Wednesday, November 25, 2009

NOW BLIND CAN VISUALIZE.......................SAYS MIT CHEK IT OUT

Look look it's a great deal by the MIT. They have developed it, it is just like a map vision for the blind guys.
BlindAid system allows blind people to "feel" their way around a virtual model of a room or building, familiarising themselves with it before going there.
it is just similar to that before going to some place as we visit that place through internet or other way this system works like that for blind people.
sandeep "the techchnology lover"

Saturday, November 21, 2009

what are the trojens are ?????

A trojen horse is:
. An unauthorized program contained within a legitimate program this unauthorized program performs functions unknown by the user.
.it is a legitimate program that has been altered by the placement of unauthorized codewithin it; this code performs the functions unknown to the user
-> the common underlying feature is that it is the malicious code.
for more visit my blog :
http://sandeepthesecurity.blogspot.com

sandeep "the techchnology lover"

what are the viruses???

What is a virus?

A computer virus is a way of describing a computer programme that has been written specifically to cause damage to your PC. In essence, it is a piece of software that is written to cause as much havoc as possible.
A virus is designed to gain access to files or programs on your PC. The virus may enter your computer CD, DVD, USB by email or by your internet connection.

There are many types of viruses including worms, phishing, rootkits, and Trojan horses. They are collectively known as malware.

An antivirus software package is designed to prevent viruses or malware from damaging your PC. It does this by being able to recognise emails and programmes which are potentially harmful to your PC and then destroy them.

sandeep "the techchnology lover"

Monday, November 16, 2009

Hooks Hijacked? New Research Shows How To Block Stealthy Malware Attacks

The spread of malicious software, also known as malware or computer viruses, is a growing problem that can lead to crashed computer systems, stolen personal information, and billions of dollars in lost productivity every year. One of the most insidious types of malware is a "rootkit," which can effectively hide the presence of other spyware or viruses from the user -- allowing third parties to steal information from your computer without your knowledge. But now researchers from North Carolina State University have devised a new way to block rootkits and prevent them from taking over your computer systems.


THE DETAILS ARE AS FOLLOWS:
ENJOY READING

To give some idea of the scale of the computer malware problem, a recent Internet security threat report showed a 1,000 percent increase in the number of new malware signatures extracted from the in-the-wild malware programs found from 2006 to 2008. Of these malware programs, "rootkits are one of the stealthiest," says Dr. Xuxian Jiang, assistant professor of computer science at NC State and a co-author of the research. "Hackers can use rootkits to install and hide spyware or other programs. When you start your machine, everything seems normal but, unfortunately, you've been compromised."
Rootkits typically work by hijacking a number of "hooks," or control data, in a computer's operating system. "By taking control of these hooks, the rootkit can intercept and manipulate the computer system's data at will," Jiang says, "essentially letting the user see only what it wants the user to see." As a result, the rootkit can make itself invisible to the computer user and any antivirus software. Furthermore, the rootkit can install additional malware, such as programs designed to steal personal information, and make them invisible as well.
In order to prevent a rootkit from insinuating itself into an operating system, Jiang and the other researchers determined that all of an operating system's hooks need to be protected. "The challenging part is that an operating system may have tens of thousands of hooks -- any of which could potentially be exploited for a rootkit's purposes," Jiang says, "Worse, those hooks might be spread throughout a system. Our research leads to a new way that can protect all the hooks in an efficient way, by moving them to a centralized place and thus making them easier to manage and harder to subvert."
Jiang explains that by placing all of the hooks in one place, researchers were able to simply leverage hardware-based memory protection, which is now commonplace, to prevent hooks from being hijacked. Essentially, they were able to put hardware in place to ensure that a rootkit cannot modify any hooks without approval from the user.
The research, "Countering Kernel Rootkits with Lightweight Hook Protection," will be presented at the 16th ACM Conference on Computer and Communications Security in Chicago, Nov. 12. The study's co-authors are Jiang, Dr. Peng Ning, associate professor of computer science at NC State, NC State Ph.D. student Zhi Wang and Weidong Cui of Microsoft Research.


sandeep "the techchnology lover"

Saturday, November 14, 2009

Cell Phones Become Handheld Tools For Global Development

ScienceDaily (Nov. 11, 2009) — Mobile phones are on the verge of becoming powerful tools to collect data on many issues, ranging from global health to the environment.

Computer scientists at the University of Washington have used Android, the open-source mobile operating system championed by Google, to turn a cell phone into a versatile data-collection device. Organizations that want a fully customizable way to, say, snap pictures of a deforested area, add the location coordinates and instantly submit that information to a global environmental database now have a flexible and free way to do it.
UW computer scientists were already working on mobile tools for the developing world when Android, the first comprehensive open-source platform for mobile devices, was announced two years ago by the Open Handset Alliance, a group of companies of which Google is a member. For the past year UW computer science and engineering doctoral students Carl Hartung, Yaw Anokwa and Waylon Brunette have worked at Google's Seattle office using Android to create a data-collection platform for use in developing regions.
Their free suite of tools, named Open Data Kit, is already used by organizations around the world that need inexpensive ways to gather information in areas with little infrastructure. Seattle's Grameen Foundation Technology Center is using it to evaluate its Ugandan text-messaging information hotline; D-Tree International, a Boston-based nonprofit, is using it in Tanzania to guide health workers treating children under 5 years old; the University of California, Berkeley's Human Rights Center is using it to record human rights violations in the Central African Republic. This fall the Jane Goodall Foundation in Tanzania and the Brazilian Forest Service signed up to use it to monitor deforestation.
"Many organizations need to be able to make evidence-based decisions, and to do that they need data," Anokwa said. "We hope our toolkit enables organizations to gather the data quickly so they can analyze it quickly and make the best decisions for the communities they serve."
They tool is described in an article published this month in the Institute of Electrical and Electronics Engineers' Computer magazine. Gaetano Borriello, UW professor of computer science and engineering, and Adam Lerer, a graduate student at the Massachusetts Institute of Technology, are co-authors.
In the past some researchers have harnessed individual cell phone models to collect data in the field. But when the phone gets outdated, so does the software. Instead of creating a tool for a single phone, or even a single purpose, the UW team built something that would provide a reusable platform to collect all types of mobile data.
"We found a lot of organizations were building a lot of one-off tools that were very similar," Hartung said. "We're trying to make ours as compatible and flexible as possible."
Open Data Kit's versatile suite of tools can collect data; store, view and export data on remote servers; and manage devices in the field from a central office. The output is compatible with emerging data standards such as the Open Medical Records System, which aims to coordinate health records in the developing world.
Many organizations are using Open Data Kit, but the biggest project so far is a major effort to track and treat HIV patients in Kenya. Led by the Academic Model Providing Access to Healthcare, a U.S. Agency for International Development-funded partnership between Indiana University and Kenya's Moi University, it is one of the most comprehensive HIV treatment programs in sub-Saharan Africa. AMPATH trains Kenyan community health workers who conduct door-to-door testing in rural areas for HIV, tuberculosis and malaria, and offer ongoing personalized health counseling.
Hartung and Anokwa traveled to Kenya this summer to meet with AMPATH's community health workers and do a trial run with 10 phones. They spent two weeks working with Kenyan collaborators, then accompanied community health workers on home visits to see the phone being used in the field.
"It's a pretty amazing experience to be sitting in a mud hut seeing someone get counseled, maybe for the first time, on HIV, and the counselor is using your tool to record information," Hartung said. "It gives a whole new perspective on the need for reliable software."
For the past two years AMPATH workers have conducted field visits using a Palm Pilot and separate GPS unit. This required workers to key in a 10-digit identifier for each patient, stand outside and wait up to two minutes to get location coordinates, and at the end of each day return to the main office to upload their information to a central database, which adds travel time and expense.
Phones running Open Data Kit can record location in seconds, scan a barcode rather than requiring the numbers to be entered by hand, and upload the data automatically using a cellular network. AMPATH plans to deploy 100 Google-powered phones by the end of this year. Ultimately, it aims to use 300 phones powered with Open Data Kit to reach 2 million people.
"Adopting this technology was kind of a win-win-win in terms of direction for our organization," said Dr. Burke Mamlin, an assistant professor of medicine at the Indiana University School of Medicine and research scientist with the nonprofit Regenstrief Institute, which supports AMPATH. "This opens doors by allowing us to bring data collected in the field directly into our medical records system. And now we have a phone, all the personal digital assistant capability, the ability to read barcodes, and the ability to capture images or video, all in one unit."
The device also opens up new possibilities for the future. If one family member is absent during a site visit health workers can schedule a follow-up visit and have it automatically appear in their calendars. Health workers could cue up public-health videos if they thought the family could benefit. Program managers in a central office could track data in real time and send updates to field workers without them having to come back to the base.
Building technology for use in the developing world offers new challenges for computer scientists. Power and connectivity may be intermittent, and users may have poor eyesight or literacy.
There are also other issues specific to mobile devices. Web developers in the Western world generally create white text on a dark background, but it turns out dark text on a white background works better in bright sunlight, where most of these devices will be used. And touch-screen phones rely on an electrical signal from users' fingers, but that signal gets blocked by calluses. UW students found some rural users needed to use a softer part of the finger pad, and this meant designing bigger buttons.
The team is now back at the UW, where they are part of a group called Change that studies technology in the developing world. Funding for the project comes from Google.org, the philanthropic arm of the company. The code is freely available and ongoing research will be based at the university.
sandeep "the techchnology lover"

TECHNOLOGY AHEAD

: BLUE RAY DISK :
Blu-ray, also known as Blu-ray Disc (BD), is the name of a next-generation optical disc format jointly developed by the Blu-ray Disc Association (BDA)
The format offers more than five times the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer disc and 50GB on a dual-layer disc. This extra capacity combined with the use of advanced video and audio codecs will offer consumers an unprecedented HD experience.
While current optical disc technologies such as DVD, DVD±R, DVD±RW, and DVD-RAM rely on a red laser to read and write data, the new format uses a blue-violet laser instead, hence the name
Blu-ray. Despite the different type of lasers used, Blu-ray products can easily be made backwards compatible with CDs and DVDs through the use of a BD/DVD/CD compatible optical pickup unit. The benefit of using a blue-violet laser (405nm) is that it has a shorter wavelength than a red laser (650nm), which makes it possible to focus the laser spot with even greater precision. This allows data to be packed more tightly and stored in less space, so it's possible to fit more data on the disc even though it's the same size as a CD/DVD. This together with the change of numerical aperture to 0.85 is what enables Blu-ray Discs to hold 25GB/50GB. Recent development by Pioneer has pushed the storage capacity to 500GB on a single disc by using 20 layers.


sandeep "the techchnology lover"
A GREAT GUY IN NEWS

Meet the 10-yr-old who is CEO of two companies and a lecturer

Kuala Lumpur, Nov 11 (ANI): A Malay boy, who is only 10 years old, has become the CEO of two companies and a lecturer who charges RM 6,000 per hour.

According to Sin Chew Daily and Nanyang Siang Pau, 10-year-old Adi Putra Abdul Ghani's mother Serihana Alias operates the two companies, which sell vitamins under the brand Adi.

Adi Putra, who is supposed to be attending Year Four classes at his age, has stopped schooling, and he has now instead been invited to certain local universities to give lectures.

The Perak-born child genius, who moved to Selangor with his family a few years ago, was quoted as saying that he wanted to be a lecturer in Islamic studies.

Serihana said he keeps track of foreign stock markets via the Internet and studies at home.

"He's interested in mathematics, physics, chemistry, geography and biology, but not so much in history and politics. He dislikes reading books but loves spending his time browsing the Net for study materials," the Star Online quoted Serihana as saying.

"Adi also hopes to study in Canada, Singapore or the United States, but we have yet to come to a final decision," she added. (ANI
sandeep "the techchnology lover"