Archive

Archive for November, 2011

CARS RUNNING ON ROAD CAN PRODUCE POWER?

November 30, 2011 Leave a comment

Hi guys the kinetic energy laid by cars while driving on the road can be converted in to electrical energy, yes watch this video demonstration and understand by your own. 🙂


Categories: GENERAL SCIENCE

GOOGLE QUERY OPERATION

November 29, 2011 Leave a comment
Google serves some 80 percent of all search queries on the Internet, making it by far the most popular search engine. Its popularity is due not only to excellent search effectiveness, but also extensive querying capabilities. However, we shouldalso remember that the Internet is a highlydynamic medium, so the results presented by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google).                                
                                                     CLICK HERE TO SEE FULL SIZE

Categories: Uncategorized

C Program To Accept Password [*appearing]

November 28, 2011 Leave a comment

This is a simple login program in C. While accepting password it masks each character using ‘*’ symbol and display the password in the next line after the user hits Enter key. It also accepts backspaces and acts accordingly.

#include<stdio.h>
#include<conio.h>
char pw[25],ch;
int i;
void main()
{
clrscr();
puts("Enter password");
while(1)
{
if(i<0)
i=0;
ch=getch();
if(ch==13)
break; /*13 is ASCII value of ENTER*/
if(ch==8) /*ASCII value of BACKSPACE*/
{
putch('\b');
putch(NULL);
putch('\b');
-i;
continue;
}
pw[i++]=ch;
ch='*';
putch(ch);
}
pw[i]='';
printf("\n\n%s",pw);
getch();
}
Categories: C_PROG

AT&T Hackers Arrested After Funneling $2 Million To Terrorists

November 28, 2011 Leave a comment

Filipino police and the FBI arrested four people who allegedly hacked AT&T’s phone systems as part of a plan to funnel money to terrorists, escalating the debate over data security.

The suspects were reportedly planning to use the hacked information to divert funds to a Saudi-based terror group, and are identified as part of a group that helped finance the deadly 2008 terrorist attacks in Mumbai, India.

The suspects reportedly hacked the phone lines of different telecommunications companies, including AT&T, and diverted money stolen from the intrusion to bank accounts belonging to the terrorists. These terrorists paid the Filipino hackers on commission, according to the Philippines’ Criminal Investigation and Detection Group, or CIDG.

The hacking resulted in almost $2 million in losses incurred by AT&T, according to the CIDG. A FBI spokeswoman said hackers targeted customers of AT&T, not the carrier itself, but didn’t elaborate because the agency does not discuss investigations.

AT&T’s spokesperson declined to comment on information the scheme generated $2 million in bogus charges.

Last week, AT&T e-mailed select customers to inform them of an attempted hack on its database after its network temporarily went down in the northeast, advising them to be cautious of suspicious e-mails or text messages that ask for sensitive information.

At that time, the Dallas, Texas-based company said no accounts were breached and the less than one percent of the company’s customers were contacted, but the carrier believed it was an “organized attempt to obtain information on a number of customer accounts.”

It is unclear if the attempted hack is related to the recent arrests, or a separate incident.

The news also follows a formal Pentagon report to Congress on cyber-warfare earlier this month, which laid out a more specific role for the U.S. military in the event computer-generated attacks threaten the nation’s economy, government, or armed forces.
.
The arrests in the AT&T case indicate cyber-attacks are on the rise, and companies are looking to the Department of Defense to shore up defensive strategies.

Experts predict future terrorist attacks worldwide may originate in cyberspace, and warn they may bring down financial institutions, industrial compounds and other critical systems. The DoD is working to boost defensive measures against cyber-attacks in addition to more effectively identify their sources to make cyber-terrorists pay for their actions.

In this latest case, officials in Manila are pointing the suspects’ possible links to terror networks connected to Al Qaeda. Filipino police said the country’s weak laws against cyber-crime contribute to its attractiveness as a base for these kinds of syndicates.

AT&T Hackers Arrested After Funneling $2 Million to Terrorists originally appeared atMobiledia on Mon Nov 28, 2011 12:33 pm.

Categories: COMPUTER_TECH_FOCUS

AMD introduces branded memory modules for desktops

November 28, 2011 Leave a comment

Advanced Micro Devices’ first branded desktop system memory modules, called AMD Memory, will be available in North America through major retailers, the company said Monday.

By offering its own branded memory modules for desktops, AMD aims to “take the guesswork out of DRAM selection, providing an easy and straightforward experience when looking for the ideal match for gaming or multimedia PC needs”, it said in a statement.

AMD has been supplying and validating memory for AMD Radeon graphics cards for several years, and saw an opportunity to add system memory to its product line, AMD said.

The company did not immediately respond to requests for comment on whether it will offer branded memory modules for other kinds of computers besides desktops.

It said it is collaborating with memory module makers to create the AMD Memory branded products from components qualified to meet certain specifications. By testing and certifying the memory components, end-users can be assured of compatibility with AMD platforms, it added.

AMD has partnered with memory modules company Patriot Memory in Fremont, California, and PC enhancement products firm VisionTek Products in Illinois. VisionTek, which is already an authorized reseller for AMD products, will distribute the AMD modules through its distributor D&H.

AMD Memory branded products will be available soon through major retailers like Amazon.com, Fry’s, Memory Express, and Best Buy in Canada, AMD said.

The company said it has used the AMD OverDrive performance optimization tool to test and optimize DRAM with the company’s APUs (Accelerated Processing Units), CPUs (Central Processing Units), GPUs (Graphics Processing Units) and chipset platforms.

AMD Memory is available at three different sizes, 2GB (gigabyte), 4GB and 8GB, in a range of price points and speeds, AMD said. For the entertainment category, it will feature 1333 MHz and 1600 MHz speed RAM. A performance version supports speed up to 1600 MHz with low latency and comes in matched pairs, while Radeon Edition DRAM will run at 1866 MHz, AMD said.

Categories: COMPUTER_TECH_FOCUS

C Program Without a Main Function

November 28, 2011 Leave a comment

How to write a C program without a main function?. Is it possible to do that. Yes there can be a C program without a main function. Here’s the code of the program without a main function

HERE IS THE CODE

__________________________________________
#include<stdio.h>
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e)

int begin()
{
printf(” hello “);
}

__________________________________________


Does the above program run without the main function? Yes, the above program runs perfectly fine even without a main function. But how, whats the logic behind it? How can we have a C program working without main?

Here we are using preprocessor directive #define with arguments to give an impression that the program runs without main. But in reality it runs with a hidden main function.

The ‘##‘ operator is called the token pasting or token merging operator. That is we can merge two or more characters with it.

NOTE: A Preprocessor is program which processess the source code before compilation.

Look at the 2nd line of program –

#define decode(s,t,u,m,p,e,d) m##s##u##t

What is the preprocessor doing here. The macro decode(s,t,u,m,p,e,d) is being expanded as “msut” (The ## operator merges m,s,u & t into msut). The logic is when you pass (s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters(tokens).

Now look at the third line of the program –

#define begin decode(a,n,i,m,a,t,e)

Here the preprocessor replaces the macro “begin” with the expansion decode(a,n,i,m,a,t,e). According to the macro definition in the previous line the argument must be expanded so that the 4th,1st,3rd & the 2nd characters must be merged. In the argument (a,n,i,m,a,t,e) 4th,1st,3rd & the 2nd characters are ‘m’,’a’,’i’ & ‘n’.

So the third line “int begin” is replaced by “int main” by the preprocessor before the program is passed on for the compiler. That’s it…

The bottom line is there can never exist a C program without a main function. Here we are just playing a gimmick that makes us beleive the program runs without main function, but actually there exists a hidden main function in the program. Here we are using the proprocessor directive to intelligently replace the word begin” by “main”. In simple words int begin=int main.

Categories: C_PROG

How to Hide Data in Image, Audio & Video Files: Steganography

November 28, 2011 Leave a comment

         Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.
What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.

                          The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.
What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.

                                 Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.
How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.

There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.

Download Stego Magic
Download StegoMagic.zip

                                        The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.

With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.

At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.
How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:

1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe

2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.

3. Note down the secret decryption key.

Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.

Categories: Hacking

Control electrical appliances using PC UPDATED

November 23, 2011 Leave a comment

 Introduction

In this article I will first tell you about how to build the LED interface circuit for the Parallel Port and then how to control the circuit using software. With this very basic prototype you will be able to learn a lot how the parallel port works. So, I’ll start with the circuit first.

                                              

Circuit Description

Components Used:-
Eight RED colored LEDs
DB-25 Male Connector
Zero PCB
Ribbon WireAll you need to do is to connect each data pin from the parallel port (pins 2 to 9) to positive terminal of a LED and one ground pin (any one from 18 to 25) to the negative terminal of all the LEDs.
Since LEDs have polarity, you should pay attention to correctly locate its positive and negative terminals. If you pay close attention, you will see that LEDs are not completely rounded, the cathode side is a little bit flat. Also the longer leg of LED is anode or positive terminal and the shorter leg is cathode or negative terminal.

                                          

How the circuit works?

Working of this circuit is pretty simple. When data at any pin 2 – 9 is ‘1’ , that particular LED will glow, else if data is ‘0’, the LED will stop glowing.

When data at any pin from 2 – 9 is ‘1’,then it means that 5 volts is coming out of that pin and is going towards +ve terminal of LED. Circuit gets completed through ground pin (any from 18 to 25) and the LED glows until data at that particular pin is not ‘0’.

This data flow is controlled using software discussed below.

Software

To control any port we need a kernel mode driver software. Softwares generally run in USER mode. But to control theParallel Port we need a software running in kernel mode. I have used C#.Net for developing this software.
Download and install Microsoft .NET Framework Version 2.0.
Now download and install My Parallel Port Control Setup.
Download the source code in C#.Net.

In The End

This article was just an building block to the parallel port interfacing.

Categories: circuit, projects

How to protect USB Pendrives/Flashdrives from VIRUS ?

November 17, 2011 Leave a comment

Lets Protect USB Pendrives / flash drives from Viruses.

Most often our system get infected with virus soon after a USB pendrive has been plugged in. These days it is so easy to get infected by viruses by plugging in a pendrive to your system from unknown source (may be your friends one or your college desktops).

Not all the security programs can defend your pc against the virus attacks carried out through pendrives. But if we can take necessary steps, then we can be safe from such viruses, worms and spywares spreading through pendrives/ flash drives.

So here are some software’s that can efficiently protect your system and pendrive from unknown threats ad viruses.
1.USB Write Protector

It is a software that can help you in write protecting your Pendrive. USB Write Protector allows only to read the data from the pendrive but it wont permit to write data into the pendrive. This is really useful if you take your pendrive to plug on to your friends or relatives pc, as most of the virus enter the pendrive unknowingly. USB Write Protector is a small program, around 190kb in size.

ETY

                     

USB Write Protector

The program doesn’t need any installation and can be directly run from the location. On running the program the window just shows up with just two option to enable write Protection in your Pendrive/ USB Flash Drive and to Turn Off the USB Write Protection. Its that simple. You just need to pick the option and click on OK.
Download
USB writer
2)USB FireWall

As said above, USB write protect software protect your pendrive from viruses, USB firewall likewise protects your PC from viruses. The software protects your system from security threats by launching itself as soon as a USB peripheral is inserted. As soon as USB firewall is launched it works in the background and a window appears when some program tries to launch out automatically since a peripheral USB. USB FireWall is also able to scan all your partitions for auto launched programs and delete the respective autorun file.

USB Firewall is 3.3 MB in size.

Download USB Firewall || Download USB Firewall (Direct Link)
3) Panda USB Vaccination Tool

: It’s a great Tool from Panda that will disable the autorun function from your computer completely and it has a special ability to add a autorun.inf file of its own which can’t be read or deleted or modified. So the autorun virus wont be able to modify it and your system will be safe from the autorun.inf virus even if you plug the pendrive.

You can create a shortcut to the Panda Vaccination Tool with the parameters USBVaccine.exe /resident /hidetray +system and copy the shortcut to the windows startup folder, so that each time a USB device is plugged onto your system, the program popups automatically asking you for vaccination.

Download Panda USB Vaccination Tool
4) USB Guardian

USB Guardian helps you to safely share pictures, movies, documents etc. via your USB pendrive without the risk of being infected by viruses and worms that spread through the pendrives. USB Guardian boasts a clean and simple interface so that so that the user can work with minimum effort.

ETY

USB Guardian

USB Guardian blocks any programs from being automatically executed from a pendrive and thereby it isolates the autorun directives on the removable device.
USB Guardian then scans for any autorun.inf file on the flash drive to check whether it references to any additional files on the pendrive. If any such files are found it automatically blocks those files.

The Locked files will be inaccessible by any other program and you can unlock it using USB Guardian itself if you think the program is harmless. USB guardian is free for use and is 2.96 MB in size.

Download USB Guardian
Hope these tools will help you in protecting and securing your USB Flash drives/ Pendrive from Viruses and Worms.Comments awaited:)

Categories: Hacking

1 Watt Four Stage FM Transmitter

November 15, 2011 Leave a comment

This FM transmitter circuit uses four radio frequency stages: a VHF oscillator built around transistor BF494 (T1), a preamplifier built around transistor BF200 (T2), a driver built around transistor 2N2219 (T3) and a power amplifier built around transistor 2N3866 (T4). A condenser microphone is connected at the input of the oscillator.

Working of the 1 Watt transmitter circuit is simple. When you speak near the microphone, frequency-modulated signals are obtained at the collector of oscillator transistor T1.

The FM signals are amplified by the VHF preamplifier and the pre-driver stage. You can also use transistor 2N5109 in place of 2N2219. The preamplifier is a tuned class-A RF amplifier and the driver is a class-C amplifier. Signals are finally fed to the class-C RF power amplifier, which delivers RF power to a 50-ohm horizontal dipole or ground plane antenna.

Use a heat-sink with transistor 2N3866 for heat dissipation (Note: or 2N4427 because it works better at 12 V and delivers up to 1 watt RF power). Carefully adjust trimmer VC1 connected across L1 to generate frequency within 88-108 MHz. Also adjust trimmers VC2 through VC7 to get maximum output at maximum range.

Regulator IC 78C09 provides stable 9V supply to the oscillator, so variation in the supply voltage will not affect the frequency generated. You can also use a 12V battery to power the circuit. Assemble the circuit on a general purpose PCB. Install the antenna properly for maximum range.

Coils L1 through L5 are made with 20 SWG copper-enameled wire wound over air-cores having 8mm diameter. They have 4, 6, 6, 5 and 7 turns of wire, respectively.

Categories: Transmitter-receiver