Share This Post

Dec 28, 2010

steganography - How to Hide a data with in an Image ?

Remember those invisible ink kits from when you were a kid? You'd write a secret message that no one could see unless they had a black light or the decoder marker. The digital equivalent of invisible ink is steganography software, apps that embed files and data inside other files, hidden from everyone who doesn't know any better.


You don't have to be a trained spy plotting international espionage to put steganography to good use. With some free tools for both the Mac and PC, you can embed secret information in image, PDF, HTML and MP3 files for fun or profit.

Dec 22, 2010

How Twitter acquires people ?

When is an acquisition not an acquisition? When Twitter’s involved, apparently.
The microblogging company announced today that it had “acquired the team at Fluther, Inc.” Fluther makes a question-and-answer site, a popular category of Web startup as of late. (See Hunch or Quora for examples of better-funded competitors.)
When I asked Twitter spokeswoman Carolyn Penner what kind of deal it had actually struck, she characterized the event as a “talent acquisition.” I pointed out that there’s no such thing, really, as a talent acquisition: Either a company acquires or merges another company and takes on its employment obligations, or it hires employees as individuals. I also pointed out that under the U.S. Constitution, acquiring people was technically illegal.

Dec 15, 2010

Wikileaks have Now Competition with Open Leaks on Net

Wikileaks have Now Competition with Open Leaks on Net, It seems that the organization WikiLeaks will have a competitor going forward. According to the Swedish newspaper Dagens Nyheter, several people who resigned from the project due to conflicts with the founder Julian Assange are planning to open a new site next Monday (13), the Openleaks.

Dec 11, 2010

Arrest of Wikileaks founder Julian Assange

Julian Assange  


The founder of whistle-blowing website Wikileaks, Julian Assange, has been refused bail by a court in London but vowed to fight extradition to Sweden - but what are the issues involved?
Why has Julian Assange been arrested?
Mr Assange has been arrested under a European Arrest Warrant (EAW) because he has been accused of committing serious crimes in Sweden.



Dec 6, 2010

Locate Lost i phone from Find my i phone, But thieves can easily Disable

Over the weekend, Livejournal blogger HappyWaffle (real name Kevin), posted a great story about how he purportedly used Apple's MobileMe service to track down his iPhone, which was stolen while he was at a bar. By using a laptop with a Sprint EVDO wireless data card, he and his friends figured out where it was and managed to get it back from the person who had taken it. They even usedGoogle Translate to alert the thief (in multiple languages) that they would call the police if the device was not returned.

Dec 2, 2010

What is QR Code and what is its Use ? Know about QR Code


QR Code is a matrix barcode (or two-dimensional code), readable by QR scanners, mobile phones with a camera, and smartphones. The code consists of black modules arranged in a square pattern on white background. The information encoded can be text, URL or other data.
Common in Japan, where it was created by Toyota subsidiary Denso-Wave in 1994, the QR code is one of the most popular types of two-dimensional barcodes. QR is the abbreviation for Quick Response, as the creator intended the code to allow its contents to be decoded at high speed.

Nov 29, 2010

A practical cell phone that is specially designed for senior citizens

Just what the doctor ordered! A practical cell phone that is specially designed for senior citizens! Lots of what you need, and nothing you don't! . Tired of those small phones with dial buttons so small that unless you have pencil fingers you can't make a call? Not exactly user friendly for people with arthritis, rheumatism, or poor eyesight right? In contrast, the old age pensioners phone has jumbo sized keys which make calling a breeze! 

Nov 27, 2010

Mobile telecom profits may dip due to stringent norms: COAI

Cellular Operators Association of India (COAI) Wednesday indicated that profits of mobile telecom industry may shrink further on account of strict subscriber verification norms and levy of charges on erection of cell towers by the state governments. Lack of infrastructure facilities in rural areas coupled with stringent norms of customer verification before providing services is a deterrent for mobile penetration in most parts of the country, COIA Director-General Rajan S. Mathews said.

Nov 26, 2010

How to Make a Virus to Test your Antivirus ?

If you are active in the anti-virus research field, then you will regularly receive requests for virus samples. Some requests are easy to deal with: they come from fellow-researchers whom you know well, and whom you trust. Using strong encryption, you can send them what they have asked for by almost any medium (including across the Internet) without any real risk. 

Related Posts Plugin for WordPress, Blogger...