Add

Friday, November 6, 2009

Google is trying not to be creepy.

Google is trying not to be creepy.

That's according to CEO Eric Schmidt, who told Fox Business Thursday that "we're trying not to cross what we call the creepy line" when it comes to the data it gathers. As an example, Schmidt said Google only publishes satellite data that is a month old, indicating that Google would consider it creepy to publish real-time satellite data.

Google is quite used to facing charges that it has become a little too Big Brotherish in its conquest of the Internet search market. In response, it emphasizes that Google users have control over the data the company collects on them, most recently introducing Google Dashboard as a way of letting users see all the personal data the company has assembled in a single Web page.

That will likely never be enough to satisfy the hardcore privacy advocates of the world, but the general public--and the government--are also starting to get a little uneasy about Google's unparalleled reach across the Internet.

In the interview, Schmidt also said that Google had to avoid the "mistakes" made by Microsoft that led to its prosecution by the U.S. government. But Google also has to be wary about how aggressively it courts favor with the Obama administration, he said: Schmidt is a technology adviser to the administration.

"You don't want to be too close to any particular administration, and they don't want to be too close particularly to you," Schmidt said. That drew a dry retort from Fox Business' Neil Cavuto, who said, "Well, take it from us here at Fox, that's not a worry."

Source:www.cnet.com

Thursday, October 29, 2009

Intel Software Developer Supercomputing Conference

Defying constant changes in the economic climate, Intel hosts the first of its kind – Software Developer Supercomputing conference in India. The conference promises to build a diverse community of participants including researchers, scientists, computing center staff members, IT and data center management, application developers, computer manufacturing personnel, program managers, journalists and congressional staffers. This diversity will be one of the conference's main strengths, making it a yearly "must attend" forum for stakeholders throughout the technical computing community in India.

Over the next 5 years we expect our community to play an important role in leading the mainstream of computing into an era of parallelism. Many of the new developments in reconfigurable architectures, memory technologies, languages and tools, real-time high performance computing and other core technologies will debut at the conference. Don't miss this annual opportunity to meet with industry and research leaders.

Be part of this unique forum that will provide you insights and information on computing for a changing world.

You don’t want to be left behind.
Venue
City: Bangalore
Date: 12th November 2009
Venue: Royal Orchid Hotel, Old Airport Road
Time: 9 am to 1 pm (with lunch)

City: Hyderabad
Date: 13th November 2009
Venue: Katriya Hotel, Raj Bhavan Road
Time: 9 am to 1 pm (with lunch)

City: Chennai
Date: 9th November 2009
Venue: Taj Coromandel, Nungambakkam
Time: 6 pm to 9 pm (with dinner)

RSVP
Hema – +919741300651
e-mail: intelevents@
softwareconferenceindia.com

Friday, October 9, 2009

Web of Trust extension comes to Chrome

Google's browser now has an extension to use the Web of Trust, a project that lets people rate the trustworthiness of Web sites and see how others have rated them.

The open-source plug-in previously worked only with Firefox and Internet Explorer, but now a version is available for the new developer preview version of Chrome, according to a blog post.

The Web of Trust extension lets people rate Web pages. Clicking an icon in the lower left corner of Chrome pops up this interface.

The Web of Trust extension lets people rate Web pages. Clicking an icon in the lower left corner of Chrome pops up this interface.
(Credit: Screenshot by Stephen Shankland/CNET

It's one of a host of relatively widely used extensions available on other browsers but now on their way to Chrome, whose extensions framework is just getting off the ground. There also are extensions (called add-ons in the Firefox realm) for Delicious and Xmarks, for example.

The extension takes advantage of the newer "mole" feature that lets windows pop up from the bottom of the screen. (The "mole" term originated with the work Google's Gmail team on instant-message windows; closing a number of them is like playing Whack-a-Mole.) However, Web of Trust programmers are considering using a newer extensions possibility called browser actions, which builds an extension interface into a button that appears along the top of the Chrome window.

"Browser Actions look promising though and we're looking forward to using them in future," said programmer Sami Tolvanen in a mailing list announcement. He also offered a list of suggestions for the Chrome extensions interface.

Separately, Google announced a new developer preview version, Chrome 4.0.221.6 for Windows and 4.0.221.8 for Mac OS X. In the Windows version is a new browser action feature, pop-up windows.

Thanks:http://news.cnet.com/8301-30685_3-10370777-264.html?tag=newsEditorsPicksArea.0

Wednesday, September 30, 2009

Banking Trojan steals money from under your nose

Researchers at security firm Finjan have discovered details of a new type of banking Trojan horse that doesn't just steal your bank log in credentials but actually steals money from your account while you are logged in and displays a fake balance.

The bank Trojan, dubbed URLzone, has features designed to thwart fraud detection systems which are triggered by unusual transactions, Yuval Ben-Itzhak, chief technology officer at Finjan, said in an interview on Tuesday. For instance, the software is programmed to calculate on-the-fly how much money to steal from an account based on how much money is available.

The specific Trojan Finjan researchers analyzed targets customers of unnamed German banks. It was linked back to a command-and-control server in Ukraine that was used to send instructions to the trojan software sitting infected PCs. Finjan has notified German law enforcement authorities, Ben-Itzhak said.

"It's a next generation bank trojan," he said. "This is part of a new trend of more sophisticated Trojans designed to evade antifraud systems."

Finjan researchers were able to trace the communications from the code on an infected machine back to the command-and-control server, which was left unsecured, according to Ben-Itzhak. On that server, they saw the LuckySploit administration console and were able to see exactly what types of rules the Trojan was written to follow and statistics on victims.

About 90,000 computers visited the sites housing the malware and 6,400 of them were infected, a 7.5 percent success rate, he said. Of those whose computers had the Trojan installed, a few hundred had money stolen from their bank accounts, he added.

During the span of 22 days in mid-August, the criminals behind the Trojan stole the euro equivalent of nearly $438,000, according to the security company.Source:

Friday, June 5, 2009

10 most dangerous web search terms revealed

Web searches including terms like lyrics, free music downloads are most likely to put your computer at risk of virus or even malicious software, for security firm McAfee, Inc. has listed these words as some of the most dangerous search terms on the internet.

In a recent report, McAfee has revealed Web search terms that put users most at risk for accidentally downloading unwanted or malicious software.

The report, titled 'The Web's Most Dangerous Search Terms', reveals that the researchers analysed over 2,600 of the most popular search terms of 2008 from a range of sources, including the Google Zeitgeist and the Yahoo! 2008 Year in Review.Search engines are our on-ramp, our highway and our off-ramp -- they're everything for Web travel. The hacking community is very smart-they can spot a trend as well as any trendspotter," the Telegraph quoted Shane Keats, the research analyst with McAfee who led the study, as saying.

After analysing the search terms, the researchers found that hackers looking for crowds.

They are also attacking Internet surfers who are ready to take an online action, like downloading a ringtone or logging in to a site with a name, address and social security number.

For example, people searching for free music downloads are easy targets for hackers because they are expecting to download an mp3.

In order to evaluate the risk associated with each keyword, the researchers looked at the search results generated by each keyword, and then calculated the percentage of links that would take users to Web sites with unwanted adware, spyware or other malicious software.

For example, the term "lyric," had an average risk of 14.8 percent, meaning that nearly 15 out of 100 search results would take users to risky sites.

The most dangerous categories of search terms include online games, free downloads, song lyrics, and screensavers.

Search terms involving online games were among the riskiest because online games often prompt users to install plug-ins or register with a name or e-mail address.

Keywords that include lyrics were risky because Web sites featuring the words to songs sometimes host links that take users to sites with unwanted pop-up ads or spyware.

The 10 Most Dangerous Web Searches in the United States are:

1. Word Unscrambler

2. Lyrics

3. MySpace

4. Free Music Downloads

5. Phelps, Weber-Gale, Jones and Lezak Wins 4x 100m Relay

6. Free Music

7. Game Cheats

8. Printable Fill in Puzzles

9. Free Ringtones

10. Solitaire (ANI)

Monday, June 1, 2009

Visual Studio 2010 Beta 1 Cheat Sheet

ASP.NET Documentation Tool

The ASP.NET Documentation Tool creates technical documentation for ASP.NET 1.0, 1.1 and 2.0 projects written in VB.NET and C#. The ASP.NET Documentation Tool is based on the popular ASP Documentation Tool, and is intended to the the quickest and most cost effective way of automatically documenting and understanding ASP.NET projects [full list of features]. It is also able to document Windows Forms and Console applications written in .NET.

Documentation is created in standard HTML, Microsoft's HTML Help (shown in screenshot on left) and plain text formats.

The ASP.NET Documentation Tool was voted as first runner-up in the Best .NET Documentation and Help Tools category of the .NET Developer's Journal Readers' Choice Awards 2003.

Sample documentation* produced by the current version of the ASP.NET Documentation Tool for a variety of projects can be seen by choosing the following selection of links:

* SampleWeb.NET (VB.NET & C#) [HTML] [Text] [HTML Help - Full, Class Browser]
* IBuySpy Portal (C#, Visual Studio version) [HTML] [Text] [HTML Help - Full, Class Browser]
* IBuySpy Store (VB.NET, SDK version) [HTML] [Text] [HTML Help - Full, Class Browser]
* Windows application sample documentation may be viewed on the .NET Documentation Tool Samples pages.

Although Visual C#.NET has the ability to create code comment [sample], the ASP.NET Documentation Tools are much more comprehensive.

Download From
http://www.winnershtriangle.com/w/Products.ASPNETDocumentationTool.asp

Sunday, May 31, 2009

Visual Studio 2010 and .NET Framework 4 Beta 1

Visual Studio 2010 and .NET Framework 4 focuses on the core pillars of developer experience, support for the latest platforms, targeted experiences for specific application types, and core architecture improvements.
Download From Here..


Monday, May 25, 2009

Capturing the image is an asp.net web application

Introduction:


Capturing the image is an asp.net web application is not a difficult task. If you are ready to use flash with asp.net.

Description:

Create a flash file will be used to capture the image from clientside.That flash file code is given below with explanation.

Import the files whatever necessary.

import flash.display.BitmapData;

import flash.display.DisplayObject;

import com.adobe.images.*;

import flash.utils.ByteArray;

import flash.utils.*;

import flash.events.*;

import flash.display.SimpleButton;

import com.dynamicflash.util.Base64;

import com.bumpslide.util.*;

import flash.external.ExternalInterface;

//Create an instance for camera

var cam:Camera = Camera.getCamera();

//Import video file

//var __video:Video = new Video(80,80)

cam.setQuality(0, 100);

//cam.setMode(1024,768,30);

__video.x=47;

__video.y= 25;

__video.width=80;

__video.height=80;

//Set Border

var square:Sprite = new Sprite();

addChild(square);

square.graphics.lineStyle(1,0x000000);

square.graphics.drawRect(0,0,80,80);

square.x = 47;

square.y = 25;

//Set Capturing image size.

//cam.setQuality(0,80);

var count:int = 0;

var scale:Number = .68;

var m:Matrix = new Matrix();

m.scale(scale,scale);

//Create buttons and add corresponding event listener to that.

//cam.setMode(cam.width,cam.height,cam.currentFPS);

btnStart:SimpleButton;

btnStart.addEventListener(MouseEvent.CLICK, startphoto);

btnCapture.addEventListener(MouseEvent.CLICK, takephoto);

btnStop.addEventListener(MouseEvent.CLICK, stopphoto);

var screenS:BitmapData = new BitmapData(80,80,false);

var screenS_image:Bitmap=new Bitmap(screenS);

//function to start camera

function startphoto(e:MouseEvent):void

{

__video.attachCamera(cam);

__video.visible=true;

}

//function to take photo

function takephoto(e:MouseEvent):void

{

screenS.draw(__video,m);

//screenS_image(screenS);

var jpg: JPGEncoder = new JPGEncoder(80);

var jpgByteArray:ByteArray = new ByteArray();

jpgByteArray = jpg.encode(screenS);

var encoded:String = Base64.encodeByteArray(jpgByteArray);

var myData:URLRequest = new URLRequest("_self")

myData.method = URLRequestMethod.POST;

var variables:URLVariables = new URLVariables();

variables.encoded = encoded;

myData.data = variables;

var loader:URLLoader = new URLLoader();

loader.dataFormat = URLLoaderDataFormat.VARIABLES;

loader.addEventListener(Event.COMPLETE,dataOnLoad);

loader.load(myData);

__video.attachCamera(null);

}

//function to stop camera.

function stopphoto(e:MouseEvent):void

{

__video.visible=false;

__video.attachCamera(null);

}

function dataOnLoad(evt:Event)

{

trace(evt.target.data.writing)

if(evt.target.data.writing=="Ok")

{

gotoAndPlay(2)

}

//else status_txt.text = "Error in saving submitted data"

}

Get data from client side(asp.net) as string and convert that in to byte again. Save that converted data in to database.

string data = Request.Form["encoded"];

if (data != null)

{

byte[] bytes = Convert.FromBase64String(data);

}

Download Sample From Here