Wednesday, June 26, 2013

What iTHINK about Google Glass?

What iTHINK about -        
                                                         


   Augmented Reality has already gotten into our life in the forms of simulated experiment and education app, but Google is taking it several steps higher with Google Glass. Theoretically, with Google Glass, you are able to view social media feeds, text, Google Maps, as well as navigate with GPS and take photos. You will also get the latest updates while you are on the ground.






   It’s truly what we called vision, and it’s absolutely possible given the fact that the Google’s co-founder, Sergey Brin has demo’ed the glass with skydivers and creatives. Currently the device is only available to some developers with the price tag of $1500, but expect other tech companies trying it out and building an affordable consumer version.


                  



iTHINK Google glass is dream turned reality  

Tuesday, June 25, 2013

What iTHINK about Nokia Asha 501?

What iTHINK about -


                 Nokia Asha is a full touch smartphone from Nokia Asha Series announced by Nokia on 9 may 2013 in India. The model comes in either single sim or dual sim(dual sim-standby) configuration.
           
                 The device introduces Nokia Asha software platform 1.0 for its OS, which features technology from Smartphone, a software company acquired by Nokia in 2012. Its key feature is the long life battery and excellent standby time,
                
         The price of approximately $99 is really attractive. Also it have  got Multitouch with 2 fingers. Also 3.15 MP Camera is much in the price of just $99.

iTHINK Asha 501 is an attempt to reinvent its marvelous creation. Lets hope that Nokia Succeeds in its venture. 

Sunday, June 23, 2013

What iTHINK about Ethical Hacking?

What iTHINK about - 

                



                                  With the growth of the Internet, computer security has become a major concern for businesses and governments. They want to be able to take advantage of the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being "hacked." At the same time, the potential customers of these services are worried about maintaining control of personal information that varies from credit card numbers to social security numbers and home addresses.

                               In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems. This scheme is similar to having independent auditors come into an organization to verify its bookkeeping records. In the case of computer security, these "tiger teams" or "ethical hackers"   would employ the same tools and techniques as the intruders, but they would neither damage the target systems nor steal information. Instead, they would evaluate the target systems' security and report back to the owners with the vulnerabilities they found and instructions for how to remedy them.

                                        This method of evaluating the security of a system has been in use from the early days of computers. In one early ethical hack, the United States Air Force conducted a "security evaluation" of the Multics operating systems for "potential use as a two-level (secret/top secret) system."   Their evaluation found that while Multics was "significantly better than other conventional systems," it also had " . vulnerabilities in hardware security, software security, and procedural security" that could be uncovered with "a relatively low level of effort." The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military.

                                      With the growth of computer networking, and of the Internet in particular, computer and network vulnerability studies began to appear outside of the military establishment. Most notable of these was the work by Farmer and Venema,   which was originally posted to Usenet   in December of 1993. They discussed publicly, perhaps for the first time,   this idea of using the techniques of the hacker to assess the security of a system. With the goal of raising the overall level of security on the Internet and intranets, they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented.

What do ethical hackers do?

An ethical hacker's evaluation of a system's security seeks answers to three basic questions:

What can an intruder see on the target systems?
What can an intruder do with that information?
Does anyone at the target notice the intruder's attempts or successes?
While the first and second of these are clearly important, the third is even more important: If the owners or operators of the target systems do not notice when someone is trying to break in, the intruders can, and will, spend weeks or months trying and will usually eventually succeed.

             When the client requests an evaluation, there is quite a bit of discussion and paperwork that must be done up front.

            This approach usually works because it involves the use of techniques of intruders to our protection.Hence iTHINK the knowledge of ethical hacking is of great use.



Our new security threats are ‘nameless’ and ‘faceless’ via the Internet. And for this reason, it is even more important to reinforce our cyber defences..
-MY SARAWAK



Saturday, June 22, 2013

What iTHINK about Phishing?

What iTHINK about -



                                        In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes.


                                     There are many variations on this scheme. It is possible to Phish for other information in additions to usernames and passwords such as credit card numbers, bank account numbers, social security numbers and mothers' maiden names. Phishing presents direct risks through the use of stolen credentials and indirect risk to institutions that conduct business on line through erosion of customer confidence. The damage caused by phishing ranges from denial of access to e-mail to substantial financial loss.

PHISHING TECHNIQUES

Phishers use a wide variety of techniques, with one common thread.

Link Manipulation

                        Its one of the most commonly used method by phishers to extract information from victim on the name of an organization etc to which the victim may be associated.
Its also an easier method. Phisher just need to construct a webpage that looks exactly similar to an official site of an organization consider a bank. When victim sign in, his information such as password credit card no. etc are transferred to the phisher through an email system. (I myself have used this over one of my friend and got his gmail account password.)   

Filter Evasion

                  Phishers have used images instead of text to make it harder for anti-Phishing filters to detect text commonly used in Phishing e-mails.

Website Forgery

                 Once a victim visits the Phishing website the deception is not over. Some Phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL.

Phone Phishing

                  Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the Phishers) was dialed, prompts told users to enter their account numbers and PIN. Vishing (voice Phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

           Some may use Phishing to have fun.But its not really funny. I have read a novel called "Hakuna Matata" in which terrorist group uses these methods to gain control over credit card of one of the important character.. These are really harmful in the hands of terrorist since this could pose a threat to nation's security. 

                    It all makes us feel helpless but iTHINK a careful attitude is all needed to tackle such circumstances.Remember an careless mind is always a target.




For more information contact: Yash .S. Jain 9766124639

Don't forget to mention the reference of this blog.

What iTHINK about Li-Fi Technology?

What iTHINK about- 
           
                           
             Whether you’re using wireless internet in a coffee shop, stealing it from the guy next door, or competing for bandwidth at a conference, you've probably gotten frustrated at the slow speeds you face when more than one device is tapped into the network. As more and more people and their many devices access wireless internet, clogged airwaves are going to make it increasingly difficult to latch onto a reliable signal. 

But radio waves are just one part of the spectrum that can carry our data. What if we could use other waves to surf the internet? One German physicist,DR. Harald Haas, has come up with a solution he calls “Data Through Illumination”—taking the fiber out of fiber optics by sending data through an LED light bulb that varies in intensity faster than the human eye can follow. It’s the same idea behind infrared remote controls, but far more powerful. Haas says his invention, which he calls D-Light, can produce data rates faster than 10 megabits per second, which is speedier than your average broadband connection. He envisions a future where data for laptops, smartphones, and tablets is transmitted through the light in a room. And security would be a snap—if you can’t see the light, you can’t access the data.
                         
                        In simple terms, Li-Fi can be thought of as a light-based Wi-Fi. That is, it uses light instead of radio waves to transmit information. And instead of Wi-Fi modems, Li-Fi would use transceiver-fitted LED lamps that can light a room as well as transmit and receive information. Since simple light bulbs are used, there can technically be any number of access points.

                           This technology uses a part of the electromagnetic spectrum that is still not greatly utilized- The Visible Spectrum. Light is in fact very much part of our lives for millions and millions of years and does not have any major ill effect. Moreover there is 10,000 times more space available in this spectrum and just counting on the bulbs in use, it also multiplies to 10,000 times more availability as an infrastructure, globally.

                                     Li-Fi is a VLC, visible light communication, technology developed by a team of scientists including Dr Gordon Povey, Prof. Harald Haas and Dr Mostafa Afgani at the University of Edinburgh. The term Li-Fi was coined by Prof. Haas when he amazed people by streaming high-definition video from a standard LED lamp, at TED Global in July 2011. Li-Fi is now part of the Visible Light Communications (VLC) PAN IEEE 802.15.7 standard. “Li-Fi is typically implemented using white LED light bulbs. These devices are normally used for illumination by applying a constant current through the LED. However, by fast and subtle variations of the current, the optical output can be made to vary at extremely high speeds. Unseen by the human eye, this variation is used to carry high-speed data,” says Dr Povey, , Product Manager of the University of Edinburgh's Li-Fi Program ‘D-Light Project’.

                             It is possible to encode data in the light by varying the rate at which the LEDs flicker on and off to give different strings of 1s and 0s. The LED intensity is modulated so rapidly that human eyes cannot notice, so the output appears constant.

                                 More sophisticated techniques could dramatically increase VLC data rates. Teams at the University of Oxford and the University of Edinburgh are focusing on parallel data transmission using arrays of LEDs, where each LED transmits a different data stream. Other groups are using mixtures of red, green and blue LEDs to alter the light's frequency, with each frequency encoding a different data channel.

                                   Li-Fi, as it has been dubbed, has already achieved blisteringly high speeds in the lab. Researchers at the Heinrich Hertz Institute in Berlin, Germany, have reached data rates of over 500 megabytes per second using a standard white-light LED. Haas has set up a spin-off firm to sell a consumer VLC transmitter that is due for launch next year. It is capable of transmitting data at 100 MB/s - faster than most UK broadband connections.

                            Li-Fi is typically implemented using white LED light bulbs at the down-link transmitter. These devices are normally used for illumination only by applying a constant current. However, by fast and subtle variations of the current, the optical output can be made to vary at extremely high speeds. This very property of optical current is used in Li-Fi setup. The operational procedure is very simple-, if the LED is on, you transmit a digital 1, if it’s off you transmit a 0. The LEDs can be switched on and off very quickly, which gives nice opportunities for transmitting data. Hence all that is required is some LEDs and a controller that code data into those LEDs. All one has to do is to vary the rate at which the LED’s flicker depending upon the data we want to encode. Further enhancements can be made in this method, like using an array of LEDs for parallel data transmission, or using mixtures of red, green and blue LEDs to alter the light’s frequency with each frequency encoding a different data channel. 



                     Light is inherently safe and can be used in places where radio frequency communication is often deemed problematic, such as in aircraft cabins or hospitals. So iTHINK that visible light communication not only has the potential to solve the problem of lack of spectrum space, but can also enable novel application. The visible light spectrum is unused, it's not regulated, and can be used for communication at very high speeds.

Such advancements promise a theoretical speed of 10 Gbps meaning one can download a full high-definition film in just 30 seconds. It sends a single data stream of bits at the rate of 10,000-20,000 bps. Now replace the IR LED with a Light Box containing a large LED array. 

Friday, June 21, 2013

What iTHINK about Nuclear Weapons?

What iTHINK about-

         

           Nuclear Weapon is an explosive device that derive its destructive force from nuclear reactions either Fission or Fusion.These reactions derive vast amount of energy from relatively small quantity of matter.

          The Concept of Nuclear Weapon is derived from the Einstein equation E=mc2 . Its said that Einstein didn't revealed this equation for long time after its discovery(He came to know that this equation can be used for building nuclear weapons).Clearly Bomb was not in his mind during his discovery.


          In November 1954, five months before his death,Einstein summarized his feelings about his role in the creation of atomic bomb:"I made one great mistake in my life...when i signed the letter to President Roosevelt recommending that atom bomb can be made;but there was some justification - the danger that Germans would make them. "


         Its a weapon of mass destruction that make the life of people surviving it worse than death. The Harmful radiation emitted on its explosion are deadly and hazardous for Life of all kind. Use of Nuclear Weapons is simply inhumane and is against all laws and ethics.


        Possession of nuclear weapons doesn't mean that the country is highly developed for example countries like Australia,Germany,Spain doesn't posses any of these but still these are included in category of developed countries.


       Maintaining and keeping these nuclear weapons is very expensive and takes a large share of defense budget of that country.


       There are currently nine countries that are in possession of these weapons(US, China, Russia, India, Pakistan, North Korea, Israel, France, UK).Out of these 95% belongs to Russia and US.


       The countries that posses these pose threat to whole world. Firstly its hazardous for countries that are on target. Secondly these are deadly for countries that are neutral but surrounds targeted countries due to nuclear radiations. Finally these can be harmful for countries that posses these as an attack on nuclear reserves can be dangerous for these countries. Also there are that these weapons can be stolen and can be used by terrorist group.


        The elimination of nuclear weapons seems practically impossible today, but iTHINK if world leaders take a sincere efforts, then they might be able to make this planet free from nuclear weapons.

We can possibly convert them and can derive enormous energy from them.


Nuclear arsenals: who wants them? - A coterie of politicians.

Why do they want them? - For the illusion of power and to feed their egos.
How do they keep them? - By fostering a culture of fear.
How do they do that? - By positing a Threatening and Unknown Future. 





There are at least 23,000 nuclear weapons: enough to wipe out complete human existence



So what are we waiting for an Armageddon?

What iTHINK about Windows Phones?

What iTHINK about-





Windows phone is a series of device based on mobile operating system developed by Microsoft. Windows Phones were publicly on 10th November 2010 in United States. Microsoft released an updated version of Windows Phone 7 Mango (named as Windows Phone 7.5) in May 2011.

Minor updated version called Tango was released later in 2012. Windows Phone 8 was released on October 29 2012.

 A Major breakthrough in Windows Phone series when Microsoft announced its partnership with Nokia in February 2011 at London. this replaced its primary OS Symbian with windows. 

With this Nokia entered the world of Smartphones.Windows Phone 8's new hardware gave Windows Phone the ability to better compete with Google and Apple smartphones.

First Windows Phones, the Nokia Lumia 800 and Nokia Lumia 710 was announced by Nokia in October 2011 at World Nokia Event 2011. This was the beginning of Lumia Series By Nokia.

 Nokia Lumia 920 came to be known as Most Innovative Smartphone available with wireless charging(based on magnetization concept).

Truly with Lumia series Nokia have got asha (hope) lost earlier with Asha series. iTHINK that this ensures to provide a great competition to its rivals like Samsung and Apple.





 When We Attack We May Fall Back 
 But When We Hit It Back Its Reloaded
 -adopted from KKR tagline for 2nd season of IPL