Monday, April 28, 2014

Apple tech blocks users from texting while driving.

Apple tech takes on distracted driving, blocks users from texting while driving.

A new piece of technology unearthed on Tuesday shows Apple has developed iPhone technology that automatically shuts off texting capabilities when it is determined that a user is driving, helping to mitigate potential accidents resulting from in-car distractions.
Volvo


With Apple's automotive projects — Car Play and Siri Eyes Free — rolling out in more vehicles throughout the year, the company has been beefing up its in-car technology suite. A document discovered on Tuesday, however, shows Apple's "iOS in the car" initiatives go back much further than iOS 7.

The U.S. Patent and Trademark Office issued Apple U.S. Patent No. 8,706,143 for "Driver handheld computing device lock-out," a system that intelligently determines whether a device user is driving and shuts off distracting phone functions accordingly.

There are two main embodiments to Apple's invention. The first concentrates on a lock-out mechanism that requires no input from a vehicle and instead uses on-board sensors to determine when a user is driving. In the second embodiment, the car is able to transmit blocking signals to an iPhone, effectively stopping a user from receiving and sending texts, or using other smartphone functions while in the driver's seat.


Source: USPTO


Without input from the car, an iPhone relies on data from a motion analyzer and a scenery analyzer to trigger a lock-out mechanism. As described, accelerometers, cameras, light sensors, GPS receivers and other sensing components can be deployed to harness raw data.

The motion analyzer monitors device speed up to a certain threshold that, when reached, is indicative of a car in motion. Making the system more accurate is data from an iPhone's GPS and accelerometer, which can be used to discern whether a user is walking, running or in a moving motor vehicle.

The scenery analyzer is more complicated in that some embodiments require image acquisition and processing to determine when a device holder is in a "safe" or "unsafe" operating area. For example, the analyzer algorithm may find that a user is in the driver's seat by analyzing a photo or video that shows one face and a steering wheel.

Alternatively, if the analyzer sees two faces, one in the driver's seat and another in the passenger or rear seat, the device may be classified as in a "safe area." Further, an accelerometer can be used to ensure the person holding the device does not pan away from the driving cockpit to avoid analysis.

Once recognition and analysis are complete, the lock-out mechanism may be activated according to preset rules. For example, texting may be blocked when a device holder is found to be driving.



The second embodiment is fairly straightforward, with the car in communication with the iPhone via RFID or active radio signals. In this case, onboard sensors, a wireless ignition key or other proximity-sensing devices can communicate a blocking signal to the nearby phone, disabling texting and other distracting features.

Another notable function of Apple's invention is a parental lock-out function that disables user-selectable smartphone features associated with a specific key or phone.

It is unclear if Apple intends to incorporate the lock-out functionality in a future iOS version, though no mention of the feature was made in CarPlay's introduction. As noted in the patent document, however, such a mechanism would be "a significant selling point in the eyes of concerned parents, and it could lead to legislation that would require all handheld computing devices to disable texting while driving."

Apple's handheld device lock-out patent was first filed for in 2008 and credits John Greer Elias as its inventor.

Thursday, April 24, 2014

Scientists create cancer-killing cells that can be injected into patients

World first as scientists create cancer-killing cells that can be injected into patients



 




















Scientists have created cells capable of killing cancer for the first time.The dramatic breakthrough was made by researchers in Japan who created cancer-specific killer T cells.
They say the development paves the way for the cells being directly injected into cancer patients for therapy.The cells naturally occur in small numbers, but it is hoped injecting huge quantities back into a patient could turbo-charge the immune system.
Researchers at the RIKEN Research Centre for Allergy and Immunology revealed they have succeeded for the first time in creating cancer-specific, immune system cells called killer T lymphocytes.
To create these, the team first had to reprogramme T lymphocytes specialised in killing a certain type of cancer, into another type of cell called induced pluripotent stem cells (iPS cells).
These iPS cells then generated fully active, cancer-specific T lymphocytes.These lymphocytes regenerated from iPS cells could potentially serve as cancer therapy in the future.
Previous research has shown that killer T lymphocytes produced in the lab using conventional methods are inefficient in killing cancer cells mainly because they have a very short life-span, which limits their use as treatment for cancer.
To overcome the problems, the Japanese researchers, led by Hiroshi Kawamoto reprogrammed mature human killer T lymphocytes into iPS cells and investigated how these cells differentiate.
The team induced killer T lymphocytes specific for a certain type of skin cancer to reprogramme into iPS cells by exposing the lymphocytes to the 'Yamanaka factors' - a group of compounds that induce cells to revert back to a non-specialised, stage.
Japanese researchers who created cancer-specific killer T cells (pictured) say the development paves the way for the cells being directly injected into cancer patients for therapy
The iPS cells obtained were then grown in the lab and induced to differentiate into killer T lymphocytes again. This new batch of T lymphocytes was shown to be specific for the same type of skin cancer as the original lymphocytes.
They maintained the genetic reorganisation, enabling them to express the cancer-specific receptor on their surface. The new T lymphocytes were also shown to be active and to produce an anti-tumour compound.
Doctor Kawamoto said: 'We have succeeded in the expansion of antigen-specific T cells by making iPS cells and differentiating them back into functional T cells.
'The next step will be to test whether these T cells can selectively kill tumour cells but not other cells in the body. If they do, these cells might be directly injected into patients for therapy. This could be realised in the not-so-distant future.'The findings were published in the journal Cell Stem Cell.
Dr Dusko Ilic, Senior Lecturer in Stem Cell Science, King’s College London, said: 'The study tackled a novel, quite interesting approach to cell based therapy, something that we do not usually hear about.
'Although this approach requires further verification and a lot of work needs to be done before we can think about clinical trials, the initial data are promising.
'This pioneering work definitely provides a strong foundation to build and expand our knowledge about new opportunities in cell based therapy and personalised medicine.'

WE ARE WHAT WE EAT

Nutrition is the science of food, the nutrient in them and how the body uses those nutrients. It includes the process of ingestion, digestion, absorption, metabolism, transport, storage and excretion of the same.
 
They emphasized that healthy eating was the key to well being as up to 100 trillion cells in our bodies, each one demanding a constant supply of daily nutrients in order to function optimally and be able to fight various ailments.
Food affects all these cells, and every aspect of our being: mood, energy levels, thinking capacity, self drive and general health .

The duo gave some tips like importance of eating balanced diet with more of whole grains, right size or portion, a diet low in fat, saturated fat and cholesterol. “It is paramount that you fill up on colorful fruits and vegetables to your meals”, they recommended .
The meeting was told to limit the use of sugar and salt.


 

RIP Flash arise HTML5

RIP Flash: Why HTML5 will finally take over video and the Web this year.

Cassette tapes, 8-tracks, and … Flash. All three of these mediums need a player to work, and all three mediums are either dead or dying. Just as CDs replaced tapes as a more efficient means of playing music, and digital files replaced CDs to do the same, HTML5 is making Flash obsolete.
The HTML5 versus Flash debate has been a hot topic among Web developers for years – and even more so since Steve Jobs published his now infamous 2010 letter touting HTML5 as the future and Flash as “no longer necessary.” But whether you side with Flash or HTML5, there’s no denying that the implications of HTML5 on video and the Web are real.
For online video, HTML5 offers two things Flash does not: mobile capabilities and semantic markup. The growth of mobile engagement; the rise of Interactive Video for entertainment, advertising and shopping; and HTML5’s open structure all combine to create the future of an HTML5-based Web, leaving Flash to eventually shuffle into its place in the Retired Tech Hall of Fame (make some room Windows XP, Palm Treo).
Mobile killed the Flash star.
Since HTML5’s introduction, mobile has been touted as one of the publishing language’s largest advantages. And since iOS and many Android devices don’t support Flash, Flash is bound to PCs – a market which, according to Gartner, saw a 10 percent decline in shipments in 2013 from 2012.
According to IAB.net, nearly half of the U.S. population has a mobile phone with Internet access, and one in five page views on the Web happen on a mobile device.
Those numbers will continue to grow each month, and companies making Flash-based Interactive Videos are missing out on a huge audience by not enabling their videos to run on mobile devices.
Let’s take Bob Dylan’s fantastically entertaining “Like a Rolling Stone” Interactive Video that launched in November. Millions of PC viewers clicked with joy within the video’s TV-like interface.
However, users trying to open the video on their phone or tablet had a less enjoyable experience: Android users got a video teaser and a message to experience the full video on their desktop computer, and the site directed iOS users to download an app – neither option allowing for playback on their phone or tablet’s Web browser.
If one in five page views are happening on mobile, that’s one out of five people having to deal with a broken user experience when they go to the video site on a mobile device.
Those in the advertising, shopping, and enterprise industries are also beginning to focus their attention on mobile’s importance, as well as on Flash’s limitations with online video.
A recent open letter to advertisers by the Interactive Advertising Bureau – and signed by several major publishers and ad firms, including AOL, Conde Nast, Forbes, Google, The New York Times, Time Inc. and the Wall Street Journal – urges marketers to implement the HTML5 standard for their mobile ads so that they can run on different platforms. The letter states that to guarantee the paid ads “actually appear and look great on all screens,” ads should be developed in a mobile-compatible format.
“And the one open, industry-standard, universal format for building mobile-ready creative is HTML5,” the letter says.
In Sizmek’s annual Global Benchmark Report, “Breaking Boundaries: Engagement Gone Global,” the shift towards more mobile friendly formats using HTML5 is emphasized as one of the most important changes in digital advertising during 2013.
The report, which reveals key trends in digital advertising from more than 913 billion ad impressions worldwide for 2013, says to “expect engagement rates for HTML5 to increase in 2014 as the industry adopts rigorous creative and publishing standards that ensure seamless multiscreen delivery.”
Not only is the ability to play ads on all platforms crucial for major publishers, it’s also imperative that once the viewer clicks on the ad, they’re able to actually buy the product without any issue. This isn’t always the case, however, because Flash-based sites limit what can be done on mobile devices.
In a recent frustrating online shopping experience, our VP of Marketing attempted to find a vacuum cleaner on Amazon using his iPad. Ready to spend upwards of $400, the product video he tried playing stopped him in his tracks when it wouldn’t open due to missing Flash plugins. This is a huge missed opportunity for Amazon.
So why aren’t all of Amazon’s videos using HTML5?
Sure, it might be that developers are still catching up to the new standard. There’s also no denying that it has historically been much easier for developers to build in Flash than in HTML5.
A digital shift:
A recent Forrester report entitled “Improving Enterprise Mobility: Meeting Next-Generation Demands of Development, Delivery, and Engagement,” says building apps in HTML5 takes more time than planned 59 percent of the time. That’s largely due to testing and fixing issues in non-native responsive frameworks.
HTML5 isn’t perfect; it’s still in its early years. Fortunately, talented companies are focusing on solving those problems for you – doing the work with a SaaS platform so you can just concentrate on the creative.
However, that’s not stopping enterprise and game developers. In a recent report from Sencha, a provider of open-source Web application frameworks, more than 60 percent of business application developers have converted to HTML5 and hybrid development of their key projects, and more than 70 percent of HTML5/hybrid developers are using HTML5 more this year than last.
Mobile video isn’t the only culprit
In the gaming industry, HTML5-based games are on the rise. Holland-based Spil Games is just one publisher taking the HTML5 path. The company plans to publish more than 1,000 HTML5 games by the end of the year.
Spil Games already has 5,000 Flash games published on the Web, but that’s 5,000 games in its library that won’t work on tablets or phones.
According to Digital Buzz Blog, 32 percent of time spent on iOS and Android devices is spent playing games. With HTML5, developers can create games that can work on all devices. Just look at some of the awesome stuff Google created with its Google Chrome Experiments (all built in HTML5 and JavaScript using open Web technologies such as Canvas, WebGL and WebRTC).
And the nail in the Flash coffin award goes to… SEO.
While mobile is the most obvious advantage of HTML5 over Flash, there’s a feature that lies in semantic structure that’s just as important and especially powerful for Interactive Videos based on HTML5. Web crawlers and search engines can’t see inside of Flash, which is a completely closed container, and they’ll never be able to.
Why does that matter? With the semantic structure of Interactive Video, you can build projects using HTML5 that have multiple interrelated pieces that Web crawlers know how to understand. But with Flash, you’re getting a black box that, when crawled, shows up as just a Flash video without any extra information.
Let’s take a look at another recent interactive music video, the 24-hour-long, HTML5-based project for Pharrell Williams’ “Happy.” The video, which allows viewers to interact and jump between 24 hours worth of footage of happy dancers lip-synching to Pharrell’s song, is a beautiful example of the powerful and immersive projects you can create with HTML5.
There’s a new dancer or group of dancers every four minutes, totaling 360 clips – 24 of which include Pharrell himself. In addition to Pharrell’s appearances, there are also cameos by the likes of Steve Carell, Jamie Foxx, Magic Johnson, Kelly Osborne and more.
The video is really impressive, but it missed an opportunity by not building on a semantic structure. Had it been built correctly, each of the 360 videos would refer to that single Web page, making it possible for viewers to do things like search on Google for the clip of Jamie Foxx and his family. Without watching the entire video, you might not find these “Easter eggs” without knowing their exact time stamps.
Building the video on a semantic structure would’ve allowed Web bots to crawl each distinctive video clip as its own page. The video could have title tags and all the information you’d expect from a standard Web page (H1 tags, meta info, etc.), which would allow bots to read the single video as 360 individual Web pages with discrete content, resulting in higher-ranking search results.
Content creators who aren’t building HTML5 videos are already behind, and they’ll soon be left completely in the dust if they don’t implement the HTML5 Web publishing language soon. However, the good news for brands and content creators is that there are companies focused on delivering all the benefits of HTML5 without any of the technical challenge or complication.
Those who still think Flash is the way to go for online video will likely be changing their tune in the near future as mobile usage continues to skyrocket and HTML5 gets closer to becoming the universal format for creating mobile-ready creative projects.
Image Courtesy:Phonearena.

Water fuel Cell invention.

Water fuel Cell invention that was killed by the govt.




In the late 1980's, Stanley Meyer invented a car that could go from coast to coast in the United States on 21 gallons of water. He was offered $1 billion from the automobile industry for his invention but turned it down because he wanted this idea to go to the people. Shortly afterwards, he was poisoned to death and the invention has been hidden from us ever since, yet our children are not learning about inventors such as Meyer in school, nor are they being encouraged to develop alternate fuel sources. Our children are inevitably asked, “What do you want to be when you grow up?”

Tuesday, April 22, 2014

Cheap Android Smartphones

Here’s Where They Make China’s Cheap Android Smartphones

Apple and Samsung, beware. Practically anyone can make a smartphone these days.
A little over a year ago, 38-year-old entrepreneur Liang Liwan wasn’t making smartphones at all. This year, he expects to build 10 million of them.
Liang’s company, Xunrui Communications, buys smartphone components and then feeds them to several small factories around Shenzhen, in southern China. There, deft-fingered workers assemble the parts into basic smartphones that retail for as little as $65.
Manufacturers built about 700 million smartphones last year. But the market has taken on a barbell shape. On one side are familiar names like Apple and Samsung, selling pricey phones for $300 to $600; on the other, several hundred lesser-known Chinese brands supplied by a thousand or more small factories.
The change began in 2011, when computer-chip makers began selling off-the-shelf chipsets—the set of processors that are the brains of a touch-screen phone. Those, plus Google’s free Android operating system, made smartphones much easier to produce.
The flood of inexpensive devices could hurt struggling phone makers like Nokia and might also force Samsung and Apple to offer cheaper models. “They have reached their peak,” Liang said during an interview near his office in Shenzhen, which has become a hub for electronics makers. “In [manufacturing] technique we are close to the same level. Then the only difference will be the cost and the brand.”
Larger Chinese companies, like Lenovo and Huawei, have also swarmed into China’s market with midrange phones that cost closer to $200. Lenovo captured 12 percent of China’s market last year.
Liang’s phones are the ultracheap kind. He builds them at several Shenzhen factories, like Shenzhen Guo Wei Global Electronics, a nondescript building that opened in 1991 as a manufacturer of fixed-line phones and audio equipment. At Guo Wei, young Xunrui engineers lounge about, smoking cigarettes and drinking warm Coca-Cola while playing games on various brands of laptops.
One floor up, past a metal detector and an enclosure where high-pressured air blows dust and other impurities off workers’ blue smocks, are the production lines—five of them, each with 35 young workers able to solder together and box up 3,000 smartphones a day.
Guo Wei has had to make some investments to get into the smartphone game, including importing new solder inspection equipment from Korea. One production line costs around $1.6 million to set up, according to Li Li, a production manager at the factory who showed off the equipment.
“The techniques are very complicated compared to older phones,” says Li, who joined the factory 17 years ago to work in a department that repaired fixed-line telephones.
But the real reason for the switchover to smartphones was that last year large chip makers, including the Taiwan-based MediaTek and Spreadtrum, started offering “turn-key” systems: phone designs plus a set of chips with Android and other software preloaded. Spreadtrum says it may sell 100 million units this year.
Each chipset costs $5 to $10, depending on the size of a phone’s screen and other features. In total, Liang says, his cost to make a smartphone is about $40. He says he can manufacture as many as 30,000 smartphones a day for brands such as Konka Mobile and for telecom operators like China Unicom.
In the United States, a smartphone’s high cost is generally masked by wireless companies, which discount them steeply if consumers agree to a contract. In China that happens as well. Liang says his phones retail for about $65 or $70 but can cost only $35 with a contract.
That is making China, now the world’s largest smartphone market, a challenging place for foreign firms to compete. Apple accounts for 38 percent of U.S. smartphone sales, but its share in China is 11 percent and falling. Google has even bigger problems making money. Even though the devices use Android, they often don’t come with Google’s apps and search tool installed (see “Android Takes Off in China, But Google Has Little to Show for It”).
Liang says his aim is to make smartphones that are affordable, even if they aren’t yet as good as an iPhone. That means the camera and LCD screen might not be the best, and the battery life could be shorter. “I always use this word ‘acceptable,’” he says. “A lot of users only need an acceptable product. They don’t need a perfect product.”
What’s certain, Liang says, is that the quality of the phones his factories produce will rise. “There is no profit at the bottom,” he says. “Everyone is trying to improve their techniques.”
Su Dongxia assisted with interpreting and research.

Lessons A Wise Man Would Share

20 Life Lessons A Wise Man Would Share


Commitment is what transforms a promise into reality. It is the words that speak boldly of your intentions. And the actions which speak louder than the words. It is making the time when there is none. Coming through time after time after time, year after year after year. Commitment is the stuff character is made of; the power to change the face of things. It is the daily triumph of integrity over skepticism. – Abraham Lincoln


No One is Perfect.  The quicker this is realized the faster you can get on with being excellent.  Start every morning ready to fight harder than you did the day before and run further than you ever imagine.
Avoid over explaining yourself.  Be confident with who you are.
Keep balance in your life.  Write down what’s most important to you and show up.  Sometimes we tend to do the things that are most important to us when it’s written down.
Play the hand you were dealt.  Have the courage to face challenges head on it builds character.  Start looking for a way through instead of a way out.
Be a student of life.  Learn something new every day.  The day you stop learning is the day you become obsolete so keep learning.
No Excuses.  Stop making excuses replace them with ways to do better.  Excuses are a waste of time and energy.
Let others know where you Stand.  Be uncompromising and be up front when someone steps on your core values.
Never be afraid of a challenge.  You put on your shoes like every other man.  Now it comes down to who wants it more.
Service to others.  Small, simple or important be a volunteer and give the very best of you.
Work like hell.  Everyone has a job to do so do it.  Cross every “T” and dot every “I”.
Discover You.  Find your passion, life purpose, and take action.
Don’t take it Personal.  Don’t be afraid to laugh at yourself self confidence shows that you’re comfortable in your own skin.
Manage your time.  Our situation and environment is ever changing so be careful not to confuse the things that are urgent with the things that are important.  Look for time wasters and eliminate them.
Ask for help.  Life can be tough remember you never have to do it alone.
Do your homework.  Know what you getting into before you start.  Doing your homework reduces uncertainty and fear.
Day Dream Often.  On the weekend when you are relaxing embrace a day dream.  During the week take action to preserve your dreams.
Be A HERO.  Cultivate a healthy dose of forgiveness and set someone free.  Learn to forgive others and stop carrying those bags of hate, guilt or regret.
Stay One Step Ahead.  Be proactive, Take the initiative, Brainstorm with the big picture in mind.
Self Love.  Become your own priority.  Strive to be the you, you want to be.
Finish what you started.  Avoid the urge to stray.

If you found this article interesting, please share it with someone on Facebook,Twitter, Stumbleupon or leave a comment below.  Thank You!

Wednesday, April 16, 2014

Samsung Fingerprint Scanner Can Easily Be Hacked

Galaxy S5 Fingerprint Scanner Can Easily Be Hacked 

swipe_1


Just some few days ago, the Samsung Galaxy S5 was released in the market, and Samsung did what it does best, break record sales. According to a report from GSM arena, the flagship device managed to set a new record on sales after being released last Friday simultaneously in 125 countries around the world beating its predecessor (the S4) by over 30%, making this the largest-scale launch the Korean company has ever pulled.
The most distinguished feature on the S5 is the fingerprint scanner integrated on the home button. And just after the release, a report from Germany’s Security Research Labs is already out claiming that hackers can easily bypass the fingerprint security.
What the team did is simply create a wood glue spoofed fingerprint from an etched PCB mold using a latent print photographed by an iPhone 4S. With very little effort, the finger print can be easily spoofed to think it is the actual finger print giving the hacker instant access.
Perhaps you may not have very delicate stuff on your phone to make you a tad worried, but remember the S5 integrates with your PayPal account and authentication can be done through the same swiping. The team was able to access a PayPal account, transfer funds and make purchases using this fake fingerprint; a process made easier by the fact you’re allowed unlimited swipe attempts, giving hackers plenty of time to perfect their spoof if it was rejected the first few times.
A PayPal spokesman issued a statement stating “The scan unlocks a secure cryptographic key that serves as a password replacement for the phone,” the statement read in part. “We can simply deactivate the key from a lost or stolen device, and you can create a new one. PayPal also uses sophisticated fraud and risk management tools to try to prevent fraud before it happens. However, in the rare instances that it does, you are covered by our purchase protection policy.”

Generate Solar Power in the Dark


Scientists Discover How to Generate Solar Power in the Dark

Meet 'photoswitches,' a breakthrough set of materials that act as their own batteries, absorbing energy and releasing it on demand.

 
The next big thing in solar energy could be microscopic.
Scientists at MIT and Harvard University have devised a way to store solar energy in molecules that can then be tapped to heat homes, water or used for cooking.
The best part: The molecules can store the heat forever and be endlessly re-used while emitting absolutely no greenhouse gases.  Scientists remain a way’s off in building this perpetual heat machine but they have succeeded in the laboratory at demonstrating the viability of the phenomenon called photoswitching.

“Some molecules, known as photoswitches, can assume either of two different shapes, as if they had a hinge in the middle,” MIT researchers said in statement about the paper published in the journal Nature Chemistry. “Exposing them to sunlight causes them to absorb energy and jump from one configuration to the other, which is then stable for long periods of time.”
To liberate that energy all you have to do is expose the molecules to a small amount of light, heat or electricity and when they switch back to the other shape the emit heat. “In effect, they behave as rechargeable thermal batteries: taking in energy from the sun, storing it indefinitely, and then releasing it on demand,” the scientists said.
The researchers used a photoswitching substance called an azobenzene, attaching the molecules to substrates of carbon nanotubes. The challenge: Packing the molecules closely enough together to achieve a sufficient energy density to generate usable heat.
It appeared that the researchers had failed when they were only able to pack fewer than half the number of molecules needed as indicated by an earlier computer simulation of the experiment.
But instead of hitting a projected 30 percent increase in energy density, they saw a 200 percent increase. It turned out that the key was not so much packing azobenzene molecules tightly on individual carbon nanotubes as packing the nanotubes close together. That’s because the azobenzene molecules formed “teeth” on the carbon nanotubes, which interlocked with teeth on adjacent nanotubes. The result was the mass needed for a usable amount of energy storage.
That means different combinations of photoswitching molecules and substrates might achieve the same or greater energy storage, according to the researchers.
So how would molecular solar storage work if the technology can be commercialized? Timothy Kucharski, the paper’s lead author and a postdoc at MIT and Harvard, told The Atlantic that most likely the storage would take a liquid form, which would be easy to transport.
“It would also enable charging by flowing the material from a storage tank through a window or clear tube exposed to the sun and then to another storage tank, where the material would remain until it's needed,” Kucharski said in an email.  “That way one could stockpile the charged material for use when the sun's not shining.”
The paper’s authors envision the technology could be used in countries where most people rely on burning wood or dung for cooking, which creates dangerous levels of indoor air pollution, leads to deforestation and contributes to climate change.
“For solar cooking, one would leave the device out in the sun during the day,” says Kucharski. “One design we have for such an application is purely gravity driven – the material flows from one tank to another. The flow rate is restricted so that it's exposed to the sun long enough that it gets fully charged. Then, when it's time to cook dinner, after the sun is down, the flow direction is reversed, again driven by gravity, and the opposite side of the setup is used as the cooking surface.”
“As the material flows back to the first tank, it passes by an immobilized catalyst which triggers the energy-releasing process, heating the cooking surface up,” he adds.
Other versions of such device could be used to heat buildings.
Kucharski said the MIT and Harvard team is now investigating other photoswitching molecules and substrates, “with the aim of designing a system that absorbs more of the sun's energy and also can be more practically scaled up.”

@TheAtlantic

Google- Project loon

Balloon powered internet from Google.




Balloon-powered Internet for everyone

Change WordPress Admin URL to Protect Blog From Hackers.

How to Change WordPress Admin URL to Protect Blog From Hackers.

Every day on Internet thousands of websites hacked by hackers because of less security. Especially WordPress websites getting hacked every day because it has huge popularity throughout the world. So automatically hackers try to hack WordPress blogs and websites. Here problem comes from with WordPress default admin URL because most of the bloggers and website owners use the default URL which comes after installation of WordPress on database. WordPress already said about this and they recommended changing the default username “admin” to other username. But these precautions don’t stop your website getting hacked from hackers.
So what to do? Here we come up with another approach which increases your WordPress blog/website security 10 times better than before.

How to Install and Configure Lockdown WP Admin Plug-in?

Here is the basic information about how to install and setup Lockdown WP Admin plug-in on WordPress blogs/websites.
  • First Login to your WordPress admin dashboard by entering username and password.
  • To get perfect results with this plug-in your site must have permalinks.
  • Now just navigate to plugins from the sidebar menu and click on Add new option to install new plug-in.
plugin installation on wordpress
  • Type Lockdown WP Admin in the search box and click on Search button to get search results. Click on Install Now Button to install it on your WordPress blog.
lockdown wp admin installation
confirmation dailogue box
  • Once the installation process complete, click on Activate Plug-in to activate Lockdown WP Admin plug-in.
installing lockdown wp adminplugin
  • Now Launch Lockdown WP Admin from the sidebar by clicking on Lockdown WP and select Lockdown WP.
lock down wp
  • First of all you need to select the box “Yes, please hide WP Admin from the user” and change the admin URL from WordPress login URL section with any name which is not easy to guess by any one.
hide wp admin url on wordpress
change default url of wordpress
  • In HTTP Authentication leave the field same that means keep “Disable HTTP Auth” as the default option and click on “save options” to save all these settings.
  • If you use HTTP Authentication then you need to create secondary WordPress Admin .htaccess password. This secondary password will be useful even if someone guess your secret admin URL too. If you use WordPress Login Credentials then you need to enter primary username and password to gain access secondary username and password.
  • Alternatively you can also use “Private Usernames/Passwords “ to set secondary username and passwords from Lockdown WP>Private Users Section.
  • To check whether it’s working or not, just logout from the WordPress dashboard. Now enter old WordPress admin URL and you’ll see 404 not found error page. Now on wards you need to use WordPress secret admin URL to login into WordPress dashboard.
logout wordpress
not found page in wordpress

Remove WordPress Meta Widget to Stop Exposing Secret Login Url:

Actually professional bloggers doesn’t keep this meta widget on their blogs but if any case you forgot to remove this widget then follow the below steps and remove Meta Widget.
1. Click on Apperance and select Widgets from the menu.Now you will see all activated and deactivated widgets at one place.
widgets on wordpress
2. In Primary Sidebar you’ll have all active widgets,click on Meta widget and delete from the list.
remove meta widget on wordpress blog
You can check the below screenshot which exposes the secret admin url before removing meta widget.
meta information on wordpress
There is another method to remove meta widget from wp files but all files are restored again if you update your WordPress dashboard.
Now no one can hack your website by accessing WordPress default admin URL.If you have any doubts while installing this process please leave a comment below.

Dancing Ugandan kids that went viral

Dancing Ugandan kids that went viral

Monday, April 14, 2014

The dark side of mobile technology


I’m going to be shifting gears here a little bit. Normally we’d be talking about all of the wonderful things that mobile tech can do for us, how exciting it is looking back and seeing how far we’ve come, discussing all of the latest gadgets that hold our interest, and so on. Today, though, my article will be a little different, because there is another side of smartphones that, quite frankly, I didn’t even know existed up until recently. Since making this discovery, I have to admit that I am positively shocked at what I’m finding out.
When we look at smartphones, we see the future. We’re happy because these little computers can do so much for us. They can keep us connected via phone calls, texting, and various social networks; they serve as media players for videos, music, and photo albums; they can even serve as gaming entertainment. There’s a lot of great things that come from smartphones. Once you go deeper than the smartphone, however, things start to get depressing.
I’m not sure if I’ve ever really considered how smartphones were made. I never thought to concern myself with exactly how smartphones were made because I was too busy enjoying the product in my hands; the finished product was the most important part to me. I couldn’t have cared less about the process of how it got there. I assumed that most factories were operated entirely by machinery at this point, but I was wrong. Until recently, I had never heard about benzene or n-hexane, much less how they directly affect the workers responsible for putting our beloved smartphones together.

It started off with this short documentary called “The Human Cost of Electronics”. The video shows accounts of factory workers who have developed “occupational cancer” - cancer developed as a direct result of working with chemicals in these factories, such as benzene or n-hexane. Cancer of any form is serious, but I think it is most alarming because the people in the film are people are around my age. I’m only 23, and I feel like my life is just getting started. I can’t imagine what these people are going through being around my age and dealing with cancer, and knowing that it was developed as a direct result from their jobs that deal directly with these chemicals for up to 15 hours in a given work day, 7 days a week, in a building with no windows or proper ventilation.
Benzene is a category 1 carcinogen that is banned in most Western countries for industrial use; there is an exception for benzene use in China given that so many electronics are created here. Yes, you read that correctly: We make exceptions to our safety standards in the name of sleek-looking electronics. And yes, this chemical is in all of our smartphones - every single one. Don’t bother looking for one that doesn’t have it, because it doesn’t exist right now. That doesn’t mean that we can’t try and help the situation.
Network Coordinator of Good Electronics in Armsterdam, Pauline Overeem, encourages people to bring up these devastating conditions to manufacturers in order to bring them to an end. “It is part of supply chain responsibility. Banning the use of benzene should be part of that,” says Overeem.
Fortunately, there are alternatives to benzene. Toxicology experts estimate that replacing benzene with safer solvents would only cost around $1 extra per phone.
I would gladly pay more money for a phone made in safer work environments than buying a cheaper phone knowing that somebody contracted a serious illness in the process. These people are working in these factories trying to build towards a better life, like anybody would, and ended up terminally ill in the process. It breaks my heart, and I had no idea. I am certain that there are a lot of people who had no idea, which is why I felt compelled to write about it.
Nobody deserves those conditions. If there is a way to fix it, then it should be done. Manufacturers must replace benzene and n-hexane with safer alternatives. Money is not an excuse not to.

Tell if your Android is Heartbleed infected

How to tell if your Android device is vulnerable to Heartbleed

Believe it or not, some Android devices are susceptible to the Heartbleed bug. Here’s what you need to know.
heartbleeddetectorandroid.jpg
Jason Cipriani/CNET
The Heartbleed bug just doesn't quit. When Google announced it had patched its key services, it also mentioned Android was largely unaffected, with one (big) exception -- devices running Android 4.1.1.
The good news is Google has already sent a patch to its Android partners. The bad news? Now we have to wait for those partners to implement it, followed by carriers testing and pushing out the update. Android users know how slow this process can be. Hopefully with the critical nature of the Heartbleed bug, and the attention it's received, these partners and carriers will work quickly to get the fix out.
In the meantime, to verify if your Android device is at risk, security company Lookout has released a free app. The app, called Heartbleed Detector, scans your device and reports the results. I have yet to find a device that doesn't report that the offending version of OpenSSL is present, however if it isn't enabled, as in the photo above, then your device is not at risk.
Right now, if your device is affected, there's not much you can do other than wait for an update. You can typically check for updates by going into Settings > About > Software update.
Download Heartbleed Detector to check your device.

Beyond Quantum Computing

Is There Anything Beyond Quantum Computing?

A quantum computer is a device that could exploit the weirdness of the quantum world to solve certain specific problems much faster than we know how to solve them using a conventional computer. Alas, although scientists have been working toward the goal for 20 years, we don’t yet have useful quantum computers. While the theory is now well-developed, and there’s also been spectacular progress on the experimental side, we don’t have any computers that uncontroversially use quantum mechanics to solve a problem faster than we know how to solve the same problem using a conventional computer.
computer_620
Credit: Marcin Wichary/Flickr, under a Creative Commons license.
 
Yet some physicists are already beginning to theorize about what might lie beyond quantum computers. You might think that this is a little premature, but I disagree. Think of it this way: From the 1950s through the 1970s, the intellectual ingredients for quantum computing were already in place, yet no one broached the idea. It was as if people were afraid to take the known laws of quantum physics and see what they implied about computation. So, now that we know about quantum computing, it’s natural not to want to repeat that mistake! And in any case, I’ll let you in on a secret: Many of us care about quantum computing less for its (real but modest) applications than because it defies our preconceptions about the ultimate limits of computation. And from that standpoint, it’s hard to avoid asking whether quantum computers are “the end of the line.”
Now, I’m emphatically not asking a philosophical question about whether a computer could be conscious, or “truly know why” it gave the answer it gave, or anything like that. I’m restricting my attention to math problems with definite right answers: e.g., what are the prime factors of a given number? And the question I care about is this: Is there any such problem that couldn’t be solved efficiently by a quantum computer, but could be solved efficiently by some other computer allowed by the laws of physics?
Here I’d better explain that, when computer scientists say “efficiently,” they mean something very specific: that is, that the amount of time and memory required for the computation grows like the size of the task raised to some fixed power, rather than exponentially. For example, if you want to use a classical computer to find out whether an n-digit number is prime or composite—though not what its prime factors are!—the difficulty of the task grows only like n cubed; this is a problem classical computers can handle efficiently. If that’s too technical, feel free to substitute the everyday meaning of the word “efficiently”! Basically, we want to know which problems computers can solve not only in principle, but in practice, in an amount of time that won’t quickly blow up in our faces and become longer than the age of the universe. We don’t care about the exact speed, e.g., whether a computer can do a trillion steps or “merely” a billion steps per second. What we care about is the scaling behavior: How does the number of steps grow as the number to be factored, the molecule to be simulated, or whatever gets bigger and bigger? Scaling behavior is where we see profound differences between today’s computers and quantum computers; it’s the whole reason why anyone wants to build quantum computers in the first place. So, could there be a physical device whose scaling behavior is better than quantum computers’?

The Simulation Machine
A quantum computer, as normally envisioned, would be a very specific kind of quantum system: one built up out of “qubits,” or quantum bits, which exist in “superpositions” of the “0” and “1” states. It’s not immediately obvious that a machine based on qubits could simulate other kinds of quantum-mechanical systems, for example, systems involving particles (like electrons and photons) that can move around in real space. And if there are systems that are hard to simulate on standard, qubit-based quantum computers, then those systems themselves could be thought of as more powerful kinds of quantum computers, which solve at least one problem—the problem of simulating themselves—faster than is otherwise possible.
So maybe Nature could allow more powerful kinds of quantum computers than the “usual” qubit-based kind? Strong evidence that the answer is “no” comes from work by Richard Feynman in the 1980s, and by Seth Lloyd and many others starting in the 1990s. They showed how to take a wide range of realistic quantum systems and simulate them using nothing but qubits. Thus, just as today’s scientists no longer need wind tunnels, astrolabes, and other analog computers to simulate classical physics, but instead represent airflow, planetary motions, or whatever else they want as zeroes and ones in their digital computers, so too it looks likely that a single device, a quantum computer, would in the future be able to simulate all of quantum chemistry and atomic physics efficiently.
So far, we’ve been talking about computers that can simulate “standard,” non-relativistic quantum mechanics. If we want to bring special relativity into the picture, we need quantum field theory—the framework for modern particle physics, as studied at colliders like the LHC—which presents a slew of new difficulties. First, many quantum field theories aren’t even rigorously defined: It’s not clear what we should program our quantum computer to simulate. Also, in most quantum field theories, even a vacuum is a complicated object, like an ocean surface filled with currents and waves. In some sense, this complexity is a remnant of processes that took place in the moments after the Big Bang, and it’s not obvious that a quantum computer could efficiently simulate the dynamics of the early universe in order to reproduce that complexity. So, is it possible that a “quantum field theory computer” could solve certain problems more efficiently than a garden-variety quantum computer? If nothing else, then at least the problem of simulating quantum field theory?
While we don’t yet have full answers to these questions, over the past 15 years we’ve accumulated strong evidence that qubit quantum computers are up to the task of simulating quantum field theory. First, Michael Freedman, Alexei Kitaev, and Zhenghan Wang showed how to simulate a “toy” class of quantum field theories, called topological quantum field theories (TQFTs), efficiently using a standard quantum computer. These theories, which involve only two spatial dimensions instead of the usual three, are called “topological” because in some sense, the only thing that matters in them is the global topology of space. (Interestingly, along with Michael Larsen, these authors also proved the converse: TQFTs can efficiently simulate everything that a standard quantum computer can do.)
Then, a few years ago, Stephen Jordan, Keith Lee, and John Preskill gave the first detailed, efficient simulation of a “realistic” quantum field theory using a standard quantum computer. (Here, “realistic” means they can simulate a universe containing a specific kind of particle called scalar particles. Hey, it’s a start.) Notably, Jordan and his colleagues solve the problem of creating the complicated vacuum state using an algorithm called “adiabatic state preparation” that, in some sense, mimics the cooling the universe itself underwent shortly after the Big Bang. They haven’t yet extended their work to the full Standard Model of particle physics, but the difficulties in doing so are probably surmountable.
So, if we’re looking for areas of physics that a quantum computer would have trouble simulating, we’re left with just one: quantum gravity. As you might have heard, quantum gravity has been the white whale of theoretical physicists for almost a century. While there are deep ideas about it (most famously, string theory), no one really knows yet how to combine quantum mechanics with Einstein’s general theory of relativity, leaving us free to project our hopes onto quantum gravity—including, if we like, the hope of computational powers beyond those of quantum computers!

Boot Up Your Time Machine
But is there anything that could support such a hope? Well, quantum gravity might force us to reckon with breakdowns of causality itself, if closed timelike curves (i.e., time machines to the past) are possible. A time machine is definitely the sort of thing that might let us tackle problems too hard even for a quantum computer, as David Deutsch, John Watrous and I have pointed out. To see why, consider the “Shakespeare paradox,” in which you go back in time and dictate Shakespeare’s plays to him, to save Shakespeare the trouble of writing them. Unlike with the better-known “grandfather paradox,” in which you go back in time and kill your grandfather, here there’s no logical contradiction. The only “paradox,” if you like, is one of “computational effort”: somehow Shakespeare’s plays pop into existence without anyone going to the trouble to write them!
Using similar arguments, it’s possible to show that, if closed timelike curves exist, then under fairly mild assumptions, one could “force” Nature to solve hard combinatorial problems, just to keep the universe’s history consistent (i.e., to prevent things like the grandfather paradox from arising). Notably, the problems you could solve that way include the NP-complete problems: a class that includes hundreds of problems of practical importance (airline scheduling, chip design, etc.), and that’s believed to scale exponentially in time even for quantum computers.
Of course, it’s also possible that quantum gravity will simply tell us that closed timelike curves can’t exist—and maybe the computational superpowers they would give us if they did exist is evidence that they must be forbidden!

Simulating Quantum Gravity
Going even further out on a limb, the famous mathematical physicist Roger Penrose has speculated that quantum gravity is literally impossible to simulate using either an ordinary computer or a quantum computer, even with unlimited time and memory at your disposal. That would put simulating quantum gravity into a class of problems studied by the logicians Alan Turing and Kurt Gödel in the 1930s, which includes problems way harder than even the NP-complete problems—like determining whether a given computer program will ever stop running (the “halting problem”). Penrose further speculates that the human brain is sensitive to quantum gravity effects, and that this gives humans the ability to solve problems that are fundamentally unsolvable by computers. However, virtually no other expert in the relevant fields agrees with the arguments that lead Penrose to this provocative position.
What’s more, there are recent developments in quantum gravity that seem to support the opposite conclusion: that is, they hint that a standard quantum computer could efficiently simulate even quantum-gravitational processes, like the formation and evaporation of black holes. Most notably, the AdS/CFT correspondence, which emerged from string theory, posits a “duality” between two extremely different-looking kinds of theories. On one side of the duality is AdS (Anti de Sitter): a theory of quantum gravity for a hypothetical universe that has a negative cosmological constant, effectively causing the whole universe to be surrounded by a reflecting boundary. On the other side is a CFT (Conformal Field Theory): an “ordinary” quantum field theory, without gravity, that lives only on the boundary of the AdS space. The AdS/CFT correspondence, for which there’s now overwhelming evidence (though not yet a proof), says that any question about what happens in the AdS space can be translated into an “equivalent” question about the CFT, and vice versa.
This suggests that, if we wanted to simulate quantum gravity phenomena in AdS space, we might be able to do so by first translating to the CFT side, then simulating the CFT on our quantum computer, and finally translating the results back to AdS. The key point here is that, since the CFT doesn’t involve gravity, the difficulties of simulating it on a quantum computer are “merely” the relatively prosaic difficulties of simulating quantum field theory on a quantum computer. More broadly, the lesson of AdS/CFT is that, even if a quantum gravity theory seems “wild”—even if it involves nonlocality, wormholes, and other exotica—there might be a dual description of the theory that’s more “tame,” and that’s more amenable to simulation by a quantum computer. (For this to work, the translation between the AdS and CFT descriptions also needs to be computationally efficient—and it’s possible that there are situations where it isn’t.)

The Black Hole Problem
So, is there any other hope for doing something in Nature that a quantum computer couldn’t efficiently simulate? Let’s circle back from the abstruse reaches of string theory to some much older ideas about how to speed up computation. For example, wouldn’t it be great if you could program your computer to do the first step of a computation in one second, the second step in half a second, the third step in a quarter second, the fourth step in an eighth second, and so on—halving the amount of time with each additional step? If so, then much like in Zeno’s paradox, your computer would have completed infinitely many steps in a mere two seconds!
Or, what if you could leave your computer on Earth, working on some incredibly hard calculation, then board a spaceship, accelerate to close to the speed of light, then decelerate and return to Earth? If you did this, then Einstein’s special theory of relativity firmly predicts that, depending on just how close you got to the speed of light, millions or even trillions of years would have elapsed in Earth’s frame of reference. Presumably, civilization would have collapsed and all your friends would be long dead. But if, hypothetically, you could find your computer in the ruins and it was still running, then you could learn the answer to your hard problem!
We’re now faced with a puzzle: What goes wrong if you try to accelerate computation using these sorts of tricks? The key factor is energy. Even in real life, there are hobbyists who “overclock” their computers, or run them faster than the recommended speed; for example, they might run a 1000 MHz chip at 2000 MHz. But the well-known danger in doing this is that your microchip might overheat and melt! Indeed, it’s precisely because of the danger of overheating that your computer has a fan. Now, the faster you run your computer, the more cooling you need—that’s why many supercomputers are cooled using liquid nitrogen. But cooling takes energy. So, is there some fundamental limit here? It turns out that there is. Suppose you wanted to cool your computer so completely that it could perform about 1043 operations per second—that is, one about operation per Planck time (where a Planck time, ~10-43 seconds, is the smallest measurable unit of time in quantum gravity). To run your computer that fast, you’d need so much energy concentrated in so small a space that, according to general relativity, your computer would collapse into a black hole!
And the story is similar for the “relativity computer.” There, the more you want to speed up your computer, the closer you have to accelerate your spaceship to the speed of light. But the more you accelerate the spaceship, the more energy you need, with the energy diverging to infinity as your speed approaches that of light. At some point, your spaceship will become so energetic that it, too, will collapse into to a black hole.
Now, how do we know that collapse into a black hole is inevitable—that there’s no clever way to avoid it? The calculation combines Newton’s gravitational constant G with Planck’s constant h, the central constant of quantum mechanics. That means one is doing a quantum gravity calculation! I’ll end by letting you savor the irony: Even as some people hope that a quantum theory of gravity might let us surpass the known limits of quantum computers, quantum gravity might play just the opposite role, enforcing those limits.

Go Deeper
Editor’s picks for further reading
Computer History Museum
Explore 2000 years of computer history at the web site of this unique Mountain View, California museum.
Quantum Computing Since Democritus
Described by its author as “a candidate for the weirdest book ever to be published by Cambridge University Press,” Scott Aaronson’s book is a romp through the past and present of math, physics, and computer science.
The New York Times: Quantum Computing Promises New Insights, Not Just Supermachines
In this essay, Scott Aaronson argues that the popular conception of quantum computers “misses the most important part of the story,” and that the greatest payoff may be a deeper understanding of quantum mechanics.

Sunday, April 13, 2014

How to Block Ads on Android Apps, Games and Browser’s.

How to Block Ads on Android Apps, Games and Browser’s?

Ads are most disgusting things in internet which distracts users while in the browsing session. Most of the ads which are displayed in the internet are not useful to most of the people. Now ads are expanding their range to show them on smart mobiles and showed up them while playing games and using apps. To block ads on Firefox and chrome there are so many extensions and add ons are available. In these extensions Ad block plus is popular and it also available to android users.
Here we explain two methods which are useful to block ads on android apps, games and browser. One is traditional method and another one is using application.

How to Block Ads on Android Apps, Games and Browser?

There is one old and working method in windows operating system to block ads in internet. Here we use the same trick in android mobile too. That is hosts file trick.
1. We collect some websites which shows ads on android apps, games and kept them in one text file. First you need to download this file.
2. Now you must change the file name to hosts, because it doesn’t work if you use any other name except hosts.
3. After changing file name you need to transfer that file to android system folder. In system folder navigate to /etc folder and paste this hosts file which have bunch of websites which shows ads on android apps, games.
4. Here you need to made one other change that is rename hosts file into hosts.bak because there is already one hosts file available in that directory.
rename hosts file
5. Alternatively you can copy all websites from hosts file and paste them into your mobile system hosts file which is located on /system/etc folder.
system folder in android mobile
6. To paste hosts file you need to have administrative rights, if the above trick doesn’t work then you need to root your android mobile.
7. After completing all above steps just restart your mobile and see ads are blocked or not. Most of the ads are removed with this trick but it needs some more improvements. We will add some more websites in future to this list.

Block Ads on Android Apps, Games Using Adblock Plus for Android:

This is the most useful and easy method to block ads but you need to some more configurations. Then only it works effectively. You can download adblock plus for android from the below link.
Download Adblock plus for Android
If you use rooted android mobile then install this application with superuser permissions. Then only it’s working perfectly. If you have non rooted android mobile then you must do some more configurations like manual proxy setting. You can check all manual configuration settings from adblock plus website. (Settings for Non rooted Android mobiles)

adblock plus advanced settings

Block Ads on Websites with Adblock plus Firefox Extension:

If you feel above process is difficulty then you can use Firefox extension to block ads on websites only. To do this first download adblock plus extension for Firefox from the below link.
After installing extension just restart browser and see ads are appeared or not. If you want more options to block ads then go to adblock plus extension from menu and configure new options.
These are the working methods to block ads on both websites, android apps, games. If you have any doubts while installing application please leave a comment below.

Protect USB with Password

How to Protect USB/Pendrive with Password

Here in this article we know about how to protect USB/pen drive with password and how can we give such protection with different types of software. Now a days every one use flash drives to transfer data from one computer to another computer because every flash drive is same in size but have capability of carrying GB’s of data. We use USB flash drives to boot into windows computer and play songs in DVD players. We also carry some important data through flash drives like office files and some other confidential information. Let’s assume if someone try to theft your pen drive, price is not a problem but data is more important.
So to prevent your important data from others you need to set some protection which is not easy to break. Here we provide some third-party applications which are good at protecting USB flash drives with password.

USB Security:

USB Security is a great software to protect your data which is located on USB flash drive. They provide better security to your pen drive which is not easy to get data from USB drive without entering password. This is a shareware application but it works well with all functions for 30 days. After that you need to buy full license to use application without any problem.

How to Use USB Security on USB Drive?

1. First you need to download latest version of USB security from the below website.
2. After that open USB security application and click on accept button to start installation. Once you click on accept button it will show all available removal drives in your pc.
3. Choose your USB drive from the list and click on install button, after that click on finish button to complete the installation.
install usb security on pen drive
4. Now you’ll see another window which have some sort options related to pen drive protection. It asks you to set new password to pen drive and again type the same password in next field. Type some hint to remember password when you forgot password.
protect usb drive with password
5. Make sure to check whether password in uppercase or lowercase. Once completing the setup click on protect button to protect data in pen drive.
6. Now it copies whole data into a secret partition and lock it with password. To get data from pen drive you need to run USBsecurity.exe file from USB flash drive and enter password to unlock pendrive.
usb drive protected

Some Common Problems and Solutions:

Q. How Can I get my Data Back if someone delete USBsecurity.exe?
A. There is no need to worry about this because it is a one minute process. Simply copy the USBsecurity.exe file and paste it into pen drive. Now again click on USBsecurity.exe and enter password to unlock pen drive.
Q. If I don’t have USBsecurity.exe file along with me then how can I get my data back?
A. Don’t worry, we have solution for that problem also. Simple go through the above download link and download USBsecurity.exe file then paste it into your pendrive. Now open that exe file to unlock your pendrive.
How to Uninstall USB Security.exe Completely from Your Pendrive?
Normal program uninstallation process doesn’t work with this application because it doesn’t install on PC, it installs on USB drive.
So before uninstalling this application you need to unprotect this application. After that it shows two options. Those are Uninstall and Reprotect.
Click on Uninstall button then it prompts another dialogue box with a message “Are you sure you want to uninstall USB Security”. Click on OK button to uninstall USB Security completely.
uninstall usb security

Is there any alternatives available for this software?

Yes there are some other applications are also available to protect pen drive with password. They are
1. Truecrypt
2. Rohos mini drive
3. Comodo Disk Encryption
4. USB Safeguard
5. Diskcryptor
By using these all tools you can protect your flash drive with password or encrypt whole data in the pendrive. If you have any doubts while installing this application please leave a message.

Saturday, April 12, 2014

Heartbleed developer explains OpenSSL mistake that put Web at risk

Heartbleed developer explains OpenSSL mistake that put Web at risk

"Trivial" coding error in open source project wasn't intentional, report says.

The software developer who inserted a major security flaw into OpenSSL has said the error was "quite trivial" despite the severity of its impact, according to a new report. The Sydney Morning Herald published an interview today with Robin Seggelmann, who added the flawed code to OpenSSL, the world's most popular library for implementing HTTPS encryption in websites, e-mail servers, and applications. The flaw can expose user passwords and potentially the private key used in a website's cryptographic certificate (whether private keys are at risk is still being determined).
The Herald reports:
Dr. Seggelmann, of Münster in Germany, said the bug which introduced the flaw was "unfortunately" missed by him and a reviewer when it was introduced into the open source OpenSSL encryption protocol over two years ago.
"I was working on improving OpenSSL and submitted numerous bug fixes and added new features," he said.
"In one of the new features, unfortunately, I missed validating a variable containing a length."
After he submitted the code, a reviewer "apparently also didn’t notice the missing validation," Dr. Seggelmann said, "so the error made its way from the development branch into the released version." Logs show that reviewer was Dr. Stephen Henson.
Dr. Seggelmann said the error he introduced was "quite trivial", but acknowledged that its impact was "severe".
Seggelmann said it might be "tempting" to assume the bug was inserted deliberately by a spy agency or hacker. "But in this case, it was a simple programming error in a new feature, which unfortunately occurred in a security relevant area," he said, according to the newspaper report. "It was not intended at all, especially since I have previously fixed OpenSSL bugs myself and was trying to contribute to the project."
A Netcraft post on Tuesday said that "Support for heartbeats was added to OpenSSL 1.0.1 (released in 2012) by Robin Seggelmann, who also coauthored the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension RFC. The new code was committed to OpenSSL's git repository just before midnight on new year's eve 2011."
A "heartbeat" is "a check to see if the other party is still present or if they’ve dropped off," security expert Troy Hunt wrote. "In the context of SSL, the initial negotiation between the client and the server has a communication overhead that the heartbeat helps avoid repeating by establishing if the peer is still 'alive,'" he wrote. "Without the heartbeat, the only way to do this is by renegotiation, which in relative terms is costly." The Heartbleed flaw lets attackers "control the heartbeat size and structure to be larger than expected" and receive responses from the server that contain information that should have been kept secure.
"Ultimately, this boiled down to a very simple bug in a very small piece of code that required a very small fix," Hunt wrote. "Now it just needs to be installed on half a million vulnerable websites."

Thursday, April 10, 2014

know how to Check if an Image is Photoshopped

How to Check if an Image is Photoshopped or Not ?

Now a days every one used Photoshop or any other photo editing software like Gimp, paint.net etc. to change any image into new look. In Internet we have seen so many images which are morphed and some photographs are looks like original but we can’t decide our self by viewing the images. We can find some images directly by viewing but few images have no difference to our eyes. In this time we need to take support of online tools which have capability of finding the image is changed or not?
Here we review two online tools which works perfectly to detect morphing images and photoshopped images which looks like real to our eyes.

Fotoforensics:
Fotoforensics is a unique web service which provide exact information about morphed and photoshopped images. This website has some sort of algorithms to detect whether image is photoshopped or not. This website provides 4 types of information which helps you to find the image is morphed or not.
They are
  • ELA
  • JPEG%
  • Meta Data
  • Original
How to Check Image is Photoshopped or not using Fotoforensics:
1. First Open fotoforensics website from the below link and upload desired image which one you want to check the originality.
Fotoforensics website

2. After uploading the image it will show two images, one is original image and another one is analyzed image.
upload pictures on fotoforensics
3. Now you can check ELA of that image and find whether it is photoshopped or not.

ELA:

ELA means error level analysis, it helps us to detect the image was photoshopped or not by showing error level on image. If the image is edited or morphed then it shows some color in image analysis. If the image doesn’t change using any software then it shows normal white color on the image.
ela on fotoforensics

JPEG%:

You can also detect the image morphing ratio using this Jpeg%. It shows the quality of image when it was last saved. If the quality will be decreases then it would be definitely modified using software. Here you can see the image which have 90% quality.
jpeg quality test on fotoforensics

Meta Data:

Most of the computer users know about how to remove Meta data from photographs. But still some kind of information is available in this Meta data section. It displays available information about that photograph like when it was created, when it was modified and which camera is used to take that photograph.

Original:

This original section shows the original version of that image uploaded by you on this website.
 Image Edited?
This is another awesome online tool to check the image is photoshopped or not. By using this web service you can find image is changed with photo editing software or not. Unlike Fotoforensics tool this service provide straight answers to users who upload image and this is easily understandable to everyone. For example if you upload fully photoshopped image then it shows a message like “Yes” and give the full details about that photograph. It also mention the software which one they used to modify the image.

How to Check an Image is Edited or Not?

1. First open Image edited website from the below link and upload an image which one you want to check.
ImageEditied? Website
2. After that it takes few seconds of time to retrieve all information about that image. If you want to get exif information then click on “Show Exif information”.
find morphed image on imageedited
By using this web service not only check whether image is edited or not but also reveal some other important information like meta data of image, exif data of image. There is one unique feature is available in this application that is you can find whether it is taken from Facebook or not. If you upload images which are downloaded from Facebook then it shows a message like “Photo has been taken from Facebook” and also give detailed information about that photograph like which software is used to edit this photograph.
image edited website detects facebook photos

How these Online Tools are working?

In these above two tools first one fotoforensics works with some sort of algorithms like error level analysis, jpg% etc. and another tool photo edited? Gathers data from Meta and exif data. If it can’t get any Meta or exif data from the photograph then it shows a message like can’t tell.
These two tools are working perfectly to find out whether image is photoshopped or not but these are not enough to judge photographs because most of the users delete Meta data. So try these tools to find out some kind of information about modified photographs.