Friday, July 16, 2010

Code protection tool for developers unveiled

Software optimization tool

Code protection tool for developers unveiled

New tool aims to help software developers to fight against piracy, reverse-engineering and IP theft, to which billions of dollars are lost every year

Wednesday, July 14, 2010

BANGALORE, INDIA: Crypto Obfuscator, the code-protection, obfuscation and software optimization tool from LogicNP Software, is set to become the new weapon of choice for software developers.

Using powerful software obfuscation and encryption techniques, Crypto Obfuscator aims to help software companies protect their valuable code from competitors, reverse-engineers and crackers said a press release.

Crypto Obfuscator gives a variety of advanced protections to .NET software including symbol renaming, string encryption and control flow obfuscation. “Some very unique protections offered by Crypto Obfuscator are the Anti-Debug, Anti-Tamper, Anti-Tracer and Anti-Reflection”, says G Himangi from LogicNP Software.

“We are constantly doing R&D - in the recently released v2010 R2, we added protection technique called method call hiding, which hides all calls made to methods in external dlls and to unrenamed internal methods. Nobody can make sense of how various methods are used by your software and this feature in itself is quite enough to frustrate a cracker. We are very proud of this feature!” says G Himangi.

Crypto Obfuscator also features WPF, XAML and BAML obfuscation, resource encryption and compression, and dependant-assembly embedding, encryption and compression.

“One of the focus areas for Crypto Obfuscator is ease of use and integration – we wanted to ensure that the obfuscation step becomes a seamless part of the software development process.” says G Himangi.

“To this end, Crypto Obfuscator offers features like command-line support, Visual Studio integration via Post-Build events and MSBuild, automatic resigning of strong-named assemblies, and even automatic code signing of obfuscated assemblies using Authenticode. We really wanted to ensure that the obfuscation step does not become a liability for developers and that developers do not develop a resistance to something so vital to IP protection," added Himangi.

©CIOL Bureau

Clampdown rumored as China "twitter" sites down

Clampdown rumored as China "twitter" sites down

Company sources told Reuters that the developments were the result of tightened government controls over the new services

Melanie Lee

Thursday, July 15, 2010

SHANGHAI, CHINA: Chinese social networking websites that provide Twitter-like services have suddenly reverted to testing mode and access has been spotty amid reports of a government clampdown.

Although Twitter has been banned for more than a year in China, Chinese Internet companies have been quick to fill the void, providing microblogging services that allow users to post frequent updates and follow other posters.

On Wednesday, NetEase.com Inc's microblog (t.163.com) was inaccessible. A notice said the site had been down since 7 p.m. on Tuesday and was under maintenance.

Sohu.com Inc's microblog (t.sohu.com) was also shut down for more than a day earlier in the week and all Chinese "twitters" now display the notice "in testing mode."

Company sources told Reuters that the developments were the result of tightened government controls over the new services.

"Nobody will publicly announce the reason, but it is as obvious as a fly on a bald head," one source said, declining to be named because of the sensitivity of the matter.

The Shanghai-based Oriental Morning Post cited unnamed "industry sources" as saying that the websites were under pressure from Chinese censors.

News content on Chinese Internet websites is under intense government censorship, and online news editors with major Internet portals often receive dictats from the government on what can and cannot be published. But the new microblogs of Internet portals, with less government censorship, have proved to be freer for carrying news and comments.

Nevertheless, in July 2009 Fanfou.com, a budding replica of Twitter, was shut down by the government amid a major campaign to tighten Internet controls.

Beijing has been trying to tighten controls on the country's booming Internet industry, the world's largest by users, since the second half of last year, introducing new regulations concerning online gaming, online mapping and e-commerce.

Sina Corp, China's largest Internet portal, launched a microblog in August last year. Yet, earlier this week, the company put an "in testing mode" notice on the website.

"We are constantly upgrading the site. Even though we launched in August last year it is still in testing mode," said Sina spokesman Liu Qi.

Sina and NetEase both denied government intervention and said the notices and sporadic site access were due to upgrading of features.

"NetEase's micro-blog is very popular and growing fast, so we had to perform maintenance to upgrade features," said NetEase spokesman Liu Youcai.

Sohu could not be reached for comment.

©Reuters

MySQL, Java best in hands of Oracle

MySQL and Java

MySQL, Java best in hands of Oracle

Oracle viewed as a better steward of Java and MySQL than Sun, says findings of a new survey

Thursday, July 15, 2010

SAN FRANCISCO, US: Oracle acquisition of Sun may spark resurgence of Java and faster growth of MySQL, says findings from a study by Jaspersoft, a provider in business intelligence platform.

Contrary to dark predictions by many in the open source community prior to its acquisition of Sun, Oracle was viewed by most respondents as a better steward of Java and MySQL than Sun. Indeed, most large organizations planned to use more Java than before and most expected to see MySQL innovate and improve faster under Oracle than under Sun.

According to the findings of a global survey of open source community members about the future of Java and MySQL under Oracle, 43 per cent of respondents said MySQL development and innovation would improve under Oracle; 80 per cent of respondents felt the Java process would improve or stay the same.

The most popular alternative to MySQL cited by respondents who said they planned to switch databases away from Oracle, is PostgreSQL. But only five per cent indicated they would switch.

Jaspersoft's survey revealed that 59 per cent of survey respondents were not aware that Oracle reorganized and established a completely separate MySQL business unit from Oracle's traditional RDBMS business, which includes separate and dedicated engineering, professional services, sales and marketing.

"It was a misconception to think Oracle would kill off MySQL," said Michael Fauscette, group vice president of Software Business Solutions at IDC research firm.

He further said that Oracle is not new to open source software with projects like InnoDB, Unbreakable Linux, Berkley DB, etc. and with the addition of Sun's portfolio of OSS, Oracle arguably became the world's largest OSS vendor. Oracle continues to target MySQL to areas of the market where MySQL is a good fit over Oracle's database products (small and medium business for example).

“What’s interesting now is seeing if Oracle can improve transparency, openness and foster stronger communities, something Sun was consistently criticized for," he added.

MySQL is the world's most popular relational database and the default relational storage engine in most open source enterprise software stacks. Java is the most popular language for writing open source enterprise applications. With its acquisition of Sun, Oracle has positioned itself to control substantial portions of both the open source and proprietary enterprise software stacks most commonly deployed in production today.

©CIOL Bureau

India gets its own web-browser: Epic

Web browser

India gets its own web-browser: Epic

Powered by Mozilla platform new browser has a suite of sidebar applications to improve multi-tasking and productivity

BANGALORE, INDA: Bangalore-based Hidden Reflex today launched Epic, the first web-browser targeting Indian audience powered by Mozilla platform. The browser has been created by a team of Indian engineers.

Addressing the press conference, Alok Bhardwaj, CEO and founder, Hidden Reflex, said, "We’re excited to introduce a unique Indian browsing experience that we hope will reach and resonate with every citizen in the country. As an organization, we foresee huge growth in Internet usage in India. Our aim with Epic is to make it easy even for the first time web users and at the same time powerful enough to be important for advanced users."

One of the features of Epic’s India sidebar, which supports Indian content, is to provide users access to latest national and regional news from popular publications, live television channels, videos, stock quotes, live cricket scores, top music albums, and local events.

Users can also choose from 1500+ customized Indian themes and wallpapers. It also enables user to write in twelve Indian languages on any webpage or on Write, Epic’s free built-in word processor.

R Rajalakshmi, director, STPI, said, "At STPI, we encourage small and start-up companies to use our infrastructure to build new and innovative applications.”

She added, "We must utilize the large talent pool available in India and develop our own innovative products. I hope to see more technologists catch up to the entrepreneurial spirit"

Epic also incorporates free antivirus scanning and healing, the only browser to offer this service.

Epic is the first browser to have a suite of sidebar applications to improve multi-tasking and productivity. Pre-installed applications include communication apps for Facebook, Orkut, Gmail, entertainment apps such as a Picture-in-Picture Video Sidebar and Games, and utilities such as File Backup, My Computer, a To-Do list, and Maps.

Internet user can now download the browser for free by logging onto the company website.

©CIOL Bureau

Linux to dominate mobile market by 2015

Linux to dominate mobile market by 2015


Growth of Linux-based mobile device shipments will outstrip growth of the entire mobile device market from 2010 to 2015

Friday, July 16, 2010

SCOTTSDALE, USA: ABI Research anticipates that Linux-enabled mobile devices, led by the success of Google’s Android and upcoming Chrome OSs, will comprise 62 percent of the operating systems shipping in all (non-smartphone) mobile devices by 2015.

“The number of Linux-oriented initiatives recently seen in the mobile industry indicates that Linux will be a key technology in the next generation of netbooks, media tablets, and other mobile devices,” says senior analyst Victoria Fodale.

Despite the growing number of Linux distributions in the mobile market, Linux has a unified base of upstream components, most notably the Linux kernel, says Fodale.

A new ABI Research study, “Linux for Mobile Devices,” examines the key market issues in the Linux ecosystem, as well as the technology drivers within the mobile device segment. It highlights the strengths and weakness of each mobile Linux platform including architecture, development, applications, and governance models. Detailed regional forecasts of shipments by each Linux-enabled platform are included.

Multiple application ecosystems-provided by Google’s Android and Chrome OSs, MeeGo, and Palm’s webOS-ride on top of the unified Linux components. This model enables companies to share the cost of research and development, yet differentiate their offerings in the marketplace added the press release.


©CIOL Bureau

7 tips for working securely from wireless hotspots

7 tips for working securely from wireless hotspots

Wireless hotspots are changing the way people work. These wireless local area networks (LANs) provide high speed Internet connection in public locations—as well as at home—and need nothing more than a mobile PC such as a laptop or notebook computer equipped with a wireless card.

In fact, hotspots are an everyday connection method for travelers and remote workers to browse the Internet, check their e-mail, and even work on their corporate networks while away from the office.

Hotspots range from paid services, such as T-Mobile or Verizon Wireless, to public, free connections. Hot spots are everywhere, including:

Coffee shops
Restaurants
Libraries
Bookstores
Airports
Hotel lobbies

But they all have one thing in common—they are all open networks that are vulnerable to security breaches. And that means it's up to you to protect the data on your PC. In this article, we cover a few tips to make working in public locations more secure.

Try to choose more secure connections

It's not always possible to choose your connection type—but when you can, opt for wireless networks that require a network security key or have some other form of security, such as a certificate. The information sent over these networks is encrypted, which can help protect your computer from unauthorized access. The security features of different networks appear along with the network name as your PC discovers them.


Make sure your firewall is activated

A firewall helps protect your mobile PC by preventing unauthorized users from gaining access to your computer through the Internet or a network. It acts as a barrier that checks all incoming information, and then either blocks the information or allows it to come through. All Microsoft Windows operating systems come with a firewall, and you can make sure it's turned on.

To activate the Windows Vista Firewall

Click Start and then click Control Panel.

In Control Panel, click Network and Internet.

Under Windows Firewall, click Turn Windows Firewall on or off.

Ensure that On is selected.

To activate the Windows XP Firewall


Click Start, and then click Control Panel.

In Control Panel, click Network Connections.

In the Network Connections window, under Network Tasks, click Change Windows Firewall Settings.

In the Windows Firewall dialog box, on the General tab, ensure that On is selected.


Monitor your access points

Chances are that there are multiple wireless networks anywhere you're trying to connect. These connections are all access points, because they link into the wired system that gives you Internet access. So how do you make sure you're connecting to the right one? Simple—by configuring your PC to let you approve access points before you connect.

Configure Windows Vista Access Points

Windows Vista takes the guesswork out of connecting to hotspots because you are automatically prompted to approve new connections. In addition, after you approve a connection, you assign it a profile for future use.

Configure Windows XP Access Points



Click Start, click Control Panel, and then click Network Connections.

Right-click Wireless Network Connection, and then click Properties.

On the Wireless Networks tab, make sure that the Use Windows to configure my wireless network settings check box is selected.

Under Preferred networks, make sure that the name of the network that you want to connect to is highlighted, and then click Advanced.

Click Access point (infrastructure) network only, and then click Close.


Disable file and printer sharing

File and printer sharing is a feature that enables other computers on a network to access resources on your computer. When you are using your mobile PC in a hotspot, it's best to disable file and printer sharing—when it's enabled, it leaves your computer vulnerable to hackers. Remember, though, to turn this feature back on when you return to the office.

Disable file and printer sharing in Windows Vista



Click Start, and then click Control Panel.

Click Network and Internet, and then click Network and Sharing Center.

Under Sharing and Discovery, click the arrow next to File sharing, click Turn off file sharing, and then click Apply.

Click the arrow next to Printer sharing, click Turn off printer sharing, and then click Apply.


Disable file and printer sharing in Windows XP




Click Start, and then click Control Panel.

Click Security Center, and then click Windows Firewall.

Click the Exceptions tab, and then under Programs and Services, clear the File and Printer Sharing check box.


Make your folders private

When the folders on your mobile PC are private, it's more difficult for hackers to access your files.

To make a folder private in Windows Vista

Windows Vista not only makes folders private by default, but it also requires passwords for shared folders. As a result, you're already covered! But if you want to double-check, simply right-click on the folder in question, and select Properties. On the Security tab, you can review the set permissions.

To make a folder private in Windows XP




Click Start, and then click My Computer.

Click the drive where Windows is installed, and then click Documents and Settings.

Open your user folder, right-click the folder that you want to make private, and then click Properties.

On the Sharing tab, click Do no share this folder, and then click OK.

Repeat the steps above for each folder that you want to make private.


Encrypt your files

You can protect your files further by encrypting them, which requires a password to open or modify them. Because you must perform this procedure on one file at a time, consider password-protecting only the files that you plan to use while working in a public place.


Consider completely removing sensitive data from your notebook PC

If you're working with extremely sensitive data, it might be worth taking it off your notebook PC altogether. Instead, save it on a corporate network share and access it only when necessary. This way, you have multiple safeguards in place.


A few simple precautions can help make working in public places more secure. And by selecting the best connections and adjusting settings, you can enjoy productive and safe work sessions no matter where you are.

Photos Of Ladakh

Photos Of Ladakh


Charukesi Ramadurai travels to northern India and returns with these images of the mountainous land and its people.

Ladakh — or La-Dags, meaning “land of high passes” — attracts travelers from all over the world, who come seeking glimpses of a life ordered by Himalayan Buddhism. Some go so far as to describe it is as the last Shangri La. A land of ancient monasteries, austere Buddhists, friendly locals, and stunning landscapes, Ladakh remains cut off from the rest of the world during the winter months.

Himalayas, aerial

1. An aerial view of the Himalayas as the flight from New Delhi prepares to land in Leh.


Indian vendor

2. A vendor of dried fruit and nuts sits at the Leh market wearing the traditional Brokpa costume and headgear, waiting for customers.


Vegetable vendors

3. Vegetable vendors display their wares in the main market of Leh. During the harsh winter months, supply of fresh vegetables and poultry to Ladakh is completely cut off.


Changla Pass

4.Changla Pass, at 5,360 meters, is proudly proclaimed the third-highest motorable pass in the world.


Mother and daughter, Ladakh

5. A young Ladakhi woman carries her small daughter in the customary manner.


Ladakhi girl

6. This little Ladakhi girl smiles from a distance but is shy when it comes to posing for the camera.


Pangong Lake

7. Cloudscapes at Pangong Lake, situated at an elevation of 4,250 meters and stretching 134km — only a third of the lake is in India, with the rest in Tibet.


Mountain reflection, India

8. Reflections of the mountains on a dull grey morning near Pangong Lake.


Indian monks

9. Young monks in training during an early morning prayer session at the Thiksey monastery near Leh.


Buddhist monk

10. A solitary monk walks in for his morning prayers at the Thiksey monastery.


Indian painter

11. Traditional painter Norboo Sonam works at his home in Likir, a couple hours’ drive from Leh.


Indus River

12. At the confluence of the Zanskar and Indus rivers, near the village of Nimmo, an hour’s drive from Leh. From here the blue green waters flow to Pakistan.


Indian woman

13. An old woman wearing protective sunglasses against the harsh mountain light at the main market in Leh.


Tso Moriri, India

14. The other high-altitude lake of Ladakh, Tso Moriri, whose waters change color with the whims of the sunlight.



15. A Ladakhi grandfather walks with his young grandson on the streets of Leh.

Futuristic High Speed Train

Futuristic High Speed Train


The first look inside futuristic high speed train nicknamed 'Concorde of the tracks'


By Ray Massey
Last updated at 2:46 AM on 15th July 2010


It's a far cry from the hot and sweaty commuter crush endured by millions of train travellers daily.
But this futuristically sleek, aerodynamic and downright sexy train is the way in which the backers of a new high speed rail link across Britain think travellers should be transported at speeds of up to 225mph within 15 years.
With an interior more reminiscent of a luxury penthouse apartment, comfortable sofas with cushions and soft furnishings, airy glass modules fitted with computer screens,  a storage space for folding bicycles, and a well stocked bar, glass modules, and a double decker observation deck, it is far removed from the experience of most rail travellers. 








Sicily Crypts: Place Where The Dead Don’t Sleep

Sicily Crypts: Place Where The Dead Don’t Sleep

   The Capuchin Order is an offshoot of the more famous Franciscans that branched out in the mid sixteenth century. Their names comes from the distinctive hood that the monks wear that has since lent its name to the popular coffee drink Cappuccino, whose foamed milk top it resembles. Even though this Order of the Friars Minor originated in the Marche region of Italy, their unique take on the mortal body after death make them a perfect fit for Sicily. In fact the first monk to be embalmed was placed in the crypt shortly after the Order arrived in Palermo.



   Entrance to the Crypt is located at Piazza Cappuccini, which is a short walk from the Palazzo Reale. It is an unassuming building that conforms to the Order’s vow of poverty and may be overlooked if you miss the signs. On arriving you may be greeted by the elderly monk who watches over the crypt as he gestures toward the cool and dark stairway that leads to the crypt. As you walk down the steps one is reminded of Dante’s inscription above the gates of hell: “Abandon all hope, ye who enter here.”



   Once inside the crypt feels more like the set for “Night of the Living Dead” or Michael Jackson’s “Thriller” than a religious community. No horror movie or amusement park haunted house can compete with hundred of bodies dressed in their Sunday’s best and suspended by hooks on the wall. The bodies, in various levels of decay stare down (some with their own eyes) looking like they are ready to grab you, wanting you to join them.

   A creepy, eerie feeling surrounds you as you walk along the halls. Suddenly the ghostly voice of a monk echoes through the chamber stating “no photo.” It makes you wonder why anyone would want to take pictures in the first place. If ghosts could be caught on film, it would certainly be here.



   Even though it seems like a hodgepodge of bodies, some hanging and some in open coffins, the crypt is organized by social status and gender. The first section contains the monks of the order, the original residents of crypt. This section includes the body of Brother Silvestro da Gubbio, the oldest member of the crypt whose grotesque remains have been welcoming visitors since 1599.



   The men’s section is next, all dressed in clothing of their time period and looking ready to rise and join the living. The Women’s section is very interesting as there is a special area for “virgins” denoted by bodies that wear a metal band on their skulls. These maids still wearing their silk dresses and bonnets are very spooky. The professor’s section is actually the area designated for doctors, soldiers another men of professions and include some famous individuals such as the painter Velasquez and sculptor Lorenzo Marabitti. The soldiers dressed in their parade uniforms are still colorful after nearly two centuries. The Priest section is small but contains numerous holy men still wearing their tattered cassocks and ghostly white vestments.

   The secret to the embalming process is visible toward the end of the tour as one of the “strainer rooms” used to desiccate the bodies is open to view. The process is mainly due to the conditions in the crypt itself that naturally wicks away bodily fluids. However the bodies are then embalmed using vinegar before being dressed according to family requests.



   This process was halted in 1871 with Brother Riccardo being the last buried under these conditions. However in the small chapel at the end of the tour houses the very last member of the crypt, a child that has come to be known as “sleeping beauty”. Rosalia Lombardo died in 1920 and thanks to a secret chemical embalming process she looks as if she is only sleeping. Encased in a glass-covered coffin, it is hard to believe that this little girl died 85 years ago. She looks like she could open her eyes at any moment, a truly haunting vision that stays with you for days.

   as you leave, you can support the convent by purchasing some freaky postcards of your favorite corpses from the crypt. As you can’t take photos, they make good conversation pieces or gifts for people you hate. Otherwise visitors to the crypt shouldn’t need souvenirs, as the weeklong nightmares should keep the memories fresh in you mind for a long time. This is not a tour for the squeamish, easily frightened or small children. However it is an absolute must for fans of horror movies, the macabre, mummies, and of course morticians.











Laura Acuna

Laura Acuna




















Stevie Leow

Stevie Leow



















KATRINA KAIF in BLACK

KATRINA KAIF in BLACK



[y6xyej6uo0pfary1z6hn.jpg]

[6x38mectfnjjxmmw8s3i.jpg]

[ryx4n246z51u7ylwduqy.jpg]

[ynv0cvg8qrv3hrch9bv0.jpg]

[sjx9v35e7lz8b03ij0.jpg]

[s68cmjb2ma3ubz15hsvc.jpg]

[erdjv2pmd9pyqiesj9e9.jpg]

[c6lwxgt658htzf6gzdg.jpg]

[pfexk4ozgarharpbgor0.jpg]

[ws8935cdtdclzqc9upm0.jpg]

Popular Posts