloaded from Microsoft's website from 9 a.m. Pacific time, free for people using licensed Microsoft operating systems.

IE8, as it is commonly referred to, has been in public beta testing for about a year, but Thursday's launch marks its full public rollout.

Microsoft, the world's largest software company, said IE8 will run with Windows Vista, its latest operating system, and also Windows XP, the previous version which some users still prefer over Vista.

The application replaces IE7, which has a lock on the browser market. According to a recent survey by IT consultants Janco Associates, Internet explorer has a 72.2 percent market share, ahead of the Mozilla Foundation's Firefox browser with 17.2 percent. Google's new Chrome browser has only 2.8 percent of the market, while Apple's Safari has less than 1 percent.

Microsoft has run afoul of U.S. and European antitrust regulators for bundling its browser with its operating system, which competitors say is an attempt to drive them out of the market.

Last month, Google joined Mozilla and Norway's Opera in protesting Microsoft's dominance in the browser market. In January, European regulators brought formal charges against Microsoft for abusing its dominant market position by bundling its Internet Explorer Web browser with its Windows operating system, which is used in 95 percent of the world's personal computers.

Microsoft has already announced that users of Windows 7 -- expected later this year or early next year -- will be able to turn key programs like Internet Explorer off, making it easier to use other browsers.

New features in IE8 include right-clicking on addresses or other Web features to go straight to a map or put into a blog or other website, which Microsoft calls an "accelerator". Users will also be able to put in keywords in the address bar to recall sites visited related to that word.

The new browser also has enhanced security protection, for example warning users if they are about to download something from a site known to be a source of malicious software, or "malware".

Source: - http://www.reuters.com/article/technologyNews/idUSTRE52I5CD20090319

Monday, March 16, 2009

Wednesday, March 11, 2009

Google Chrome: a new web browser for Windows

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
Search from the address bar
Type in the address bar and get suggestions for both search and web pages.

Thumbnails of your top sites
Access your favorite pages instantly with lightning speed from any new tab.

Private browsing
Open an incognito window when you don't want to save your browsing history.


Screenshot

Tuesday, March 10, 2009

Friday, March 6, 2009

Would you like to know if your mobile is original or not?!!

Type # 6 0 # *
After you enter the code you will see a new code contain 15 digits:

43 4 5 6 6 1 0 6 7 8 9 4 3 5


IF the digit number Seven & Eight is 02 or 20 that mean it was Assembly on Emirates which is very Bad quality :(

IF the digit number Seven & Eight is 08 or 80 that mean it¢ s manufactured in Germany which is not bad.

IF the digit number Seven & Eight is 01 or 10 that mean it¢s manufactured in Finland which is Good.

IF the digit number Seven & Eight is 00 that mean it was manufactured in original factory which is the best Mobile Quality ...

IF the digit number Seven & Eight is 13 that mean it was Assembly on Azerbaijan which is very Bad quality and very dangerous for health!!!

Monday, March 2, 2009

Get it now: the all-new Skype


Happy with the Skype you've got? You ain't seen nothing yet, baby. This brand new version will change the way you stay in touch.
What's changed

Best ever sound.
It's a big step up. It's super clear, with smart help that pops up the second we detect a problem.

Bigger video.
Now video calls open in a great big screen that goes full-screen in one click. Incredible picture turns calls from closer to special.


So easy.
New one-click buttons and clean, simple layout make it wonderfully easy to use.


Keep conversations going.
With the new Conversations list, jump in and out of conversations
 you're having. Pick up where you left off in one click.

Once you start using it, you'll never want to go back to the old version ever again. You've really got to get this.
Skype 4.0 for Windows

Enjoy a whole new experience,The people from Skype

Saturday, February 28, 2009

Enterprise Resource Planning

Advantages of ERP Systems
There are many advantages of implementing an EPR system; here are a few of them:
A totally integrated system
The ability to streamline different processes and workflows
The ability to easily share data across various departments in an organization
Improved efficiency and productivity levels
Better tracking and forecasting
Lower costs
Improved customer service

Disadvantages of ERP Systems
While advantages usually outweigh disadvantages for most organizations implementing an ERP system, here are some of the most common obstacles experienced:
Usually many obstacles can be prevented if adequate investment is made and adequate training is involved, however, success does depend on skills and the experience of the workforce to quickly adapt to the new system.
Customization in many situations is limited
The need to reengineer business processes
ERP systems can be cost prohibitive to install and run
Technical support can be shoddy
ERP's may be too rigid for specific organizations that are either new or want to move in a new direction in the near future.

Apple Safari 4 Beta Released

Apple Safari is a leading web browser holding some 8% of market share as of January 2009. Now Apple has unrolled Safari 4 Beta at 24th February, 2009. This new version is claimed to be a fastest and most innovative browser by Apple Inc.

Boasting a galore of features with this release, they’ve specifically emphasized on the speed and innovation side. Their new Nitro JavaScript engine claims to beat Internet Explorer 8 by 6 times and is 4 times faster than Firefox 3.1’s. It is tightly integrated with HTML 5, CSS 3 web standards and is fully Acid 3 compliant.

There are innovative new features such as Top Sites which displays stunning previews of frequently visited sites. Full History Search, AutoFill, Spell Check, Grammar Check are built right in the browser. Apart from this, there are many features which you can read here. It currently runs on Windows and Mac. Below is its screenshot.


Download Safari 4 Beta.

Install Apache Server with PHP and MySQL

To install apache server with PHP & MySQL support go to:
System >Administrator > Synaptic Package Manager
Mark following packages for installation and then click "Apply" button from toolbar:

apache2.2-common
php5
php5-common
php5-gd
php5-mysql
phpmyadmin
mysql-client-5.0
mysql-common
mysql-server-5.0


After completing installation open your browser and go to: http://localhost .
If everything installed successfully you will see "It works" message.

UNIX’s Unique Birthday!


On February 13th 2009, a very special moment for UNIX lovers will occur. UNIX will be celebrating its 1234567890th birthday. Wondering how? Here’s its explanation.
UNIX calculates its time as number of seconds since January 1, 1970. On February 13 2009 at 11:31 PM GMT, this time will reach 1234567890 seconds. You can see this time on your UNIX based machine by opening a terminal and typing date +%s
Or if you don’t have UNIX installed, don’t worry. You can view live countdown right here.

Friday, February 20, 2009

Download Windows 7 Public Beta

Microsoft's Windows 7 public beta is now available at http://www.microsoft.com/windows/windows-7/beta-download.aspx
Minimal System Requirements.
* 1 GHz processor (32- or 64-bit)
* 1 GB of main memory
* 16 GB available disk space
* Support DirectX 9 graphics with 128 MB memory
* DVD-RW drive

Thursday, February 19, 2009

Google shows Web-based offline Gmail on iPhone

Story Highlights
Google on Wednesday demonstrated a concept version of Gmail for the iPhone
This Gmail could be used even when a phone had no network connection
Google exec: "It's very, very fast because it's using [a] local database"
Google wants to bring to the iPhone all of Gmail's features
(CNET) -- Showing that its Web application priorities extend to the mobile world, Google on Wednesday demonstrated a version of Gmail for the iPhone that could be used even when the phone had no network connection.

Vic Gundotra, Google's vice president of engineering, showed what he called a "technical concept" of Gmail even when the iPhone was offline. In January, Google released an offline version of Gmail for desktops and laptops, and like it, mobile phone incarnation runs in a Web browser, not as a native application.
The software let Gundotra browse and read e-mail even after he switched the phone into airplane mode, which shuts off the wireless network.
Offline applications can't of course retrieve new data from the network, but they do synchronize when network access is restored. Meanwhile, it stores e-mail in a local database on the phone, even when online.
"You'll note that it's very, very fast because it's using that local database," Gundotra said. The application also showed a floating toolbar that was visible even as he scrolled through his inbox.
It's significant for several reasons that Google is eyeing a new version of its Web-based Gmail application for the iPhone. For one thing, the company wants to bring to the iPhone all of Gmail's features -- search, labels, and conversations, for example -- and Apple's built-in mail application lacks those abilities.

But more broadly, the move is significant because it shows how Web-based applications can bypass the control particular companies such as Apple or Microsoft have over a computing technology.
Apple has achieved tremendous success with its App Store, which lets people download and buy software for the iPhone and iPod Touch. But it controls that conduit, and it only can deliver software written specifically for those devices.
Web applications run in a Web browser, and all smart phones have browsers -- though of course hardware and network constraints typically mean they're anemic compared to desktop versions.
In case this point about the power of Web applications was lost on observers, Gundotra showed the same Gmail software running on the HTC Magic, a new phone using Google's Android operating system.
"You now have an ability to build an app that spans devices as long as that device implements the latest specifications of these modern HTML 5 Web browsers," Gundotra said.
The mobile phone version of the Gmail software uses a somewhat different approach to enable offline access.
Where the desktop version uses a Google-developed open-source browser plug-in called Gears to enable offline support, the iPhone version uses the offline data storage standard of HTML 5, the gradually emerging overhaul of the language used to describe Web pages. That technology can cache the state of an application as well as data such as messages.
Of course, getting a modern, full-featured browser on a PC with plenty of memory is hard enough, and mobile browsers generally lag PC versions.
However, it should be noted that Safari on the iPhone, like the browser in Android, is based on the WebKit open-source project, and WebKit has been building in offline support. So at least on some higher-end phones, a Web-based version of offline Gmail could be an option sooner rather than later.

Expert: Social networkers risk 'losing control' of privacy

Story Highlights
Expert: Social-networking site users risk losing control of personal information
Facebook backed down from changing content ownership policy after user revolt
Sites have to balance legal requirements, making policies on data use clear
Young people in particular should be careful about what they post online

To read full article visit:-http://edition.cnn.com/2009/TECH/02/18/facebook.privacy/index.html?iref=nextin

Facebook backs down, reverses on user information policy

Story Highlights
Facebook this month changed its policy to say user content belonged to Facebook
Outraged members canceled their accounts or created online petitions
On Wednesday, Facebook reviewed user "feedback," and reverted to its old policy

To Read full article visit:- http://edition.cnn.com/2009/TECH/02/18/facebook.reversal/index.html

Wednesday, February 18, 2009

Murthy pulls out as IT advisor to president


Bangalore, Feb 18 (IANS) Infosys Technologies chairman and chief mentor N.R. Narayana Murthy has declined to be the IT advisor to the Sri Lankan government, the IT bellwether said Wednesday.
In a letter to Sri Lankan President Mahinda Rajapaksa, Murthy said he had decided to withdraw from being the advisor due to personal reasons.
“I thank you for the courtesy shown to me during my recent visit to Sri Lanka. I have decided to withdraw from being the advisor to your government due to personal reasons,” the company quoted Murthy’s letter to Rajapaksa.
Murthy was appointed Feb 13 as Rajapaksa’s international advisor on IT after he was invited to be the chief guest at the launch of “2009 - Year of English and Information Technology” at the presidential secretariat in Colombo.
The Sri Lanka government launched the IT initiative to meet the demands of the 21st century in skills and capacities, mainly in the rural sector.
Incidentally, Murthy told IANS Tuesday that the role of an advisor was to keep his mouth shut and open it only when asked for his views based on experience.
“I am advisor to president of South Korea, prime minister of Malaysia and have been made advisor to Rajapaksa,” Murthy said on the sidelines of a function at the Infosys campus in the electronics city, about 30 km from here.
A day later, Murthy declined the offer.

Tuesday, February 17, 2009

Nokia introduces first touch device in Lanka

Working closely with Governments to mitigate gray market:
Anjana Samarasinghe in Singapore
Nokia introduced its first touch device for the mass market - Nokia 5800 XpressMusic in Sri Lanka on Monday.
The Nokia 5880 XpressMusic was launched in December. After the launch last December this product had a good response and Nokia sold over one million devices globally.
The company launched the product in Bangladesh in January and now in Sri Lanka, said Product Manager GTM Devices OPM, SEAP Michael Peh.
Nokia 5880 XpressMusic is a play, share , touch product. Nokia is targeting the younger generation through this device and it stores nearly 7,000 songs. The Company said the new device will be successful in the local market as in other markets. It is now commercially available in the Sri Lankan market.
Meanwhile, Nokia launched several new products at the Showcase Nokia 2009 which was held in Singapore on Monday.
Nokia unveiled two new additions to its Eseries range, the full QWERTY Nokia E75 and the compact QWERTY Nokia E55, which were the first to be shipped with the company's new email user interface to offer a richer messaging experience.
Nokia also introduced Nokia N86 8MP, Nokia 6710 Navigator and Nokia 6720 classic at the Showcase Nokia 2009 which was held in conjunction with the Mobile World Congress 2009 in Barcelona.
Vice President, Southeast Asia Pacific, Nokia Chris Carr said they have identified five key areas maps, music, games, messaging and media.
The E75 is equipped with the Nokia messaging which gives the best email experience for users and this will be made available in March.
The Nokia E55 compact messaging deviser will be available in the market in the second quarter this year.
The Nokia 6720 classic which is designed to talk will also be available in the second quarter this year.
The Company will make available the Nokia N86 8MP in the second quarter of 2009, he said.
Head of Marketing Southeast Asia Pacific Nokia Loren Shuster said that the Company does not have to change its strategies due to the global economic crisis since it has been positioned strongly with the correct strategies.
Our strategy is to approach people and make them enable, he said.
Talking about the gray market in emerging markets, he said Nokia is working closely with the Governments to mitigate the gray market and educate customers more on the issue.
"We will also enhance customer care service to combat the gray market in emerging markets," he said.
source:-http://www.dailynews.lk/2009/02/18/bus03.asp

Year 2009


Monday, February 16, 2009

“Sinhala text to speech” – for visually impaired

The official launching of the software “Nuwana Sinhala Text to Speech” developed by the Software Engineering Services Division (SESD) of the Sri Lanka Institute of Information Technology (SLIIT) was held recently.The development of the new software came to light as result of a request made by Sri Lanka Council for the Blind the SESD of SLIIT to explore the possibilities of developing a software which would open doors of knowledge to the visually impaired.
Accordingly the Head of SESD Yashas Mallawarchchi appointed a project team in order to achieve this. It was decided to hand over the research component to the academic staff of SLIIT. Accordingly, Dean / Research of SLIIT Dr. Koliya Pulasinghe guided a dedicated batch of students, who undertook an year’s extensive research, to develop an appropriate software engine.
It took the project team another four months to complete the latter stages of the development process to come up with the required software. What made it all so special was the fact that Mr Samson Perera, a visually impaired professional representing the Sri Lanka Council for the Blind has been working hand in hand with the project team from day one. Mr Perera who works for the Sri Lanka Council for the Blind is well conversant with Microsoft Word and Excel. He undertakes training for the visually impaired at the Council. “His insights were invaluable right through out the development process” Mr Mallawarachchi Head of the Project Team commented.
“Nuwana Sinhala Text to Speech” software will be made available to all those interested, free of charge by the Sri Lanka Council for the Blind. It would help the visually impaired to read a document, to use it to type Sinhala text and for proof reading. This software comes in handy as it improves the accuracy levels of their Sinhala typing as well.“Information Technology has revolutionized our lives, almost beyond imagination. We at SLIIT believe in bringing the best of education and training in Information Technology to our nation. This is an instance where we took one step further in order to channel our services towards the benefit of our people, to open the doors of wisdom to the differently abled among us” said Professor S. Karunaratne Chairman of SLIIT.
source:-http://www.itpro.lk/?q=node/1748