Total Pageviews

Saturday 22 September 2012

175 DEGREE 160 INCH CURVED GAMING SCREEN!!!


It is really a stunning news for Hardcore game lovers that the Swedish company Norman Design is offering a very great Formula 1 Simulation game in a curved screen which was ever released before.


It is not necessary for Formula 1 racers to go to the circuit and practise for the race. They can now sit back in their home for taking lap practises which gives them real experience of driving with an original car in the circuit.(It sounds really cool!!!)

This simulator comes with the 160 inch curved screen, chair attached to it, a full system with powerful computer capable of running the special software and other stuffs like steering, accelerators, breaks etc. This simulator is portable, weighing 49.8 kg(110 pounds). It is priced 114,000 dollars for the entire simulation set and 28,500 dollars for the display alone. The company also provides lease option so that the simulator can be used on a contract basis. In near future, every game is expected to chose its screen shape, giving real gaming experience. 

Thanks for reading my blog. Comments are appreciated... Stay tuned  for my next blog :-)

Saturday 1 September 2012

ORACLE VIRTUAL BOX



Most of you will have a dual boot and work with 2 operating systems. To do so, you need to partition the drives, allocate memory for each OS and establish your need. This dual boot option gives you  a provision to work with more than 1 OS. But
with this dual boot option, you can work with only one OS at one time. Also if you need to share some files between different OS in the system, it is possible only by copying the desired file from one OS in USB, CD or using other medium. Direct file transfer between the OS is not possible(But now it is possible. For eg. in Ubuntu 11.04, one drive is shared among both the OS so that mere copy-paste can be used to share files)

Oracle Corporation has developed an application called Oracle Virtual Box. In this, you can load any number of OS(called Guest OS because these OS are installed in addition to the existing OS which is called Host OS) in it and work with many OS. What makes the difference with this Virtual Box is that, it runs the desired OS in a separate window as an application. 

linux OS in windows 7 OS

Suppose for eg. if you wanna run an application say MS word, you double click it to get the MS word and continue with your work. The same concept is applied for the OS. Virtual Box will have a list of installed OS in it. What you wanna do to work with an OS is just click the OS. OS will be loaded in a new window as an application.     

I use ubuntu linux using Oracle Virtual Box... 

Virtual Box Application in which i've added ubuntu linux

Like this you can add several OS in this list by clicking on New below File menu.

Each Guest OS in VM can be configured independently. Guest OS can communicate with Host OS through a number of mechanisms like common clipboard, shared folder, virtualized network facility.
Also Guest OS can communicate among each other if configured.

shared folder option for file sharing

All the resources like pendrive, printer etc. can be used by the Guest OS exactly like the Host OS, even internet. You can browse on all the active Guest OS along with Host OS simultaneously. :-)

This is all i have tried and i know about Virtual Box so far. You are welcome to discuss about Virtual Box further. Thanks for reading my blog :-) Comment on my blog... Stay tuned for my next post... :-)

Monday 27 August 2012

HOW TO SEND .EXE FILES VIA MAIL???

There are times where you wanna send some important .exe files such as programs via mail. But you will be annoyed to see the message from gmail or other mail services which goes like this...

xxx.exe IS AN EXECUTABLE FILE. FOR SECURITY REASONS, GMAIL DOES NOT ALLOW YOU 
TO SEND THIS TYPE OF FILE.

Even if you compress the .exe file to .zip or .tar or .gz format and try to mail, gmail scans the file which is zipped to check for its extension and throws the same message. To override this nonsense message and send mails of such types of file, let me tell you a trick. ;-)

The main idea is to change the extension of the file from .exe to some other format say .jpg. To do so, follow the instructions...

1. Go to the place where the file is located.

2. Go to Tools -> Folder options.



3. Switch to View tab. 

4. Uncheck the HIDE EXTENSIONS FOR KNOWN FILE TYPES check box if it is checked and click apply.



5. Now rename the extension of the file to .jpg or .dll or whichever you like. But make sure that the new extension is allowed by the mail service. Now the mail can be sent!!! :-)

6. The recipient must also follow the same procedure to change the format of the received file to .exe and he/she can use the file.

This is one scenario. You can apply the same trick for different purposes. :-) 

Consider the situation where you wanna add your friend's photo in gmail contact which is in .exif or in .raw format. But gmail allows only  the photos of the format JPG, GIF and PNG. In such cases, this trick can be applied. :-)

Thanks for reading my blog. :-) Comment on my blog... Stay tuned for my next blog... :-) 


Sunday 5 August 2012

FLUTTER APP (Control the music player by your hand)

Most of the time, we used to do multitasking with our system. We usually work with word file by referring to the web browser or we may surf or we may play high definition games. In most of these cases, we used to play music in background. (I usually do this!!!). In such case, if we wanna play or pause the music player, we have to minimize the active window or maximize the music player window from taskbar. This becomes more tedious when we play games like GTA, NFS etc... We can't simply pause or terminate our mission for play/pause the music player.

Using input devices to accept our command has started to sense its death :-D The hot research in image processing is to get input from user in the form of action or gesture and perform the desired operation in the system. Microsoft is working on this and 2 years back, Microsoft stated that it is impossible to use the ordinary webcam of the system to receive gesture of the user and make computer do the operation based on the gesture.

What makes this discussion interesting is that this is made possible by a very small company which actually has only 7 employees under it. That was really interesting. They made the webcam to sense our hand gesture to play/pause the music player. 

What you need to do to pause/play the music player is just raise your hand and show the STOP gesture before the webcam.


The pictorial explanation of how this app works is...



They developed an app called FLUTTERAPP to achieve this. Initially they introduced this app for Mac OS. Just 3 weeks back, they unveiled the Windows version of this app. Since this is their 1st initiative, they may extend this idea to get all kinds of inputs in future in this way so that just webcam can serve as an input device by accepting all sort of inputs eliminating the need for separate device for different mode of inputs... 


Navneet Dalal whose native is Chandigarh, India and who currently resides in San Francisco did this great job. Really Indians are talented. This blog is an evidence to it. :-)

I really loved this technique and i'm sharing this to you. You can download this app in www.flutterapp.com I request everyone to give a try on this app during your idle time. You'll feel the thrill as i did...

Thanks for reading my blog :) Comment about it... :) Stay tuned for my next blog :)

Saturday 4 August 2012

ANDROID APPS ON YOUR PC!!!!!


Attention!!! Don't you have a mobile with Android OS? Are you fond of android apps? Then you are in the right place. :-) In this blog, i'll tell you how to enjoy Android apps in your computer without losing the thrill as in mobile...

Android is the most used buzzword in recent years. The main aim of Android is to increase the interest of using mobiles in an interesting way. They wanted their customers to get stuck with their product. Today almost 60% of the world is crazy about Android. Everyone must use Android apps to feel the real pleasure of technology. 

Now, its not obligatory to have one Android mobile to use the apps. The Silicon valley based software company gives you a provision to use Android apps in your own computer. By installing their application, you can feel like Android mobile is in your computer. You need not worry about the Operating System which you use. Currently this software is available for Macintosh and Windows. This application software provides a layer for android apps to work well and provides an environment for the android to run...

Currently it comes in free and pro version. Free version comes with 10 apps already installed and gives you a provision to download 26 more apps while the pro version provides unlimited app support.

To play android game, you need not reboot Android everytime you enter. Since it comes as an application, you can start enjoying the thrill of Android apps in just a single click. 

And finally, the name of this software is BLUE STACKS. Free version of Blue Stacks is available and you can easily download it in www.bluestacks.com.


So start downloading and enjoy!!!



Thanks for reading... :) jst comment on my blog... :) Stay tuned for my next blog :)

Monday 30 July 2012

HOW TO DISABLE USB PORT???   



Hi everyone :) In this blog, i'm gonna let you know how to disable the USB port in your system.


Go to Start -> Run. Type regedit and hit enter. Registry Editor window appears.



Follow the path given below:
HKEY_LOCAL_MACHINE -> SYSTEM -> CurrentControlSet -> services -> USBSTOR




In the right pane, right click start and select modify.




Edit DWORD Dialog Box pops out. Make sure that the radio button is active for Hexadecimal.




To disable the USB port, just change the value data to 4.




Conversely, to enable, change the value data to 3.


Thats it!!! On restarting your system, this modification will be put to effect and your USB port will be disabled.


Hope this tip will be useful.... Thanks for reading my blog... :) comment on it.... Stay tuned for my next blog... :)

Sunday 29 July 2012

PROXY

This is not the one which we usually put for our mates in the college  :-) Proxy is a tool using which we can browse safely by hiding our ip. We can do lot more with it. 

this is how proxy works...
A proxy or proxy server is basically another computer which serves as a hub through which internet requests are processed. By using proxy, whatever u request in the browser will reach the proxy instead of directly contacting the server. The proxy server then processes our request, sends our request to the server and gives us the search result which is returned by the server. In this way it serves as an intermediary between your home machine and the rest of the computers on the internet.

Proxies are used for a number of reasons such as to filter web content, to go around restrictions such as parental blocks, to screen downloads and uploads and to provide anonymity when surfing the internet.

TYPES:
·         
   Anonymous Proxy - An anonymous proxy server is also known as web proxy. By connecting to the internet through this proxy, the home IP address of your machine will not be shown but rather the IP of the proxy server will be shown. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network.
·    Distorting Proxy - This type of proxy server makes an incorrect original IP address available through the http headers.
Transparent Proxy - A transparent proxy does not provide privacy. It means that it does not add, delete or modify attributes or modify our request. It just forwards our request as it is to the server and return the result to our computer. Also it does not mask our ip. Our ip will be visible to the network. But these are generally used for their ability to cache websites. 

Some more proxies are available and we can chose it based on our requirement.

CACHING:

Proxies may also cache web pages. Each time the user requests an URL from their system, a temporary copy is stored locally in the proxy server. When user requests the same URL for the next time, the proxy can serve the local copy instead of retrieving the original across the network, improving performance.

USES:

Finally, the uses of the proxies are:
*To keep machines behind it anonymous(that is for hiding our ip address)
*To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
*To access sites prohibited or filtered by your ISP or institution.
*To log / audit usage, i.e. to provide company employee Internet usage reporting.
*To bypass security controls.
* To scan transmitted content for malware before delivery.

CONS:

   The main problem with the proxy is that if you use untrusted proxies, then your informations like your ids and passwords can be accessed by proxy server. So use trusted and recognized proxy. Some proxies are free to use and there are proxies for which we've to pay(this type will be used in the organisations). But make sure that the proxy you use is genuine.




     SOME PROXY SITES:
       §  http://proxify.com
       §  https://www.vtunnel.com
       §  www.ninjacloak.com


   Do googling for more proxies and before you use, check for its genuinity. So try using proxies for accessing information which you think others should not see. 

   It is a safe way to restrict hackers provided the proxy is from trustworthy environment.

  Thanks for reading :) comment about my blog... :) Stay tuned for my next blog... :)



Saturday 21 July 2012


FLEXIBLE DISPLAYS


Samsung OLED display
The near future technology will be the Flexible display which will be in the market by 2014. One of the reason for the advent of flexible screen is to make the gadgets lighter and portable. With flexible display gadgets, we can simply fold it and carry it in our pocket.
          
Flexible displays are still under R & D (Research and Development). Samsung is the leading company which is keen in unveiling flexible smart phones in the market. Flexible display uses FOLED (Flexible Organic Light Emitting Diode) which is a type of OLED (Organic Light Emitting Diode). Kodak is the inventor of OLED. FOLED is made by depositing electro luminescent organic semiconductor over flexible plastic OLED. This enables the device to be bent or rolled even when it is operating. Since OLED contains organic chemical compound, it emits light when electric current flows through it.

PROS:

OLED screens are slimmer and eye smoothening. These screens provide better viewing experience.

OLED can provide brighter, crisper displays on electronic devices.

OLED create their own light as opposed to LCDs which require a separate light source (backlight)  and hence they use 20% less power than the conventional LEDs and LCDs used today.

Since they can be rolled, it provides good portability.

OLEDs can be refreshed in microseconds in contrast with LEDs which takes few milliseconds, it provides flicker free display in near-eye applications resulting in smooth display with high dynamic motion video.

CONS:

These displays last only for shorter lifespan. The display may lose efficiency and brightness because of the stress developed during bending.

They’re prone to sunlight effect. That is, the display can’t be seen clearly in direct sunlight.

They’re prone to water as it can’t even withstand small water droplet.

OLED are costly nowadays. But as the popularity and advancement increases, the price may fall rapidly in future.


Thanks for reading... :) comment about my blog and stay tuned for my next blog :)

Wednesday 18 July 2012

MISSING .DLL FILE


A dynamic link library (DLL) is a collection of small programs, which can be called upon when needed by the executable program (EXE) that is running. The DLL lets the executable communicate with a specific device such as a printer or may contain source code to do particular functions.

The advantage of DLL files is that, because they do not get loaded into random access memory (RAM) together with the main program, space is saved in RAM. When and if a DLL file is called, then it is loaded. For example, you are editing a Microsoft Word document, the printer DLL file does not need to be loaded into RAM. If you decide to print the document, then the printer DLL file is loaded and a call is made to print.


All in all, a DLL is an executable file that cannot  run on its own, it can only run from inside an executable file. This would be like having a car without an engine, where as an executable has an engine.

Let me come to the point now. J Sometimes your computer may miss .dll file of some software. When you try to open those softwares, due to inavailability of the required .dll file, the application may not run. There is one good reason for .dll files to disappear from the computer. It is not that one .dll file will be used by only one .exe file. Several .exe files can use a single .dll file. So in such situation, when you uninstall a software which used a .dll file say for eg. xxx.dll , then xxx.dll might have been deleted. So when we try to open a software which uses the same xxx.dll file will not find that file and it will report an error in a dialog box.

In such a case never panic. Its very easy to tackle such situations. There are various sites which provides .dll files which u can download and continue using the software free of error!!! J Some of them are below…
you can google and find more sites if u didn’t get .dll file in one site.

Thanks for reading... Comment your suggestions about this blog :) 

Monday 16 July 2012

FLAME - MALWARE








FLAME




Flame is the most complex malware ever found. Researchers named the malware as “Flame” after the name of one of its module. It also known as Flamer and skywiper. It is a computer malware discovered in 2012 which attacks computers running the Microsoft Windows OS. It is being used to monitor Cyber Espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by Maher Centre of  Iranina National Computer Emergency Response Team (CERT), Kaspersky lab and CrySyS lab of the Budapest University of Technology and Economics.

Flame can spread to other systems over a local network (LAN) or via USB stick. It can record audio, screenshots, keyboard activity and network traffic. The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth-enabled devices. This data, along with locally stored documents, is sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers.

Flame had initially infected approximately 1000 machines with victims including Govt. organizations, educational institutions and pvt. Individuals. Infections happened in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt with major target in Iran. Flame supports a "kill" command which wipes all traces of the malware from the computer. The initial infections of Flame stopped operating after its public exposure, and the "kill" command was sent.

Researchers guess that Flame is related with Stuxnet(another computer worm) These two worms have different usage of codes and must be developed by different group of hackers. But researchers are sure that these two worms share atleast one module of code and there is a strong relationship between Flame and Stuxnet.


Thanks for reading... :) Do comment on my blog for further improvement... my next blog will be released shortly... :)

Saturday 14 July 2012


ACCESS HOME SYSTEM FROM ANYWHERE:

LogMeIn is an application which allows to access, manage and monitor our computer from anywhere with the requirement of internet connection. We can sit in front of any computer, anywhere in the world, and control the host computer no matter where it is located. The remote computer screen appears on the local computer, and this is all done through the magic of the web browser.

Each computer that we wish to control remotely must have the local LogMeIn utility installed, to handle the secure login and connection. Once installed, computer is ready to be accessed. We can access the computer from anywhere and it gives us an illusion like we’re working with our system lively. We can access files, transfer files, watch movies in our remote system and do all the jobs which we wish…

PROS:

Assume you’ve a laptop with less configuration and a desktop in your home with powerful configuration and good resolution. Using Log me in, Even though you’ve laptop with bad configuration, we get an experience of working in a powerful system which actually resides in the home.

LogMeIn handles switching the host resolution (desktop in this example) to that of the notebook used to access it. It does this automatically and importantly it switches it back when you log out. That means the desktop screen switches back to a nice hi-res setting, without any user interaction.

working with system through mobile
Suppose if we are in a situation to teach someone who are not familiar with computer operations and if for eg. they wanna install a software, instead of explaining them how to install for an hour via mobile, we can simply connect to the remote system and give them a demo which will be very efficient and easier to understand for the new user.

Even our mobile phone is enough to work with the remote system. (mobile in the sense, its not with nokia 1100 kind of mobiles :-D what I mean is smart phones…J)


CONS:

Since log me in requires internet connection for accesing remote computer, it requires good internet connection. Bad connection may lead to lagging of viewing our remote system.

We require someone in our home to switch on the system and connect to the internet.

Hope this blog is bit useful for some readers.... Do comment on my blog so that it can help me improve my next blog... Thankz for spending time for my blog... :-)