CARS RUNNING ON ROAD CAN PRODUCE POWER?
GOOGLE QUERY OPERATION
CLICK HERE TO SEE FULL SIZE
C Program To Accept Password [*appearing]
This is a simple login program in C. While accepting password it masks each character using â*â symbol and display the password in the next line after the user hits Enter key. It also accepts backspaces and acts accordingly.
#include<stdio.h>
#include<conio.h>
char pw[25],ch;
int i;
void main()
{
clrscr();
puts("Enter password");
while(1)
{
if(i<0)
i=0;
ch=getch();
if(ch==13)
break; /*13 is ASCII value of ENTER*/
if(ch==8) /*ASCII value of BACKSPACE*/
{
putch('\b');
putch(NULL);
putch('\b');
-i;
continue;
}
pw[i++]=ch;
ch='*';
putch(ch);
}
pw[i]='';
printf("\n\n%s",pw);
getch();
}
AT&T Hackers Arrested After Funneling $2 Million To Terrorists
Filipino police and the FBI arrested four people who allegedly hacked AT&Tâs phone systems as part of a plan to funnel money to terrorists, escalating the debate over data security.
The suspects were reportedly planning to use the hacked information to divert funds to a Saudi-based terror group, and are identified as part of a group that helped finance the deadly 2008 terrorist attacks in Mumbai, India.
The suspects reportedly hacked the phone lines of different telecommunications companies, including AT&T, and diverted money stolen from the intrusion to bank accounts belonging to the terrorists. These terrorists paid the Filipino hackers on commission, according to the Philippinesâ Criminal Investigation and Detection Group, or CIDG.
The hacking resulted in almost $2 million in losses incurred by AT&T, according to the CIDG. A FBI spokeswoman said hackers targeted customers of AT&T, not the carrier itself, but didnât elaborate because the agency does not discuss investigations.
AT&Tâs spokesperson declined to comment on information the scheme generated $2 million in bogus charges.
Last week, AT&T e-mailed select customers to inform them of an attempted hack on its database after its network temporarily went down in the northeast, advising them to be cautious of suspicious e-mails or text messages that ask for sensitive information.
At that time, the Dallas, Texas-based company said no accounts were breached and the less than one percent of the companyâs customers were contacted, but the carrier believed it was an âorganized attempt to obtain information on a number of customer accounts.â
It is unclear if the attempted hack is related to the recent arrests, or a separate incident.
The news also follows a formal Pentagon report to Congress on cyber-warfare earlier this month, which laid out a more specific role for the U.S. military in the event computer-generated attacks threaten the nationâs economy, government, or armed forces.
.
The arrests in the AT&T case indicate cyber-attacks are on the rise, and companies are looking to the Department of Defense to shore up defensive strategies.
Experts predict future terrorist attacks worldwide may originate in cyberspace, and warn they may bring down financial institutions, industrial compounds and other critical systems. The DoD is working to boost defensive measures against cyber-attacks in addition to more effectively identify their sources to make cyber-terrorists pay for their actions.
In this latest case, officials in Manila are pointing the suspectsâ possible links to terror networks connected to Al Qaeda. Filipino police said the countryâs weak laws against cyber-crime contribute to its attractiveness as a base for these kinds of syndicates.
AT&T Hackers Arrested After Funneling $2 Million to Terrorists originally appeared atMobiledia on Mon Nov 28, 2011 12:33 pm.
AMD introduces branded memory modules for desktops
Advanced Micro Devices’ first branded desktop system memory modules, called AMD Memory, will be available in North America through major retailers, the company said Monday.
By offering its own branded memory modules for desktops, AMD aims to “take the guesswork out of DRAM selection, providing an easy and straightforward experience when looking for the ideal match for gaming or multimedia PC needs”, it said in a statement.
AMD has been supplying and validating memory for AMD Radeon graphics cards for several years, and saw an opportunity to add system memory to its product line, AMD said.
The company did not immediately respond to requests for comment on whether it will offer branded memory modules for other kinds of computers besides desktops.
It said it is collaborating with memory module makers to create the AMD Memory branded products from components qualified to meet certain specifications. By testing and certifying the memory components, end-users can be assured of compatibility with AMD platforms, it added.
AMD has partnered with memory modules company Patriot Memory in Fremont, California, and PC enhancement products firm VisionTek Products in Illinois. VisionTek, which is already an authorized reseller for AMD products, will distribute the AMD modules through its distributor D&H.
AMD Memory branded products will be available soon through major retailers like Amazon.com, Fry’s, Memory Express, and Best Buy in Canada, AMD said.
The company said it has used the AMD OverDrive performance optimization tool to test and optimize DRAM with the company’s APUs (Accelerated Processing Units), CPUs (Central Processing Units), GPUs (Graphics Processing Units) and chipset platforms.
AMD Memory is available at three different sizes, 2GB (gigabyte), 4GB and 8GB, in a range of price points and speeds, AMD said. For the entertainment category, it will feature 1333 MHz and 1600 MHz speed RAM. A performance version supports speed up to 1600 MHz with low latency and comes in matched pairs, while Radeon Edition DRAM will run at 1866 MHz, AMD said.
C Program Without a Main Function
How to write a C program without a main function?. Is it possible to do that. Yes there can be a C program without a main function. Hereâs the code of the program without a main function
HERE IS THE CODE
#include<stdio.h>
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e)
int begin()
{
printf(â hello â);
}
__________________________________________
Does the above program run without the main function? Yes, the above program runs perfectly fine even without a main function. But how, whats the logic behind it? How can we have a C program working without main?
Here we are using preprocessor directive #define with arguments to give an impression that the program runs without main. But in reality it runs with a hidden main function.
The â##â operator is called the token pasting or token merging operator. That is we can merge two or more characters with it.
NOTE: A Preprocessor is program which processess the source code before compilation.
Look at the 2nd line of program –
#define decode(s,t,u,m,p,e,d) m##s##u##t
What is the preprocessor doing here. The macro decode(s,t,u,m,p,e,d) is being expanded as âmsutâ (The ## operator merges m,s,u & t into msut). The logic is when you pass (s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters(tokens).
Now look at the third line of the program –
#define begin decode(a,n,i,m,a,t,e)
Here the preprocessor replaces the macro âbeginâ with the expansion decode(a,n,i,m,a,t,e). According to the macro definition in the previous line the argument must be expanded so that the 4th,1st,3rd & the 2nd characters must be merged. In the argument (a,n,i,m,a,t,e) 4th,1st,3rd & the 2nd characters are âmâ,’aâ,’iâ & ânâ.
So the third line âint beginâ is replaced by âint mainâ by the preprocessor before the program is passed on for the compiler. Thatâs itâŚ
The bottom line is there can never exist a C program without a main function. Here we are just playing a gimmick that makes us beleive the program runs without main function, but actually there exists a hidden main function in the program. Here we are using the proprocessor directive to intelligently replace the word beginâ by âmainâ. In simple words int begin=int main.
How to Hide Data in Image, Audio & Video Files: Steganography
Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.
What is Steganography?
Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.
What are the Applications of Steganography?
Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.
How do Steganography Tools Work?
Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called âStego Magicâ. You can download it from the following link.
Download Stego Magic
Download StegoMagic.zip
The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.
How to Use Stego Magic?
Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
Control electrical appliances using PC UPDATED
Introduction
In this article I will first tell you about how to build the LED interface circuit for the Parallel Port and then how to control the circuit using software. With this very basic prototype you will be able to learn a lot how the parallel port works. So, I’ll start with the circuit first.
Circuit Description
Components Used:-
Eight RED colored LEDs
DB-25 Male Connector
Zero PCB
Ribbon WireAll you need to do is to connect each data pin from the parallel port (pins 2 to 9) to positive terminal of a LED and one ground pin (any one from 18 to 25) to the negative terminal of all the LEDs.
Since LEDs have polarity, you should pay attention to correctly locate its positive and negative terminals. If you pay close attention, you will see that LEDs are not completely rounded, the cathode side is a little bit flat. Also the longer leg of LED is anode or positive terminal and the shorter leg is cathode or negative terminal.
How the circuit works?
Working of this circuit is pretty simple. When data at any pin 2 – 9 is ‘1’ , that particular LED will glow, else if data is ‘0’, the LED will stop glowing.
When data at any pin from 2 – 9 is ‘1’,then it means that 5 volts is coming out of that pin and is going towards +ve terminal of LED. Circuit gets completed through ground pin (any from 18 to 25) and the LED glows until data at that particular pin is not ‘0’.
This data flow is controlled using software discussed below.
Software
To control any port we need a kernel mode driver software. Softwares generally run in USER mode. But to control theParallel Port we need a software running in kernel mode. I have used C#.Net for developing this software.
Download and install Microsoft .NET Framework Version 2.0.
Now download and install My Parallel Port Control Setup.
Download the source code in C#.Net.
In The End
This article was just an building block to the parallel port interfacing.
How to protect USB Pendrives/Flashdrives from VIRUS ?
Lets Protect USB Pendrives / flash drives from Viruses.
Most often our system get infected with virus soon after a USB pendrive has been plugged in. These days it is so easy to get infected by viruses by plugging in a pendrive to your system from unknown source (may be your friends one or your college desktops).
Not all the security programs can defend your pc against the virus attacks carried out through pendrives. But if we can take necessary steps, then we can be safe from such viruses, worms and spywares spreading through pendrives/ flash drives.
So here are some softwareâs that can efficiently protect your system and pendrive from unknown threats ad viruses.
1.USB Write Protector
It is a software that can help you in write protecting your Pendrive. USB Write Protector allows only to read the data from the pendrive but it wont permit to write data into the pendrive. This is really useful if you take your pendrive to plug on to your friends or relatives pc, as most of the virus enter the pendrive unknowingly. USB Write Protector is a small program, around 190kb in size.
ETY |
USB Write Protector
The program doesnât need any installation and can be directly run from the location. On running the program the window just shows up with just two option to enable write Protection in your Pendrive/ USB Flash Drive and to Turn Off the USB Write Protection. Its that simple. You just need to pick the option and click on OK.
Download
USB writer
2)USB FireWall
As said above, USB write protect software protect your pendrive from viruses, USB firewall likewise protects your PC from viruses. The software protects your system from security threats by launching itself as soon as a USB peripheral is inserted. As soon as USB firewall is launched it works in the background and a window appears when some program tries to launch out automatically since a peripheral USB. USB FireWall is also able to scan all your partitions for auto launched programs and delete the respective autorun file.
USB Firewall is 3.3 MB in size.
Download USB Firewall || Download USB Firewall (Direct Link)
3) Panda USB Vaccination Tool
: Itâs a great Tool from Panda that will disable the autorun function from your computer completely and it has a special ability to add a autorun.inf file of its own which canât be read or deleted or modified. So the autorun virus wont be able to modify it and your system will be safe from the autorun.inf virus even if you plug the pendrive.
You can create a shortcut to the Panda Vaccination Tool with the parameters USBVaccine.exe /resident /hidetray +system and copy the shortcut to the windows startup folder, so that each time a USB device is plugged onto your system, the program popups automatically asking you for vaccination.
Download Panda USB Vaccination Tool
4) USB Guardian
USB Guardian helps you to safely share pictures, movies, documents etc. via your USB pendrive without the risk of being infected by viruses and worms that spread through the pendrives. USB Guardian boasts a clean and simple interface so that so that the user can work with minimum effort.
ETY |
USB Guardian
USB Guardian blocks any programs from being automatically executed from a pendrive and thereby it isolates the autorun directives on the removable device.
USB Guardian then scans for any autorun.inf file on the flash drive to check whether it references to any additional files on the pendrive. If any such files are found it automatically blocks those files.
The Locked files will be inaccessible by any other program and you can unlock it using USB Guardian itself if you think the program is harmless. USB guardian is free for use and is 2.96 MB in size.
Download USB Guardian
Hope these tools will help you in protecting and securing your USB Flash drives/ Pendrive from Viruses and Worms.Comments awaited:)
1 Watt Four Stage FM Transmitter
This FM transmitter circuit uses four radio frequency stages: a VHF oscillator built around transistor BF494 (T1), a preamplifier built around transistor BF200 (T2), a driver built around transistor 2N2219 (T3) and a power amplifier built around transistor 2N3866 (T4). A condenser microphone is connected at the input of the oscillator.
Working of the 1 Watt transmitter circuit is simple. When you speak near the microphone, frequency-modulated signals are obtained at the collector of oscillator transistor T1.
The FM signals are amplified by the VHF preamplifier and the pre-driver stage. You can also use transistor 2N5109 in place of 2N2219. The preamplifier is a tuned class-A RF amplifier and the driver is a class-C amplifier. Signals are finally fed to the class-C RF power amplifier, which delivers RF power to a 50-ohm horizontal dipole or ground plane antenna.
Use a heat-sink with transistor 2N3866 for heat dissipation (Note: or 2N4427 because it works better at 12 V and delivers up to 1 watt RF power). Carefully adjust trimmer VC1 connected across L1 to generate frequency within 88-108 MHz. Also adjust trimmers VC2 through VC7 to get maximum output at maximum range.
Regulator IC 78C09 provides stable 9V supply to the oscillator, so variation in the supply voltage will not affect the frequency generated. You can also use a 12V battery to power the circuit. Assemble the circuit on a general purpose PCB. Install the antenna properly for maximum range.
Coils L1 through L5 are made with 20 SWG copper-enameled wire wound over air-cores having 8mm diameter. They have 4, 6, 6, 5 and 7 turns of wire, respectively.