Showing posts with label Tech News. Show all posts
Showing posts with label Tech News. Show all posts

Sunday, August 30, 2009

Unlocking the iphone!!

Unlocking the iphone-



As we all know, iPhone is Subscriber Identity Module (SIM) locked. This means iphone was designed for and can be used by one carrier—AT&T in the United States—and offers a limited set of iPhone-compatible voice and data plans. Within weeks of its release, a hacker named iZsh created a tool named iASign, which allowed iPhone owners to unlock and use their phones with AT&T/Cingular plans that were not designed for the iPhone, including pay-as-you-go plans.




A month or two later, the iPhone Dev Team hackers released the iUnlock and anySIM tools (see Figure above), which allowed the iPhone to be unlocked and used with any Global System for Mobile communications (GSM) SIM from around the world.Within days of its release, the iPhone had been unlocked and used in dozens of countries,from Malaysia to Jamaica and from Norway to Pakistan.

Reacting to the iPhone Unlock tool, Steve Jobs said, “It’s a cat-and-mouse game. We try to stay ahead. People will try to break in, and it’s our job to stop them breaking in.” In late September 2007, Apple issued the following statement in a press release:

"Apple has discovered that many of the unauthorized iPhone unlocking programs available on the Internet cause irreparable damage to the iPhone’s software,which will likely result in the modified iPhone becoming permanently inoperable when a future Apple-supplied iPhone software update is installed.Apple plans to release the next iPhone software update,containing many new features including the iTunes Wi-Fi Music Store(http://www.itunes.com/), later this week.Apple strongly discourages users from installing unauthorized unlocking programs on their iPhones.Users whomake unauthorized modifications to the software on their iPhone violate their iPhone software license agreement and void their warranty.The permanent inability to use an iPhone due to installing unlocking software is not covered under the iPhone’s warranty".

After releasing firmware update 1.1.1 for iPhone, Apple refused warranty service to bothunlocked phones and phoneswith third-party applications. Caveat emptorand hacker beware.

Wednesday, August 19, 2009

FEEDJIT The Geoblogosphere

FEEDJIT one of the famous Live traffic feed for websites and blogs which can be used to monitor users from which country and city.


FEEDJIT also shows maps which includes popular pages and tracks the countries that hits the website or blog.

FEEDJIT launched Geoblogosphere, the concept of Geoblogosphere is to monitor which FEEDJIT blogs are popular in your city or any city, state or country in the world. If your blog is popular in your town it will appear in the Geoblogosphere for your area.


Visit :feedjit.com

VIPeers - Yet Another Better Alternative To Rapidshare

I hate rapidshare mainly because every second file on the internet seems to be available on rapidshare and rapidshare is miserable for free users. And if you have a shared internet IP, then forget about downloading from rapidshare. There are a zillion sites which have come up with their own file storage services but there seems to be no service which can compete rapidshare.

I usually use the service called mediafire which is also free ofcourse and gives quite decent stats and upload and download options. But recently I stumbled upon a new file sharing site with quite an amazing feature set. It has got a huge file size limit of 5 GB.

Some other features on the site are listed as:
Share by Direct Download Link or BitTorrent

The VIPeers hosting service offers you the perfect selection of easy sharing methods:

* Download URL of the file
* Send by email or post on Social networks
: Facebook, FriendFeed, Delicious…
* Download button for blogs
* Plain button for forums
* BitTorrent and Podmailing links for Peer-To-Peer downloads





Manage your VIPeers uploads and P2P downloads with Podmailing

To transfer many files you can use Podmailing, our tiny software which enables:

* Upload entire folders as easily as files
* Transfer manager for queueing and resuming uploads / downloads
* Peer-To-Peer client, supporting BitTorrent “.torrent” and Podmailing “.zed” links
* Hybrid protocol mixing http and BitTorrent
* Deliver files by email or using VIPeers options listed above
* Free software working on Windows XP/Vista and MacOS X



I think this is the best file hosting service I have encountered yet which also gives a desktop software client for managing our downloads and uploads. The torrent option is also awsome and unique. Please let me know about your experiences.

Tuesday, August 18, 2009

YouTube has recently added a really huge format (850×500) for those videos which have got the option to be displayed in HD format. But how we can s

Windows XP may be one of the more stable and developed operating systems (Vista is like a beta right now). But there are many irritating aspects in Windows XP.

Windows has a really stupid popup system, which pops up for every unnecessary thing imaginable. For example, there is a popup to warn that disk space is low on the system drive (usually C:\). Also, there is a popup for alerting you that a new program installed. As if you didn’t know that you’ve installed a program!

There is an easy registry hack to get rid of all these popups. Do not be appalled by a registry edit - this is really simple.

Open up the registry editor - go to Run, type regedit and click OK. Backing up the registry before a hack is always a good idea, so click File > Export, choose a location and click save. Then, proceed to HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced

Right click on the right-hand pane, make New> DWORD Value and name it EnableBallonTips. Set the value to 0 to disable ballontips, and set it back to 1 to enable balloontips.

This hack disables most balloontips. In order to eliminate all popups, some more work is required. In each of the following locations, change the values to 0 to disable balloontips.

* Location: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced\
1. Change the value of FolderContentsInfoTip to 0

* Location: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced\
1. Change the value of ShowInfoTip to 0.

* Location: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\tips\Show
1. Change the value of Show to 0

If anything goes wrong, restore the registry file that you had edited before and settings will be restored

Gigabyte EX58-EXTREME Review

We received the retail version of the Gigabyte EX58-Extreme tested, Unlike its older models of motherboards, the manufacturer opted for a much more sober colors, replacing the color pink, apple green, purple and orange and dimm SATA ports by blue and white. As for the rest, the card is identical to the model previously tested..

Photos of the card.





The card has 6 ports dimm and supports DDR3 triple channel. Alongside the SATA ports you can see a small LCD diagnostic system, displaying the error codes and other hardware problems encountered. Beneath the memory ports, Gigabyte switch placed Power / Reset / Clr CMOS making tests outside box easier. The EX58-Extreme has voltage to 12 phases for the CPU, 2-phase DDR3 and 2 phases for the Northbridge.



The rear panel is very rich because the card offers 2 ports PS2, analog outputs and digital audio, 1 firewire port, 1 clear CMOS button, 8-port USB2, 2 Ethernet ports and RJ45 input and output 7.1 audio. The EX58-Extreme supports 10 SATA devices without prior installation. 4 ports are managed by 2 controllers JMicron 322 and the other 6 by the ICH10-R Intel. You can also see the GUI three PCI-Express 2.0 that supports CrossFireX and sorting SLI, which allows the installation of 3 cards Nvidia or ATI.

The Bundle.



The contents of the box:
  • Motherboard GA-EX58-EXTREME
  • A CD-ROM drivers
  • The user manual
  • A quick guide
  • IDE cable and a floppy cable
  • Four cables SATA 3Gb / s
  • A SATA bracket
  • A back plate I / O
  • An expansion card 2-port IEEE 1394a
  • A mounting kit module Hybrid Silent-Pipe
  • Bridge 2-Way SLI
  • Bridge 3-Way SLI
The Hybrid Silent-Pipe II.




The Hybrid Silent-Pipe II is the external radiator cooling Hybrid Silent Pipe 2 which aims to transfer the heat given off camera. Cooling Hybrid Silent-Pipe 2 combines air and liquid to maximize thermal performance in silence. It is also inspired by the radiator system graphics cards with passive cooling Gigabyte. It attaches easily near the waterblock with four small screws provided with the bundle. The X58 chipset does almost no heat, no one knows if such a cooling system is necessary for the proper functioning of the card or simply to decorate this..


Layout.

The map shows a layout almost perfect except that Gigabyte has put the LCD diagnostic system below the graphics card. Indeed when using multiple cards, we could see what it shows. It would have been better to deport almost like buttons dimm power ON / OFF and reset. Some would say it would have been preferable not to use the SATA connectors to 90 degrees. It may be noted that the CMOS battery is located below the heatpipe, as was the case on the EP45 Extreme. If you have lots of fans to connect, the EX58-Extreme will make you happy because it has no less than six connectors 3 or 4 pins.



The Bios

Gigabyte uses the same blue Award Bios for years, but here, as on the EP45-UD3P, the MIT (Motherboard Intelligent Tweaker) was deported on the right. Here are some pictures of the MIT, where one has access to almost all the tensions and possible settings.


The parameters A-Channel-Timing-Settings and Channel-A-Turnaround-Settings can be changed for the three channels of memory, A, B and C.


Key voltages and frequencies available:

CPU

CPU vCore: 0.5V-1.9V in steps of 20mV (OC CPU)
QPI / ATV VOLTAGE: 1.082v-2.0V in steps of 20mV (OC clock Bclk)
CPU PLL: 1.4v-2.5V in steps of 20mV (OC clock Bclk)

MCH / ICH

PCIE: 1.0V-2.14v in steps of 20mV (OC PCIe)
QPI PLL: 0.8V-1.6V in steps of 20mV (OC clock QPI)
IOH Core: 1.0V-2.0V in steps of 20mV (system stability OC)
ICH I / O: 2.5V-1.05v in steps of 20mV (system stability OC)
ICH Core: 0.92v-2.38v in steps of 20mV (system stability OC)

DRAM

DRAM VOLTAGE: 1.3V-2.6V in steps of 20mV (OC memory timings)
DRAM TEMINATION: 0.52v-1.225v in steps of 25mv (OC memory timings)
A CH-DATA VREF. 0.7V-0.97v in steps of 10mV (OC memory timings)
CH-B DATA VREF. 0.7V-0.97v in steps of 10mV (OC memory timings)
CH-C DATA VREF. 0.7V-0.97v in steps of 10mV (OC memory timings)
A CH-ADDRESS VREF. 0.7V-0.97v in steps of 10mV (OC memory timings)
CH-B ADDRESS VREF. 0.7V-0.97v in steps of 10mV (OC memory timings)
CH-C ADDRESS VREF. 0.7V-0.97v in steps of 10mV (OC memory timings)

Some tests in overclocking aircooling


For a motherboard called "Extreme" we did run some benchmark with one of the largest configurations available on the market today.

Here is the configuration used for overclocking tests:
  • CPU: Core i7 965xe
  • Motherboard: Gigabyte EX58-Extreme
  • RAM: 3 X 1gb A-DATA 1600X
  • VGA: 2 X 4870X2
  • Power: 1200w Gigabyte Odin
  • CPU Cooling: Noctua NH-C12P




Tests conducted at -105 ° C: Objective 5 GHz!

After some testing aircooling, where the processor was stable to 4200mhz for applications and multithreaded reaching 4500mhz for those using only one of the cores, we tested the Core i7 965 Extreme under cascade cooling system change phase of up to -105 degrees.



Here, we overclock the CPU to 5 GHz and even test Wprime 32M to 4900mhz, this software has the feature to test all the CPU cores. Until the system was cooled, it was also retest everest, but this time the amount DDR3 earlier using more than 2.15 V vDIMM.



Conclusion.

A month has passed since our test of the pre-sample of the EX58-Extreme, and within a month Gigabyte was correct small bugs that we could find at the bios of the card. During the tests, whether in aircooling or extreme cold, the card has behaved in an exemplary manner. By this we mean that the card has not been blocked or rebooted it does not continuously with bad parameters when forced by the OC, the original settings automatically when applying crashes without pass through the clear CMOS button. Despite a price ranging from Rs. 24,650 and Rs. 20,400 on average, Gigabyte EX58-Extreme is a map to advise all gamers, overclockers hard or even just technology enthusiasts

Monday, August 17, 2009

Search Site Box: Yet Another Reason to Love Google

When it comes to search engines, at the moment nothing beats Google. Today I was playing with a tool that Google has added to its search results pages ... a Search Site option. I was looking for a particular story on the world's greatest satire site, The Onion, and so I did what I always do. I typed the headline, best as I remembered it, into the Google Search box in Firefox. I was treated to this sight.

Search Site Box: Yet Another Reason to Love Google

So I got to wondering ... is this a new feature of Google's paid service Google Site Search? This is Google's corporate search engine SaaS offering. Companies can embed a Google search box on their Web sites and pay Google to do the searching and return the results. (Google also offers on-premises search appliances.) The best way to check if this was such a paid-for feature was to search on the one company I knew would never pay Google for anything such a search feature.

Search Site Box: Yet Another Reason to Love Google

So short answer, no. This can't be a strictly paid-for service.

Addition 8/13: Google confirmed that this feature, which has been available on Google for select sites for a couple of months, is not a paid service. The mini-search box is a feature that occurs during specific searches, when the Google algorithm detects "a high probability" that a user wants more refined search results within a specific site. According to Google: "Like the rest of our snippets, the sites that display the site search box are chosen algorithmically based on metrics that measure how useful the search box is to users."

Which got me thinking. What criteria would Google use to add the site box? Most searched sites? So I tried one that is searched all the time ... "Google." Nope, no search box. I tried the About Google URL, too (it sports a "Search Our Site" box on top), but the Google.com domain doesn't cut it for in-results Site Search boxes.

Search Site is a feature that has always been available via the Google Toolbar. It is one of the reasons Google became so popular in the first place. Plus, Search Site has been available for sites that use the Google site map via the "site:" command typed into the search box. (For instance, if you type this command into the box search appliance:site:www.google.com you will get a results page on search appliances on Google.com).

But in the race with Bing, Google is bringing more of its tricks and techniques front and center. If you got 'em flaunt 'em.

Mozilla Releases Firefox 3.6 Alpha 1 For Testing Purposes

Codenamed as Namoroka, Mozilla’s latest release Firefox 3.6 Alpha 1, has been revealed. Web application developers and testers who intend to test and have a feel of this latest Firefox browser can check it out. This new Firefox 3.6 Alpha 1 is built on the Gecko 1.9.2 platform and various new features have been added. The most significant change in this release is the speed improvement to the TraceMonkey JaveScript engine. The new Alpha 1 also presents an incredibly fast start up and amazing responsiveness throughout the application. The long awaited visual tab previews which are supposed to appear in earlier versions have finally come along in this Alpha 1 version as well. In addition, other new features include new aded CSS3 properties (background size and gradients for background images) and chromedir attribute with a pseudoclass.

Web developers who intend to try the new Firefox 3.6 Alpha 1 can read the full release note via the link here and download the Namoroka for Windows, Linux, and Mac OS X in English accordingly. General users of Mozilla Firefox are, however, not recommended to use Namoroka Alpha 1 as this release is purely for developers and testers.

Firefox 3.6 Alpha 1 review

Mozilla has released Firefox 3.6 Alpha 1, the first development step in the way for Firefox 3.6 (code named Namoroka), targeted for later this year.

One of the main themes in this release is making Firefox feel snappier to the user: whether you are launching it, opening a new tab, a sidebar, there is a difference on whether the action is done fast and perceived fast.

In this area, you will notice that web pages now scroll faster thanks to acceleration activated after a few mouse wheel scrolls.

User experience

A new feature provides better autocomplete recommendations for previously entered form fields: instead of an alphabetically ordered list, it is sorted by frecency (a combined index of frequency and recency of use) so the most likely values are displayed first. Also, the characters you type are searched in all previously entered strings not just the beginning as in Firefox 3.5.

Originally planned for Firefox 3.0 and 3.5, tabs preview got backed out in both development cycles. It is back again to provide visual tab switching: press Ctrl + Tab and you get preview of the current along with the five most recently used tabs, plus an option to show all tabs’ thumbnails including a search bar.

Also back is the new behavior for single Ctrl + Tab: instead of moving to the next tab in the tab bar, you switch to the previously used tab.

Unlike previous attempts, this time tab preview and the new tab switching behavior are off by default. To enable tab preview, set browser.ctrlTab.previews to true via about:config. For the new behavior, set browser.ctrlTab.mostRecentlyUsed to true.

A new full screen button is now available in the customize toolbar dialog for users who prefer mouse browsing. There’s always F11 for hard core keyboard users.

fullscreenbutton

Better Session Restore

Has this happened to you? You want to restart Firefox, so you close your only window, then double click the Firefox icon and instead of your tabs you get your home page only. What happened? You then realize that there was a non browser window (the Add-ons or Download manager) also opened, so you just got a new window. Starting with alpha 1, Firefox is smarter about this and will restore your tabs whenever it finds no other browser window open.

Performance

JavaScript optimizations (TraceMonkey) are improved and are also now available for the user interface by default. You can do the same in Firefox 3.5 setting javascript.options.jit.chrome to true via about:config. I have been using it that way since the Firefox 3.5 alphas or betas and haven’t had a problem, so I think it is is safe to have it enabled by now.

Web Development

In the development front, support for multiple background images, gradients, rem units (root font size) in CSS. It scores 94 in Acid3 (the web standards compliance test), one point more than Firefox 3.5.

As said, Firefox 3.6 is targeted for later this year. A previous Namoroka draft plan included a lot of significant new features borrowed from Prism, Ubiquity, Personas, and Jetpack Mozilla Labs’ extensions, but it is hard to imagine all or even any of these will get in for a fall release.


Windows: Namoroka Setup 3.6 Alpha 1.exe

Mac OS X: Namoroka 3.6 Alpha 1.dmg

Linux: Namoroka-3.6a1.tar.bz2

Opera Unite:Share files & media with other users, using your browser

Share files & media with other users, using your browser

They say that the web browser will become the central hub for all our media. It’s becoming that way. We use our browser to send messages to other users, chat to our friends via social networking sites, stream video and much more.

Recently, Opera added BitTorrent support to their browser which enables you to download files from the Internet more quickly. Problem is that we also need to share files with other users, including our photos, favourite files, media files and more. Uploading and sharing data is much more difficult that downloading, with a standard web browser.

Opera Unite is a special version of Opera 10 that now enables you to download and install various modules that will enable you to share data with other users. The modules available include a file server (so you can share files, such as documents and other data), a media server (so you can access your music files from another computer), a photo sharing facility and even a module to run your own web server via your browser.

You’ll need an Opera account to make use of these modules and we’re also assuming that there will be other modules added in the future. Remember that you’d need to leave your computer on, running Opera Unite, in order to access your music files using another machine. You can’t share your files if your PC goes to sleep or you shut it off each night.

If you’re a big fan of Opera 10, you’ll like Unity. It’s definitely useful for people who are less sure about how to share files, provide photos to other users and run their own server.
Code:
http://unite.opera.com/
This image has been resized.Click to view original image

Photoscape 3.3: Alternate to photoshop

Description:

Photoscape is the fun and easy photo editing software that enables you to fix and enhance photos.

Features:
• Viewer: View your folders photos, slideshow
• Editor: resizing, brightness and color adjustment, white balance, backlight correction, frames
• Batch editor: Batch editing multiple photos
• Page: Make one photo by merging multiple photos at the page frame
• Combine: Make one photo by attaching multiple photos vertically or horizontally
• Animated GIF: Make one animation photo with multiple photos
• Print: Print portrait shot, carte de visite, passport photo
• Screen Capture: Capture your screenshot and save it
• Color Picker: Zoom in screen on images, search and pick the color
• Rename: Change photo file names in batch mode
• Raw Converter: Convert RAW to JP

New in version 3.3:

• Support 23 languages : English, Korean, Chinese, Traditional Chinese, German, Dutch, Spanish...
• Added 'Newsprint' filter.
• Added 'Perspective' filter.
• Added perspective feature in 'Reflection' filter.
• Improved 'Linear Gradadient' filter.
• Subdivided 'Mole Removal' function into High and Low
• Added batch splitter function
• Multi-page tiff & animated gif supported in 'Combine' and 'Print'.
• RW2 supported in 'Raw Converter'
• Fixed bug in balloon.
• Fixed bug in photo loading crash.
• Minor bugs fixed.

Click Here To Download & More Information

Thursday, August 6, 2009

Http Cookie & Cookie Theft [ Info ]

What is a cookie.
Cookie is a text only strings which is sent by server and stored into yours pc and reports backs to server (when server requests it) when you acess it again, to detect that you have been in site before. (HTTP cookies are used for user authentication, user tracking, and maintaining user-specific information (preferences, electronic shopping cart, etc.)

Some Missconception
  • cookies are like worms and viruses (they can erase data from the user's hard disks);
  • cookies are a form of spyware (they can read personal information stored on the user's computer);
  • cookies generate popups;
  • cookies are used for spamming;
  • cookies are only used for advertising.

Cookies are data, not code: they cannot erase or read information from the user's computer.



Cookies can be used for targetted advertising and gathering alot of user info.

Cookie Theft


In particular, scripting languages such as JavaScript and JScript are usually allowed access to cookie values and have some means to send arbitrary values to arbitrary servers on the Internet. These facts are used in combination with sites allowing users to post HTML content that other users can see.

As an example, an attacker running the domain example.com may post a comment containing the following link to a popular blog they do not otherwise control:

Quote:
Click here!
When another user clicks on this link, the browser executes the piece of code within the onclick attribute, thus replacing the string document.cookie with the list of cookies of the user that are active for the page. As a result, this list of cookies is sent to the example.com server, and the attacker is then able to collect the cookies of other users.

This type of attack is difficult to detect on the user side because the script is coming from the same domain that has set the cookie, and the operation of sending the value appears to be authorised by this domain. It is usually considered the responsibility of the administrators running sites where users can post to disallow the posting of such malicious code.