All posts by Utkarsh

Solution designer with Firstsource solutions. A post grad in Networks and IT Infrastructure. Technology enthusiast, blogger, webdesigner, Network security aspirant and in love with electronics and gadgets. This blog is an attempt to share what I find interesting... almost anything @Mtaram on twitter and

Twinkle Twinkle Little Star

http://images.meredith.com/parents/images/2008/07/ss_Twinkle_Summary.jpgTwinkle, twinkle, little star,
How I wonder what you are!
Up above the world so high,
Like a diamond in the sky!

When the blazing sun is gone,
When he nothing shines upon,
Then you show your little light,
Twinkle, twinkle, all the night.

Then the traveller in the dark,
Thanks you for your tiny spark,
He could not see which way to go,
If you did not twinkle so.

In the dark blue sky you keep,
And often through my curtains peep,
For you never shut your eye,
Till the sun is in the sky.

As your bright and tiny spark,
Lights the traveller in the dark,—
Though I know not what you are,
Twinkle, twinkle, little star.

Students find ringtone that adults can’t hear

In that old battle of the wills between young people and their keepers, the young have found a new weapon that could change the balance of power on the cellphone front: a ring tone that many adults cannot hear.

In that old battle of the wills between young people and their keepers, the young have found a new weapon that could change the balance of power on the cellphone front: a ring tone that many adults cannot hear.

The technology, which relies on the fact that most adults gradually lose the ability to hear high-pitched sounds, was developed in Britain but has only recently spread to America — by Internet, of course.

Download here [credit: NY times]

The cellphone ring tone was the offshoot of an invention called the Mosquito, developed last year by a Welsh security company to annoy teenagers and gratify adults, not the other way around.

It was marketed as an ultrasonic teenager repellent, an ear-splitting 17-kilohertz buzzer designed to help shopkeepers disperse young people loitering in front of their stores while leaving adults unaffected.

The principle behind it is a biological reality that hearing experts refer to as presbycusis, or aging ear. While Miss Musorofiti is not likely to have it, most adults over 40 or 50 seem to have some symptoms, scientists say.

While most human communication takes place in a frequency range between 200 and 8,000 hertz (a hertz being the scientific unit of frequency equal to one cycle per second), most adults’ ability to hear frequencies higher than that begins to deteriorate in early middle age.

“It’s the most common sensory abnormality in the world,” said Dr. Rick A. Friedman, an ear surgeon and research scientist at the House Ear Institute in Los Angeles.

But in a bit of techno-jujitsu, someone — a person unknown at this time, but probably not someone with presbycusis — realized that the Mosquito, which uses this common adult abnormality to adults’ advantage, could be turned against them.

The Mosquito noise was reinvented as a ring tone.

“Our high-frequency buzzer was copied. It is not exactly what we developed, but it’s a pretty good imitation,” said Simon Morris, marketing director for Compound Security, the company behind the Mosquito. “You’ve got to give the kids credit for ingenuity.”

The detailed post can be found here

The Unhackable Cellphone

Gold Line Group’s Hacker Challenge has a cartoonish James Bond aspect to it that begs a bunch of hard questions, but it also has a deadly serious side.
The Israeli company invited hackers, cyber spooks, and industrial espionage geeks to try breaking its new Gold Lock 3G cell phone encryption system. Anyone who succeeds wins a cool quarter million dollars in gold ingots.
The software, launched in mid-2009, is already used by the Israeli military to scramble field communications. South American moguls are using it to prevent kidnap gangs eavesdropping on their conversations. Life and death stuff.
But Gold Lock 3G, which the company launched in North America late last year, can also be used by organizations just looking to protect trade secrets from prying ears.
Cyber spooks
The software encrypts voice conversations, SMS messages, instant message conversations and file transfers to and from Nokia, Windows Mobile, BlackBerry, and iPhone mobile devices.
Phones at both ends have to be running Gold Lock 3G. List prices start from about $35 a month per device, or $1,700 for a perpetual license.
The software does introduce a level of latency in voice conversations – typically about a second – but the company’s North American channel manager, Douglas Haskins, insists users barely notice or, if they do, adjust easily.
Software such as Gold Line’s takes on added significance now with recent news that a German encryption expert succeeded in breaking the native 64-bit protocols used by GSM carriers to encrypt cell calls.
In the past, says Haskins, industrial spies would have to spend $80,000 or more on specialized equipment to intercept and decrypt cell phone conversations.
Now they can use a laptop and $100 worth of software.
“It could be somebody sitting outside your business or your house – they can be a couple of hundred of yards away, or in a nearby cubicle,” Haskins says. “So it’s very serious. If you’re talking about sensitive information – it’s wide open now.”
Gold Line claims that between 2,000 and 3,000 hackers, including security organizations, have taken a crack at breaking its system. The company bumped the prize from $100,000 to $250,000 in November, and renewed the challenge recently.

Final deadline for breaking the Gold Lock 3G system: February 1, 2010.

All hackers have to do is unscramble a Gold Lock-encrypted conversation that the company intercepted and recorded using commonly available call sniffer technology and posted at its Web site.
(To find out how to participate, see this page at the company’s site.)
On the line
There’s more at stake here than cash, of course. There’s also Gold Line’s reputation.
If someone does decrypt the conversation, the company will have egg on its face – although Haskins tries to spin it otherwise.
“If it happens, [it means] there’s one really smart guy out there – and a lot of hackers are really smart,” he concedes.
“I think if it does happen, the way we look at it is that it gives us the opportunity to make [Gold Lock 3G] that much better. We already have by far the best product out there. We not only have the confidence to issue this challenge, but we’re prepared to take [it] even a step higher.”
Haskins says Gold Lock 3G is superior to comparable products from competitors, such as Cellcrypt because it uses a unique three-layer system.
It starts with automatic handshaking between devices using Diffie–Hellman key exchange protocols. Then the software uses the same AES-256 (Advanced Encryption Standard) used by the U.S. government for top secret communications. Finally, it re-encrypts the already encrypted data using 384-bit Elliptic curve cryptography (ECC).
“It’s just off the charts,” Haskins says of the effort that would be required to break the system. “Even if you could break AES-256, then you’d have to work on the 384-bit [ECC].”
The company claims an independent auditor estimated it would take hundreds of years to break the system using brute strength methods. But encryption systems have been broken before using cleverer techniques.
Are hacker challenges like Gold Line’s anything more than flimsy publicity stunts? How legitimate are they really?
For example, to what extent does putting a four-month time limit on the challenge tilt the board in the developer’s favor. After all, if some cyber snoop breaks the system on February 2, the implications for users relying on the product are just as dire – but with no negative publicity.
And notwithstanding the very attractive prize, has the challenge really brought all the best talent out of the woodwork? Would criminal hackers, for example, risk registering with Gold Line to participate?
And then too, how would we ever know if somebody actually succeeded in breaking the Gold Lock system? Isn’t it possible Gold Line would decide to just pay off the winner and keep it quiet while it fixed the vulnerability?
Certainly the company wouldn’t be stupid enough to stiff a successful hacker, Haskins says. For one thing, participants in effect enter into a contract with the company. Besides, it would be too easy for the person to go public with the information and embarrass Gold Line even more.
“It would cause more damage to try and hide the fact than it would to admit it and fix the product,” he says.
But couldn’t Gold Line make them sign a non-disclosure agreement to get their loot and keep it all on the QT?

Yet another scary thought: if a criminal hacker did participate and succeed, might they decide the information was more valuable on the black market? How much would Al-Qaeda or the Iranian secret service pay to be able to eavesdrop on the Israeli military?

Gerry Blackwell is a veteran technology journalist who writes from Canada, Italy, and Spain

Import Orkut Birthdays to Google Calender

I was just wondering whether I could get all my Orkut friends birthday notifications in google calendar so I did a Google search for it.  I turned out that @labnol had an excellent post on it. So I am just linking to the post instead of copying and pasting it.

To add orkut friends birthdays to your google calender you can click here [this link will automatically add your friends’ birthdays to your Google calender] or visit labnol’s post here.

http://technotricks.files.wordpress.com/2008/03/orkut.jpg http://z.about.com/d/diyfashion/1/0/O/6/-/-/Arrow.JPG http://thomasbarszcz.files.wordpress.com/2009/01/google-calender.jpg

While most Orkut users will definitely find the calendar feature useful, there’re limitations. You can neither subscribe to Orkut birthday notifications in Google Calendar via SMS or email, nor do they provide an XML or ICAL feed for the Orkut calendar so you can’t import birthday notification into other calendar systems.

The only workaround is Google Calendar Sync that will help you import Orkut birthdays into Microsoft Outlook calendar from where you can copy the events into other calendars.

Thanks to Amit Agarwal aka @labnol

E63 essential keybord shortcuts

I recently had bought an E 63. I like my phone very much but the major issue that I faced was of selecting multiple files. Everytime I had to do so I had to go through the options menu and then one fine day [err night] while playing with the keyboard I found some shortcuts which I am listing here. [I read the manuals when all else fails 😉 ].

Nokia E63

Shift+Enter to Mark/Unmark files or sms or such things.

Ctrl+Shift Toggles predictive text input.

Shift+Backspace To delete charachter after cursor.

Ctrl+Up/Down To jump paragraphs.

Ctrl+Left/Right To jump per word.

To select multiple objects that are in continous order just Shift+Up/Down depending on your requirement.

If you know of more useful shortcuts please leave a comment.

College to corporate

I am a B school student and as all of us know that the B schools host numerous guest lectures for their students which helps them get the insights of the industry and the corporate world throught the visiting guest who have been very good at doing what they do. Eminent personalities come and speak in the guest lecture about various technologies, methodologies, frameworks, designs, procersses, leadership, entrepreneurship and what not. We have had lot many of such lectures but this one by the Chief Administrative Officer and Head HT of Avaya Global Connect Mr. Abhay Valsangkar. He shared with us his experiences and learnings and the way he put forward the things was very practical. I was fortunate enough to present in the guest lecture and taking the advantage of the situation recorded it and am presenting it to you all.
Please listen to it and let us know of your feedback.

I am a B school student and as all of us know that the B schools host numerous guest lectures for their students which helps them get the insights of the industry and the corporate world throught the visiting guest who have been very good at doing what they do. Eminent personalities come and speak in the guest lecture about various technologies, methodologies, frameworks, designs, procersses, leadership, entrepreneurship and what not. We have had lot many of such lectures but this one by the Chief Administrative Officer and Head HT of Avaya Global Connect Mr. Abhay Valsangkar. http://pcquest.ciol.com/2008/images/secure2_nov2k8.jpgHe shared with us his experiences and learnings and the way he put forward the things was very practical. I was fortunate enough to present in the guest lecture and taking the advantage of the situation recorded it and am presenting it to you all.

Audio link

College to Corporate

Please listen to it and let us know of your feedback.

[Will be adding the streaming in some time. Till then plz bear with the download.]

Happy New Year

happy_new_year

Looking back on the months gone by,
As a new year starts and an old one ends,
We contemplate what brought us joy,
And we think of our loved ones and our friends.

Recalling all the happy times,

Remembering how they enriched our lives,
We reflect upon who really counts,
As the fresh and bright new year arrives.

And when we ponder those who do,

We immediately think of you.

Thanks for being one of the reasons We’ll have a Happy New Year!

By Joanna Fuchs

Fascinated by smoking?

The world’s view on smoking cigarettes has changed dramatically over the last century. The habit was once considered to be cool, sexy, good for your health, and widely enjoyed by many people. It was promoted by sportsmen, and advertised all over television. No one could be seen acting in a movie without a lit cigarette in their hand! Today, smoking is considered to be a nasty addictive habit that can kill you and those around you. You wont find them advertised anywhere – nor will you see anyone smoking inside a public building. It seems that these days smokers are considered to be anti-social and are often frowned at if seen smoking outside in crowded places. Below is a list of interesting facts about cigarettes.

1

Facts 1 – 5

Cigarettes Upclose-1

1. Cigarettes are the single-most traded item on the planet, with approximately 1 trillion being sold from country to country each year. At a global take of more than $400 billion, it’s one of the world’s largest industries.

2. The nicotine content in several major brands is reportedly on the rise. Harvard University and the Massachusetts Health Department revealed that between 1997 and 2005 the amount of nicotine in Camel, Newport, and Doral cigarettes may have increased by as much as 11 percent.

3. In 1970, President Nixon signed the law that placed warning labels on cigarettes and banned television advertisements for cigarettes. The last date that cigarette ads were permitted on TV was extended by a day, from December 31, 1970 to January 1, 1971 to allow the television networks one last cash windfall from cigarette advertising in the New Year’s Day football games.

4. U.S. cigarette manufacturers now make more money selling cigarettes to countries around the globe than they do selling to Americans.

5. The American brands Marlboro, Kool, Camel and Kent own roughly 70% of the global cigarette market.

2

Facts 6 – 10

7.2Cigarettes

6. Cigarettes contain arsenic, formaldehyde, lead, hydrogen cyanide, nitrogen oxide, carbon monoxide, ammonia and 43 known carcinogens.

7. In the early 1950s, the Kent brand of cigarettes used crocidolite asbestos as part of the filter, a known active carcinogen.

8. Urea, a chemical compound that is a major component in urine, is used to add “flavor” to cigarettes.

9. The ‘Cork Tip’ filter was originally invented in 1925 by Hungarian inventor Boris Aivaz, who patented the process of making the cigarette filter from crepe paper. All kinds of filters were tested, although ‘cork’ is unlikely to have been one of them.

10. In most countries around the world, the legal age for the purchase of tobacco products is now 18, raised from 16, while in Japan the age minimum is 20 years old.

3

Facts 11 – 15

Cigarettes Money

11. Contrary to popular social belief, it is NOT illegal to smoke tobacco products at any age. Parents are within the law to allow minors to smoke, and minors are within the law to smoke tobacco products freely. However, the SALE of tobacco products is highly regulated with legal legislation.

12. Smoking bans in many parts of the world have been employed as a means to stop smokers smoking in public. As a result, many social businesses have claimed a significant drop in the number of people who go out to pubs, bars and restaurants.

13. Scientists claim the average smoker will lose 14 years of their life due to smoking. This however does not necessarily mean that a smoker will die young – and they may still live out a ‘normal’ lifespan.

14. The U.S. states with the highest percentage of smokers are Kentucky (28.7%), Indiana (27.3%), and Tennessee (26.8%), while the states with the fewest are Utah (11.5%), California ( 15.2%), and Connecticut (16.5%).

15. Cigarettes can contain more than 4,000 ingredients, which, when burned, can also produce over 200 ‘compound’ chemicals. Many of these ‘compounds’ have been linked to lung damage.

4

Facts 16 – 20

Obama-Smoking

16. The United States is the only major cigarette market in the world in which the percentage of women smoking cigarettes (22%) comes close to the number of men who smoke (35%). Europe has a slightly larger gap (46% of men smoke, 26% of women smoke), while most other regions have few women smokers. The stats: Africa (29% of men smoke, 4% of women smoke); Southeast Asia (44% of men, 4% of women), Western Pacific (60% of men, 8% of women)

17. Nicotine reaches the brain within 10 seconds after smoke is inhaled. It has been found in every part of the body and in breast milk.

18. Sugar approximates to roughly 20% of a cigarette, and many diabetics are unaware of this secret sugar intake. Also, the effect of burning sugar is unknown.

19. ‘Lite’ cigarettes are produced by infusing tobacco with CO2 and superheating it until the tobacco ‘puffs up’ like expanding foam. The expanded tobacco then fills the same paper tube as ‘regular’ tobacco.

20. Smokers draw on ‘lite’ and menthol cigarettes harder (on average) than regular cigarettes; causing the same overall levels of tar and nicotine to be consumed.

5

Facts 21 – 25

Monica Bellucci025

21. ‘Lite’ cigarettes are manufactured with air holes around the filter to aerate the smoke as it is drawn in. Many smokers have learned to cover these holes with their fingers or their lips to get a stronger hit.

22. The immune systems of smokers has to work harder every day than non-smokers. As a result, a smokers’ blood will contain less antioxidants, although a smokers immune system may be quicker to respond to virus attacks due to its more active nature.

23. Smokers often smoke after meals to ‘allow food to digest easier’. In fact, this works because the bodies priority moves away from the digestion of food in favor of protecting the blood cells and flushing toxins from the brain.

24. Some people (mostly males) can be aroused by the sight of smoker smoking (usually females). This is called the Smoking Fetish, and affects a small number of the population. As with most fetishes, the reason for this arousal can usually be traced back to incidents in childhood. However, cigarettes – particularly menthols, force blood away from the penis if smoked while aroused.

25. According to the World Health Organization, approximately 25% of cigarettes sold around the world are smuggled.

6

Facts 26 – 30

S Cigarettes4

26. Most smokers take up the habit in their mid teens, well before the legal age for purchasing them, and is seen as a right of passage towards adulthood. Other perceived rights of passage include: aftershave, wearing stilettos, alcohol, drugs and sexual intercourse; with a combination of these sometimes being cited as the main causes of teenage pregnancy.

27. Smoking tobacco is the ultimate gateway drug in that it is legally available, and involves mastering a unique method of intake – much more so than alcohol (which has such a significant effect that users need look no further for stimulation). Smokers looking to get ‘high’ will very rarely do so from cigarettes after the initial stages of taking up the habit.

28. Smokers generally report a variety of after-effects; such as calmness, relaxation, alertness, stimulation, concentration and many others. In fact, smoking will produce a different effect in each individual depending on ‘what they expect to get’; turning the cigarette into the worlds most popular placebo (satisfying the brains hunger for nicotine being the only ‘relaxing’ factor). The smoker will then use these expectations as a means to continue the habit.

29. Several active ingredients and special methods of production are involved in making sure the nicotine in a cigarette is many times more potent than that of a tobacco plant.

30. ‘Toppings’ are added to the blended tobacco mix to add flavor and a taste unique to the manufacturer. Some of these toppings have included; clove, licorice, orange oil, apricot stone, lime oil, lavender oil, dill seed oil, cocoa, carrot oil, mace oil, myrrh, beet juice, bay leaf, oak, rum, vanilla, and vinegar.

sourced from Listverse

Twitter – forbidden passwords

Below this text is a list of passwords not accepted by Twitter in their signup process. The list is copied from the HTML source at https://twitter.com/signup. You might call it the flip side of a dictionary attack, a list of common passwords that they won’t let you use, perhaps because they detected attacks trying to hack accounts with these passwords.

They’re not the only bad passwords out there, but you’d probably do well to avoid all these for other services as well.

111111dakotamavericksophie
112233dallasmaxwellspanky
121212danielmelissasparky
123123daniellememberspider
123456debbiemercedessquirt
1234567dennismerlinsrinivas
131313diablomichaelstartrek
232323diamondmichellestarwars
654321doctormickeysteelers
666666doggiemidnightsteven
696969dolphinmillersticky
777777dolphinsmistressstupid
7777777donaldmonicasuccess
8675309dragonmonkeysummer
987654dreamsmonkeysunshine
aaaaaadrivermonstersuperman
abc123eagle1morgansurfer
abc123eaglesmotherswimming
abcdefedwardmountainsydney
abgrtyueinsteinmuffintaylor
accesseroticmurphytennis
access14extrememustangteresa
actionfalconnakedtester
albertfendernascartesting
alexisferrarinathantheman
amandafirebirdnaughtythomas
amateurfishingncc1701thunder
andreafloridanewyorkthx1138
andrewflowernicholastiffany
angelaflyersnicoletigers
angelsfootballnippletigger
animalforevernipplestomcat
anthonyfreddyolivertopgun
apollofreedomorangetoyota
applesgandalfpackerstravis
arsenalgatewaypanthertrouble
arthurgatorspantiestrustno1
asdfghgeminiparkertucker
asdfghgeorgepasswordturtle
ashleygiantspasswordtwitter
augustgingerpassword1united
austingoldenpassword12vagina
badboygolferpassword123victor
baileygordonpatrickvictoria
bananagregorypeachesviking
barneyguitarpeanutvoodoo
baseballgunnerpeppervoyager
batmanhammerphantomwalter
beaverhannahphoenixwarrior
beavishardcoreplayerwelcome
bigdaddyharleypleasewhatever
bigdogheatherpookiewilliam
birdiehelpmeporschewillie
bitcheshockeyprincewilson
bitemehootersprincesswinner
blazerhorneyprivatewinston
blondehotdogpurplewinter
blondeshunterpussieswizard
bond007huntingqazwsxxavier
bonnieicemanqwertyxxxxxx
boobooiloveyouqwertyuixxxxxxxx
boogerinternetrabbityamaha
boomeriwanturachelyankee
bostonjackieracingyankees
brandonjacksonraidersyellow
brandyjaguarrainbowzxcvbn
bravesjasminerangerzxcvbnm
braziljasperrangerszzzzzz
broncojenniferrebecca
broncosjeremyredskins
bulldogjessicaredsox
busterjohnnyredwings
butterjohnsonrichard
buttheadjordanrobert
calvinjosephrocket
camarojoshuarosebud
cameronjuniorrunner
canadajustinrush2112
captainkillerrussia
carlosknightsamantha
carterladiessammy
casperlakerssamson
charleslaurensandra
charlieleathersaturn
cheeselegendscooby
chelsealetmeinscooter
chesterlittlescorpio
chicagolondonscorpion
chickenloverssecret
cocacolamaddogsexsex
coffeemadisonshadow
collegemaggieshannon
compaqmagnumshaved
computermarinesierra
cookiemarlborosilver
coopermartinskippy
corvettemarvinslayer
cowboymastersmokey
cowboysmatrixsnoopy
crystalmatthewsoccer

How brain stores memories

http://skynetcommunications.net/images/brain.gifScientists at the University of California Santa Barbara have discovered how the brain encodes memories.
According to researchers, the finding could eventually lead to the development of new drugs for diseases like Alzheimer’s.
The researchers have uncovered a central process in encoding memories that occurs at the level of the synapse, where neurons connect with each other.
“When we learn new things, when we store memories, there are a number of things that have to happen,” said senior author Kenneth S. Kosik, co-director and Harriman Chair in Neuroscience Research, at UCSB”s Neuroscience Research Institute.
“One of the most important processes is that the synapses — which cement those memories into place — have to be strengthened.
“In strengthening a synapse you build a connection, and certain synapses are encoding a memory. Those synapses have to be strengthened so that memory is in place and stays there. Strengthening synapses is a very important part of learning. What we have found appears to be one part of how that happens,” Kosik added.
Part of strengthening a synapse involves making new proteins. Those proteins build the synapse and make it stronger. Just like with exercise, when new proteins must build up muscle mass, synapses must also make more protein when recording memories. In this research, the regulation and control of that process was uncovered.
The production of new proteins can only occur when the RNA that will make the required proteins is turned on. Until then, the RNA is “locked up” by a silencing molecule, which is a micro RNA. The RNA and micro RNA are part of a package that includes several other proteins.
“When something comes into your brain — a thought, some sort of stimulus, you see something interesting, you hear some music — synapses get activated,” said Kosik.
The expert added: “What happens next is really interesting, but to follow the pathway our experiments moved to cultured neurons. When synapses got activated, one of the proteins wrapped around that silencing complex gets degraded.”
When the signal comes in, the wrapping protein degrades or gets fragmented. Then the RNA is suddenly free to synthesize a new protein.
“One reason why this is interesting is that scientists have been perplexed for some time as to why, when synapses are strengthened, you need to have proteins degrade and also make new proteins,” said Kosik.
“You have the degradation of proteins going on side by side with the synthesis of new proteins. So we have now resolved this paradox. We show that protein degradation and synthesis go hand in hand. The degradation permits the synthesis to occur. That”s the elegant scientific finding that comes out of this,” Kosik added.
The scientists were able to see some of the specific proteins that are involved in synthesis.
One of the approaches used by the scientists in the experiment was to take live neuron cells from rats and look at them under a high-resolution microscope. The team was able to see the synapses and the places where proteins are being made.

The study has been published in the December 24 issue of the journal Neuron.