Sunday, January 30, 2011

BlackBerry Monaco Touch CDMA Phone Revealed: Launch Date & Price

BlackBerry Monaco Touch

Research In Motion (RIM) will soon launch a new touchscreen smartphone, the BlackBerry Monaco Touch. Monaco Touch does not have physical QWERTY keyboard. Monaco Touch supports CDMA EV-DO network. BlackBerry Monaco Touch runs on BlackBerry 6.1 OS and is powered by a 1.2GHz Qualcomm processor.

BlackBerry Monaco Touch features a 3.7-inch WVGA capacitive touchscreen display that supports resolution of 480 x 800 pixels, 5 megapixel autofocus camera with LED flash, 720p HD video recording, 768MB RAM memory, 4GB inbuilt memory, and microSD card slot. BlackBerry Monaco Touch also features NFC, 3G, Bluetooth 2.1, Wi-Fi 802.11b/g/n, GPS, accelerometer, and magnetometer.
BlackBerry Monaco Touch will be available in Q3 2011. Price of BlackBerry Monaco Touch is yet to be revealed.


LG Cookie Duet C310

LG has launched a new Dual SIM QWERTY phone LG Cookie Duet C310 in India. LG Cookie Duet C310 is a social networking phone to stay connected with friends. LG Cookie Duet C310 Dual SIM phone features a 6.1 cms TFT display, 2 MP camera with video recording, and up to 4GB of expandable memory.





LG Cookie Duet C310 features a Bluetooth, USB connectivity, Java, mobile tracker, MP3 player, FM Radio, and video player. The handset comes pre-installed with Opera Mini 5 browser, and Windows Live Messenger and is powered by 1250 mAh battery for up to 18 hours of talk time.

LG Cookie Duet C310 Price and Availability: LG Cookie Duet C310 is priced at Rs. 4949 and is now available in India.


Saturday, January 22, 2011

Firewall

Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Thursday, January 13, 2011

RUN COMEDY AL IN ONE

RUN - Biryani scene

DAMINI - Tareekh Pe Tareekh

suuny deol in damini

Manoj Kumar

Dil deewane ka dola

Hum Jaante hain (Khilona-1996)

Dell Laptops India - Dell Adamo XPS

The Adamo XPS features a 13.4 inch LED high definition panel that comes in the ratio of 16:9. It boasts of an inbuilt 2 MP internet camera. Possessing an 800 MHz dual channel DDR3 memory, it comes with a 128 GB robust state drive. Powered by a 1.4 GHz Intel Core 2 Duo extremely low voltage processor, this laptop runs on the Windows 7  Home Premium 64-bit operating system. The gadget is designed in such a way that it can be opened by the mere touch of our finger. This is courtesy the Elezygology’s TZ Intevia expertise incorporated by the company. This novel laptop is enabled by integrated Wi-Fi, USB and other typical networks. It is also equipped with a site recognition option which facilitates users to understand their precise location.
 

 Price:     Rs. 150,000.00

Technical Specifications of Dell Adamo XPS
ProcessorMake Intel
Processor Name Intel Core2Duo
Cache Memory(KB) 1024
Front Side Bus 800
Processor Speed(MHz) 1900.00
System MemoryStandard RAM (GB) 4.00
Hard Disk Drive (HDD)Installed Capacity (GB) 128.00
Optical DriveCD ROM Drive NA
DVD Drive NA
DVD Writer Drive NA
DisplayScreen Size (Inches) 13.40
Maximum Display Resolution (dpi) 1366 x 768
Screen Type WLED
Video Display CardVideo Display Card Integrated
Video Card Make Intel
Memory Type DDR3
Internet UtilitiesInternal Modem NA
WiFi 802.11b/g/n
Multimedia InfoSound Card Yes
Sound Card Make Yes
Microphone Yes
Speakers Yes
SecurityFingerprint Reader Yes
Web CamBuiltin Camera Yes
Resolution (Mega Pixel) 2.00
Ports and Cards InterfacesUSB Port 3
Bluetooth 1
Hdmi port 1
Laptop MeasurementsWidth (mm) 340.00
Depth (mm) 274.00
Height (mm) 39.00
Weight (Kgs) 1.44
BatteryBattery (Type) Lithium Ion
Battery Life (Hours) 6
Input DevicesKeyboard Type full-size keyboard
Touch Screen Yes
MiscellaneousOperating System Windows 7 Home Premium
Colour Options Black
Warranty (Years) 1

Wednesday, January 12, 2011

Google Code Blog: BigQuery, meet Google Spreadsheets

Google Code Blog: BigQuery, meet Google Spreadsheets: "Since announcing BigQuery at Google IO last May, we’ve been very excited by the response and feedback we’ve received from the developer comm..."

Google Code Blog: Google URL Shortener gets an API

Google Code Blog: Google URL Shortener gets an API: "When we launched Google’s URL shortener externally back in September, there was no accompanying API to allow people to integrate goo.gl into..."

Nokia N77 WCDMA 2100

The world's largest mobile-phone maker is showcasing the second generation of its successful E-series business phones. Going by the Mobile TV buzz, the company is gung ho on N77 -- its first mid-priced mobile-TV phone (and second overall). The phone will be able to receive TV signals broadcast in DVB-H (Nokia’s own TV technology platform). While Nokia and other European phone makers favour the homegrown DVB-H technology for watching broadcasts on cellphones, rival formats such as MediaFlo from Qualcomm and DMB are getting there too.

The N77 features a wide 2.4-inch screen, high-quality stereo sound and alerts when programmes are about to start. However, the Nokia N77 is much more than just live TV. Designed to work on 3G (WCDMA 2100 MHz), EDGE and GSM (900/1800/1900 MHz) networks, Nokia N77 is based on Series 60 3rd Edition software of Symbian OS.

The N77 WCDMA 2100, is cost of $480, roughly half the price of the N92, in Europe.

Automated wild malware troubles Yahoo and Microsoft IM

Messenger applications of Yahoo and Microsoft are facing new attack from malware which can infect the PC and user will not be able to know about this.

This malware download itself and infect user's PC and generally it infects contacts list made in both messenger application of Yahoo and MSN

If a user does not open any file, this malware can infect the PC in that condition also. However other malwares are delivered normally through attachments and infect the PC but this one is different from others.

As a reader of ZDNet Asia sister site ZDNet.com.au has said that his PC was affected by this malware afternoon and this malware installed itself in windows registry.

Whenever a user visit any website, ads that are going to be displayed will be replaced by other party and those ads will be shown instead of of original ads.

Also, when the user tried to boot up his PC after removing this malware, the machine shuts down. And there was a blue screen after this.

According to user this malware is not detected by McAfee and also bypasses spybot search and destroy.

However no representative of Yahoo or Microsoft was not available for comment at the time of publication.

Lenovo Laptops in India

Lenovo: A Worldwide Leader in Technology


Lenovo is an innovative, international technology company formed as a result of the acquisition by the Lenovo Group of the IBM Personal Computing Division.

Lenovo's executive headquarters are in Purchase, New York, USA with principal operations in Beijing, China, and Raleigh, North Carolina, USA and an enterprise sales organisation worldwide. The company employs more than 19,000 people worldwide.

Some beautiful laptops of Lenovo with Price range
1.
ThinkPad R61i Series 8932-A32

Configuration is as --

Thinkpad R61i Series with Intel Pentium Dual Core T2310 (1.46 Ghz) ( Prices given are Special Prices and are Tax Paid for Delhi,Haryana,U.P.)
Intel Pentium Dual Core T2310 (1.46 Ghz)
Dos
15.4 Inch WXGA
80GB HDD
(512+512) MB RAM
CDRW/DVD-RW

Price is INR 39000

2.

Lenovo Laptop 3000 N100 0769-A74

Configuration is as --

Lenovo Thinkpad 3000 N200 Series with Intel Pentium Dual Core T2370(1.73Ghz) AND Bluetooth-Integrated ( Prices given are Special Prices and are Tax Paid for Delhi,Haryana,U.P.)
Intel Pentium Dual Core T2370(1.73Ghz)
Dos
15.4"WXGA TFT
120 GB 5400 rpm HDD
512 MB RAM
DVD-RW Drive

Price is INR 35000


3.


Lenovo Laptop 3000 G410 2049-34Q


Configuration is as --

Lenovo Thinkpad 3000 G410 Series with Intel Core 2 Duo T5250 (1.5 GHz) with Free 512MB RAM ( Prices given are Special Prices and are Tax Paid for Delhi,Haryana,U.P.)
Intel Core 2 Duo T5250 (1.5 GHz)
Dos
14.1" WXGA TFT
120 GB 5400 rpm HDD
512 MB
DVD-RW/ DVD RAM (Slot in)

Price is INR 36000

4.


Lenovo Laptop 3000 G400 2048-23Q


Configuration is as --

Lenovo Thinkpad 3000 G400 Series with Intel Core Duo T2080 (1.73 GHz/ 533 Mhz, 1 MB L2 Cache) ( Prices given are Special Prices and are Tax Paid for Delhi,Haryana,U.P.)
Intel Core Duo 2080 (1.73 GHz)
Dos
14.1" WXGA TFT
80 GB SATA HDD
512 MB
DVD-RW/ DVD RAM (Slot in)

Price is only INR 32000

7 tips to safer online banking

Banking has never been easier. Type in one simple web address and you have access to your bank for almost anything, from viewing the latest balance to transferring money to your friend to paying for that online purchase.

However, this convenience has its set of risks too. The stepping of financial institutions into the virtual realm has lead to a new breed of financial criminals. Criminals, who largely thrive on the innocuousness of netizens and technology loopholes.

Here are some simple tips to prevent you from falling into the trap of these cyber criminals. Remember, a simple ignorance or oversight can make a huge dent in your hard-earned savings.

1.

Always check the URL of your bank's web site


Fraudsters can lure you to enter your user ID and password at a fake web site that resembles your bank. If you see anything other than the bank's genuine URL, it has to be fake.

Never enter your user ID or password or such sensitive information without ascertaining that you are on the right web site. Always type the Web address of your bank into the browser address space. Never click on the link in the email.


2.

Regularly check for security updates for your OS (operating system).

Most security updates are aimed at reducing risks to your computer, these may be data-related or otherwise. Make sure that your operating system and browser have the latest security patches installed. And, always install these only from trusted web sites.

Install a personal firewall to prevent hackers from gaining unauthorized access to your computer, especially if you connect to the Internet through a cable or a DSL modem.

3.

Change your online banking password at regular intervals.

Also, avoid easy-to-guess passwords, like first names, birthdays, kid's or spouse's name and telephone numbers. Try to have an alpha-numeric password, one that combines alphabets and numbers.

If you have several bank accounts, never use the same online banking password for all. Never select the option on browser that stores or retains user name and password. As it can easily be cracked by cyber criminals.

Also, never paste your password, always type it in. This little amount of `finger exercise' will go a long way in safety.

4.

Banking website address should be SSL protected.

Some banks have enhanced security features in Internet banking. For example, if the money that you want to transfer online to another account exceeds a particular sum, you may have to enter a specific password. Several banks require password to validate high-value transactions.

Make sure that the banking website address starts with https (SSL protected) which ensures encryption protected communications.


5.

Always log out when you exit the online banking portal.

Most banks have a 'last logged in' panel on their web sites. If your bank has it, check the panel whenever you log in. If you notice irregularities (like you are logging in after two days, but the panel says you logged in that morning!), report the matter immediately to your bank and change your password right away.

Always log out when you exit the online banking portal. Close the browser to ensure that your secure session is terminated. Never exit simply by closing the browser.


6.

Avoid accessing your bank online at cyber cafes.

Don't leave the PC unattended after keying in information while transacting on the web site. Avoid accessing your bank online at cyber cafes or on a share or public computer.

Also, avoid locations that offer online connections through wireless networks (Wi-Fi), where privacy and security are minimal.


7.

Avoid filling out forms in email messages that seem spam.

Avoid filling out forms in email messages that ask for personal financial information, like account or credit card numbers. Never, in response to any email, provide your online banking user ID, passwords, credit and debit card numbers.

No bank's representative will ever ask for your user ID/ credit or debit card number/ password in any form. If they do, change the bank!

Your Credit Card - Beware, before you swipe it.

What is the worst thing to do with your credit card? Use it to withdraw cash from the ATM, says a financial expert.

In your monthly credit card statement, there is a mention of cash limit. That is the extent to which one could withdraw cash using a credit card. But the googly is the interest rates. It’s actually a very expensive proposition to withdraw cash as the interest rates on such withdrawals fall in the range of 40 per cent on an annual basis.

Usually, the credit card company mentions the interest rate as a percentage per month which typically varies from 2.7-2.85 per cent per month. And since this interest is compounded monthly, the effective annual rate of interest tends to be anywhere from 38 to 40 per cent per annum.

Essentially, credit card companies charge the same interest rates for cash withdrawals made through credit cards and for rolling over credit card balances. But if one pays the entire amount on due date, one gets around 30-45 days of interest free credit.

But what is important to know is that the rule doesn’t apply in case of cash withdrawals; the credit card company levies the interest rate the moment you withdraw the cash.

Cash withdrawals can also attract an additional withdrawal fee. This charge falls in the range of 3-3.5 per cent of the withdrawn amount. That will be added along with the interest rate to your bill. Therefore, unless you have emergency needs, do not withdraw cash on your credit card. The better option though is to go for a personal loan.

RL Prasad, general manager and head of cards and personal loans at Standard Chartered Bank, says “You should look at this option as the last resort. If it’s a planned expenditure and you don’t have sufficient liquidity then a personal loan is be a viable option.

Looking for a job? Try Facebook Now

What's your value as a cyber mafia.

Are you really a cyber crime specialist or cyber mafia? Then what is your cost there?
You may be worth of $0.25 for your official name, $2 for cell number, $150 to $500 for credit card number and $50 to $400 for bank customer ID and PIN.

You could be worth $1,000 on an average. But when you enter in corporate world and deal with corporate information, your value could run into thousands of dollars.

Gone are the days when fun and fame were the sole aim of cyber hijackers, making fast buck is the key motive of today’s cyber crackers.

These nerds can outsmart cracker king Kevin David Mitnick. The tech savvyness attached to the profession makes it proliferate in terms of value and volume, said a leading cyber expert.

A case of a Chandigarh bank executive Mr. Vasudeva can realize you the reality and power of cyber crime and their mafias.

He logged on to a social networking site, a couple of months ago. “Soon, I started receiving mails from unknown sources asking about my health and home loan details. I thought someone who knows us well was playing a prank, until a tech-savvy friend realised my computer was hijacked and turned into a BOT (a hijacked computer), a captive.

In this case, when Vasudeva logged on a virus called as malware/spyware download itself automatically in the system and started sending the files to the outsider even passwords too from where it came.

Over 10,000 computers are converted into BOTs a day and are linked into large networks of such computers, called BOTnets.

On an average, around 400 BOTs are created a day in India, says a recent study. The country has over 40 command-and-control servers having 38,465 distinct BOTs.

Among the cities, Mumbai reported a share of 33 per cent, followed by Delhi at 25 per cent, Chennai 17 per cent and Bangalore 13 per cent.

Cyber criminals sell stolen information be it credit cards, credit verification values, bank accounts on the underground economy servers. The buyer is then required to pay cash.

Unwilling to risk exposure, buyers use cashiers agents who convert the stolen information into true currency in the form of e-gold (wherein the process is instantaneous and the payments are final, ensuring no charge-backs) or through money transfers.

India - second-largest wireless market in the world [FM82632-68]

Mobile telephony has grown rapidly in India, especially during the last three years, with India becoming the second-largest wireless market in the world, says a World Bank study.

The number of wireless subscribers in the country has reached 250 million, making India the second-largest wireless market in the world, says the study, The Role of Mobile Phones in Sustainable Rural Poverty Reduction.

Authored by Asheeta Bhavnani, Rowena Won-Wai Chiu, Subramaniam Janakiram and Peter Silarszky, the study says India is now second only to China, with tele-density already surpassing the 25 percent mark.

Currently, China is adding about six to seven million new subscribers per month, India about eight to nine million and the U.S. about two to three million, it notes.

"The private sector is also active in India and there are a number of telecommunication companies providing mobile telephone services who have to compete for market share and meet consumer expectations," according to the study released recently.

It argues that mobile telephony has a positive impact on economic welfare by generating GDP; job generation (both in the mobile industry and the wider economy); productivity increases; and taxation revenue with mobile operators usually being a sizeable contributor.

Epic Browser... Made in India

Finally, Indian did that for what all techies were waiting.
A Bangalore based software company launched India’s first web browser "Epic" created by Indians. Company name is Hidden Reflex.
Person behind this is Alok Bhardwaj who started this company in 2008. This Indian browser will provide various services like in built antivirus, searching computer for viruses, booking of flights, mark phishing attacks and will stop them.
The developers have included antivirus software, NOD 32, in the browser. This antivirus software provides maximum security, malicious website warnings and anti-publishing protection.
The most important and Indians friendly feature of this browser is that it is in 12 Indian local languages…. Hindi, Bangla, Punjabi, Marathi, Gujarati, Sanskrit, Nepali. This Epic browser is completely free of cost and can be downloaded from internet. URL is www.epic.com
"Epic will be useful to all types of users, including hard-core multi taskers and newbies," said Bhardwaj.
The Epic web browser is based on the open source Mozilla platform and users can create documents in 12 regional Indian languages using the sidebar. The browser will also offer national and regional news from popular publications and television channels.
The company is also offering more than1500 Indian themes and wallpapers with the browser. The built in free anti software of the browser will offer the protection of a conventional security software without any cost. It is capable of manually scanning the whole system or individual folders and also removing the threats.

ख़ून से पता चल जाएगी उम्र

ख़ून से पता चल जाएगी उम्र

मानव आंख सा कैमरा

मानव आंख सा कैमरा

Tuesday, January 4, 2011

Japanese Government Wants Apple To Add Content Filter To The iPhone


Apple has a history of trouble with the government in Japan, and over the the last days, more bad news reached the company (which is highly successful in Japan). This time it’s not about iPods causing fire but about the iPhone. The Japanese Ministry of Internal Affairs and Communications criticized Apple Japan and its exclusive provider in the country, SoftBank Mobile, for offering insufficient content control for minors.

According to reports in various Japanese media, the ministry will ask both companies to pre-install Japan-specific content control software on the iPhone as soon as possible. The background is that in this country, stores are obliged to install filtering software before selling cell phones (including smartphones) to minors.

In a first reaction, a speaker for SoftBank Mobile said that in the case of the iPhone, the process would be impractical as stores would require subscribers to provide personal information, including credit card numbers, before downloading censorware on the customer’s iPhone.

Japan is known to have one of the strictest legal frameworks for mobile internet usage by minors in the world.

Sunday, January 2, 2011

Google Code Blog: Google’s sample OpenID relying party site

Google Code Blog: Google’s sample OpenID relying party site: "More and more websites are enhancing their login systems to include buttons for identity providers such as Google, Yahoo, Facebook, Twitter,..."

Google Code Blog: HTML5 Games, Jammed

Google Code Blog: HTML5 Games, Jammed: "(Updated 10 Dec 2010 -- corrected link to 3rd Place Hilversum developer Kornel Lesinski's Twitter page.) Last month, more than 50 developer..."

Google Code Blog: New Shopping APIs and Deprecation of the Base API

Google Code Blog: New Shopping APIs and Deprecation of the Base API: "We are pleased to announce our newest addition to the shopping family -- a simple yet powerful programmatic interface that enables retailers..."

Saturday, January 1, 2011

Web Design Web Development Website maintenance by Calculus Infosoft in Jaipur, India

Web Design Web Development Website maintenance by Calculus Infosoft in Jaipur, India

Google Code Blog: HTML5 Games, Jammed

Google Code Blog: HTML5 Games, Jammed: "(Updated 10 Dec 2010 -- corrected link to 3rd Place Hilversum developer Kornel Lesinski's Twitter page.) Last month, more than 50 developer..."

Google Code Blog: Highlights from Google Developer Day 2010

Google Code Blog: Highlights from Google Developer Day 2010: "With our 3 Google Developer Days in Munich, Moscow and Prague last month, we wrapped up “GDD season” this year. It was great to meet many of..."

Google Code Blog: Richer photo support in the Google Buzz API

Google Code Blog: Richer photo support in the Google Buzz API: "You’ve already been able to simply include a photo in a Google Buzz post using the Buzz API. Today we’re making it much easier to add photo..."

Google Code Blog: A fresh look for Google Project Hosting

Google Code Blog: A fresh look for Google Project Hosting: "Simplicity is key to longevity. Since we launched in 2006, even as we’ve added new features, we’ve had very little desire to change our user..."

Google Code Blog: Announcing apache-extras.org

Google Code Blog: Announcing apache-extras.org: "The Apache Software Foundation (ASF) has had a profound influence on everything I’ve worked on over the last decade, and a new partnership w..."

Google Code Blog: WindowBuilder becomes new open source project with...

Google Code Blog: WindowBuilder becomes new open source project with...: "When Google acquired Instantiations in August 2010, everyone knew about our Java Eclipse products. Shortly after we joined, we talked about ..."

Google Code Blog: WebGL now in Beta: here comes the 3D web!

Google Code Blog: WebGL now in Beta: here comes the 3D web!: "(Cross-posted from the Chromium Blog) We’re happy to announce that WebGL is now on by default in Google Chrome’s beta channel, with some sh..."

Google Code Blog: Android stretches its legs... errr wheels... with ...

Google Code Blog: Android stretches its legs... errr wheels... with ...: "Today we announced a fun 20% robotics project that resulted in three ways you can play with your iRobot Create®, LEGO® MINDSTORMS&re..."

Google Code Blog: New Shopping APIs and Deprecation of the Base API

Google Code Blog: New Shopping APIs and Deprecation of the Base API: "We are pleased to announce our newest addition to the shopping family -- a simple yet powerful programmatic interface that enables retailers..."