All posts by Utkarsh

Solution designer with Firstsource solutions. A post grad in Networks and IT Infrastructure. Technology enthusiast, blogger, webdesigner, Network security aspirant and in love with electronics and gadgets. This blog is an attempt to share what I find interesting... almost anything @Mtaram on twitter and

Indian software movement – Please support

http://www.insomo.in/wp-content/themes/insomo/images/insomo-logo.gifIndian Software Movement or InSoMo as we have named it, is a movement to give India its rightful place in the software world. Indians have helped create numerous software products, since many years. But how many of us are aware of intenationally used software products, created by Indians? The answer is very few!

Now in this decade (2011-2020) we want to give India recognition, on the software global map! We want Indian companies to mark its place with the Microsofts and Oracles of the world. Our apps, our databases and our products should be used as much worldwide. We want equal ratings and rankings for our superior quality software products as much as the internationally known brands.

If you want to know more or be part of this initiative

please visit www.indiansoftwaremovement.com

Thumb Keyboard With Rear-Facing Trackpad

The iTablet Thumb Keyboard is being marketed as an accessory for Android and iOS cellphones, and for the iPad. It might be better to focus on its ability to hook up to the Xbox 360 or media-center PC, though, as it is almost spectacularly ill-suited to mobile devices.

http://www.wired.com/images_blogs/gadgetlab/2011/05/thumbs.jpg

The keypad is similar in form to a console gamepad. You hold it in two hands and type on the QWERTY ‘board with two thumbs, as God intended (if God had been a teenager obsessed with texting). Round the back is a trackpad that you tickle with your fingers, and above that are the left and right mouse buttons. A function and caps-lock button on the front panel complete the lineup.

The Thumb Keyboard also has backlit keys and communicates via Bluetooth.

But even the greatest hater of on-screen keyboards would’t want to use this. First, you have to prop your phone up somewhere you can see the screen. Then you need to go back and forth between typing and touching the screen (the trackpad input obviously can’t be sent to a phone that lacks a mouse pointer). This is bad enough using an iPad at a desk with a proper stand and keyboard. Add in a device you have to hold and it becomes a nightmare.

For a media-center PC, though, it looks perfect, barely bigger than a regular remote and easy to just toss onto the sofa when you’re done. The marketing sure is ass-backwards on this one.

Thumb Keyboard product page

How strong is your password

http://www.passwordsafepro.com/images/secure_passwords.gifIf you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?

Let’s see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I’ll probably get into all of them.

  1. Your partner, child, or pet’s name, possibly followed by a 0 or 1 (because they’re always making you use a number, aren’t they?)
  2. The last 4 digits of your social security number.
  3. 123 or 1234 or 123456.
  4. “password”
  5. Your city, or college, football team name.
  6. Date of birth – yours, your partner’s or your child’s.
  7. “god”
  8. “letmein”
  9. “money”
  10. “love”

Statistically speaking that should probably cover about 20% of you. But don’t worry. If I didn’t get it yet it will probably only take a few more minutes before I do…

Hackers, and I’m not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)

One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. Insecure.org has a list of the Top 10 FREE Password Crackers right here.

So, how would one use this process to actually breach your personal security? Simple. Follow my logic:

  • You probably use the same password for lots of stuff right?
  • Some sites you access such as your Bank or work VPN probably have pretty decent security, so I’m not going to attack them.
  • However, other sites like the Hallmark e-mail greeting cards site, an online forum you frequent, or an e-commerce site you’ve shopped at might not be as well prepared. So those are the ones I’d work on.
  • So, all we have to do now is unleash Brutus, wwwhack, or THC Hydra on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.
  • Once we’ve got several login+password pairings we can then go back and test them on targeted sites.
  • But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser’s cache. (Read this post to remedy that problem.)

And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker’s computer, and the speed of the hacker’s Internet connection.

Assuming the hacker has a reasonably fast connection and PC here is an estimate of the amount of time it would take to generate every possible combination of passwords for a given number of characters. After generating the list it’s just a matter of time before the computer runs through all the possibilities – or gets shut down trying.

Pay particular attention to the difference between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters – like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.

Password LengthAll CharactersOnly Lowercase
3 characters
4 characters
5 characters
6 characters
7 characters
8 characters
9 characters
10 characters
11 characters
12 characters
13 characters
14 characters
0.86 seconds
1.36 minutes
2.15 hours
8.51 days
2.21 years
2.10 centuries
20 millennia
1,899 millennia
180,365 millennia
17,184,705 millennia
1,627,797,068 millennia
154,640,721,434 millennia
0.02 seconds
.046 seconds
11.9 seconds
5.15 minutes
2.23 hours
2.42 days
2.07 months
4.48 years
1.16 centuries
3.03 millennia
78.7 millennia
2,046 millennia

Remember, these are just for an average computer, and these assume you aren’t using any word in the dictionary. If Google put their computer to work on it they’d finish about 1,000 times faster.

Via One Mans Blog
image: Passwordsafepro

New Android OS for Phones, ‘Ice Cream Sandwich’

The next Android operating system for smartphones will include some features that were previously exclusive to Android tablets, Google announced Tuesday.

Dubbed “Ice Cream Sandwich,” the platform will debut some time in the fourth quarter of 2011, Google officials said during the company’s I/O developer conference.

“We want one OS that runs everywhere,” Android engineer Mike Claren said at the conference.

Ice Cream Sandwich-powered smartphones will ship with enhancements introduced in Android Honeycomb, Google’s operating system for tablets. Some of these new features include a holographic user interface, enhanced multitasking abilities and the ability to connect the smartphone with a USB device, such as a mouse or an Xbox controller.

The release of Ice Cream Sandwich has been highly anticipated by the Android developer community. Android version 3.0 (Honeycomb) first debuted on Motorola’s Xoom tablet in February, touting a host of enhancements and features new to the Android platform. Developers have been waiting for Google to release the Honeycomb source code, in order to bring some of these features to smartphones.

So far, Google has refused to do so. After a long period of silence and a whole lot of fear, uncertainty and doubt, Google issued a statement to members of the press in March: “While we’re excited to offer these new features to Android tablets, we have more work to do before we can deliver them to other device types including phones. Until then, we’ve decided not to release Honeycomb to open source.”

http://www.wired.com/images_blogs/gadgetlab/2011/05/google_io_f31.jpg

via Wired

Disability limits marriage choices: Online survey

http://www.ifsw.org/cm_data/Disability.jpgChoices are limited for the physically disabled wanting to get married. A recent survey shows that 59% women and 48% men refuse to marry anyone with a physical disability. About 34% women and 37% men said it depended on the situation and extent of the disability. Only 7% women and 15% men and said that they would marry someone with
physical disability.

An online matrimonial site had conducted the survey over four months starting November 2010. It had more than 1.5 lakh respondents in the age group ranging between 18 to 45 years. These also include NRIs from the US, UK, Canada, Middle East, S E Asia, Australia and New Zealand.

via Times of India

Google Wants to Control Your Home

http://www.wired.com/images_blogs/gadgetlab/2011/05/AndroidAtHome.jpgGoogle’s Android operating system may have been created for phones and refined for tablets, but the OS is set to move beyond the bounds of mobile devices.

Today, Google announced a new class of Android devices for the home during the opening keynote at its annual I/O developer’s conference in San Francisco. These devices—dubbed “Tungstens”—act as an intermediary between an Android phone or tablet and a suitably enabled home appliance. They would allow users to remotely control everything from lighting to refrigerators.

The company demonstrated how a Tungsten could make playing a game on an Android tablet more immersive: explosions and gunfire set the special lights in the room flickering with every blast. New software that makes it easier for Android devices and their apps to interface with other devices and objects, including home automation equipment, was also demonstrated.

New Nanosensor Sniffs Bombs, One Molecule at a Time

http://www.wired.com/images_blogs/dangerroom/2011/05/honeybees.jpg

Imagine a piece of metal 30,000 times thinner than one of the hairs on your head. Mixed with a little protein from bee venom, that microscopic filament becomes the most powerful explosives-detection system in history, able to detect a single molecule of dangerous chemicals.

Now imagine having that in an airport. No need for taking a pornographic photograph or having your genitals massaged by the Transportation Security Agency. And a nanotechnology specialist may have hastened that happy day for homeland security.

Michael Strano, an associate professor of chemical engineering at the Massachusetts Institute of Technology, spent the past two years testing out the boundaries of nanotech in explosives detection. For less than $200,000, he took it practically to the atomic limit. “There’s no further improvement in the sensor part you can get,” Strano tells Danger Room. “It’s the last word in sensors.”

Some of his colleagues aren’t quite so sure. Strano’s system is promising, they say. But they have questions about bringing Strano’s sensor into the field.

The science behind the Strano’s sensor is complex. But here’s the simplest way of breaking it down. Put bee venom on a carbon rod and you’ve got yourself a sensor.

 

Believe it or not, bees are powerful bomb sleuths. That’s why Darpa wanted to enlist them to find explosives, landmines and “odors of interest” in the early 2000s. As it turns out, inside of every bee sting is a small fragment of a protein called a peptide that has an uncanny property.

“When it wraps around a small wire, that allows it to recognize ‘nitro-aromatics’,” Strano explains, the chemical class of explosives like TNT. That wire is a carbon nanotube, a mere one atom thick.

Put that against a nitro-aromatic treated with the bee peptide, and take a look through a near-infrared microscope. “The light from the carbon nanotube will fluoresce — so red that your eye can’t see it,” Strano says. “What you’d see in the microscope is: The nanotube would flicker off and on.” A single molecule of the explosive material would set off the sensor.

via Wired

Google Music Beta – Launched

In its long-anticipated effort to bring music storage to the cloud, Google debuted its own streaming music service at its I/O developer conference on Tuesday morning.

Dubbed “Music Beta by Google,” the service will act as a “digital locker,” where users can store their music in the cloud instead of on their local hard drives or mobile devices.

After uploading your existing music library to a remote server, you’ll be able to stream your music to your Android phone or web-connected PC. As long as you’re connected to the internet, you’ll be able to access your music wherever you go.

You’ll be able to add up to 20,000 songs, and it’s free while it’s in beta mode.

http://www.wired.com/images_blogs/epicenter/2011/05/music-beta.jpg

image: Wired.com

Why Google Does Not Own Skype

http://www.wired.com/images_blogs/epicenter/2011/05/5514628.jpegSo Microsoft is buying Skype for $8.5 billion, its biggest deal ever. It’s too soon to make a pronouncement on whether the purchase is an idiot move, a brilliant one or just something in between. All the geniuses who ripped the investors who bought Skype from eBay in 2009 don’t look so smart now.

It was almost Google who owned Skype.

Here’s more detail on the story:

In 2009 a brilliant product manager named Wesley Chan was in charge of Google Voice, which was still in development. It was Google’s revamp of Grand Central, which Chan had snared in an acquisition the year before. When some Google executives heard that eBay was selling Skype, they jumped on the opportunity and began negotiating.

As Chan helped with due diligence, even going to Europe to see Skype firsthand, he became convinced that the purchase was a bad idea for Google. He concluded that one of Skype’s key assets — its peer-to-peer technology — was a mismatch for Google, which worked on the newer paradigm of cloud computing.

Read more at Wired
The article first appeared on Wired