Posts

Showing posts from January, 2012

Windows Phone 7 is Better Than Android

Image
Why Windows Phone is better than Android ?  Market share of    Android  phone is increasing at a rapid rate but there are some bottlenecks where Android lags behind as compared with    Windows Phone 7 Series  .  Having worked on these phones and having a strict watch at internet, i found Windows Phone 7 a  great  mobile platform.  Regardless of the numbers, WP7 is one of the favorite mobile platforms, outshining Android in almost every aspect. Don’t believe me? Well, allow me to try and change your mind. Have a look at some reasons why Windows Phone 7 is better than Android . Streamlined User Interface Android’s are different depending on the SKU of the handset. In other words, the UI you’ll be dealing with when using, say, a Motorola handset, will be radically different than one from Samsung or HTC . The ambiguity can be disconcerting. With WP7, you know what kind of interface you’re going to be working with...

A Guide to General Packet Radio Service -3

Image
RLP The Radio Link Protocol (RLP) is used to transmit data over the GSM PLMN. RLP  covers the functionality of Layer 2 of the ISO OSI Reference Model. It  has been tailored to the needs of digital radio transmissions and provides  an OSI data link service. It also spans from the MS (Mobile Station) to the  interworking function, which is located at the nearest MSC (Mobile  Switching Center) or even further. There are currently three versions of RLP: Version 0 is a Single-link basic version, Version 1 is a Single-Link extended version, And Version 2 is a Multi-link version. RLP frames are fixed in length. The frame can either be 240 or 576 bits.  The frame consists of a header, information field, and an FCS field. The format of the 240-bit frame is:   _____________________________________   | Header  |  Information    | FCS    |   |---------|-----------------|--------|   | 16 bit ...

Windows Media Bug, A new Target for Malwares

Image
Windows Media Player Bug Security researchers have seen attackers going after the newly patched CVE-2012-0003 vulnerability in the Windows Media Player. The flaw, which was patched earlier this month by Microsoft, is a critical one that can enable remote code execution, and it affects a wide range of Windows systems. When the patch was released, Microsoft officials recommended that customers install it immediately as there was a decent chance of attackers leveraging it in the near future. And that's just what's happened. Researchers at the IBM ISS X-Force have seen malicious attacks against the MIDI vulnerability going on in the wild in recent days, and say that because exploitation of the flaw is not considered difficult, there may well be more on the horizon. "In addition to the appearance of live exploitation, detailed discussion of the vulnerability details and methods of exploitation have been seen. The relatively low complexity of locating the vulnerabilit...

Record game videos on your system

Image
 Game Capture from Roxio can do even more: record in-game XBOX360 and/or PS3 to your PC while you play it on your TV and it even includes a video editing software to spice up your homemade videos. The Roxio Game Capture includes a hardware box in which you need to plug and setup so you can capture all the inputs (video and audio) and record them into a video file. The component includes all the RCA, audio, and USB cables so you are good to set it up from the go. Roxio Game Capture records the video to your PC in 480p and supports these following formats: AVI, WMV, DivX, and also MP4. You can also take XBOX360 and PS3 in-game screenshots with Roxio Game Capture and the files will be saved in one of these following formats: JPG, PNG, TIFF, BMP, or GIF. Not just that, you can even edit your videos using the included software, so you can add transitions, commentary, subtitles, background music, effects and more. It makes your videos much more alive and fun, ready to be shared on ...

Test Webpages in IE10 Using Compat Inspector

Image
Test Webpages Using Compat Inspector Website managers who would like to learn whether the latest changes in the Internet Explorer platform also affect their site, can now use the Compat Inspector for IE10 to take a look into the matter.  Compat Inspector can be easily run on a page that has problems, regardless of whether developers are getting ready for the release of the upcoming Internet Explorer 10 or they are simply upgrading to IE9. If there are issues, the Compat Inspector will deliver messages explaining them and will also provide details on what needs to be done to resolve these problems. Released as a JavaScript-based testing tool meant to analyze the website while it runs, the Compat Inspector will provide reports on patterns of interaction that might cause issues in recent modules. “This allows you to identify problems quickly without memorizing a bunch of documentation or searching through the entirety of your site's code,” Tony Ross, program manager, In...

Method for Cleaning Spent Nuclear Fuel Created

Image
 Method for Cleaning Spent Nuclear Fuel Created A collaboration of investigators at the Sandia National Laboratories (SNL) announces the development of a method for removing dangerous gases from spent nuclear fuels. This could finally enable the production of cleaner, safer nuclear energy around the world. At the same time, the innovation would also contribute to reducing the amount of radioactive waste currently being produced by power plants and medical isotope production facilities. Together, these sources produce large volumes of wastes that are extremely difficult to manage. In the United States, the Yucca Mountain project has been on hold for years. This was to be a facility designed specifically for handling such dangerous chemicals, by storing them underground. By using the new approach, such expensive and potentially-dangerous endeavors may no longer be needed. In order to capture and remove volatile radioactive gas, SNL investigators decided to use something cal...

Firefox Security to Improve with Sandboxing and JIT Hardening

Image
The move to the new rapid release cycle has definitely spurred new blood into Firefox development. Firefox 10 is around the corner, even as Firefox 4 landed less than a year ago. In that time, the browser has evolved, it's faster, less memory hungry and boasts plenty of new features as well as better support for new web standards. But there's one department where Firefox may still be a little behind, security. Firefox is not an unsecure browser, compared the other popular browsers, but it is lacking some big features, especially those that Google Chrome , which has become the gold-standard, boasts, notably sandboxing and JIT hardening. According a recent interview though, Mozilla is working on just those very features, though work is more advanced in some aspects than in others. A recent report, created by an independent company but paid for by Google, found Firefox to be lacking in a couple of areas in particular. One of them is Just-in-Time compiling hardening, ...

Wi-Fi networks in India vulnerable to DOS

Image
Indian computer security analysts have detected and alerted Wi-Fi  users in the country against a possible virus attack. Indian computer security analysts have detected and alerted Wi-Fi users in the country against a possible virus attack that could lead to crashing and hacking of secure networks. The Indian Computer Emergency Response Team (CERT-In), country's national agency to respond to computer security incidents, has found that the " Wi-Fi Protected Setup (WPS) contains a design error that could allow a weaker-than- expected defence against brute-force attacks, which could allow an attacker to gain unauthorised access to the affected system." A brute-force attack, in computer terminology, is a programme that is used to crack and stealthily enter into an encrypted and password protected system while WPS is a popular method for setting up a new wireless router for a home network. "The virus is streaming in the Indian Internet networks with a high...

Hackers watching your Official Conference

Image
Video Conferencing Zero-Day Attack One afternoon this month, a hacker took a tour of a dozen conference rooms around the globe via equipment that most every company has in those rooms; video-conferencing equipment.  With the move of a mouse, he steered a camera around each room, occasionally zooming in with such precision that he could discern grooves in the wood and paint flecks on the wall. In one room, he zoomed out through a window, across a parking lot and into shrubbery some 50 yards away where a small animal could be seen burrowing underneath a bush. With such equipment, the hacker could have easily eavesdropped on privileged attorney-client conversations or read trade secrets on a report lying on the conference room table.  In this case, the hacker was HD Moore, a chief  security  officer at Rapid 7 , a  Boston  based company that looks for security holes in computer systems that are used in devices like toaster ovens and Mars landing equipmen...

Run linux programs on windows: Cygwin

Image
Have a taste of Linux on Windows We believe that everyone who considers themselves a computer enthusiast should have at least some experience with a Linux environment, but it can be daunting to just jump into the deep end of a completely unfamiliar operating system. One way to get your feet wet is with Cygwin, a free program that provides you with a Unix-like command line, without having to leave Windows. Cygwin is not a Unix emulator (it cannot run native Unix programs, although it does contain the tools needed to compile and run a program from source code), but it does have a wide array of optional packages that let you use most of the tools and utilities that you would commonly use in Unix, in Windows. In this guide, we’ll show you how to get Cygwin set up, the basics of how to navigate a Unix file system, and how to find more information as you need it. 1. Install Cygwin To get started with Cygwin, go to   www.cygwin.com   and click the link that says “Install or updat...