Your Ad Here

Friday, January 22, 2010

Apple's Cease-and-Desist Letter Wins Tablet Prize


Silicon Valley's ValleyWag offered cash for evidence of Apple, Inc.'s tablet computer, but instead got a cease-and-desist letter from Apple's lawyer. Aha! ValleyWag said, the letter "proves" the tablet exists and sent Apple's lawyer a prize that includes "fabulous" steak knives. But Apple may not think the joke funny, and it could sue.
Always up for tweaking the breathless blogging that passes for technology journalism in Silicon Valley, ValleyWag this week offered to put up some real money if anyone could provide concrete evidence of the tablet computer that most Apple watchers expect CEO Steve Jobs to unveil at a Jan. 27 press happening in San Francisco.
"We've had enough of trying to follow all the speculation around Apple's impending tablet," ValleyWag's Gabriel Snyder wrote in a blog post announcing the Apple Tablet Scavenger Hunt. "If you can find the first genuine photos, video or -- the holy grail -- the actual messiah machine itself before then and they're exclusive to us, we'll give you a cash prize." The post offered $10,000 for bona-fide pictures, $20,000 for videos, $50,000 for images of Steve Jobs using the device, and $100,000 "to let us play with it for an hour."
After receiving a cease-and-desist letter from the Silicon Valley law firm of Orrick, Huntington and Sutcliffe, ValleyWag has declared the firm the winner of the contest, saying the letter confirms the existence of the tablet.

Illegal Inducement?
"You call this the 'scavenger hunt,'" but Apple calls it "offering a bounty for the theft of Apple's trade secrets," attorney Michael C. Spillner wrote. "Such an offer is illegal and Apple insists that you immediately discontinue the scavenger hunt."
ValleyWag's tongue-in-cheek response: The letter "is the most concrete evidence (from Apple itself, no less!) yet that there may indeed be a tablet in the works. Granted, it's no photo of Steve Jobs holding his heavenly device himself (prize: $50,000), but we do feel like it merits some kind of reward," Snyder wrote. The site claims it sent Spillner his reward: a DVD of Legally Blonde 2, a $25 Zune Marketplace gift card, and a "fabulous set of steak knives!"
Far from agreeing to suspend the contest, ValleyWag merely admonished people to stay within the boundaries of the law and "use anonymous e-mail addresses! We can't tell Apple who you are if we don't know who you are."
Strict Confidence
That's exactly the sort of thing that Apple's lawyers say is encouragement of illegal behavior: "Apple has maintained the types of information and things you are soliciting -- 'how it'll work, its size, the name, the software,' as well as any further details about the product's appearance, features and physical appearance -- in strict confidence."
Since anyone with knowledge would be under nondisclosure agreements, ValleyWag's offer constitutes inducing a misappropriation of trade secrets in violation of California law, the letter says.
Besides protecting legal interests, does this letter confirm the existence of the tablet? Despite ValleyWag's insistence, it probably doesn't.
The letter doesn't say there is a tablet; it says that ValleyWag is inducing people under legal obligation to keep quiet to spill the beans, which is a violation of law. Regardless of the existence of the tablet, or what happens on Jan. 27, Apple could sue ValleyWag parent Gawker for this behavior unless it stops.
Even so, the letter does seem sensitive to the risk of a leak, even just a few weeks before Apple's planned event. So it may in fact qualify as an indication, but hardly a smoking gun.

Microsoft New Mouse Devices Announced



Microsoft Unveils BlueTrack Tracking Technology - New Mouse Devices Announced

Microsoft Corp. today unveiled the world's most advanced tracking technology, Microsoft BlueTrack Technology, which allows consumers to take their mice anywhere and work with confidence on more surfaces than before.
Microsoft's new proprietary tracking technology combines the width and power of optical technology with the precision of laser tracking to allow consumers to mouse on virtually any surface — from a granite kitchen countertop to the living room carpet. BlueTrack Technology will debut in two new top-of-the-line mice, Microsoft Explorer Mouse and Microsoft Explorer Mini Mouse, available this fall at BestBuy.com and in Best Buy stores.
Microsoft Hardware: History of Leadership
Microsoft Hardware has consistently raised the bar in mouse tracking technology throughout its 26-year history, including the launch of the world's first optical mouse in 1999. The LED light and sensor allowed consumers to mouse on more surfaces with ease, eliminating the old "ball" mouse for good. In 2005, Microsoft introduced High Definition Laser Technology, which allowed mice to work on many surfaces that optical technology did not. But now Microsoft's in-house engineers have taken mouse tracking to the next level, creating an exclusive, groundbreaking technology to advance the way consumers use their computer mice.
"Research shows that people aren't sitting at a desk all day, but they've gone mobile. In fact, 72 percent of PCs sold are notebook PCs, and consumers need a mouse that can go with them anywhere," said Mark DePue, platforms engineering manager at Microsoft and co-inventor of BlueTrack Technology. "BlueTrack Technology excels in areas where optical and laser technologies were falling short. Laser mice, for example, have a difficult time working on some common home surfaces, including granite and marble."
According to David Bohn, senior engineering architect at Microsoft and BlueTrack Technology co-inventor, "Laser technology is also sensitive to dust and dirt accumulation during travel, which can lead to poor tracking performance. With BlueTrack Technology you can rest easier about where your mouse will or won't track — it works just about everywhere, just like you."
Under the Hood
Microsoft's BlueTrack Technology works on more surfaces than both optical and laser mice. The large, blue beam and specular optics architecture, in conjunction with a Microsoft-designed image sensor and proprietary pixel geometry, generates a high-contrast picture of the mousing surface that allows exceptional tracking accuracy. The BlueTrack Technology light beam emanating from the bottom of the mouse is more than four times as large as the average laser beam used in today's mice, enabling reliable mouse tracking even on difficult surfaces such as carpet.
This advanced technology creates a superior, more precise picture of the surface, allowing consumers to use their mouse virtually anywhere. To see a video on the making of BlueTrack Technology and meet the inventors, consumers can visit http://www.microsoft.com/hardware/bluetrack.
Explorer Mouse and Explorer Mini Mouse
BlueTrack Technology will debut in two new high-end Microsoft mouse products this fall — the full-size Explorer Mouse and the smaller Explorer Mini Mouse. These mice pair revolutionary tracking technology with a sophisticated design that brings the mice to life. A chrome trim and blue lighting around the bottom rim of the mouse create a soft glow and set the device apart from anything else on the market. A right-handed, ergonomist-approved design offers hours of comfortable use, and 2.4GHz wireless technology delivers a reliable connection up to 30 feet away. The snap-in minitransceiver offers easy storage and mobility, allowing consumers to take their full-size mouse with them wherever they need it.
The full-size Explorer Mouse features easy recharging with a battery status indicator and a small charging base, while the Explorer Mini Mouse uses two AA batteries.
Availability
The Explorer Mouse with BlueTrack Technology and the Explorer Mini Mouse with BlueTrack Technology will be available at BestBuy.com and Best Buy stores in November for the estimated retail price of $99.95 and $79.95 (U.S.), respectively.
"At Best Buy we offer our customers the latest and greatest in consumer technology," said Steve Guild, senior merchant, computing peripherals at Best Buy. "We are excited to enter into our relationship with Microsoft BlueTrack Technology, as the products truly map to where our customers are using their computers — everywhere."
Both mice will be backed by a worldwide three-year limited hardware warranty from Microsoft.

Gigapixel Sky CameraCameraCamera


Forget Megapixels: Here Comes the Gigapixel Sky Camera


To help Earth’s inhabitants avoid the fate of the dinosaurs and the Clovis people, researchers with the Panoramic Survey Telescope and Rapid Response System (Pan-Starrs) have developed the world’s largest digital camera, which can capture 1.4 billion pixels, to scan the skies for approaching asteroids or comets. The camera is scheduled to begin its search this month with the Pan-Starrs-1 telescope in Haleakala, Hawaii
Pan-Starrs will repeatedly scan the same portions of the sky to look for changes, such as the supernova discovered during the telescope’s test runs last fall. And if an asteroid is detected hurtling toward Earth Scientists and engineers are still working on ways to use spacecraft to alter its orbit

LEDs Light Times Square, But Can They Light Your Office?

LEDs Light Times Square, But Can They Light Your Office?
The invention of the bright-white light-emitting diode (LED) in the 1990s marked the beginning of a revolution in lighting. Cheap, long-lasting, and needing little power, bright LEDs are increasingly the light source of choice for flashlights, traffic signs, even the brilliant marquees in places like New York City’s Times Square. They are also used to illuminate the picture in some large-screen TVs. But LEDs still have not made much headway in our homes and offices, where the general lighting provided by incandescents and fluorescents is still superior.
Part of the reason is that individual LEDs are typically quite small; the surface area of the semiconductor material that emits light is only about one square millimeter. As a consequence, a bright LED, of the kind found in a flashlight, might produce 80 lumens (a lumen is a standard measure of how powerful a light source appears). A 100-watt incandescent bulb, in contrast, typically emits about 1,500 lumens. To approach this level of brightness, lighting manufacturers have arranged LEDs in arrays, which is a bulky solution at best. Some have made individual small LEDs as bright as 1,000 lumens, but these are expensive and still function best as spotlights, not as area lighting for a room.
Now Luminus Devices hopes to break into the general lighting realm with its LED PhlatLight. Derived from research the firm’s founders did at MIT, the PhlatLight is a much bigger LED, with a light-emitting area of 12 square milli­meters. A single such LED can generate up to 3,300 lumens. PhlatLights have already been used to backlight large LCD screens, replacing the necessary thousands of LEDs with a few dozen

23 Best Hacking Videos Mediafire Links

23 Best Hacking Videos [High Quality Videos]
Part 1
Siffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Buffer Overflows Pt. 3 by IDESpinner
Buffer Overflows Pt. 2 by IDEspinner
Part 2
Breaking WEP in 10 minutes
DoS attack against Windows FTP Server
How to sniff around switches using Arpspoof and Ngrep!
Part 3
Buffer Overflows pt1
Feauture Addition pt 1
Feauture Addition pt 2
DNS Poison Routing
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit Client Side Attack (lo-Res)
MITM Hijacking
Sniffing logins and Passwords
Part 4
Sniffing Remote Router Traffic via GRE Tunnels (lo-res)
A Penetration Attack Reconstructed
Telnet Bruteforce
Tunneling Exploits through SSH
Bluesnarfing a Nokia 6310i hand set
Start a session and get the interactive commandline access to a remote windows box!
Use Brutus to ***** a box running telnet!
Cain to ARP Poison and sniff passwords!


http://rapidshare.com/files/247247021/23.B.H.Videos_hvanhtuan.part1.rar
http://rapidshare.com/files/247246997/23.B.H.Videos_hvanhtuan.part2.rar
http://rapidshare.com/files/247246900/23.B.H.Videos_hvanhtuan.part3.rar
http://rapidshare.com/files/247246764/23.B.H.Videos_hvanhtuan.part4.rar


http://www.megaupload.com/?d=WEX8PTG9
http://www.megaupload.com/?d=V7H5M30N
http://www.megaupload.com/?d=21NP7GW5
http://www.megaupload.com/?d=6NZWQD2T


http://uploading.com/files/YPHB74XH/23.B.H.Videos_hvanhtuan.part1.rar.html
http://uploading.com/files/78D430ON/23.B.H.Videos_hvanhtuan.part2.rar.html
http://uploading.com/files/583XC36Z/23.B.H.Videos_hvanhtuan.part3.rar.html
http://uploading.com/files/XB7ETQ31/23.B.H.Videos_hvanhtuan.part4.rar.html


http://hotfile.com/dl/7370150/19e874f/23.B.H.Videos_hvanhtuan.part1.rar.html
http://hotfile.com/dl/7370595/5c46de5/23.B.H.Videos_hvanhtuan.part2.rar.html
http://hotfile.com/dl/7370903/e9f0dd6/23.B.H.Videos_hvanhtuan.part3.rar.html
http://hotfile.com/dl/7371145/a2ec955/23.B.H.Videos_hvanhtuan.part4.rar.html


http://depositfiles.com/files/2thq7b071
http://depositfiles.com/files/kc9x0rnd4
http://depositfiles.com/files/78rop30fu
http://depositfiles.com/files/ysr59yaq2


http://www.easy-share.com/1906010755/23.B.H.Videos_hvanhtuan.part1.rar
http://www.easy-share.com/1906010733/23.B.H.Videos_hvanhtuan.part2.rar
http://www.easy-share.com/1906010712/23.B.H.Videos_hvanhtuan.part3.rar
http://www.easy-share.com/1906010757/23.B.H.Videos_hvanhtuan.part4.rar


http://mega.1280.com/file/7OLZNLIV
http://mega.1280.com/file/4ICON42H
http://mega.1280.com/file/WGETX2R7
http://mega.1280.com/file/8KX0OEYD


http://www.mediafire.com/?eztwmbkn5d5
http://www.mediafire.com/?nkm2ztommn5
http://www.mediafire.com/?i40ymjyio5y
http://www.mediafire.com/?znywemyrwtl
 

Thursday, January 21, 2010

Lock or hide private folder in windows without software

Many times you face this situation; you want to hide some personal data from the other person using your computer. However most of the person uses any software for that which can be troublesome sometime. So here is the trick to lock any folder in windows without any software.
Suppose you want to lock the folder “hitman” in C: drive.
The path for the folder is C:\games\hitman.
Go to C:\games the create a text file and type command
ren hitman hitman.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as hide.bat

Create another text file and type in it
ren hitman.{21EC2020-3AEA-1069-A2DD-08002B30309D} hitman
Now save this text file as show.bat

Now you can see 2 batch files “hide” and “show”.

Press “hide” and the folder hitman will change to control panel and you cannot view its contents. Press “show” and you will get back your original folder.
You can move this folder to anywhere on your drives. But make sure you click on “hide” or “show” file when it is placed in C:\games; else it wont work. Always remember the folder is to be locked and "show" and "hide" files should be in same folder at the time of using them, after use you can move it.

Note: To rename your text files as bat files?
Just go to my computer->tools->folder options->go to the view tab.
Now uncheck the 'Hide extensions for known file types' then click apply.

Now rename your text files as bat files.

Bluejacking

Bluejacking sending messages over Bluetooth to Bluetooth-enabled devices 
“Bluejacking” is define as sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, Laptops, sending a contact which typically contains a message in the name field to another bluetooth enabled device via the OBEX protocol.
Few prople say the term “Bluejacking” originated with a user named ajack on esato.com. Some people say that the term bluejacking comes from Bluetooth and hijacking. While that certainly sounds logical, a bluejacker doesn't hijack anything, he just send a contact to the recipient's device. Both parties have absolute control over their devices, and a bluejacker will not be able to take control of your phone or steal your personal information.
You can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone. So, personalised messages like 'I like your pink top' and the startled expressions that result is where the fun really starts.
Bluejacking is quite harmless, but because bluejacked people don't know what is happening, they think their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well.
But with the increase in the availability of bluetooth enabled devices, these devices have become vulnarable to virus attacks and even complete take over of devices through a trojan horse program.
Bluejacking Process
  •    Go to Contacts.
  • Create a new contact.
  • Write the short message you want to send on the line next to 'Last name'
  • Save this contact.
  • Select this contact and send via Bluetooth.
  • Your phone will search for devices
  • All the Bluetooth devices near you will be displayed.
  • Select any one you like and send.
  • You have bluejacked someone.
You can also send pictures to your victim by adding them to your bluejack contact. The best thing about this is even if the victim rejects the contact that you sent him/her, the picture gets automatically saved in the victim's My Pictures section.
Note:
It is not that interesting after 2 or 3 trials. Its just a prank. Do NOT harass anyone with this. Be careful at some places and with some peoples, especially in airports where the tolerance level is very low. Also don't send threatening messages. Technically you cannot be traced, but if the victim notices you behaving in a suspicious way with your mobile phone in your hand, you better run for your life.