Saturday, December 30, 2006

Messages to Spies Are Coded but Not Hidden

It turns out that anybody can tune in to the world's top spy agencies talking to operatives. All you need is a cheap shortwave-radio receiver, the kind available at any drugstore.

Read More

Wednesday, December 20, 2006

Linux Distro Timeline 1991-2006

Wondering when a Linux distro forked off of another? Interested to know which distro branched into what? This handy time line should answer most of your questions

View The Image

How to digitize cassette tapes

The next time you have an afternoon free, dig out that old box of cassette tapes you squirreled away in the basement. With a few simple tools and your PC, you can turn these forgotten jewels into digital audio files that will live forever

Source Article

Sunday, December 10, 2006

Picture of a 5MB Hard Disk in 1956

Take a look at what a 5MB Hard Disk was like 50 years ago!!!!

read more

Saturday, December 09, 2006

How Microsoft fights off 100,000 attacks per month...

Microsoft may be the biggest target out there for hackers. Here's what the company does to protect itself from the continuous onslaught of probes and intrusion attempts.

Read The Article

Wednesday, November 15, 2006

PowerShell: Microsoft releases a new Windows Command Prompt

Microsoft Windows PowerShell command line shell and scripting language helps IT Professionals achieve greater productivity. Using a new admin-focused scripting language, more than 130 standard command line tools, and consistent syntax and utilities, Windows PowerShell allows IT Professionals to more easily control system administration
Read More

Saturday, November 11, 2006

The best software development group in the world

People today demand and expect the software to be of a certain quality. But are all the big corporations able to deliver what they make us believe? That is a debatable question with no simple answer. So how do people develop software in place where there is no place for errors .
"In the NASA space shuttle"
"As the 120-ton space shuttle sits surrounded by almost 4 million pounds of rocket fuel, exhaling noxious fumes, visibly impatient to defy gravity, its on-board computers take command. Four identical machines, running identical software, pull information from thousands of sensors, make hundreds of milli-second decisions, vote on every decision, check with each other 250 times a second. A fifth computer, with different software, stands by to take control should the other four malfunction.
At T-minus 6.6 seconds, if the pressures, pumps, and temperatures are nominal, the computers give the order to light the shuttle main engines -- each of the three engines firing off precisely 160 milliseconds apart, tons of super-cooled liquid fuel pouring into combustion chambers, the ship rocking on its launch pad, held to the ground only by bolts. As the main engines come to one million pounds of thrust, their exhausts tighten into blue diamonds of flame."

Read More

Thursday, November 09, 2006

Flickr's Desktop Wallpaper Pool

Over 2567 (and counting) Flickr users have posted their favorite wallpaper photos. Minimum 1024x768 resolution. better go to deviantart if you want wallpapers but still nice place to check out.

Go There

BitTorrent FAQ and Guide

People keep asking about BitTorrent. I was searching for some good FAQ's and i found this one so take look at this FAQ (link give Below). I hope this is able to answers all the questions that you guys have about torrents.

BitTorrent FAQ Link

Monday, October 23, 2006

Yikes!! Photos showing Scary Civilian Aircraft Landings in Hong Kong

No autopilot stuff here...hand-fly that sucker, and don't screw up...!!!

Read More

Saturday, October 21, 2006

A Complete History of Tux - so Far.

Find out why Mr. Torvald chose the mighty Penguin, where the name "Tux" originated, background information on the cute penguin and of course it would not be complete without some nice Tux photos.

Read More

Sunday, October 15, 2006

How many seconds old are you?

What was the moon like on your birthday? What egyptian month was it? And your life path number? What about your birthstone? What was the population then? How much do you really know about YOUR special day?

Read More

Thursday, October 05, 2006

How to Shoot Yourself in the Foot in Any Programming Language

A hilarious list of ways to shoot yourself in the foot in many programming languages. If you're not a coder, you can stop reading now.

Read more

Saturday, September 30, 2006

The Hello World Collection

"Hello World" is the first program one usually writes when learning a new programming language. This collection includes 171 Hello World programs in many more-or-less well known languages.

Go to the source

Friday, September 29, 2006

No, I can't fix your computer!

In a world where the term "computer expert" can refer to many things, why do people assume that ALL people in the computer field can solve their computer problems?

Go to source

Wednesday, September 20, 2006

Classic Mistakes Enumerated--from book "Rapid Development"

Another article on the mistakes done in software development that i found its better written then the previous one.
"
Some ineffective development practices have been chosen so often, by so many people, with such predictable, bad results that they deserve to be called "classic mistakes." Most of the mistakes have a seductive appeal. Do you need to rescue a project that's behind schedule? Add more people! Do you want to reduce your schedule? Schedule more aggressively! Is one of your key contributors aggravating the rest of the team? Wait until the end of the project to fire him! Do you have a rush project to complete? Take whatever developers are available right now and get started as soon as possible!

Developers, managers, and customers usually have good reasons for making the decisions they do, and the seductive appeal of the classic mistakes is part of the reason these mistakes have been made so often. But because they have been made so many times, their consequences have become easy to predict, and they rarely produce the results that people hope for."

Go to the article source

Saturday, September 16, 2006

"Winkey Ver. 2.8" Great windows Shortcut launcher

Winkey ver 2.8 i have been using this software since my windows 98 days. the company Copernic does not make it any more but it is still available for download. it is one of the best shortcut launcher and with it you can assign anything a shortcut key. this one software thats must have.

Download it

Tuesday, September 12, 2006

C/C++ development with the Eclipse Platform

Get an overview of how to use the Eclipse Platform in your C/C++ development projects. Though Eclipse is mainly a Java development environment, its architecture ensures support for other programming languages. In this article, you'll learn how to use the C/C++ Development Toolkit (CDT), which is the best C/C++ toolkit available for Eclipse.

Go to the source article

BSD Vs. Linux - What you did not Know

While there's overwhelming similarity between the operating systems in most cases, there are also a lot of differences. As you probe more into the differences, you find that they emerge from deep-seated disagreements.


Go to the source article

P.S - > the page has bad color scheme. don't tell me i didn't warn you.

Monday, August 21, 2006

Check you website's popularity on social networking websites

Social meter scans the major social websites to analyze a webpage's social popularity. Currently they scan Del.icio.us, Digg, Furl, Google, Jots, Linkroll, Netscape, Reddit, Shadows, Spurl, Technorati, and Yahoo My Web.

Go to the WebSite

How (color blind person) see the world!

nice site which shows how dolour blind person sees the world. in his own words
"After 26 years I discovered that I see the world in a different way than all others see it!
I'm a successful web designer, and a lot of people were asking me "so, what do you see!!". "

Go to the WebSite

Sunday, August 20, 2006

50 Common Interview Questions

Review these typical interview questions and think about how you would
answer them. Read the questions listed; you will also find some
strategy suggestions with it.

Go to the Article

Tuesday, August 01, 2006

"Suspended" Honda F1 Car

The amazing display was created especially for the event by Dutch artist Paul Veroude. Each of the 3200 parts of the Formula 1 car are suspended on fine wires to produce a 3D 'exploded diagram' that allows race fans the chance to get closer than ever to the engineering secrets of the world's most technically-advanced sport.

read more

Wednesday, July 12, 2006

Intricate Steps of How to Hack Into a Computer

Here is a huge map that pretty much shows you all possible ways to gain entrance into a system. From finding exploits and scanning ports to password cracking. It shows all the likely paths you can take to hack into a computer and/or test out it's security.

Go to the source article

Digital Dirt: How to Clean Up Your On-line Profile

According to a 2005 survey of 102 executive recruiters, an executive job-search and networking organization, 75% of recruiters use search engines to uncover information about candidates, and 26% of recruiters have eliminated candidates because of information found on-line. Search engines aren't going away, so here are some tips to help you.

Go to source article

Monday, July 10, 2006

Dead Pixel Tester

Dead Pixel Tester - TFT screens have thousands of pixels, on a 1024x768 monitor, there are three cells for each pixel - one each for red, green, and blue - which amounts to nearly 2.4 million cells (1024x768x 3 = 2,359,296). There's only a slim chance that all of these will be perfect; more likely, some will be stuck on (creating a "bright" defect) or dead (resulting in a "dark" defect). DPT was written to help me check my own screens (Couldn't find one that worked across multiple desktops so had to write my own!) by cycling through the three primary colours used (red,green,blue) and all on (white) and all off (black). Simply select a colour then closely inspect your monitor in each of the primary colours checking for pixels that are not operating as expected. Stuck pixels (always on) are easier to noticed then pixels that are not on due to their size (normally under .5mm). This application is freely distributable for non commercial gain

Go to the source page

software recomended for your use

IE Tweaking software -->> Techlogica IE Customizer

It allows you to enhance and personalize Internet Explorer 6.0 by giving you access to over 75 hidden features in an easy-to-use interface.

harddisk erasing software -->> Eraser

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS.
Eraser is Free software and its source code is released under GNU General Public License.

Rootkit finder-->> RootKit Hook Analyzer

RootKit Hook Analyzer is a security tool which will check if there are any rootkits installed on your computer which hook the kernel system services. Kernel RootKit Hooks are installed modules which intercept the principal system services that all programs and the operating system rely on. If any of these system services are intercepted and modified it means that there is a possibility that the safety of your system is at risk and that spyware, viruses or malware are active.

Sunday, July 09, 2006

Ten Things to Know Before Buying a Video Card

Selecting a video card upgrade can be an intimidating task. Unless you've kept up with all the GPU announcements and performance reports, it's practically impossible to know which cards are worth buying. Here are 10 things you need to know about video cards before shopping for one.

Go to Source article

Friday, July 07, 2006

The Best Whiteboard on the Internet

This is one of those great tools that the Internet was
born to host! A free white board that you can easily invite people to collaborate with.
With a plethora of features and no membership required.
Great for small businesses, not for profits and just people that want to share
ideas.

Go to the source page

Monday, July 03, 2006

Method to Better Predict Software Vulnerabilities

Researchers at Colorado State University have developed a model to predict with much greater accuracy the number and severity of vulnerabilities that will likely surface in operating systems and in major software applications in the near future

read more

Friday, June 30, 2006

Amazingly Detailed Flash Periodic Table

Displays everything from boiling points to electron orbitals. Completely customizable coloring. Each element links to wikipedia.

read more

Thursday, June 29, 2006

Google File System - how Google does it

While many IT shops deal with the issues related to hundreds or thousands of users, Google regularly manages, administers and upgrades software and systems for millions of users. How do they do it? This article presents an excellent overview of the Google file system and its unique capabilities.

read more

Thursday, June 22, 2006

BumpTop 3D Desktop Prototype

i found this interesting video over at youtube it shows a great way of using desktop on your computer its done up using physics engine and the whole thing is 3d

Monday, June 19, 2006

A New Technique to Quickly Erase Hard Drives

Sometimes you need to QUICKLY erase your Hard drive. The article explains how to do it when you only have seconds, and the data needs to be 100% unrecoverable.

read more

Saturday, June 17, 2006

The International Space Station as Seen from Earth

You can photograph the international space station as it passes by, check these photos.

read more

Wednesday, June 07, 2006

Genetic HIV Resistance Deciphered

An estimated 1 percent of people descended from Northern Europeans are virtually immune to AIDS infection, with Swedes the most likely to be protected. One theory suggests that the mutation developed in Scandinavia and moved southward with Viking raiders.

read more

Tuesday, June 06, 2006

A VC's View of Web 2.0

The day of giant corporate software packages is over, says Oracle vet Ray Lane. The future lies in bottom-up, user-driven services.

read more

Security without firewalls: Sensible or silly?

For years, infosec experts have called the firewall a critical ingredient to security, whether it's in a large enterprise or on a home PC. But the San Diego Supercomputer Center (SDSC) has defied that logic with what some would consider surprising success.

read more

Web 2.0 works for Corporate America

"And though these Web 2.0 services have succeeded in luring millions of consumers to their shores, they haven't had much to offer the vast world of business. Until now. Slowly but surely they're scaling corporate walls."

read more

Sunday, June 04, 2006

A great Interactive Periodic Table

Here's a great interactive periodic table of elements. You can click the button for html and pdf files that provide background information and further data on the Periodic Table of Elements.

read more

Worlds Fastest Growing City (pics)

In many areas, it is not easy to see Dubai's sky without at least one crane in your view; Industry experts cautiously estimate that 15 to 25 per cent of the world's cranes are in Dubai. Some US$ 90 BILLION are on-going in Dubai alone.

read more

Thursday, June 01, 2006

TagLines - Visualization of the Evolution of Flickr Tags

TagLines is the visualization of the evolution of Flickr tags over time. An algorithm chooses the eight most popular tags for each day, along with interesting photos corresponding to each of these tags. TagLines provides via Flash two metaphors for visualization: the waterfall and river.

read more

Entire community wiped out in 10 months (with before and after pics)

Human rights group Amnesty International (AI) on Wednesday released the first-ever satellite images of the effect of the Zimbabwean government's controversial Operation Murambatsvina, which left 700 000 people homeless last year, according to a United Nations report.
(Via: http://www.mg.co.za/)

read more

Stalkerati.com: A site to "keep track" of your friends!

This site is hilarious! You type in the name of a friend and it will run searches on MySpace, Friendster, Facebook and more. Create profiles on your friends and save them to your "buddy list", then you can just click their name and see all their profiles later on! The buddy list also shows you who's online by checking their IM statuses.

read more

Impressive Collection of Before and After Photo Retouching Examples

This collection of photo retouching samples shows what's possible when cleaning up a photo to meet a client's needs. Includes everything from basic color correction to changing the outfit of a little girl and extending the world behind her.

read more

Wednesday, May 31, 2006

A Very Economical Personal Organiser! (Free)

The PocketMod is a new way to keep yourself organized. Lets face it, PDAs are too expensive and cumbersome, and organizers are bulky and hard to carry around. Nothing beats a folded up piece of paper. That is until now. With the PocketMod, you can carry around the days notes, keep them organized in any way you wish.

not really great but i thought that u guys should see this
read more

Sunday, May 28, 2006

"Fantastic Four" - video from "youtube'

"Fantastic Four" music video. Ben aka "The Thing" is having a bad day. Set to Tait's "All You Got"

The solvay congress 1927

The Prisoners' Dilemma and Trust

The Prisoners' Dilemma was extensively studied as a model of first strike nuclear ballistic missile strategy. In it, two prisoners are held separately, and both are offered the following deal, `If neither of you confess, you shall both go free. If both of you confess, you will both receive long sentences. If only one of you confesses, that one will receive a short sentence, but the other will receive a doubley long one.'

The thing is, unless I can be certain that you won't confess, the best thing I can do is to confess, and settle for a short or long sentence, but avoiding the doubley long one. You feel the same way. So unless we are both certain (remember the old packer `certainty'), which we cannot be, we both end up with long sentences where we could have got off with none at all.

This result was depressing during the Cold War, when considerable strategic advantage could be gained from a first strike. While the game theorists insisted that a double launch was inevitable, the human race, faced with utter destruction, was able to behave rationally and avoid any kind of nuclear exchange at all, let alone the Spasm predicted by game theory.

P.S - This was taken from www.reciprocality.org/

For any person wishing to carry a mapper's strengths into the workplace, the life and work of the physicist Richard Feynman is worth studying. He told stories. The Spencers' Warbler was a bird identified for him by his father. The name was made up. His father then made up names for the bird in many other languages, and pointed out that young Feynman knew no more than when he started. Rote-learning names of things means nothing. Only looking at what the bird itself is doing tells one anything about it.

He was utterly honest and saw through artificial complexity by always insisting on simplicity and facts. See his personal version of The Challenger Report, contained in his book What Do You Care What Other People Think?.

He used simple, humorous, curious language, filled with little pictures and enthusiasm. His techniques for puncturing pomposity were unrestrained.

His Lectures on Computation have recently been published, and are worth reading, as is everything he ever published, from Six Easy Pieces, to the Red Book Lectures. James Gleik's Genius and the Gribben's Richard Feynman are rewarding biographies.

Get hold of his stuff and read it.

p.s- this article was taken from www.reciprocality.org

Hide In Picture

Hide In Picture (HIP) is a steganography program. It is a program that allows you to "hide" any kind of file inside standard bitmap pictures. The pictures look like normal images, so people will not suspect they contain hidden data.

You can use a password to hide your files, and only those who know the password use are able to retrieve them - without it, people cannot even be sure there is something hidden in the image.

You could use a normal cryptography program to protect secret data from other people. But then, even if they are not able to read it, they will be able to see you are hiding something. With HIP, you can hide your secret data inside an innocent family photograph (which you can then send to other people who know the password) or even your desktop wallpaper, which nobody will ever suspect of.

Check it out

Saturday, May 27, 2006

15,000 layer Photoshop file.

Bert Monroy released his latest Photoshop painting this week after 11 months of work with an estimated 2,000 hours. The attention to detail is amazing in this 10 foot wide poster.

read more

Color blindness - What things look like to color blind people.

Ever wonder what things look like to people with colorblindness? Check this out.

read more

INSANE Mosaic! Check this out... crazy.

This is crazy. It goes on forever... see it for ur self

read more

Things You Didn't Know About Your Body

Some interesting facts about the human body. Some you may know, others probably not, but there's plenty of really good tips here. For example: "Starting 48 hours before your next long flight, take a baby aspirin each day. It'll thin your blood just enough to prevent clots from forming in your legs" A good read...

read more

Friday, May 26, 2006

A Camera You Can Download

The Linatree Pinhole is a downloadable PDF camera that you cut out and assemble yourself. Use it with photo paper, film or any other light-sensitive surface. Pinholes are pretty fickle, but they can produce amazing images when used correctly — and with patience. There are several online communities where you can share your pinhole creations, such as Pinholeday and Pinhole.org. There is also, of course, a pinhole Flickr cluster.

Thursday, May 25, 2006

chicken

If I'm not doing anything wrong, then you have no cause to watch me.

Watch someone long enough, and you'll find something to arrest -- or just blackmail -- with.

read more

Retailers Gather Data the Same Way Spies Do

'Data mining' provides valuable clues to customers\' spending habits.

read more |

Flickr group: Soviet Union Propaganda

an extensive collection (25 pages) of Soviet Union propaganda and advertisement posters from 1917 to 1991. Flickr, once again, turns out to be an interesting resource.

read more

Repairing Windows XP in Eight Commands

Article describing how to repair Windows XP when your PC is inaccessible from the standard boot procedures, and you have to use the recovery console as your last resort!

read more

Protecting yourself against the BitTorrent bandits!

Anti-P2P organizations are actively polluting P2P networks with fake peers, sending out fake or corrupt data in order to waste bandwidth and slow down file transfers. At its worst, when downloading copyrighted torrents as much as a fourth of the peers can be attributed to various Anti-P2P agencies. There is also a much more serious side to this...

read more

Voyager 2 Detects Odd Shape of Solar System's Edge

Voyager 2 could pass beyond the outermost layer of our solar system, called the "termination shock," sometime within the next year, NASA scientists announced at a media teleconference.

The milestone, which comes about a year after Voyager 1's crossing, comes earlier than expected and suggests to scientists that the edge of the shock is about one billion miles closer to the Sun in the southern region of the solar system than in the north.

This implies that the heliosphere, a spherical bubble of charged low-energy particles created by our Sun's solar wind, is irregularly shaped, bulging in the northern hemisphere and pressed inward in the south.

Scientists determined that Voyager 1 was approaching the termination shock when it began detecting charged particles that were being pushed back toward the Sun by charged particles coming from outside our solar system. This occurred when Voyager 1 was about 85 AU from the Sun.

One AU is the distance between the Earth and the Sun, or 93 million miles.

In contrast, Voyager 2 began detecting returning particles while only 76 AU from the Sun.

"This tells us that the shock down where Voyager 2 is must be closer the sun than where Voyager 1 is," said Ed Stone, Voyager project scientist at the California Institute of Technology in Pasadena.

The researchers think that the heliosphere's asymmetry might be due to a weak interstellar magnetic field pressing inward on the southern hemisphere.

"The [magnetic] field is only 1/100,000 of the field on the Earth's surface, but it's over such a large area and pushing on such a faint gas that it can actually push the shock about a billion miles in," Stone explained.

Both Voyager spacecrafts were launched from Cape Canaveral Air Force Station in Florida: Voyager 2 headed out on Aug. 20, 1977, Voyager 1 on Sept. 5, 1977.

Currently, Voyager 1 is about 9.1 billion miles from the Sun and traveling at a speed of 3.6 A U per year while Voyager 2 is about 7.3 billion miles away and moving at about 3.3 AU per year.


Go to the source

Teenager repellent

This has not been applied to annoying cell phone ringtones yet, but there may be something here.

Mosquito is a teenager repellent - an ultrasonic device that emits a sound only audible to teenagers. It's targeted to business seeking a solution to anti social youths hanging in front of their stores fronts and driving their customers away.

The box is installed in front of a store and emits an unbearable sound, only discernable to those under 20! driving them away.

Apparently, the company has sold thousands of models in the UK, to the complete delight of it's inventor, Howard Stapleton.

In their own words:

It seems that there is a very real medical phenomenon known as presbycusis or age related hearing loss which, according to The Merck Manual of Diagnosis and Therapy, "begins after the age of 20 but is usually significant only in persons over 65". It first affects the highest frequencies (18 to 20 kHz) notably in those who have turned 20 years of age". It is possible to generate a high frequency sound that is audible only to teenagers.


101 of the Top Free Software Utilities to use

Here is a list of the 101 top free utilities to use sorted by category-u can also sort them alphabetically

read more

14 year old kid becomes millionaire through online scamming

Akin is, like many things in cyberspace, an alias. In real life he's 14. He wears Adidas sneakers, a Rolex Submariner watch, and a kilo of gold around his neck.

read more

The Curious Incident of Sun in the Night-Time

Richard Stallman blasts the recent Sun PR move which makes Java available for inclusion on \"open source platforms,\" claiming that it is a deceptive and self-serving move which makes Java neither free software nor open source.

read more

Tuesday, May 23, 2006

Today's proverb

"Quis custodiet custodes ipsos? "


it means : -
Who watches the watchers?


think about it.

Wednesday, April 19, 2006

My Favorite firefox Extensions

These extensions [19] are highly recommended be me. I have them enabled on my firefox they add just the right functionality to it. I have not explained each of them individually as the names are linked and you can just go and see them on your own.