Share This Post

Dec 28, 2010

steganography - How to Hide a data with in an Image ?

Remember those invisible ink kits from when you were a kid? You'd write a secret message that no one could see unless they had a black light or the decoder marker. The digital equivalent of invisible ink is steganography software, apps that embed files and data inside other files, hidden from everyone who doesn't know any better.


You don't have to be a trained spy plotting international espionage to put steganography to good use. With some free tools for both the Mac and PC, you can embed secret information in image, PDF, HTML and MP3 files for fun or profit.

Dec 22, 2010

How Twitter acquires people ?

When is an acquisition not an acquisition? When Twitter’s involved, apparently.
The microblogging company announced today that it had “acquired the team at Fluther, Inc.” Fluther makes a question-and-answer site, a popular category of Web startup as of late. (See Hunch or Quora for examples of better-funded competitors.)
When I asked Twitter spokeswoman Carolyn Penner what kind of deal it had actually struck, she characterized the event as a “talent acquisition.” I pointed out that there’s no such thing, really, as a talent acquisition: Either a company acquires or merges another company and takes on its employment obligations, or it hires employees as individuals. I also pointed out that under the U.S. Constitution, acquiring people was technically illegal.

Dec 15, 2010

Wikileaks have Now Competition with Open Leaks on Net

Wikileaks have Now Competition with Open Leaks on Net, It seems that the organization WikiLeaks will have a competitor going forward. According to the Swedish newspaper Dagens Nyheter, several people who resigned from the project due to conflicts with the founder Julian Assange are planning to open a new site next Monday (13), the Openleaks.

Dec 11, 2010

Arrest of Wikileaks founder Julian Assange

Julian Assange  


The founder of whistle-blowing website Wikileaks, Julian Assange, has been refused bail by a court in London but vowed to fight extradition to Sweden - but what are the issues involved?
Why has Julian Assange been arrested?
Mr Assange has been arrested under a European Arrest Warrant (EAW) because he has been accused of committing serious crimes in Sweden.



Dec 6, 2010

Locate Lost i phone from Find my i phone, But thieves can easily Disable

Over the weekend, Livejournal blogger HappyWaffle (real name Kevin), posted a great story about how he purportedly used Apple's MobileMe service to track down his iPhone, which was stolen while he was at a bar. By using a laptop with a Sprint EVDO wireless data card, he and his friends figured out where it was and managed to get it back from the person who had taken it. They even usedGoogle Translate to alert the thief (in multiple languages) that they would call the police if the device was not returned.

Dec 2, 2010

What is QR Code and what is its Use ? Know about QR Code


QR Code is a matrix barcode (or two-dimensional code), readable by QR scanners, mobile phones with a camera, and smartphones. The code consists of black modules arranged in a square pattern on white background. The information encoded can be text, URL or other data.
Common in Japan, where it was created by Toyota subsidiary Denso-Wave in 1994, the QR code is one of the most popular types of two-dimensional barcodes. QR is the abbreviation for Quick Response, as the creator intended the code to allow its contents to be decoded at high speed.
Related Posts Plugin for WordPress, Blogger...