Tuesday, May 26, 2009

The Best Firewall for FREE !!! … just for today …

· 0 comments

 

Online Armor - is a Personal Firewall to protect your money, identity and your Data. Whether you’re browsing , Transacting or receiving Email; Online Armor can protect you. This award winning software is easy to use right of the box.

The powerful “HIPS” functions, which is designed to stop all unrecognized programs from running on your computer, makes it possible to protect yourself against new threats and attacks.

online-armor-firewall_177_216

In standard mode, most decisions are made completely automatically based on Online Armor’s whitelist - users never need answer a complex firewall prompt again.

Online Armor protects your passwords and private information from being stolen by blocking keyloggers as they try to activate. Online Armors behaviour detection ensures that even specially created or new keyloggers are detected and prevented.

The version given in GOTD is a full paid version which has following features … which are way more then any other firewall gives you for free !!!

ONLINE ARMOR had also been reviewed by many other people and nearly all of them found this firewall , perhaps the best in its category … some reviews are …

Matousec … an independent software testing company ..

Scot Finnie’s … Scot’s News letter

CNET

 

and just for today … my favorite site … Give away of the day .. is giving it away for free with 1 year subscription … perhaps it is one of the best giveaway by GOTD …

you can download online armor from here … GOTD site

Njoy …

Friday, May 22, 2009

GPS system 'close to breakdown' ???

· 0 comments

It has become one of the staples of modern, hi-tech life: using satellite navigation tools built into your car or mobile phone to find your way from A to B. But experts have warned that the system may be close to breakdown.

realtime_diff_GPS

US government officials are concerned that the quality of the Global Positioning System (GPS) could begin to deteriorate as early as next year, resulting in regular blackouts and failures – or even dishing out inaccurate directions to millions of people worldwide.

The warning centres on the network of GPS satellites that constantly orbit the planet and beam signals back to the ground that help pinpoint your position on the Earth's surface.

The satellites are overseen by the US Air Force, which has maintained the GPS network since the early 1990s. According to a study by the US government accountability office (GAO), mismanagement and a lack of investment means that some of the crucial GPS satellites could begin to fail as early as next year.

"It is uncertain whether the Air Force will be able to acquire new satellites in time to maintain current GPS service without interruption," said the report, presented to Congress. "If not, some military operations and some civilian users could be adversely affected."

The report says that Air Force officials have failed to execute the necessary steps to keep the system running smoothly.

Although it is currently spending nearly $2bn (£1.3bn) to bring the 20-year-old system up to date, the GAO – which is the equivalent of Britain's National Audit Office – says that delays and overspending are putting the entire system in jeopardy.

"In recent years, the Air Force has struggled to successfully build GPS satellites within cost and schedule goals," said the report. "It encountered significant technical problems … [and] struggled with a different contractor."

The first replacement GPS satellite was due to launch at the beginning of 2007, but has been delayed several times and is now scheduled to go into orbit in November this year – almost three years late.

The impact on ordinary users could be significant, with millions of satnav users potential victims of bad directions or failed services. There would also be similar side effects on the military, which uses GPS for mapping, reconnaissance and for tracking hostile targets.

Some suggest that it could also have an impact on the proliferation of so-called location applications on mobile handsets – just as applications on the iPhone and other GPS-enabled smartphones are starting to get more popular.

Tom Coates, the head of Yahoo's Fire Eagle system – which lets users share their location data from their mobile – said he was sceptical that US officials would let the system fall into total disrepair because it was important to so many people and companies.

"I'd be surprised if anyone in the US government was actually OK with letting it fail – it's too useful," he told the Guardian.

"It sounds like something that could be very serious in a whole range of areas if it were to actually happen. It probably wouldn't damage many locative services applications now, but potentially it would retard their development and mainstreaming if it were to come to pass."

The failings of GPS could also play into the hands of other countries – including opening the door to Galileo, the European-funded attempt to rival America's satellite navigation system, which is scheduled to start rolling out later next year.

Russia, India and China have developed their own satellite navigation technologies that are currently being expanded …fingerscrossed

Njoy …

Tuesday, May 12, 2009

WiMAX challenges Wi-Fi

· 0 comments

When most people hear “wireless Internet,” they think “Wi-Fi.” The technology has allowed millions of computers and mobile devices to browse the Web without the snarl of cords. But there’s another wireless standard out there – one that’s arguably more tempting if it can get its act together.

WiMAX delivers the Web similar to Wi-Fi, but covers wide areas like a cellphone tower. While the range of a Wi-Fi router is measured in yards – enough to blanket a house or office – WiMAX can broadcast for miles. This added range has attracted interest from local governments looking into citywide wireless networks.

Several early citywide Wi-Fi plans were abandoned because they underestimated the cost of installing enough hot spots. But with WiMAX, “Instead of needing 20 or 30 Wi-Fi access points per square mile, you need one,” says Craig Settles, an independent wireless analyst. And many cities won’t need to brainstorm creative places to stick a WiMAX antenna, because it can be attached to current cell phone towers. Sprint rolled out a pilot WiMAX program in Baltimore last year. The network delivers average download speeds of two to four megabits per second, half the rate of cable Internet but several times faster than the 3G mobile service used by many of today’s smart phones, according to Sprint’s tests. The company plans to introduce WiMAX in 10 American cities this year and five more in 2010.

“But here’s the big problem,” says Mr. Settles. “How many iPhones have a WiMAX chip in them? None.”

In fact, barely any devices understand a WiMAX signal because it uses different frequencies from Wi-Fi. This incompatibility issue has exacerbated the normal chicken-and-egg problem that plagues new technology: People won’t buy WiMAX devices until there are more WiMAX networks, but why build the network when Wi-Fi is doing so well? Sprint’s plan requires a proprietary antenna that plugs into laptops, similar to the early Wi-Fi cards that have since been built into computers.

If WiMAX takes off, its performance could drop off quickly, says Settles, because fewer towers means that each station needs to juggle more requests. “Some testers were stunned at the difference in reliability as more people join,” he says. “3G has about a 90 percent uptime. WiMAX is around 70% .” In the US, WiMAX has an additional hurdle because it relies on frequencies that are regulated by the government, so companies will need to pay extra for broadcast rights.

While Settles questions WiMAX’s chances, he says there’s a middle solution. “Locally owned” service provider B2X Online harnesses WiMAX-like towers to deliver broadband Internet to Franklin County, Va. The towers, which transmit over an unlicensed frequency, allow the small company to circumvent the expensive process of laying Internet cables to rural areas.

from the CSMonitor

Njoy …

Monday, May 11, 2009

An invention that could change the internet for ever

· 0 comments

The new system, Wolfram Alpha, showcased at Harvard University in the US last week, takes the first step towards what many consider to be the internet's Holy Grail – a global store of information that understands and responds to ordinary language in the same way a person does.

image 

Although the system is still new, it has already produced massive interest and excitement among technology pundits and internet watchers.

Computer experts believe the new search engine will be an evolutionary leap in the development of the internet. Nova Spivack, an internet and computer expert, said that Wolfram Alpha could prove just as important as Google. "It is really impressive and significant," he wrote. "In fact it may be as important for the web (and the world) as Google, but for a different purpose.

Tom Simpson, of the blog Convergenceofeverything.com, said: "What are the wider implications exactly? A new paradigm for using computers and the web? Probably. Emerging artificial intelligence and a step towards a self-organizing internet? Possibly... I think this could be big."

Wolfram Alpha will not only give a straight answer to questions such as "how high is Mount Everest?", but it will also produce a neat page of related information – all properly sourced – such as geographical location and nearby towns, and other mountains, complete with graphs and charts.

The real innovation, however, is in its ability to work things out "on the fly", according to its British inventor, Dr Stephen Wolfram. If you ask it to compare the height of Mount Everest to the length of the Golden Gate Bridge, it will tell you. Or ask what the weather was like in London on the day John F Kennedy was assassinated, it will cross-check and provide the answer. Ask it about D sharp major, it will play the scale. Type in "10 flips for four heads" and it will guess that you need to know the probability of coin-tossing. If you want to know when the next solar eclipse over Chicago is, or the exact current location of the International Space Station, it can work it out.

Dr Wolfram, an award-winning physicist who is based in America, added that the information is "curated", meaning it is assessed first by experts. This means that the weaknesses of sites such as Wikipedia, where doubts are cast on the information because anyone can contribute, are taken out. It is based on his best-selling Mathematica software, a standard tool for scientists, engineers and academics for crunching complex maths.

"I've wanted to make the knowledge we've accumulated in our civilization computable," he said last week. "I was not sure it was possible. I'm a little surprised it worked out so well."

Dr Wolfram, 49, who was educated at Eton and had completed his PhD in particle physics by the time he was 20, added that the launch of Wolfram Alpha later this month would be just the beginning of the project.

"It will understand what you are talking about," he said. "We are just at the beginning. I think we've got a reasonable start on 90 per cent of the shelves in a typical reference library."

The engine, which will be free to use, works by drawing on the knowledge on the internet, as well as private databases. Dr Wolfram said he expected that about 1,000 people would be needed to keep its databases updated with the latest discoveries and information.

He also added that he would not go down the road of storing information on ordinary people, although he was aware that others might use the technology to do so.

 

Wolfram Alpha has been designed with professionals and academics in mind, so its grasp of popular culture is, at the moment, comparatively poor. The term "50 Cent" caused "absolute horror" in tests, for example, because it confused a discussion on currency with the American rap artist. For this reason alone it is unlikely to provide an immediate threat to Google, which is working on a similar type of search engine, a version of which it launched last week.

"We have a certain amount of popular culture information," Dr Wolfram said. "In some senses popular culture information is much more shallowly computable, so we can find out who's related to who and how tall people are. I fully expect we will have lots of popular culture information. There are linguistic horrors because if you put in books and music a lot of the names clash with other concepts."

He added that to help with that Wolfram Alpha would be using Wikipedia's popularity index to decide what users were likely to be interested in.

With Google now one of the world's top brands, worth $100bn, Wolfram Alpha has the potential to become one of the biggest names on the planet.

Dr Wolfram, however, did not rule out working with Google in the future, as well as Wikipedia. "We're working to partner with all possible organizations that make sense," he said. "Search, narrative, news are complementary to what we have. Hopefully there will be some great synergies."

from Independent

Njoy …

Sunday, May 10, 2009

Black Holes of Internet !!!

· 0 comments

There are plenty of places online that you would do well to steer clear of. A brief visit to some unsavoury websites, for instance, could leave your computer infected with worms or viruses. Then there are the "black holes" to worry about.

If your emails mysteriously disappear, or your favorite website is suddenly unobtainable, you might have run into one. Though nowhere near as destructive as their cosmological cousins, information black holes can create all kinds of problems for surfers. Essentially they are points on the network at which data packets simply disappear due to broken connections, say, or misconfigured routers - devices that maintain lists of addresses and which help direct internet traffic. A team including computer scientist Ethan Katz-Bassett at the University of Washington in Seattle has detected almost 1.5 million black holes since it began looking in 2007. The majority persist for over 2 hours, he says. Unfortunately it is tough to predict where they will appear next, so it's hard for the average surfer to avoid them.

Far easier to avoid are a kind of online chatroom called Internet Relay Chat channels. Though the majority are legitimate, a few IRC channels have a very dark reputation, and are run as open markets for stolen goods. One 2007 survey found $37 million worth of illegal stuff in IRC channels, including 80,000 credit card numbers and bank account details. And if that is not bad enough, some of these chatrooms are also used by hackers to send commands to their networks of malicious software bots, or botnets. When a PC is infected by a virus or malicious software it may be hijacked and used as part of a botnet to launch spam or cyber-attacks elsewhere.

Then there are significant pockets of cyberspace - some 5 per cent of all internet addresses - that are not fully connected to the rest of the net. Dubbed the "dark internet", they are often the result of faulty routers or networks with strict security policies that block traffic.

Amongst these dark regions are blocks of seemingly unused internet addresses that may suddenly and briefly flare into activity. Although this behavior might have an innocent explanation, it can also hint at dubious activities.

A three-year study by online security consultants Arbor Networks revealed that dark internet addresses can be a source of cyber-attacks and junk email. The study suggests that hackers or spammers hijack routers and use them to create false addresses which are left dormant until the hackers bring them to life to facilitate their nefarious ends. These dark addresses seem to be multiplying in proportion to the growth of the net, says Arbor Networks' Craig Labovitz.

from New Scientist ..

Njoy …

Friday, May 8, 2009

Hiding Identity under the Onion … How To of TOR software

· 0 comments

 

Just like i said before … Tor is really good application … in this post i will show how this thing works and anonymize our identity on internet !!!

first all you need is to download the TOR from TOR project website … i chose , the 2nd option, “ Tor Browser Bundle for Windows (Contains Tor, Vidalia, Torbutton, Polipo, and Firefox) “ … its 0.2.1.14-rc … they says its UNSTABLE so … may give unexpected results or may be it will not make you much “anonymous” around the internet but i really don’t know the actual reason .. sigh … i use this version because , NO NEED TO INSTALL or SETUP anything and its PORTABLE …

once you download it , extract it on a usb drive ( if you are planning to use it on any other pc )or in any folder of computer ( to use only in that machine ) …

image

now , simply double click on that Vidalia icon … it will run the script and automatically

image

once connected to Tor network , it will launch Tor’s old buddy …. the Firefox … you can make sure that you are connected by viewing , the Vidalia control panel , which shows CONNECTED TO THE TOR NETWORK message with green onion …

 image

 

as it will launch FF, you will see the welcome message just like above ( ofcouse IP will be different ) … just remember to NOT TO CLOSE FIREFOX , because it will automatically exit TOR … ( i think you can change that option ) …

 

image

 

the thing is , i was using google’s chrome too , now see when is check the website … www.whatismyip.com

 

image 

the chrome shows my real IP , but the TORed firefox shows the IP that others will SEE when i use TOR … hmm …thats TORrific .. right ??

and if you ever wonder what is the route to that IP from ur IP , and how you are anonymized … just try to see the routing path of TOR … it shows TOR NETWORK MAP … as you know TOR uses onion routing , so after passing through these much number of nodes … its really hard to find your real IP ( that’s the best part ) … !!!

1124170844-1

and the thing is , i am sitting in public library which has restricted access to sites and can’t access to youtube ( no offence ) … but i really like to watch cartoons on it … so before i can’t use it because it has been blocked by firewall and filters … but now ?? … nothing is between me and my favorite show ( expect my g/f .. hehehe ) …

so that is the way how can you anonymize your identity on internet using tor … but you need to remember that TOR is all free , open to public and non profit thing , so may be you won’t feel glitch when you surf the internet , but you will feel a bit leggy performance when you watch video on youtube …and about security , TOR CAN NOT secure your connection outside the TOR network , means hacker sitting at the end of exit node can intercept / sniff your packets and crack your password  ( for security, TOR recommends SSL connection between End to End Connection )…  also , many times the search results are different then what you expected or language is different … this is because , now you have IP of another geographic location , the search engine  thinks you are from that place so it will display results according to it ( its good if you surf porn sites a lot , because they will not get your real location ….. huh, wait a minute … do you really want it  ??? ) …

 

fingerscrossedNjoy …

Tuesday, May 5, 2009

Windows 7 RC goes public …

· 0 comments

 

Just like they have said in their windows blog … the Latest Operating System from microsoft … Windows 7 … is available to public … but this time , its Release Candidate version …. v. 7100 … which means , its better then beta … and most of this will come as it is in final version of windows 7 ….

dwhiuuyd7c7glv6w6my

This RC version is available to download till JULY,and  will expire on 1st of June 2010 … to download it you need to have account with any of microsoft services … and product key will be given at time of downloading …

 

Njoy … fingerscrossed

Monday, May 4, 2009

Hiding Identity under the Onion !!!

· 0 comments

 tor_sticker

Vidalia … a sweet onion , great in taste indeed and better choice for eating raw compared to other breeds … but the vidalia onion i am talking about is something different … its the TOR Project , which has symbol of vidalia onion, because it uses onion routing concept … Tor is a software , which allows user to surf internet anonymously …

Logic behind the Onion …

Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. Here, volunteers provide their network node ( at their expense of bandwidth and $$$ ofcourse ) …

But Tor is not the magic wend of fairy god-mother that will make user completely anonymous on internet … it has its own limitation and rules … it does not guarantee for security of data transmitted , once it leaves tor network … so to ensure end-to-end security, measures need to be taken ( SSL connection for example ) … because it has been already proved that , a user ( a hacker , to be more precise )  sitting at end node of network can sniff / capture data leaving tor network and can use it too …

onionroutingfig7

But if you are an adventurer just like me … who just want to try tor for study and experiment … then its really amazing …

the tor software which runs from usb drive gives you ultra portability , ease of use … you don’t even need to install anything in pc … and more good , we can use it anywhere …  is just amazing …

i want to write about  it but some another time …

history about tor

tor official site

till then …

Njoy … fingerscrossed

Sunday, May 3, 2009

Antivirus that lives in the Cloud …

· 0 comments

 

Now a days , everything seem to be adopting itself for cloud computing … the latest edition is an antivirus by PANDA ANTIVIRUS … they call its Cloud Antivirus … which according to panda , lives in the cloud and , consumes least memory … yet provides the best protection against everything threat that internet posses to average joe !!! … But still its in BETA … and so only time can say who much successful it will be in reality … but good thing is , panda thinks to keep it free even after releasing its final version … at present its available only for XP and Vista ( too bad for me , as user of 7 and Jaunty Jackalope ) … but they are planning to release version for windows 7 too beer

till then , read this article from my favorite site about cloud antivirus …

With threats like Conficker fresh in the public's mind, security remains a top concern for Windows users. Panda Security, publishers of Panda Internet Security and Panda Antivirus, is set to take antivirus where it hasn't been yet: into the clouds. Panda Cloud Antivirus beta bets that nearly three years of development can pay off into a better protection system for users. To that end, Panda's willing to make the client free for personal use--even after it leaves beta testing.

 panda_cloud_AV_scanning_610x420

the program uses Panda's proprietary cloud computing technology, which they call Collective Intelligence, to detect viruses, malware, rootkits, and heuristics. It takes advantage of "millions of users," according to Panda, to identify new malware almost in real time. Panda says that Collective Intelligence can classify new malware in under six minutes, and that it handles more than 50,000 new samples per day. The Cloud Antivirus works by classifying threats into executables that must be scanned immediately, and non-executables that are checked at a lower priority--usually when the computer is idle.

In exchange for using consumer data to build the Collective Intelligence database, Panda decided to offer the Panda Cloud Antivirus for free, said Pedro Bustamante, senior research adviser at Panda Security.

panda_cloud_AV_1_610x379

The new program reportedly takes up around 50 MB on the hard drive and eats around 17 MB of RAM when in use. That compares well against the industry average that Panda provided of 60 MB, and Bustamante said that they're aiming for 12 MB of RAM when in use.

Cloud computing may make sense from a system resources point of view, but what happens to system security when the computer isn't connected to the Internet? "The model we've implemented is to break down the traditional antivirus to client and server, so when the user is not connected they keep a local cache copy of Collective Intelligence, including detections for what Collective Intelligence sees is spreading through the community," he said.

Panda Cloud Antivirus is for Windows XP and Windows Vista, with planned support for Windows 7 when it's released. Bustamante added that it will stay in beta as it's being accepted by users, although they hope it will leave beta by the end of this summer.

from CNET

Njoy … fingerscrossed

Friday, May 1, 2009

Is Internet running out of fuel ???

· 0 comments

 

Internet users face regular “brownouts” that will freeze their computers as capacity runs out in cyberspace, according to research to be published later this year.

Experts predict that consumer demand, already growing at 60 per cent a year, will start to exceed supply from as early as next year because of more people working online and the soaring popularity of bandwidth-hungry websites such as YouTube and services such as the BBC’s iPlayer.

It will initially lead to computers being disrupted and going offline for several minutes at a time. From 2012, however, PCs and laptops are likely to operate at a much reduced speed, rendering the internet an “unreliable toy”.

When Sir Tim Berners-Lee, the British scientist, wrote the code that transformed a private computer network into the world wide web in 1989, the internet appeared to be a limitless resource. However, a report being compiled by Nemertes Research, a respected American think-tank, will warn that the web has reached a critical point and that even the recession has failed to stave off impending problems.

“With more people working or looking for work from home, or using their PCs more for cheap entertainment, demand could double in 2009,” said Ted Ritter, a Nemertes analyst. “At best, we see the [economic] slowdown delaying the fractures for maybe a year.”

In America, telecoms companies are spending £40 billion a year upgrading cables and supercomputers to increase capacity, while in Britain proposals to replace copper cabling across part of the network with fibreoptic wires would cost at least £5 billion.

Yet sites such as YouTube, the video-sharing service launched in 2005, which has exploded in popularity, can throw the most ambitious plans into disarray.

The amount of traffic generated each month by YouTube is now equivalent to the amount of traffic generated across the entire internet in all of 2000.

The extent of its popularity is indicated by the 100 million people who have logged on to the site to see the talent show contestant Susan Boyle in the past three weeks.

Another so-called “net bomb” being studied by Nemertes is BBC iPlayer, which allows viewers to watch high-definition television on their computers. In February there were more than 35 million requests for shows and iPlayer now accounts for 5 per cent of all UK internet traffic.

Analysts express such traffic in exabytes – a quintillion (or a million trillion) bytes or units of computer data. One exabyte is equivalent to 50,000 years’ worth of DVD-quality data.

Monthly traffic across the internet is running at about eight exabytes. A recent study by the University of Minnesota estimated that traffic was growing by at least 60 per cent a year, although that did not take into account plans for greater internet access in China and India.

While the net itself will ultimately survive, Ritter said that waves of disruption would begin to emerge next year, when computers would jitter and freeze. This would be followed by “brownouts” – a combination of temporary freezing and computers being reduced to a slow speed.

Ritter’s report will warn that an unreliable internet is merely a toy. “For business purposes, such as delivering medical records between hospitals in real time, it’s useless,” he said.

“Today people know how home computers slow down when the kids get back from school and start playing games, but by 2012 that traffic jam could last all day long.”

Engineers are already preparing for the worst. While some are planning a lightning-fast parallel network called “the grid”, others are building “caches”, private computer stations where popular entertainments are stored on local PCs rather than sent through the global backbone. Telephone companies want to recoup escalating costs by increasing prices for “net hogs” who use more than their share of capacity.

Is it just a theory .. or will it become nightmare of technology …. only time will answer this question … in world of today , where applications are transforming them selves into web applications …. it will surely death call for them rose_wilted ….

from TimesOnline

Njoy … fingerscrossed

Supporting the Cause

Creative Commons

Translate into your Language

New Day New Giveaway

Powered By Blogger