Sunday, July 1, 2012


Five highly Anticipated gadgets of 2012

We provide you some details regarding the highly anticipated gadgets of 2012. These gadgets are expected to create a revolution in the year 2012. The gadgets are:
1) iPhone 5:

The most anticipated gadget is the iPhone 5, this is expected to incorporate a sleek, trendy design that is sure to give it an edge over other smartphones in 2012. The iPhone 5 is also expected to eliminate the drawbacks of it’s predecessor, the iPhone 4S. There are rumors that the iPhone 5 is going to have an aluminum body and a bigger display. For the other features, we will have to wait till 2012.

2) iPad 3:
Ever since the success of the iPad 2, Apple has been keen to bring out the iPad 3. This is going to be a reality in 2012. Speculations are rife that the iPad 3 is going to run on a quad-core processor. In addition to this, there are also rumors of never-before seen technology being incorporated in the iPad 3. Let’s wait & watch.

3) Xbox 720:

The Xbox 720 is expected to have some of the best graphic supports & never-before seen features. The speculation running rife is that the Xbox 720 is going to run on an 8-core processor. Apart from this, 3D support is also supposed to be incorporated here. All in all, the Xbox 720 is one gadget to watch out for in 2012.

4) Apple HD-TV:

Apple’s anticipated products continue to dominate the most-expected product charts. The Apple HD TV is one more addition to the growing range of Apple products. As the name suggests, the Apple TV is going to provide High-Definition support & features. Speculations doing the rounds are the Apple HD TV is going to incorporate & provide features such as game, apps support & even social networking. All these makes the Apple HD-TV an anticipated product in 2012.

5) Quad Core Mobile Phones:
Yes, this technology is going to be a reality in 2012. Many leading manufacturers have decided to incorporate their mobile phones with a quad-core processor. This is supposed to give the mobile phones never-before seen functionality.

Thursday, June 28, 2012


The Most Malignant Viruses and Worms of all time. 

10. Surreptitious Sircam

Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish.

9. Red Raider

Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack.
The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist.

8. Bad Benjamin

Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive.

7. Numbing Nimda

Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern.

6. Tennis Anyone?

The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symante'c Security Response for instructions on how to remove Kournikova.
Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands.

5. (Expletive Deleted) Explorer

The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.

4. Maniacal Magistr

Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy.

3. Malevolent Melissa

The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.
So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants. 

2. Klez the Conquerer

The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection.

1. Love Hurts

LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems.

Tuesday, June 26, 2012

Can Youth Change the World With Technology?


At least one thing is true of youth in every country: give them access to technology and a bit of guidance, and they’re capable of changing the world for the better. Helping young people do exactly that has been the job of the State Department’s Ronan Farrow for the past year.
Farrow has served as Secretary of State Hillary Clinton’s special advisor on global youth issues since the middle of 2011. He firmly believes that technology is radically altering what it means to be a young person today, as social networks give them an unprecedented opportunity to have their voice heard and connect with other youth around the world to fix the problems they face.
“It’s going to be people under 30 that solve this generation’s problems,” said Farrow. “Our principle at the State Department has been, ‘How can we turn to young people using these new technologies and tap them for their solutions?’”
According to Farrow, the State Department recently launched a “hard, honest review” to see if its policies and outreach programs worked for young people. The result? A diplomatic corps that’s been trained in social media and digital outreach, ready to engage youth on myriad platforms.
“Now we’re really coming around to understanding,” said Farrow, whose excitement about the State Department’s internal embrace of social media is only eclipsed by his enthusiasm for the digital projects he’s done with youth in a multitude of countries.
“We build all around the world,” said Farrow. “We bring groups of young people together, it’s a great thing to do in places where people are skeptical of world powers. We say, ‘You, teenager in Algeria, tell us exactly what you want from us.’ We then support them as they try to make their goals a reality.”
Farrow pointed out two examples of those goals: an e-petition service in Latvia and an SMS-based English education platform in Tunisia.
In Lativa, Farrow and his team worked with two 23-year-olds who were frustrated by their inability to participate in the political process. To fix that, they made use of a small State Department grant and built an e-petition system where Latvians could submit and support proposals for new laws and other political changes. The government agreed to look seriously into any petition that got a certain amount of popular support on the platform, and it’s been used by at least 20% of the Latvian population (Fun fact: It’s also the direct inspiration for the White House’s “We the People” platform).
Over in Tunisia, Farrow describes having a “seminal moment” when his team needed to access a population that didn’t have access to the same level of technology available elsewhere in the world. What Tunisians did have — and this is true across much of Africa — were SMS-enabled feature phones.
The State Department quickly realized they would need to embrace SMS if they wanted to reach Tunisians wirelessly. Farrow’s team accordingly got to work with local partners on a pilot program designed to teach English over text messages, which the State Department said played a key role in helping people outside of cities keep up with their education during the Arab Spring.
“We had a very large pilot program on mobile English education which was a great success,” said Farrow. “We had 535,000 users in the first 90 days. We’ve flipped it over to a pay model for end users because there’s such demand for English language training.”
Farrow, who’s leaving the State Department to pursue a Rhodes scholarship at Oxford University, said that many of the digital ideas that youth have for their own communities are easily portable to other parts of the world with slight modification. The State Department is also hosting technology training sessions, known as “TechCamps,” for young people and activists all around the world.
Ultimately, Farrow’s message to any young person with a good idea is simple: Just do it.
“The U.S. wants to play its part as young people play their role,” said Farrow. “But nobody should wait for support. With our level of connectivity today, everyone can find that mentorship or seed resourcing. Whatever it takes, find a way to get your idea off the ground if you have one. And remember: world powers really are listening to you.” Pweje