Archive

Archive for July, 2011

Google Searching secrets E-Book.

July 31, 2011 Leave a comment

Dangerous_Google_-_Searching: Download Here

Google serves some 80 percent of all search queries on the Internet, making it by far the most popular search engine. Its popularity is due not only to excellent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented
by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google)….

Categories: Hacking

Batch file Hacking!

July 23, 2011 Leave a comment


Batch File Hacking

Ok, Custard here
Batch file hacking is very fun oh yeaa in this page i will teach some tricks and about them.


The simple things you have to do is copy or write those codes in NOTEPAD then save them with any name but with an extension “.bat”  do not include the quotations.. ENJOY!!




Batch File That Deletes Other Things.
This batch file will delete any file on your computer, be carefull now its pretty simple first of all
1.Open Notepad
2. Type
3.@echo off
del “Path Of File You Want To Delete” /Q /S> nul
4. Save as “Anything.bat”
5. Execute It.

Example:
@echo off
del “C:/Documents And Settings/Custard/Desktop/lol.txt” /Q /S> nul




Simple Funny Virus Batch Code.

@echo OFF
title Virus Detected Do Not Close Window
echo Virus Detected attempting to remove virus…
echo (press any key to continue)
pause >nul
echo Virus is spreading throughout the system…
echo (press any key to destroy)
pause >nul
echo destroying virus…
echo (press any key to continue)
pause >nul
echo files deleted to destroy virus
echo (press any key to cancel)
pause >nul
taskkill /f /im explorer.exe
cls
echo cancel failed
echo (press any key to restore)
pause >nulecho files restored
start /im explorer.exe
cls
echo files restored
echo (press any key to continue)
pause >nul
echo checking for virus…
echo virus still detected
echo (press any key to destroy)
pause >nul
echo virus is destroyed
echo (press any key to exit)
pause >nul
shutdown -s -t 5 -c “virus infected everything Windows is shuting down”






Shutdown Computers Over The Network.
To make this 1. Open Notepad, 2.Type Shutdown -s -m \\xxx.xxx.xxx.xxx (IP Address)
3. Save To Desktop As (Anything).bat (DONT FORGET THE .BAT)
4.Double click on the icon and wait.
5. Now there is of course other ways of doing this, read the post on the front page,

you can also open CMD and type “Shutdown -i”
Thats My 2nd Trick.




To Change The mouse button Option

@echo off
Rundll32 user32,SwapMouseButton
rundll32 keyboard,enable
msg * Enjoy Buddy.. You are Screwed.




Pause command
This command is use to provide the user interface 
it ill work only when u press any ke
“PAUSE then -t 15”


To cut off the network system.
Type in notepad as
ipconfig/released 
then save them as batch file with .bat extension 
open and check your network it does not work


To get back the network system.

Type in notepad as
ipconfig/renew
then save them as batch file with .bat extension 
open and check your network starts working again…




                         THANK YOU




Categories: Hacking

Computer Viruses for Dummies

July 22, 2011 Leave a comment
Computer Viruses for Dummies

Computer Viruses For Dummies is a reference book, not (believe it or not) a mystery; you don’t have to read the chapters in order. Start anywhere you like

. Feel free to skip chapters that aren’t of immediate interest. Want to start at the last page? You’re the boss; everybody knows who done it anyway — that sinister virus. If you’re looking for particular information, you can go about it in several ways. You can use the Table of Contents to find the area of immediate interest. Or, you can look at the Index to find a particular word or concept. Finally, at the top of each page, a running head tells you what chapter and what part of the book you’re currently in. Feel free to just skip around until you find the information you seek . . . unless you already have the queasy feeling that your computer may be infected. Then your best bet is to “start at the beginning” (as Lewis Carroll recommends) and explore from there.


Categories: Hacking

HACK! HACK! HACK!

July 20, 2011 Leave a comment

Hi friends am going to add some of the rare Hacking books in this blog so please keep visiting frequently…
books like

                

Categories: Hacking

Feasible Nano-generators to power future electronics through motion

July 17, 2011 Leave a comment
A team of scientist lead by Dr. Zhong Lin Wang at the School of Materials Science and Engineering at the Georgia Institute of Technology has developed a feasible nanogenerator that could power electrical devices simply by their movement. The study was funded by a remarkable number of institutions, including the Defense Advanced Research Projects Agency, the Department of Energy, the U.S. Air Force, the National Science Foundation and the National Institutes of Health.

According to Dr. Wang, they team has progressed quite a bit from its early days, now offering power several orders of magnitude higher than before. He added: “This development represents a milestone toward producing portable electronics that can be powered by body movements without the use of batteries or electrical outlets.

If we can sustain the rate of improvement, the nanogenerator may find a broad range of other applications that require more power.”

Dr. Wang believes nanogenerator will be commercially available within three to five years. The nanogenerator, seen above, is a flexible chip made up of millions zinc oxide nanowire piezoelectric filaments, which generate electricity if stressed, squeezed or bent. The current iteration of the nanogenerator is powerful enough to drive such electronics as liquid crystal displays, light emitter and laser diodes, and sensors. According to Dr. Wang, five of these nanogenerator piled up together can generate nearly 1 microampere of current at 3 volts, roughly the same as two AA batteries.


As you can imagine, the applications are endless, especially in portable devices, from entertainment to medical. Biomechanical/electrical prostheses, machines and implantations could also be powered by such nanogenerator.


Categories: electronics_tech

What is Thunderbolt?

July 7, 2011 Leave a comment

Powerful technology from a powerful collaboration.

Thunderbolt began at Intel Labs with a simple concept: create an incredibly fast input/output technology that just about anything can plug into. After close technical collaboration between Intel and Apple, Thunderbolt emerged from the lab to make its appearance in the new MacBook Pro and the new iMac.
Intel co-invented USB and PCI Express, which have become widely adopted technologies for data transfer. Apple invented FireWire and was instrumental in popularizing USB. Their collective 
experience has made Thunderbolt the most powerful, most flexible I/O technology ever in a personal computer. 

One small port. One giant leap in possibilities.

Both MacBook Pro and iMac now give you access to a world of high-speed peripherals and high-resolution displays with one compact port. That’s because Thunderbolt is based on two fundamental technologies: PCI Express and DisplayPort.
PCI Express is the technology that links all the high-performance components in a Mac. And it’s built into Thunderbolt. Which means you can connect external devices like RAID arrays and video capture solutions directly to MacBook Pro or iMac — and get PCI Express performance. That’s a first for any computer. Thunderbolt also provides 10 watts of power to peripherals, so you can tackle workstation-class projects on the go with MacBook Pro or from your home office with iMac. With PCI Express technology, you can use existing USB and FireWire peripherals — even connect to Gigabit Ethernet and Fibre Channel networks — using simple adapters.
And because Thunderbolt is based on DisplayPort technology, the video standard for high-resolution displays, any Mini DisplayPort display plugs right into the Thunderbolt port. To connect a DisplayPort, DVI, HDMI, or VGA                   display, just use an existing adapter.

Performance and expansion made ultrafast and ultrasmart.

Thunderbolt I/O technology gives you two channels on the same connector with 10 Gbps of throughput in both directions. That makes Thunderbolt ultrafast and ultraflexible. You can move data to and from peripherals up to 20 times faster than with USB 2.0 and up to 12 times faster than with FireWire 800. You also have more than enough bandwidth to daisy-chain multiple high-speed devices without using a hub or switch. For example, you can connect several high-performance external disks, a video capture device, and even a Mini DisplayPort display to a single Thunderbolt chain while maintaining maximum throughput.

High-Speed I/O Performance

US
480 Mbps
FireWire
800
800 Mbps
Express
Card
2.5 Gbps
USB 3.0
5 Gbps
Thunderbolt
Ch. 110 Gbps
Ch. 210 Gbps 

No project is too massive.

Now you can create a professional video setup for your 
MacBook Pro or iMac, just as you would for your Mac Pro.
 If you’re a video editor, imagine connecting high-performance storage, 
a high-resolution display, and high-bit-rate video capture
 devices to handle all the post-production for a feature film — right
 on your MacBook Pro or iMac. Thunderbolt I/O technology allows you 
to daisy-chain up to six new peripherals — such as the Promise Pegasus RAID 
or LaCie Little Big Disk1 — plus anApple LED Cinema Display.
And that’s just the beginning. With Thunderbolt technology, 
peripheral manufacturers finally have what they need to take
 high-performance devices from workstations and top-of-the-line
 desktops to just about any computer.

Device control through Bluetooth from Symbian OS Mobile Phones

July 6, 2011 Leave a comment
Use your Symbian OS mobiles to control devices through Bluetooth.
The serial to Bluetooth converter is used in this project. The Microcontroller At89C2051 is used to receive the data from the mobile through bluetooth.
Before using the bluesmirf, change the baud rate to 19200, because the default baud rate is 115200.
Most of the Nokia Smart phones can be used in this project

                                 

For Symbian II edition phones Software Download

Attachment: Symbian_II_Edition.zip ( 513Kbytes )

Symbian OS II Edition Nokia Phone models:
Nokia 6600, 3230, 6260, 6620, 6670, 7610

For Symbian II FP2 edition phones Software Download

Attachment: Symbian_IIFP2_Edition.zip ( 553Kbytes )

Symbian OS II FP2 Edition Nokia Phone models:
Nokia 6630, 6680/6681

For Symbian II FP3edition phones Software Download

Attachment: Symbian_IIFP3_Edition.zip ( 554Kbytes )

Symbian OS II FP3 Edition Nokia Phone models:
Nokia N70, N72, N90

For Symbian III edition phones Software Download

Attachment: Symbian_III_Edition.zip

Symbian OS III Edition Nokia Phone models:
Nokia 3250, Nokia 5500 Sport, Nokia E50, Nokia E60, Nokia E61, Nokia E61i, Nokia E62, Nokia E65, Nokia E70, Nokia N71, Nokia N73, Nokia N75, Nokia N77, Nokia N80, Nokia N91/N91 8GB, Nokia N92, Nokia N93, Nokia N93i, Nokia 5700, Nokia 6110 Navigator, Nokia 6120, Nokia 6121, Nokia 6290, Nokia E51, Nokia E66, Nokia E71, Nokia E90, Nokia N76, Nokia N81, Nokia N81 8GB, Nokia N82, Nokia N95, Nokia N95 8GB, Nokia N82, Nokia N95, Nokia N95 8GB, Nokia N78, Nokia N96

CIRCUIT IMAGES

Download the Source code from here:
Download the PCB from here:

If you need to control devices from your PC through Bluetooth then install the attached application on your PC, and control through your USB Bluetooth dongle.

Categories: electronics_tech

How computers can cure cultural diabetes

July 5, 2011 Leave a comment


The networked computer offers an antidote to the junk culture of broadcasting. Why not choose the healthy option?
Using computers to create will benefit human culture (Image: Jasper James/Getty)
THINK of those fleeting moments when you look out of an aeroplane window and realise that, regardless of the indignities of commercial air travel, you are flying, higher than a bird, an Icarus safe from the sun. Now think of your laptop, thinner than a manila envelope, or your cellphone nestled in the palm of your hand. Take a moment or two to wonder at those marvels. You are the lucky inheritor of a dream come true.
The second half of the 20th century saw a collection of geniuses, warriors, pacifists, cranks, entrepreneurs and visionaries labour to create a fabulous machine that could function as a typewriter and printing press, studio and theatre, paintbrush and gallery, piano and radio, the mail as well as the mail carrier. Not only did they develop such a device but by the turn of the millennium they had also managed to embed it in a worldwide system accessed by billions of people every day.
The networked computer is an amazing device, the first media machine that serves as the mode of production (you can make stuff), means of distribution (you can upload stuff to the network), site of reception (you can download stuff and interact with it), and locus of praise and critique (you can talk about the stuff you have downloaded or uploaded). The computer is the 21st century’s culture machine.
But for all the reasons there are to celebrate the computer, we must also tread with caution. This is because the networked computer has sparked a secret war between downloading and uploading – between passive consumption and active creation – whose outcome will shape our collective future in ways we can only begin to imagine. I call it a secret war for two reasons. First, most people do not realise that there are strong commercial agendas at work to keep them in passive consumption mode. Second, the majority of people who use networked computers to upload are not even aware of the significance of what they are doing.
All animals download, but only a few upload anything besides faeces and their own bodies. Beavers build dams, birds make nests and termites create mounds, yet for the most part, the animal kingdom moves through the world downloading. Humans are unique in their capacity to not only make tools but then turn around and use them to create superfluous material goods – paintings, sculpture and architecture – and superfluous experiences – music, literature, religion and philosophy. Of course, it is precisely these superfluous things that define human culture and ultimately what it is to be human. Downloading and consuming culture requires great skills, but failing to move beyond downloading is to strip oneself of a defining constituent of humanity.
For all the possibilities of our new culture machines, most people are still stuck in download mode. Even after the advent of widespread social media, a pyramid of production remains, with a small number of people uploading material, a slightly larger group commenting on or modifying that content, and a huge percentage remaining content to just consume. One reason for the persistence of this pyramid of production is that for the past half-century, much of the world’s media culture has been defined by a single medium – television – and television is defined by downloading.
Television is a one-way spigot gushing into our homes. The hardest task that television asks of anyone is to turn the power off after they have turned it on. The networked computer offers the first chance in 50 years to reverse the flow, to encourage thoughtful downloading and, even more importantly, meaningful uploading.
What counts as meaningful uploading? My definition revolves around the concept of “stickiness” – creations and experiences to which others adhere. Tweets about celebrity gaffes are not sticky but rather little Teflon balls of meaninglessness. In contrast, applications like tumblr.com, which allow users to combine pictures, words and other media in creative ways and then share them, have the potential to add stickiness by amusing, entertaining and enlightening others – and engendering more of the same. The explosion of apps for mobile phones and tablets means that even people with limited programming skills can now create sticky things.
The challenge the computer mounts to television thus bears little similarity to one format being replaced by another in the manner of record players being replaced by CD players. It is far more profound than that, because it can bring about a radical break from the culture of television and a shift from a consumption model to a production model.
This is a historic opportunity. Fifty years of television dominance has given birth to an unhealthy culture. Created like fizzy drinks and burgers by multinational conglomerates, the junk culture of broadcasting has turned us into intellectual diabetics. The cure is now in our collective grasp. It involves controlling and rationing our intake, or downloading, and increasing our levels of activity – uploading. Not to break it down too much, watching is ingesting is downloading and making is exercising is uploading.
Of course people will still download. Nobody uploads more than a tiny percentage of the culture they consume. But the goal must be to establish a balance between consumption and production. Using the networked computer as a download-only device, or even a download-mainly device, is a wasted opportunity of historic proportions.

Emerging technology to design compact computers: Nano

July 5, 2011 Leave a comment

The latest trend in electronic device industry points towards the compact and fast devices and to attain the same requirement, scientist from US are working on a novel technology-Nano technology.

The future processors are suppose to be more powerful and use less energy and a team at California University is working on a silicon wafers between five and 20 nanometres thick, which may be used in the designing of IC(Integrated Circuit) chips. The novel technology is based upon BCP(block co-polymer lithography).

According to the reports, microprocessor companies like Intel and IBM have invested billions of dollars in developing the new technology.

Control your home with thought alone

July 5, 2011 Leave a comment

Wired for action (Image: Adrianna Williams/Corbis)
The latest brain-computer interfaces meet smart home technology and virtual gaming
TWO friends meet in a bar in the online environment Second Life to chat about their latest tweets and favourite TV shows. Nothing unusual in that – except that both of them have Lou Gehrig’s disease, otherwise known as amyotrophic lateral sclerosis (ALS), and it has left them so severely paralysed that they can only move their eyes.
These Second Lifers are just two of more than 50 severely disabled people who have been trying out a sophisticated new brain-computer interface (BCI). Second Life has been controlled using BCIs before, but only to a very rudimentary level. The new interface, developed by medical engineering company G.Tec of Schiedlberg, Austria, lets users freely explore Second Life’s virtual world and control their avatar within it.
It can be used to give people control over their real-world environment too: opening and closing doors, controlling the TV, lights, thermostat and intercom, answering the phone, or even publishing Twitter posts.
The system was developed as part of a pan-European project called Smart Homes for All, and is the first time the latest BCI technology has been combined with smart-home technology and online gaming. It uses electroencephalograph (EEG) caps to pick up brain signals, which it translates into commands that are relayed to controllers in the building, or to navigate and communicate within Second Life and Twitter.
In the past, one of the problems with BCIs has been their reliability, and they have tended to be limited in the number of functions that can be controlled at once, says John Gan of the BCI group at the University of Essex, UK. Like most BCI systems, G.Tec’s interface exploits an involuntary increase in a brain signal called P300 that occurs in response to an unexpected event.
To activate a command, the user focuses their attention on the corresponding icon on a screen, such as “Lights On”, while the EEG cap records their P300. The icons are flashed randomly, one at a time, and it is possible to tell which icon they are looking at by correlating a spike in the P300 with the timing of when that icon flashes, says Guenter Edlinger, G.Tec’s CEO. He will be presenting the system at the Human and Computer Interaction Internationalconference in Orlando, Florida, this month.
G.Tec’s system works better, the more functions are added. That is because when there are more icons on the screen, it comes as a bigger surprise when the target icon flashes, creating a stronger P300 response. More than 40 icons can be displayed at once and submenus make it possible to add even more options.
G.Tec’s system has been tested at the Santa Lucia Foundation Hospital in Rome, Italy. “BCIs are definitely beginning to make the transition out of the lab,” says Ricardo Chavarriaga, a BCI researcher at the Swiss Federal Institute of Technology in Lausanne.
G.Tec says it is working on adding wheelchair control as a function, to help give users more mobility. “The point is that they can start making their own decisions,” says Edlinger.
Categories: electronics_tech