january, 2010 first edition

70
ACACIA JANUARY, 2010 FIRST EDITION SECTION OF THE MONTH THE SIXTH SENSE TECHNOLOGY THE SIXTH SENSE TECHNOLOGY THE SIXTH SENSE TECHNOLOGY THE SIXTH SENSE TECHNOLOGY 2010 TECHONLINE.BIZ.LY TECH ONLINE GROUP 1/1/2010 SPREAD YOUR WINGS OF MIND

Upload: anikofc41459

Post on 18-Nov-2014

287 views

Category:

Documents


2 download

DESCRIPTION

ACACIA is a monthly published tech-magazine, published by "TECH ONLINE " group. send your article to [email protected] to publish it.visit TECHONLINE.BIZ.LYfor more information.

TRANSCRIPT

Page 1: January, 2010 First Edition

ACACIA

JANUARY, 2010 FIRST EDITION

SECTION OF THE MONTH

THE SIXTH SENSE TECHNOLOGYTHE SIXTH SENSE TECHNOLOGYTHE SIXTH SENSE TECHNOLOGYTHE SIXTH SENSE TECHNOLOGY

2010

TECHONLINE.BIZ.LY

TECH ONLINE GROUP

1/1/2010

SPREAD YOUR WINGS OF MIND

Page 2: January, 2010 First Edition

2 | P a g e

PREFACE

We are a group of students. This is our first try to publish an online web magazine from

our website WWW.TECHONLINE.BIZ.LY . We with some of our college friends have

tried hard to publish ACACIA. It has been made by focusing on computer funda,

robotics, ethical hacking, latest gadgets, some unsolved mysteries etc. We are tech freaks

and always want to be updated with latest technology. We want to express and share our

views with each other. We believe that sharing is caring and it is the best way to increase

our knowledge. So it is our try to gather & share technical information through

ACACIA.

ACACIA will be published monthly. Besides of

technical post of different students there are some regular sections like TECH-VISION,

TRICKS & TIPS, TECH-CHECK, ROBOTIX and ETHICAL HACKING. We also have

a special topic for every month, which will be specially highlighted.

We are pleased to thank all of our respected

moderators joydeep roy, tanuj gyan, rahul kumar and also TECHNICHE’ group to

support us. Thanks to all who have contributed their posts & writings for this magazine .

We expect your support in future also to continue our journey. The first edition of this

magazine is contributed to all of our friends and colleagues who have encouraged us to

start our journey. Most of all we thank God for His inspiration, guidance, and strength

throughout this seemingly impossible task..

In conclusion, it is our humble request to all the readers to send their remarks on this

magazine, so that we can overcome our mistakes & improve this magazine

EDITORS

ANIK CHAKRABORTY

MAYUKH CHAKRABORTY

WE ARE “TECHONLINE GROUP”

VISIT US AT - TECHONLINE.BIZ.LY

Page 3: January, 2010 First Edition

3 | P a g e

Contents

TOPICS PAGE • 3G ON THE MOVE SHENAZ REHMAN 06

• BHANGARH-the most

Haunted place in india TANUJ GYAN 07

• BIONICS DIPANKAR SINGH 08

• BOMB DEBANKO BASU 10

• COMBINED PROPULSION

SYSTEM AYAN BHATTACHARIYA 11

• FUTURE TECH SOURAV KUNDU 14

• FROM THE WEB TO GRID Siddhartha Sekhar Bose 15

• HAFNIUM BOMB-the next

Super weapon SOUVIK DUTTA 17

• THE HIGHWAY SKY SOMDATTA DEY 18

• IPTV PRASENJIT NAYAK 21

• LAPTOP PROTECTION SOURAV HALDER 22

• LIFE AFTER DEATH-(A

Parapsychological research) SHAONTY BANARJI 23

• CROME OS MAYUKH CHAKRABORTY 26

• GETTING GEOGRAPHICAL

INFORMATION USING AN

IP ADDRESS JOYDEEP ROY 29

• THE LOST WORLD OF

ATLANTIS AVIK KHARA 37

REGULAR SECTIONS

• TECH VISION

Page 4: January, 2010 First Edition

4 | P a g e

• EL CHUPACABRA TECHONLINE 40

• NANO TECHNOLOGY SHENAZ REHMAN 41

• LOCH NESS MONSTER ANIK CHAKRABORTY 43

• THE QUANTUM VACUUM TANUJ GYAN 44

• MOBILE BUG SOURAV HALDER 45

• TRICKS & TIPS ANIK CHAKRABORTY

(MODERATOR)

• NOTEPAD “WORLD TRADE 46

CENTRE TRICK”

• DISABILING DISPLAY IN 46

MY COMPUTER

• HOW TO HIDE IMPORTANT

INFO IN AN IMAGE FILE 47

• TECH-CHECK

RAHUL KUMAR (MODERATOR)

• ULTRA SMALL AGENT HP

VIDEO RECORDER CAMERA 47

• CHARIST SKATES 49

• THE GOOGLE PHONE 50

Page 5: January, 2010 First Edition

5 | P a g e

• ROBOTIX

MAYUKH CHAKRABORTY & ANIK CHAKRABORTY

(MODERATORS)

INTRODUCTION TO ROBOTICS 51

• ETHICAL HACKING

JOYDEEP ROY (MODERATOR)

CHAPTER: 1 SETTING THE STAGESETTING THE STAGESETTING THE STAGESETTING THE STAGE 61616161

• SECTION OF THE MONTH

THE SIXTH SENSE TECHNOLOGY 65

PRANAV MISTRY, FLUID INTERFACE GROUP, MIT MEDIA LAB

TECH ONLINE VIEW ANIK CHAKRABORTY 68

Page 6: January, 2010 First Edition

6 | P a g e

3G on the Move

SHENAZ REHMAN

What is 3G? 3G (third generation) is an industry term for a collection of international standards and technologies targeted at increasing efficiency and improving the performance of mobile wireless networks. 3G is really a reference to high-speed wireless data. What does 3G offer? Greater data speed, increased capacity for both voice and data. Packet data network, versus today’s circuit switched networks. Opportunity to introduce new and robust wireless applications for both consumer and business markets. 3G Standards The International Telecommunications Union (ITU) has developed a series of technical recommendations, or standards, that define the key characteristics of IMT - 2000 radio systems. The standards are intended to minimize the number of different radio interfaces, maximize their commonality, and provide a transition path to 3G.

• Leading 3G standards are based on CDMA technology (however, other standards are based on FDMA/TDMA-SC).

• One CDMA-based 3G standard is CDMA-2000.

• Another CDMA-based 3G standard is WCDMA, or wideband CDMA.

• The cost of adopting WCDMA is considerably greater than the cost to migrate to CDMA-2000.

CDMA Direct Spread interface is called the Universal Terrestrial Radio Access (UTRA) Frequency Division Duplex (FDD) or WCDMA. CDMA Multi-Carrier radio interface also is called cdma2000 and operates in FDD. CDMA TDD radio interface employs a direct-sequence CDMA radio access scheme. There are two versions: UTRA Time Division Duplex (TDD) and TD-SCDMA. TDMA Single-Carrier radio interface also is called Universal Wireless Communication-136 (UWC-136) and is an FDD system. FDMA/TDMA radio interface also is called Digital Enhanced Cordless Telecommunications (DECT) and is defined by a set of European Technical Standards Institute (ETSI) standards. Key Benefits of 3G Ultimately, it means faster, richer applications and more opportunities for customers to fulfill their information, entertainment, messaging and transaction needs their mobile devices when it’s most convenient for them. Benefits of CDMA

• Voice Clarity and Call Quality.

• Fewer Dropped Calls.

• Reduced Background Noise and Interference.

• Improved Security and Privacy.

• Greater Capacity.

• Greatest Coverage for Lower Cost.

Page 7: January, 2010 First Edition

7 | P a g e

BHANGARH-the most haunted place in

India

Tanuj gyan

Bhangarh in Rajasthan (a place on way from Jaipur to Alwar city in) which is the most

haunted Place in India as per Archeological Survey of India. “STAYING HERE AFTER

SUNSET IS STRICTLY PROHIBITED” is written on the board at city entrance…………

There are several stories explaining this menace

In the first half of the 17th century, Madho Singh of Amber built his capital here with

the sanction of an ascetic Baba Balanath, who meditated there, but not without his dire

prescription: “Look my dear chap! The moment the shadows of your palaces touch me,

you are undone. The city shall be no more!” In ignorance, Ajab Singh, one of the later

descendants in the dynasty, raised the palace to such a height that the shadow reached

the forbidden place hence the devastation.

A second legend tells of a tantric battle waged between the lovely queen Ratnavali and

that wicked sorcerer Singha Sevra, whose chhatri can be seen on the top of the hill.

Desperately, he tried to trap her in his magical web, and failed every time, as the queen

herself was a past-mistress in the tantric art.

The last battle took place on the day when the queen losing eventually her temper,

transformed a glass bottle containing the massaging oil into a big rock and flung it

towards the hill-top, where sat the devil. In vain he tried to stall this glass missile. It was

too late. Sensing his imminent death, concentrating all his powers, he spat his dying

curse: “I die! But thou too, thou Ratnavali shall not live here anymore. Neither thou, nor

thine kin, nor these walls of the city. None shall see the morning sun!” I suspect, it was

Page 8: January, 2010 First Edition

8 | P a g e

after all, the demon that had the last laugh! The night was spent in hastily trying to

transfer the palace treasures to the new site of Ajabgarh. In the morning came the

tempest leveling everything to the ground.

People say that nobody returned from there that stayed there after dark. The irony of the

situation is that as per Govt. of India rules, there has to be an office of Archaeology Survey of

India (ASI) beside every historical structure in India. But even Government authorities couldn't

dare to open an office there and they opened their office about one kilometer away from the

ruins of Bhangarh. People who visit this place out of tourist interest say that there is a strange

feeling in the atmosphere of Bhangarh, which causes sort of anxiety and restlessness.

BIONICS

Dipankar singh

The term bionics is the application of biological methods and systems found

in nature to the study and design of engineering systems and modern technology. The term

coined in the year 1958 by Jack E. Steele, it actually signifies the flow of concepts from

biology to engineering and vice versa.

May sound like a new term, in fact a little complicated, but the deeper one gets, the more

interesting it becomes. The transfer of technology between life forms and manufactures is the

key principle of operation of bionic engineering. A classical example is the development of dirt-

and water-repellent paint (coating) from the observation that the surface of the lotus flower plant

that is practically nonsticky thus giving the “lotus effect”. in fact sonar, radar, and

medical ultrasound imaging imitating were inspired from the echolocation of bats. In fact there are

several such interesting examples that follow:

• Cat's eye reflectors were invented after studying the mechanism of cat eyes that had a

system of reflecting cells, known as tapetum lucidum, which was capable of reflecting the

tiniest bit of light.

Page 9: January, 2010 First Edition

9 | P a g e

• Leonardo da Vinci's flying machines and ships are early examples of drawing from nature

in engineering.

• Resilin is a replacement for rubber that has been created by studying the material also

found in arthropods.

• Pinecones respond to higher humidity by opening their scales (to disperse their seeds).

The "smart" fabric does the same thing, opening up when the wearer is warm and

sweating, and shutting tight when cold. Another good analogy of bionic invention.

• "Morphing aircraft wings" that change shape according to the speed and duration of flight

were designed in 2004 by biomimetic scientists from Penn State University. The

morphing wings were inspired by different bird species that have differently shaped wings

according to the speed at which they fly.

There are numerous such instances of bionics. If we throw some light on the use of biometics in

the field of medicine we shall see how this revolutionizing technology has replaced or enhanced

of organs or other body parts by mechanical versions. The artificial heart invented in 2004

functions efficiently as a neat replacement for the biological heart.

Another, more recent meaning of the term bionics refers to merging organism and machine. This

approach results in a hybrid system combining biological and engineering parts, which can also

be referred as a cybernetic organism (cyborg).

In a more specific meaning, it is a creativity technique that tries to use biological prototypes to get

ideas for engineering solutions. This approach is motivated by the fact that biological organisms

and their organs have been well optimized by evolution

Bionics is a huge term with enormous meanings and undoubtedly a new pathway for modern

technology. Here in this piece only a brief introduction to this ever increasing invention is given. A

new technology no doubt, but it is also a fast growing one with contributions to modern science in

innumerable ways.

Page 10: January, 2010 First Edition

10 | P a g e

BOMB

Debanko Basu In military science, the term "aerial bomb" or "bomb" denotes a container dropped from an aircraft and designed to cause destruction by the detonation of a high-explosive bursting charge or incendiary or other material. Bombs differ from artillery shells, missiles, and torpedoes in that the latter are all propelled through the air or water by a man-made agency, while bombs travel to their targets through the force of gravity alone. A major distinction must also be made between conventional bombs and atomic and thermonuclear bombs, which have a far greater destructive capacity. The typical conventional bomb is a streamlined cylinder that consists of five major parts: an outer casing, the inner explosive material, devices such as fins to stabilize the bomb in flight, one or more fuzes to ignite the bomb's main charge, and a mechanism for arming the fuze or preparing it to explode. Bombs can be classified according to their use and the explosive material they contain. Among the most common types are blast, fragmentation, general purpose, antiarmour, and incendiary bombs. All of these were used in World War II. Newer types include cluster and fuel-air explosive (FAE) bombs. Aiming bombs has always been the most challenging part of aerial bombing, since the bomber must choose a point at which to release the bomb from a moving aircraft so that its trajectory intersects a target on the ground. The paths traversed by the plane and the bomb can be calculated mathematically, but the person who releases the bomb must act within seconds.

Smart, or homing, bombs can be guided to their targets with an even higher degree of accuracy. Such bombs are fitted with small wings and adjustable fins that give the bomb some in-flight manoeuvrability by means of gliding. The bomb's nose is fitted with a small laser or TV-camera guidance system which provides data on the target's location to a computer, which then sends signals to actuators that adjust the bomb's wing and fin surfaces as needed to keep the bomb on track to the target. In the laser system, a beam of laser light is directed at the target from an aircraft, and the bomb's laser sensors pick up the reflected beam and follow it down to the target. A TV-guidance unit fitted onto a bomb is locked onto the target by an aircraft and then transmits continuous pictures of the target either to a computer in the bomb or to the aircraft crew, either of whom can guide the bomb directly onto its target. Several types of fuzes are used in bombs. Impact fuzes, historically the most common type, are set in the bomb's nose and detonate upon impact, setting off the main charge. Most bomb fuzes are armed at the moment of the bomb's release from the aircraft, or just before, so that fused bombs cannot explode while being loaded or while being transported to their target.

Bombs first assumed military importance with the rapid development of zeppelins and aircraft in World War I, but the tonnages dropped in that conflict were insignificant, largely because the carrying capacity of the aircraft was so small. World War II saw the use of larger bombs in much greater numbers; more than 1.5 million tons of bombs were dropped by the Allies on Germany alone. Similar tonnages of bombs were used by the United States in the Korean and Vietnam wars, but by the time of the Persian Gulf War (1990), tonnages had dropped owing to the increased use of highly accurate smart bombs.

Page 11: January, 2010 First Edition

11 | P a g e

Combined Propulsion Systems Ayan bhattachariya

CODOG Combined diesel or gas (CODOG) is a type of propulsion system for ships that need a maximum

speed that is considerably faster than their cruise speed, particularly warships like modern

frigates or corvettes.

For every propeller shaft there is one diesel engine for cruising speed and one geared gas

turbine for high speed dashes. Both are connected to the shaft with clutches, only one system is

driving the ship in contrast to CODAG-systems, which can use the combined power output of

both. The advantage of CODOG is a simpler gearing compared to CODAG but it needs more

powerful (or more) gas turbines for the same power output and also the fuel consumption at

high speed is even worse compared to CODAG.

CODOG vessels

Brandenburg class frigates and f the German Navy

Anzac class frigates of the Royal Australian Navy (RAN) and Royal New Zealand Navy

Peder Skram class frigate of the Royal Danish Navy

Visby class corvette of the Swedish Navy

Page 12: January, 2010 First Edition

12 | P a g e

CODAG

Combined diesel and gas (CODAG) is a type of propulsion system for ships which need a

maximum speed that is considerably faster than their cruise speed, particularly warships like

modern frigates or corvettes.

It consists of diesel engines for cruising and gas turbines that can be switched on for high-speed

transits. In most cases the difference of power output from diesel engines alone to diesel and

turbine power combined is too large for controllable pitch propellers to limit the rotations so

that the diesels can continue to operate without changing the gear ratios of their transmissions.

Because of that, special multi-speed gearboxes are needed. This contrasts to CODOG systems,

which couple the diesels with a simple, fixed ratio gearbox to the shaft and disengage them,

when the turbine is switched on.

Typical cruising speed of CODAG warships on diesel-power is 20 knots and typical maximal

speed with switched on turbine is 30 knots.

.

CODAD Combined diesel and diesel (CODAD) is a propulsion system for ships using two diesel engines to

power a single propeller shaft. A gearbox and clutches enable either of the engines or both of

them together to drive the shaft.

Page 13: January, 2010 First Edition

13 | P a g e

COSAG Combined steam and gas (COSAG) is a propulsion system for ships that uses a combination of

steam turbines and gas turbines to power the shafts. A gearbox and clutches enable either of

the engines or both of them together to drive the shaft. It has the advantage of the cruising

efficiency and reliability of steam and the rapid acceleration and start-up time of gas. This

system was mainly used on first-generation gas-turbine ships such as the Royal Navy's County

class destroyer and Tribal class frigate .

COGAG Combined gas turbine and gas turbine (COGAG) is a type of propulsion system for ships using

two gas turbines connected to a single propeller shaft. A gearbox and clutches allow either of

the turbines to drive the shaft or both of them combined.

Using one or two gas turbines has the advantage of having two different power settings. Since

the fuel efficiency of a gas turbine is best near its maximum power level, a small gas turbine

running at its full speed is more efficient compared to a twice as powerful turbine running at

half speed, allowing more economic transit at cruise speeds.

Compared to Combined diesel and gas (CODAG) or Combined diesel or gas (CODOG), COGAG

systems have a smaller footprint but a much lower fuel efficiency at cruise speed and for CODAG

systems its also somewhat lower for high speed dashes.

Page 14: January, 2010 First Edition

14 | P a g e

FUTURE TECH Sourav kundu Have you ever dreamt about the day when you could buzz around in your very own flying machine? Shocked? Well, that day may be sooner than you think. The folks at NASA have built something called “The Highway in the Sky.” It's a computer system designed to let millions of people fly whenever they please, and take off and land from wherever they please, in their very own vehicles. And here’s the good news -- a lot of people are building machines that will be consumer friendly enough to let a lot of people buy it. A lot of inventors have tried to cash in on personal flying machines. One, built in 1956, was known as Molt Taylor’s aero car. One could detach the wings and haul them behind. But they failed to catch on because it was too expensive and hard to fly in bad weather. And now finally NASA has come up with a plan to make personal flying machines a reality. Bruce Holmes is one of NASA’s chief strategists has worked on the future of aviation. He demonstrated a flight simulator, a new computer system that could be put into any new airborne vehicle thus making flying easy, and managing the traffic up there. It’s called “The Highway in the Sky,” and here’s how it works: The plane is kept inside the box, away from other vehicles, and the plane’s computers automatically guide them towards their destination. They can even follow the highway down to the ground. It's a

Page 15: January, 2010 First Edition

15 | P a g e

$130-million program that can also help pilots fly in bad weather. Even if it’s dark and stormy, pilots can use the screen to see what’s outside. It’s a technological breakthrough that will ultimately allow more people to fly than ever before The Sky car is the latest attempt to build a real flying car. Invented by Paul Moller, It has been described as a cross between a Ferrari and a Batmobile. When its four sets of rotary engines tilt up, the car can blast off up into the sky giving the magic carpet feel of Arabian nights. Moller thinks it will be able to save people from burning buildings -- as demonstrated in his promotional video, which shows the Skycar bypassing traffic jams, extending a built-in catwalk, and ultimately saving the day. Then we again have yet another wave of magic wand. It’s called the CarterCopter, and it has a large top rotor and small wings which double as fuel tanks. Propulsion is generated from the tiny secondary propeller at the rear of the plane. It can take off and land vertically like a helicopter, but can fly as fast as an airplane. The speedy CarterCopter will let one fly from a helipad in downtown New York to a helipad in downtown Los Angeles, skipping that time-consuming drive from the airport to home. Thus with the advent of modern future technology, revolutionising the world it will not be long when today’s planes and jets will ultimately become relics – and that “The Highway in the Sky” will be filled with flying machines that we can’t even begin to imagine. All that can be assured presently is that, "The good stuff is coming. The really good stuff is coming."

From the Web to the Grid

Siddhartha Sekhar Bose

• Evolution or Revolution?

Page 16: January, 2010 First Edition

16 | P a g e

Fundamental science can change our daily lives in unexpected ways for example it may be

difficult for may be teenagers today to imagine a world without the World Wide Web.

But when they were born this technology was just in its infancy being developed at CERN

(European Organization for Nuclear Research, Geneva) for use by high energy physicists. Today a

similar sort of technology is emerging from the efforts to build the Large Hadron Collider (LHC).

It is called the GRID.

What is the Grid?

The grid is a service for sharing computer power and data storage capacity in a geographically

distributed way.

Scientists are facing increasingly complicated problems which require more and more

computing power and data storage capacities. The grid tries to tackle these problems by taking

the computers all over the world and making them act as a single, huge, powerful computer.

How does it WORK?

Although the Grid depends on the underlying hardware of the Internet- computers and

communications network- it is novel software that enables users to access computers

distributed over the network. The software called middleware (because it is conceptually

between operating system software of the computer and applications software that solves a

particular problem) and it is tasked with the organization and integration of disaparate

computational resources of the Grid into a coherent whole.

Page 17: January, 2010 First Edition

17 | P a g e

The first major users of The Grid will probably be scientists with challenging applications, who

need large computing power or who deal with vast amounts of data. Biologists want to simulate

thousands of molecular drug candidates to see how they would interact with specific proteins.

to unlock the secrets of human genome massive amounts of data have to be analysed.

Earth Scientist may also use it to keep track of atmospheric ozone with satellite observation

downloading 100 gigabytes of raw images per day.

The Grid is a ‘work in progress, with the underlying technology being developed by hundreds of

engineers and software developers around the world. Although its future is still uncertain it has

potentially revolutionary implications for Information Technology.

HAFNIUM BOMBS- THE NEXT

SUPER WEAPON……

Souvik dutta In the latter half of 1998, a small clutch of researchers and students at the University of Texas embarked upon a groundbreaking experiment. Within a large outbuilding marked with a slapdash sign reading

Page 18: January, 2010 First Edition

18 | P a g e

“Center for Quantum Electronics”, the team powered up a makeshift x-ray emitter and directed its radiation beam at an overturned disposable coffee cup. Atop the improvised Styrofoam platform was a tiny smear of one of the most expensive materials on Earth: a variation of the chemical element hafnium known as Hf-178-m2. The researchers’ contraption– cobbled together from a scavenged dental x-ray machine and an audio amplifier– bombarded the sample with radiation for several days as monitoring equipment quietly collected data. When the experiment ended and the measurements were scrutinized, the project leader Dr. Carl B. Collins declared unambiguous success. If his conclusions are accurate, Collins and his colleagues may have found the key to developing fist-sized bombs which can deliver destruction equivalent to a dozen tons of conventional explosives. Hafnium-178-m2 is a nuclear isomer– an atomic state where the particles of the nucleus are “excited” by higher than normal amounts of energy. Most such isomers are unstable and extremely short-lived, instantly ejecting their excess energy as gamma radiation in order to return to the ground state. But a handful of varieties such as hafnium-178-m2 have a constitution which prevents this release from occurring immediately, which places them in the category of nearly-stable. This interesting property causes nearly-stable isomers to act as “energy sponges”, allowing them to absorb a massive amount of energy which bleeds out very slowly. Hafnium-178-m2 has a half-life of thirty-one years, meaning that it takes a little over three decades for half of the isomer’s stored energy to be emitted as gamma rays. Hafnium is also notable for having the highest excitation energy among the nearly-stable isomers; half a teaspoon of pure Hf-178-m2 contains about the same amount of potential energy as one ton of TNT. A working hafnium device would tend to deluge its target area with absurd amounts of penetrating gamma radiation during the explosion, liquefying the flesh of any persons nearby– even those protected by bunkers. But the most appealing aspect of isomer triggering was its potential to shoehorn yet more death and destruction into convenient “fun size” packages. Even under the best of circumstances, the coveted isomers would cost approximately $1 million per gram assuming a minimum $30 billion investment in production facilities. The investigations also underscored the fact that radioactive hafnium would not be totally consumed even by a successful triggering– so any such bomb would produce a profoundly “dirty” detonation by scattering radioactive material over the blast area

Page 19: January, 2010 First Edition

19 | P a g e

THE HIGHWAY SKY

Somdatta dey

Have you ever dreamt about the day when you could buzz around in your very own flying

machine? Shocked? Well, that day may be sooner than you think.

The folks at NASA have built something called “The Highway in the Sky.” It's a computer system

designed to let millions of people fly whenever they please, and take off and land from

wherever they please, in their very own vehicles.

And here’s the good news -- a lot of people are building machines that will be consumer friendly

enough to let a lot of people buy it.

A lot of inventors have tried to cash in on personal flying machines. One, built in 1956, was

known as Molt Taylor’s aero car. One could detach the wings and haul them behind. But they

failed to catch on because it was too expensive and hard to fly in bad weather. And now finally

NASA has come up with a plan to make personal flying machines a reality.

Page 20: January, 2010 First Edition

20 | P a g e

Bruce Holmes is one of NASA’s chief strategists has worked on the future of aviation. He

demonstrated a flight simulator, a new computer system that could be put into any new

airborne vehicle thus making flying easy, and managing the traffic up there.

It’s called “The Highway in the Sky,” and here’s how it works: The plane is kept inside the box,

away from other vehicles, and the plane’s computers automatically guide them towards their

destination. They can even follow the highway down to the ground. It's a $130-million program

that can also help pilots fly in bad weather. Even if it’s dark and stormy, pilots can use the screen

to see what’s outside. It’s a technological breakthrough that will ultimately allow more people

to fly than ever before

The Sky car is the latest attempt to build a real flying car. Invented by Paul Moller, It has been

described as a cross between a Ferrari and a Batmobile. When its four sets of rotary engines tilt

up, the car can blast off up into the sky giving the magic carpet feel of Arabian nights. Moller

thinks it will be able to save people from burning buildings -- as demonstrated in his

promotional video, which shows the Skycar bypassing traffic jams, extending a built-in catwalk,

and ultimately saving the day.

Then we again have yet another wave of magic wand. It’s called the CarterCopter, and it has a

large top rotor and small wings which double as fuel tanks. Propulsion is generated from the tiny

secondary propeller at the rear of the plane. It can take off and land vertically like a helicopter,

but can fly as fast as an airplane. The speedy CarterCopter will let one fly from a helipad in

downtown New York to a helipad in downtown Los Angeles, skipping that time-consuming drive

from the airport to home.

Thus with the advent of modern future technology, revolutionising the world it will not be long

when today’s planes and jets will ultimately become relics – and that “The Highway in the Sky”

will be filled with flying machines that we can’t even begin to imagine. All that can be assured

presently is that, "The good stuff is coming. The really good stuff is coming."

Page 21: January, 2010 First Edition

21 | P a g e

IPTV

PRASENJIT NAYAK

Many attempts have been made to devise a killer application for the broadband

network. Over the last decade, the growth in the popularity of satellite service, the

growth in digital cable and the emergence of HDTV have all left their marks on the TV

scenario, but none considered adequate enough to fit the bill of killer application. A

value added application with high average revenue per user seemed to be the necessity

of the hour, based on Internet Protocol (IP) to give user full control and entertainment

value.

Then came the advent and answer to all these questionable needs-IPTV. IPTV is a

Broadband connection that uses Internet protocols to telecast TV programs. Since it is

digital format all analog TV requires set top box (STB). IPTV clubbed with other services

like video-on –demand (VOD), Voice over IP (VOIP), Web access, this collectivity called

triple-play. Triple play means Internet, TV, telephone over a single Broadband

connection.

Although IPTV is on Internet protocol, it is a service on TV; hence it does not require

computer or Internet bandwidth. It runs through a telephone wire & set top box (STB).

When a user changes a channel on STB, The box does not tune a channel like cable

system. It switches channels by using the IP group membership protocol. When the local

office receives this request, it checks to make sure that the user is authorized to view

the new channel, then direct the routers in the local office to add that particular user to

channels distribution index. In this way, only signals that are currently being watched

are sent from local office to digital subscriber.

IPTV gives viewers freedom from time bound TV schedule. Viewers can now go to back

watch any live broadcast they may have missed. Indeed very good news for busy sports

fans. Again it also offers video on demand, which enables viewer to choice any video

from a vast library. Also In a country like India, Internet uses still very low. The fact that

IPTV allows broadcast channels and Internet on one platform is a sure way of boosting

Internet uses on the country.

Page 22: January, 2010 First Edition

22 | P a g e

IPTV is a technology of the future and gradually making its mark in India. The IPTV forum

has set target of 1 million subscribers by 2012 which does not seem a distant dream if

its present demand among consumers is concerned.

LAPTOP PROTECTOR

Sourav halder

Laptops are very easy to nick and since they are valuable in terms of money as well as

data so it becomes difficult to compensate the loss. Here we present a miniature alarm

generator that can help you protect your laptop against theft. It is fixed inside a laptop

case and when someone tries to take the laptop, this highly sensitive circuit activates

the alarm through tilting of laptop case.

The circuit uses readily available components that can be easily assembled on Vero

board or a general purpose PCB. It is powered by a 12V miniature battery used in

remote controlled devices.

Page 23: January, 2010 First Edition

23 | P a g e

IC TL 071: this is used as a voltage comparator with a potential divider comprising R2

and R3 providing half supply voltage at non-inverting input (pin 3). The inverting input

receives higher voltage through a water activated tilt switch only when probes in the tilt

switch makes contact with water.

IC CD4538: This is a monostable multivibrator with timing elements R5 and C1. CD4538

is a precision monostable multivibrator free from false triggering and more reliable than

IC 5555 timer. Its output becomes high when power is switched ON and it becomes low

when trigger input gets a low to high transition pulse.

The unit is fixed in the laptop in horizontal position. In this position, the water inside tilt

switch effectively shorts the contact so that the output of IC1 remains low. The alarm

generator remains silent in standby mode as the trigger pin of IC2 is low. When

someone tries to take the laptop case the tilt switch breaks the electrical contact

between the probes as the unit takes a vertical position. Immediately the output of IC1

becomes high and monostable IC2 becomes triggers the PNP transistor (T1) and buzzer

starts beeping.

“LIFE AFTER DEATH- (A

PARAPSYCHOLOGICAL RESEARCH)”

Shaonty banarji

Mankind all through its history has left traces or records evincing that it believed that life did not end at death. A phenomenon strictly disapproved by modern

Page 24: January, 2010 First Edition

24 | P a g e

scientists yet has left convergent arguments to show that personal survival does exist after death. However now that psychology's own principles have been shaken after recent discoveries in genetics the idea that consciousness is merely an effect of brain-activity is being questioned again. In fact there is numerous such phenomenon of similar genre to proof what I mean.

Man’s psychic powers

Almost everyone is aware of the phenomenon of sixth sense or

the power of reading ones thoughts yet science claims it has no

physical basis. Numerous events like awareness of an object or

event at a distance not through the normal senses or foreseeing

an event in future can only be explained as psychic powers.

Out-of-the-body experiences

Another phenomenon that indicates that the mind can operate

independent of the body is during Out-Of-the-Body experiences occurring

during sleep, narcosis or other circumstances; people have actually felt

leaving their bodies. From a point in space they saw themselves lying in

bed.

Near-Death-Experiences (NDE's)

Thanks to progress in medical science, more and more patients are

resuscitated from clinical death. Some of them report experiences which

bear great similarity, such as passing through a tunnel, being received by

deceased members of the family, or a radiant figure, before entering in a

heavenly sphere in a state of great euphoria. It is noteworthy that these

patients saw only relatives and friends who had died. In exceptional cases

they even saw people who they surmised still being alive, but whose death

announcement had not reached them as yet.

Page 25: January, 2010 First Edition

25 | P a g e

Deathbed visions

Patients, whose last hour has struck, have been reported seeing visions of

near relatives appearing at their bedside.

Cases suggestive of reincarnation

numerous cases have been reported of young children remembering a

previous incarnation, showing even birth marks of supposed injuries in a

previous life. This further enforces the existence of the soul which still

remains an intangible riddle.

None of the above arguments in itself is sufficient proof for personal survival after death. Yet, taken together, the above phenomenons constitute a solid body of testimony in favour of the belief. Sixth sense, telepathy, clairvoyance and similar such phenomenon have always made man to believe that a parapsychology does exist however strongly detested by medical science. Near death experiences have pushed the limits of medical ideas about the range of human consciousness and the mind-brain relationship. Let us not forget that mankind all through its history has left traces or records evincing that it believed that life did not end at death. In the oldest graves objects have been found for the deceased to carry to his new abode. This phenomenon unexplained and sometimes opposed by modern science however continues to induce its enigmatic charm on the human mind and will remain to do so until an explainable solution to these mysteries is unveiled.

Page 26: January, 2010 First Edition

26 | P a g e

ASSOCIATE WITH TECHONLINE

GROUP

VISIT US �

Page 27: January, 2010 First Edition

27 | P a g e

CHROME OS

Mayukh chakraborty

Google higher-ups have officially confirmed their Google Chrome operating system (OS). It’s set

for a release in the second half of 2010. It’s been designed for net savvy peoples. Google

Chrome OS will run on both x86 as well as ARM chips. The software architecture is simple —

Google Chrome running within a new windowing system on top of a Linux kernel. For

application developers, the web is the platform. All web-based applications will automatically

work and new applications can be written using your favourite web technologies. And of course,

these apps will run not only on Google Chrome OS, but on any standards-based browser on

Windows, Mac and Linux hereby giving developers the largest user base of any platform.

Sundar Pichai said that, Google Chrome OS is an open source,

lightweight operating system that will initially be targeted at netbooks. Later this year we will

open-source its code, and netbooks running Google “Chrome OS will be available for consumers

in the second half of 2010”.

Google Chrome OS is a new project, separate from Android. Android was designed from the

beginning to work across a variety of devices from phones to set-top boxes to netbooks. While

there are areas where Google Chrome OS and Android overlap, we believe choice will drive

innovation for the benefit of everyone, including Google.

The most coolest features of it are:-

• It takes only 7 seconds to boot.

• Like chrome browser, it uses tabs. At the top left hand side it has app menu for

launching applications.

Page 28: January, 2010 First Edition

28 | P a g e

Chrome os media browser

• Switching between chrome windows.

• Cloud Storage - Everything you save inside Chrome OS is put on the cloud like this notepad application which will sync with Google Docs.

I like that despite it being a web-based OS, it also works offline. I

wonder how soon after release it will be available for desktops and it will be especially interesting

to see how widely & quickly third-party PC accessory and software makers will be supporting it.

For example, I’d also want to be able to hook up a controller to play games via Steam on it.

Page 29: January, 2010 First Edition

29 | P a g e

Getting geographical Information using an IP Address

__________________________________________________________________________ Joydeep roy Getting the Internet Protocol or the IP Address of a remote system is said to the most important step in hacking of a system. Sometimes, however we get an IP in order to get more information on someone or some host. But, how can an IP Address be used to get more information on the location etc of a system? Well, this manual is aimed at answering just this question. Actually, the IP address (Actually the entire TCP/IP Protocol) is structured or designed such that one cannot tell as to in which country a system having the given IP is situated, by simply looking at it. An IP Address has no fields, which tell you the country in which the computer using it resides in. So, all myths like ‘The Second or the third field of an IP stands for the country in which the system using it resides’ are definitely false and untrue. However, yes sometimes one can guess or deduce as to in which country and even in which city the system using an IP resides in, by simply looking at the first three fields of the IP. Let us take an example to understand what I mean to say by this. Now, before I move on the example, let us understand how exactly IP Addresses are awarded to you. Firstly, your ISP registers at the central authority and gets a particular range of IP addresses between which the various customers (people who dial into their servers) can be awarded IP addresses. Most ISP’s are given a Class C network Address. A class C Network address contains a 24-bit Network Prefix (the first three fields) and an 8-bit Host number (the last field). It is referred to as "24's" and is commonly used by most ISP's. ****************** HACKING TRUTH: For the benefit of beginners, I have included below a snippet from one of my earlier manuals, which explains IP Addresses better: (Even if you are not a newbie, I do suggest you read the below snippet, as it might just be helpful.) Like in the real world, everyone has got an individual Home Address or telephone number so that, that particular

Page 30: January, 2010 First Edition

30 | P a g e

individual can be contacted on that number or address, similarly all computers connected to the Internet are given a unique Internet Protocol or IP address which can be used to contact that particular computer. In geek language an IP address would be a decimal notation that divides the 32- bit Internet addresses (IP) into four 8- bit fields. Does the IP address give me some information or do the numbers stand for anything? Let take the example of the following IP address: 202.144.49.110 Now the first part, the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network, here are different classes of IP addresses: Address Class Dotted Decimal Notation Ranges Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx The various classes will be clearer after reading the next few lines. Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix. In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as "16's". A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number. It is referred to as "24's" and is commonly used by most ISP's. Due to the growing size of the Internet the Network Administrators faced many problems. The Internet routing tables were beginning to grow and now the administrators had to request another network number from the Internet before a new network could be installed at their site. This is where sub-netting came in. Now if your ISP is a big one and if it provides you with dynamic IP addresses then you will most probably see that whenever you log on to the net, your IP address will have the same first 24 bits and only the last 8 bits will keep changing. This is due to the fact that when sub-netting comes in then the IP Addresses structure becomes: xxx.xxx.zzz.yyy

Page 31: January, 2010 First Edition

31 | P a g e

where the first 2 parts are Network Prefix numbers and the zzz is the Subnet number and the yyy is the host number. So you are always connected to the same Subnet within the same Network. As a result the first 3 parts will remain the same and only the last part i.e. yyy is variable. *********************** For Example, if say an ISP xyz is given the IP: 203.98.12.xx Network address then you can be awarded any IP, whose first three fields are 203.98.12. Get it? So, basically this means that each ISP has a particular range in which to allocate all its subscribers. Or in other words, all subscribers or all people connected to the internet using the same ISP, will have to be in this range. This in effect would mean that all people using the same ISP are likely to have the same first three fields of their IP Addresses. This means that if you have done a lot of (By this I really mean a lot) of research, then you could figure out which ISP a person is using by simply looking at his IP. The ISP name could then be used to figure out the city and the country of the person. Right? Let me take an example to stress as to how cumbersome but easy (once the research is done) the above method can be. In my country, say there are three main ISP’s: ISP Name Network Address Allotted ISP I 203.94.47.xx ISP II 202.92.12.xx ISP III 203.91.35.xx Now, if I get to know the IP of an e-pal of mine, and it reads: 203.91.35.12, then I can pretty easily figure out that he uses ISP III to connect to the internet. Right? You might say that any idiot would be able to do this. Well, yes and no. You see, the above method of finding out the ISP of a person was successful only because we already had the ISP and Network Address Allotted list with us. So, what my point is, that the above method can be successful only after a lot of research and experimentation. And, I do think such research can be helpful sometimes. Also, this would not work, if you take it all on in larger scale. What if the IP that you have belongs to someone living in a remote igloo in the North Pole? You could not possibly get the Network Addresses of all the ISP’s in the world, could you? NOTE: In the above case, you also get to know the city of the system using the given IP, as most ISP’s use different network addresses in different cities. Also, some ISP’s are operational in a single city.

Page 32: January, 2010 First Edition

32 | P a g e

So, is there a better method of getting the location of an IP? Yes, Reverse DNS lookups hold the key. Just as DNS lookup converts the hostname into IP address, a Reverse DNS Lookup converts the IP address of a host to the hostname. By hostname, what I mean to say is that it given us the name of the remote system in alphabets and numbers and periods. For Example, mail2.bol.net.in would be a hostname, while 203.45.67.98 would not be a hostname. The popular and wonderful Unix utility ‘nslookup’ can be used for performing Reverse DNS lookups. So, if you using a *nix box or if you have access to a shell account, then the first this to do is to locate where the nslookup command is hidden by issuing the following command: ' whereis nslookup '. Once you locate where the utility is hidden, you could easily use it to perform both normal and reverse DNS lookups. As this is not a manual on using the ‘nslookup’ command, I will simply giving a basic relevant outline. In order to get a more detailed description of how this works or how to use it, read the *nix man pages or the documentation. We can use ‘nslookup’ to perform a reverse DNS lookup by mentioning the IP of the host at the prompt. For Example, $>nslookup IP Address Note: The below IP’s and corresponding hostnames have been made up. They may not actually exist. Let us say, that above, instead of IP Address, we type 203.94.12.01 (which would be the IP I want to trace.). $>nslookup 203.94.12.01 Then, you would receive a response similar to: mail2.bol.net.in Now, if you carefully look at the hostname that the Reverse DNS lookup, gave us, then the last part reveals the country in which system resides in. You see, the ‘.in’ part signifies that the system is located in India. All countries have been allotted country codes, which more often than not are the last part of the hostnames of the systems located in that country. This method can also be used to figure out as to which country a person lives in, if you know his email address. For Example, if a person has an email address ending in .ph then he probably lives in Philippines and if it ends in .il then he lives in Israel and so on. Some common country codes are: Country Code Australia .au Indonesia .id

Page 33: January, 2010 First Edition

33 | P a g e

India .in Japan .jp Israel .il Britain .uk For a complete list of country codes, visit: http://www.alldomains.com/ http://www.iana.org/domain-names.html ***************** General Extra Tip: To get the complete list of US State Abbreviation codes, visit: http://www.usps.gov/ncsc/lookups/abbr_state.txt **************** Windows users can perform Reverse DNS queries by downloading an utility called Samspade from: http://www. samspade.com/ Another method of getting the exact geographical location of a system on the globe is by making use of the WHOIS database. The WHOIS database is basically the main database, which contains a variety of information like contact details, name etc on the person who owns a particular domain name. So, basically what one does in a WHOIS query, is supply the WHOIS service with the hostname on which he wants more information. The WHOIS service then replies with the information stored in its database. This method can be used to get some pretty accurate information on a particular IP or hostname; however, it is probably of no use if you are trying to point out the exact location of a dynamic IP. But, again this can be used to get atleast the city in which the ISP used by the victim is situated. You can carry out WHOIS queries at: http://www.alldomains.com/ You could also directly enter the following in the location bar of your Browser and perform a WHOIS enquiry. Enter the following in the location bar of your browser: http://205.177.25.9/cgi-bin/whois?abc.com Note: Replace abc.com with the domain name on which you want to perform a WHOIS query. This method cannot be used to get the contact address of a person, if the IP that you use to trace him, belongs to his ISP. So, either you need to know the domain name (which is registered on his name) or have to remain satisfied knowing only the city (and ISP) used by the person. Say, the victim has registered a domain name and you want to use it to find out the city in which he resides. Now, one thing to remember in this case is that, if the victim has registered the domain name using any of the various free .

Page 34: January, 2010 First Edition

34 | P a g e

com registration services like Namezero.com etc, then the domain name would probably be registered on the company’s name and not the victim’s name. So, a WHOIS query will give information on the ISP and not the victim. ***************** NEWBIE NOTE: The WHOIS service by default runs on Port 43 of a system. Try performing a WHOIS query by telnetting to Port 43 and manually typing out the query. I have never tried it, however, it might be fun. *************** Yet another and probably the second most efficient method (after Reverse DNS queries) of tracing an IP to its exact geographical location, is to carry out a ‘traceroute’ on it. The ‘tracert’ or ‘traceroute’ commands give you the names or IP’s of the routers through which it passes, before reaching the destination. Windows users can perform a trace of an IP, by typing the following at the command line prompt: C:\windows>tracert IP or Hostname For more information about the usage and syntax of this command, type: ‘tracert’ at the command prompt. Anyway, now let us see what is the result, when I do a tracert on my IP. Remember I live in New Delhi which is a city in India. Watch the names of the hostnames closely, as you will find that they reveal the cities through which the packet passes. C:\windows>tracert 203.94.12.54 Tracing route to 203.94.12.54 over a maximum of 30 hops 1 abc.netzero.com (232.61.41.251) 2 ms 1 ms 1 ms 2 xyz.Netzero.com (232.61.41.0) 5 ms 5 ms 5 ms 3 232.61.41.10 (232.61.41.251) 9 ms 11 ms 13 ms 4 we21.spectranet.com (196.01.83.12) 535 ms 549 ms 513 ms 5 isp.net.ny (196.23.0.0) 562 ms 596 ms 600 ms 6 196.23.0.25 (196.23.0.25) 1195 ms1204 ms 7 backbone.isp.ny (198.87.12.11) 1208 ms1216 ms1233 ms 8 asianet.com (202.12.32.10) 1210 ms1239 ms1211 ms 9 south.asinet.com (202.10.10.10) 1069 ms1087 ms1122 ms 10 backbone.vsnl.net.in (203.98.46.01) 1064 ms1109 ms1061 ms 11 newdelhi-01.backbone.vsnl.net.in (203.102.46.01) 1185 ms1146 ms1203 ms 12 newdelhi-00.backbone.vsnl.net.in (203.102.46.02) ms1159 ms1073 ms 13 mtnl.net.in (203.194.56.00) 1052 ms 642 ms 658 ms So, the above shows us that the route taken by a data to reach the supplied IP is somewhat like this: Netzero (ISP from which the data is sent) ---� Spectranet (A Backbone Provider) -----� New York ISP ---�New York Backbone -� Asia --� South Asia -� India Backbone --� New Delhi Backbone --� Another router in New

Page 35: January, 2010 First Edition

35 | P a g e

Delhi Backbone ---� New Delhi ISP. So, basically this tracert does reveal my real location, which is: New Delhi, India, South Asia. Get it? Sometimes, doing a ‘tracert’ on an IP, does not give useful information. You see in the above example, the hostnames returned revealed the city or country in which the system is located. Although, more often than not, you will get such helpful hostnames, sometimes the hostnames returned are very vague and unhelpful. So what do you do then? Well, fret not. Simply do the below procedure. Let us say that the trace ends at the hostname abc.com. This is very vague and gives absolutely no clue as to where the system is located. However, what you could do is, launch your browser and visit: http://www.abc.com/ Now, abc. com is probably an ISP and an ISP, will definitely give its location and the cities in which it operates. So, you could still have a good chance of learning the definite city of the victim. A very interesting utility is the VisualRoute utility, (http://www.visualroute.com/) which traces a hostname or IP and shows the path taken by the packet to reach the destination on a world map. It is very useful and reveals some excellent information. However, it sometimes does tend to be inaccurate. ********************** HACKING TRUTH: Say you have found out the ISP of a person and simply want to learn as to in which country the person resides in. However, visiting the ISP website doesn’t help. Nor does the hostname help. So, what do you do? Well, one thing that you could do is, try connecting to Port 13 of the ISP. This is the port, which simply displays the system time. It will tell you how many hours ahead or behind the system is from GMT time. ********************** Well, this basically brings us to the end of this manual. Before I sign off, I would like to make it clear that it extremely difficult and surprising if someone is able to get the exact contact address of a person by simply knowing his IP. (Without taking help or breaking into the person’s ISP)

Page 36: January, 2010 First Edition

36 | P a g e

Page 37: January, 2010 First Edition

37 | P a g e

THE LOST WORLD OF ATLANTIS THAT

DROWNED IN THE DARKNESS

AVIK KHARA

Some claim it to be true while some say fiction. Whatever the case may be, stories of this land

continue to astonish people worldwide even today. The city here is none other than the majestic

Atlantis.

A vast island beautified by fresh orchards, breathtaking landscapes, enriched with precious

metals and alloys and inhabited by majestic elephants was described by Plato as paradise on

Earth. The city was arranged in five zones and was built in perfect concentric circles. The ports

were served with canals. It also had a great palace and a temple, covered with silver and gold.

The interior of the temple was ivory and walls, pillars and floors were coated with orchil. A

statue of the God was built with gold. This God, standing on a chariot with six winged horses has

been described as the God of the sea and Shaker of the Earth. He was worshipped by all

inhabitants

However as time passed by and as civilizations grew this pure land gradually became diluted with malicious and greedy power and slowly defeated all its neighboring lands so much so that no super power excepting Athens could stand against it.

Page 38: January, 2010 First Edition

38 | P a g e

However with time even Athens was defeated. It was said that God was disturbed by this and Plato describes, “Afterwards there occurred violent earthquakes and floods; and in a single day and night of misfortune… the island of Atlantis disappeared into the depths of the sea as a punishment for their greed.”

It was 3500 years ago. The evening passed away. Night came. And with time the pleasant,

peaceful atmosphere changed into a turbulent, violent one. The sea changed its color. From

within the earth came muffling voices. The islanders grew worried. They thought that 5000 ft.

high volcano was about to erupt. They thought that the God controlling the violent forces of the

earth had awakened from the ling slumber. They did not know that those were just signs of a

great cataclysm. And that happened. Their whole civilization was destroyed.

First a dark smoke engulfed the entire island. Then a blitzkrieg of pumice stones occurred. This was followed by ash which poured down heavily. A big bang occurred. The great volcano erupted forming a crater of 37 miles. Into this gap rushed the sea water and the great civilization finished, leaving behind no trace. That marked the end of existence of a refined civilization and an even more refined nature’s gift to earth.

But end of Atlantis marked a new beginning of stories and histories behind this ever inquisitive land. Some say it was a myth and claim this land as fiction but there are evidences enough to prove that Atlantis did exist.

Plato’s story of Atlantis passed from generation to generation. The main source of Plato’s story was his nephew Critias. And Critias claimed that he heard the story from his grandfather – Dropides and the latter heard it from Solan, who was famous for his truthfulness and was considered to be one of the wisest law givers and the seven sages of Greece. Solan lived from 640 B.C. to 558 B.C. Plato wrote the story two centuries later.

Solan himself claimed that the story was not original. He heard it from a priest in Egypt. Solan was so impressed with the story that he translated it into a poem in Greek. From this account, it appears that the Egyptians knew about the Atlantis or perhaps trade existed between them.

According to the oceanographers, of 20th century the 36 million sq. miles Atlantic shows no evidence that a cataclysm ever took place and that there existed a continent. Although 12,500 miles long mountain range runs from north to south in the Atlantic Ocean, this in no way could be remains of that Atlantis, as it is rinsing up at the place where Atlantis should have subsided.

In 1912, the controversy again flared up. An article appeared in the newspaper – New York American. The title of the article was how I found the lost Atlantis, the source of all civilizations and the author was Dr. Paul Schliemann, grandson of the discoverer of Troy.

Page 39: January, 2010 First Edition

39 | P a g e

Dr. Paul claimed that he possessed some valuable documents and articles passed on by his grandfather. Dr. Paul showed the bronze vase which was unearthed at Troy and which bore the inscription: “This was the gift of Cronos, king of Atlantis”. Dr. Paul tried earnestly to prove his evidence but nobody believed him.

Whatever be the case the myth or the history of Atlantis is still as enchanting as a fairy tale and continues to create a charm of its enigma for all people interested in this long lost earthly heaven.

REGULAR SECTIONS

TECH-VISION

El Chupacabra

El Chupacabra (Goat Sucker) is mostly associated with Latin American communities in

the USA, Mexico, and Puerto Rico (where it was first reported). It is supposedly a heavy

creature, the size of a small bear, with a row of spines reaching from the neck to the

base of the tail and it takes its name from the fact that it is supposed to attack animals

and drink their blood – especially goats.

While the legend began around 1987, there are many similarities to the Vampire of

Page 40: January, 2010 First Edition

40 | P a g e

Moca, the name given to an unknown creature to killed animals all over the small town

of Moca in the 1970s. The vampire of Moca left the animals completely devoid of blood

which had apparently been removed by a series of small circular cuts.

The most common description of Chupacabra is a lizard

leathery or scaly greenish-gray skin and sharp spines or quills running down its back.

This form stands approximately 3 to 4 feet (1 to 1.2 m) high, and stands and hops in a

similar fashion to a kangaroo. In at least one sighting, the creature hopped 20 feet (6 m).

This variety is said to have a dog or panther

protruding from it, large fangs, and to hiss and screech when alarmed, as well as leave a

sulfuric stench behind. When it screeches, some reports note that the chupacabra’s

eyes glow an unusual red, then give the witnesses nausea. For some witnesses, it was

seen with bat-like wings.

Nanotechnology: The Technology for Device Size

The consumer markets have always been attracted to high performance electronic devices in smaller size and as a result of this, the manufacturing of common electronic equipment such as computer, mobile phone and audio

Moca, the name given to an unknown creature to killed animals all over the small town

of Moca in the 1970s. The vampire of Moca left the animals completely devoid of blood

apparently been removed by a series of small circular cuts.

The most common description of Chupacabra is a lizard-like being, appearing to have

gray skin and sharp spines or quills running down its back.

mately 3 to 4 feet (1 to 1.2 m) high, and stands and hops in a

similar fashion to a kangaroo. In at least one sighting, the creature hopped 20 feet (6 m).

This variety is said to have a dog or panther-like nose and face, a forked tongue

large fangs, and to hiss and screech when alarmed, as well as leave a

sulfuric stench behind. When it screeches, some reports note that the chupacabra’s

eyes glow an unusual red, then give the witnesses nausea. For some witnesses, it was

Nanotechnology: The Technology for Device Size

Miniaturization

The consumer markets have always been attracted to high performance electronic devices in smaller size and as a result of this, the manufacturing of common electronic equipment such as computer, mobile phone and audio-visual units has been

Moca, the name given to an unknown creature to killed animals all over the small town

of Moca in the 1970s. The vampire of Moca left the animals completely devoid of blood

like being, appearing to have

gray skin and sharp spines or quills running down its back.

mately 3 to 4 feet (1 to 1.2 m) high, and stands and hops in a

similar fashion to a kangaroo. In at least one sighting, the creature hopped 20 feet (6 m).

like nose and face, a forked tongue

large fangs, and to hiss and screech when alarmed, as well as leave a

sulfuric stench behind. When it screeches, some reports note that the chupacabra’s

eyes glow an unusual red, then give the witnesses nausea. For some witnesses, it was

Nanotechnology: The Technology for Device Size

The consumer markets have always been attracted to high performance electronic devices in smaller size and as a result of this, the manufacturing of common electronic

visual units has been

Page 41: January, 2010 First Edition

41 | P a g e

experiencing phenomenal growth with rapidly increasing performance and size miniaturization. Nanotechnology is the technology which makes materials very much smaller than they are at present. The term ‘nano’ came into frequent use in the early 1990s in scientific and industrial research. Until then the more general terms ‘submicron’ and ‘ultra fine’ were used to define the smaller particles. One nanometer is one billionth of a meter i.e. 10-9 m. Nanoparticles are materials possessing micro-structural dimensions less than 100 nm. The increased importance of nanomaterials is a result of the unique properties that can be obtained and the applications that result from such nanostructuring. Scientists and engineers at various universities, national labs and industries invented new types of electronic devices, circuits and magnetic storage media that have dimensions of the order of nanometers. The small size of nanoparticles, which is responsible for different properties (optical, magnetic, structural, electrical and electronic), with respect to the bulk materials makes them suitable for new applications. These materials manifest fascinating and useful properties which can be exploited for a variety of applications in electronic device fabrication (sensors, light emitting diodes, compact discs, and next generation computer chips). Since the discovery of carbon nanotubes in 1991, numerous nanofabrication techniques have been reported for the production of nanowires, nanorods and nanofibers. The physical and chemical properties of nanomaterials are different from the bulk materials of the same molecular structure. One of the basic concepts of the science of solids is the insight that most properties of solids depend on the microstructure i.e. chemical composition, the arrangement of atoms and the size of the solid. If there is change in one or any of these parameters, the properties of the solid vary. Nanoparticles can be considered as a state of matter in the transition region between bulk solids and molecular structures. The physical and chemical properties gradually change from molecular to bulk with increasing particle size. There are a few limitations associated with this nanotechnology. Most of the materials and devices produced are in the small scale laboratory environment. One of the main challenges is the bulk (industrial scale) production of these materials. Special measurement techniques and high resolution instruments are required to characterize these materials. Even if these major hurdles are overcome in many countries, the benefits of the technology would have to outweigh the expenses in making changes in the current manufacturing process. Nanotechnology thus holds tremendous potential to improve our quality of life in the near future by offering high performance devices in small dimension. Shenaz rehman

Page 42: January, 2010 First Edition

42 | P a g e

Loch Ness Monster

The Loch Ness Monster is a legendary animal that supposedly resides in the

depths of Loch Ness, a long narrow lake situated in

rural Scotland. Stories concerning the monster date back to the 6th century

A.D. The region was in complete isolation until a road was built alongside the

lake in 1933. Then large numbers of people travelled through the region for the

very first time. Over the years thousands have reported seeing something in the

lake. Most reports depict a long neck surging from the water with a small head

of a unknown creature. Pictures have even been taken of this "creature", but

most scientists however, refuse to believe any creature of this kind lives in the

Loch Ness. They claim that most reported cases are simply products of

overactive imaginations, and as for the pictures, scientists say they are not lucid

enough to distinguish items clearly, and some pictures are dubbed as "fake". A

large number of non- scientists believe however, that the Loch Ness is the site

of a breeding colony of large unknown aquatic animals, due to the fact that

Loch Ness was once an arm of the sea. Yearly summer investigations have

been conducted since 1963 in attempt to unravel the mystery. Investigators

have obtained films that indicate that there just might be some unknown animal

in the depths of the Loch Ness. Evidence however, is inconclusive, and the

controversy continues.

ANIK CHAKRABORTY

Page 43: January, 2010 First Edition

43 | P a g e

The quantum vacuum —the next technology

revolution.

It turns out that the quantum vacuum may produce usable energy. In a perfect

vacuum, virtual particles are constantly being created and destroyed. Now

some quantum physicists believe it may be possible to harness the energy of

these virtual particles, without violating the Second Law of Thermodynamics.

So we are on the verge of a new technological revolution that will unify energy

production, computation and communications in a single quantum-based

technology.

The Second Law of Thermodynamics says that you have to return any energy

you borrow from the universe -- it's not possible to get a "net positive energy

gain." But what if there is an infinite amount of energy in the universe, rather

than a finite quantity? A stealth venture has begun that is seeking to build a

device that can tap this so-called "zero point energy" based on these ideas.

What's interesting about all this is the potential for a "Grand Unified

Technology" -- a single technology for generating energy, computing, and

communication. Energy is created using the zero point fields; computing takes

place via quantum computing; communication takes places using quantum

encryption and/or non-local quantum correlations (EPR). Propulsion could

also be enabled by the same quantum level technology. This would give us

infinite amounts of energy at near perfect efficiency, combined with the

capability to do infinite computations in finite time, and the ability to conduct

perfectly secure light-speed or even faster-than-light communications.

Companies such as MagiQ are already rolling out commercial quantum

communications networks (albeit light-speed, but it's a good start!). Several

projects, including MagiQ, are also working on quantum computing and

commercial devices are expected to be available in 30 years or less. As for ZPE

energy production from the quantum vacuum, we are on the verge of it. The

commercial devices will be launched in next 15 years or even less.

Tanuj gyan

Page 44: January, 2010 First Edition

44 | P a g e

MOBILE BUG

These days the mobile phones are being used by the anti-social elements for all cunning

purposes such as cheating in examination hall, or to record the conversation of a

confidential meeting; it is even being used as a spy tool and for unauthorized video

transmission etc.

So here we present pocket sized handy mobile phone detector that can sense the

presence of a mobile phone from a distance of one and half meters. The circuit can

detect both incoming and outgoing calls, SMS and even video transmission if mobile

phone is kept in silent mode.

Here the capacitor (C3) acts as a small gigahertz loop antenna to collect RF signals from

the mobile phone (the lead length of capacitor has to be fixed as 18mm along with a

spacing of 8mm between the leads to get the desired frequency.)

Page 45: January, 2010 First Edition

45 | P a g e

TRICKS & TIPS

• NOTEPAD "world trade centre trick"..

Did you know that the flight number of the plane that had hit WTC ...on

9/11 was Q33N ....Open your Notepad in ur computer and type the flight

number i.e Q33N... Increase the Font Size to 72, Change the Font to

Wingdings. U will be amazed by the findings.

• Disabling Display Of Drives In My Computer

Have you ever thought, if you click on MY COMPUTER and none of your local and

networked drives are visible? Where is your data; where did all the files go?? Game

Over!!

Well I will say that the game is still not over; this is a simple trick based on editing of

registry that one of your friends may have played on you. If you want to play same

prank on some of your pals……….

FIRST APPROACH:

Go to start->run-> regedit

Page 46: January, 2010 First Edition

46 | P a g e

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

Now in the right pane create new DWORD item and name in NoDrives. Now modify its

value and set it to 3FFFFFF (Hexadecimal). Now press F5 to refresh. When you click on

My Computer, no drives will be displayed. To enable the display of drives again, simply

delete this DWORD item. Just restart your computer in case the trick does not work.

SECOND APPROACH:

The easiest way with Win XP is to use the TweakUI power toy from Mcft. Go to

Start/Run and type in "tweakui" (without the quotes).

Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click

"Apply" or "OK" when finished.

If you have XP but not Tweak UI you can download it here...

http://www.Mcft.com/windowsxp/downloads/powertoys/xppowertoys.mspx

• How to hide important information in an image

file?

1. First of all, you need to save your information in a text file and then prepare an image

(either jpeg or bitmap format). In this example, i will user secret.txt as my text file and

photo.jpg as my image file.

Page 47: January, 2010 First Edition

47 | P a g e

2. Put the text document and image together. Here, i put them in my C: drive.

3. Go to Run, the type cmd. This will bring you to the command prompt.

4. Now, type cd\ to go to the root. In this case, the root is C:. You can proceed to the

next step if you save your image and text file in C: drive. But, if you save them in other

folder, such as c:\testing, you need to type cd\testing to go into the folder.

5. Now, you reach the most important part. Type copy photo.jpg/B+secret.txt/B

output.jpg. The image file need to come first. If you put your text file before image file,

the output image file maybe cannot open properly. Beside this, the input image and

output image must be same format (either both in jpeg or both in bitmap).

6. Now, try to open the output.jpg using any image viewer. Looks no different with

photo.jpg right?

7. Now, try to open output.jpg using notepad, you will found the secret.txt contents

inside.

ANIK CHAKRABORTY (MODERATOR)

TECH-CHECK

Ultra small Agent HD Video Recording

Camera

Page 48: January, 2010 First Edition

48 | P a g e

Ultra small, unique and delicately designed - this way we can characterize this gadget. Agent Cam HD Video Recording camera is a usefulgadget in many situation when is necessary to have some memories recorded. Any records could be made and saved. Time with family, business meetings, sport events, outdoor activity, evidence collector, securityaim - only are few useful clues where Agent Cam HD will be useful. This small high resolution DVR cam allows to record up to 6 hours of video. Micro Mini DVR cam is a universal miniaturized piece to carry it anywhere. Reliable construction made from metal and glass, with USB port and Led indicator. Plug and play option for Windows or later editions. Micro Mini Cam is compatible with Windows 98SE / ME / 2000 / Vista / XP. Gadget dimension: 50mm x 50mm x 15mm (LxWxD). Specification: - Model name: HS-WDVR01 Watch DVR - Memory: 2 GB MicroSD in included - Format: AVI (640*480), 15ÀÇÑ - MIC: built-in - Power source: integrated battery that is recharged directly via USB port or withcharger. - Display mode: Analog 12 hours (hour, minute, second) This Micro Mini DVR cam is a universal miniaturized piece to carry it anywhere. Reliable construction made from metal and glass, with USB port and Led indicator. Comes with all necessary set of functions to record video.

Page 49: January, 2010 First Edition

49 | P a g e

Chariot Skates: Carbon Fiber Bicycle Wheels

That Attach To Your Feet

Oh brother. When Rollerblades hit in the 90s it was as if the Roller Skate had never been invented until the day of their release. I was just a tween at the time but Rollerblades (the brand not the product) showed up in my home town with a mini van full of the skates and let folks try them out for free. It worked, because I ended up buying a few pairs.

While I don’t think the Chariot Skates will ever catch on with the same fervor, the carbon fiber constructed skates appear to be a more practical mode of transportation due to the relatively large wheels which should provide greater speeds, inertia and less pushing. Of course, to get them moving it might take a bit more energy than the average Rollerblade wheel.

Right now the Chariot Skates are in preproduction testing and due out any day now. Check the video after the ‘leap’ for their test videos.

Page 50: January, 2010 First Edition

50 | P a g e

The Google Phone May Be Coming Soon

Now here’s an exciting picture for you, folks–what you’re seeing right there is a shot of the Google Phone, the Nexus One. Pics of this thing have been leaking like a sieve to the web at large and initial reports are conflicting at best.

Google employees, of course, are operating under STRICT agreements not to talk specs–if they actually say anything even related to specs their firstborn children vanish in a puff of smoke, and if they don’t have any children, well, something ELSE vanishes instead. Okay, that’s just a joke, but still–the Google crew may be contractually forbidden from saying word one, but that didn’t stop the blogosphere! In fact, a San Francisco blogger named Cory O’ Brien got one of these fellas and clames that it’s basically an iPhone but with a slightly larger screen and a scroll wheel. PC World, however, was underwhelmed.

And naturally, the whole thing runs on Google’s own OS, Android. Admittedly that was pretty

much a given, but still. Look for this one to launch possibly in 2010, and keep it here for all

the latest details on the Nexus One!

RAHUL KUMAR (moderator)

Page 51: January, 2010 First Edition

51 | P a g e

ROBOTIX

introductionintroductionintroductionintroduction::::

Components:

Motor:Motor:Motor:Motor:

TTTThe basic thing behind manual robotics is the direction of rotation of motor. If the motor rotates clockwise for the

current flowing from left to right, then the direction of it’s

rotation will be opposite for opposite direction of flow of

current. We use dc motor here. It is of different rpm’s, such as

10rpm,15rpm,30rpm, 200rpm, even 500 rpm(The rpm, will be in the

ratio of the applied voltage, e.g. a 200 rpm,12volt DC motor will rotate in

400rpm when applied to24 volt DC).it is better to use within limiting

voltage. A motor with less rpm, will produce much torque, and

the higher rpm motor will produce less torque.

There are 2 types of motor generally : 1>Stepper Motor

and 2> Geared Motor. We normally use geared Motor for our

purpose.

Page 52: January, 2010 First Edition

52 | P a g e

A dc motor

Catcher Plug:Catcher Plug:Catcher Plug:Catcher Plug:

It is a 6-pin plug, which is used to change the orientation of movement of motor by a single movement.Dpdt (Double Pole Double Throw)is also of this type and the functioning is also the same. Functionaning:Functionaning:Functionaning:Functionaning: The middle pins 3 & 4 are connected to the two terminals of battery as shown. While one set of the other pins [either (1 & 2) or (5 & 6)] are connected to two terminals of motor. Say, (1 & 2) are connected to the two terminals of motor. Functioning of catcher plug is such that, at a time either pins (1 &

2) are connected to (3 & 4) or pins (5 & 6) are connected to (3 & 4).

By the help of cross connection of wires as shown, the

orientation of movement of motor gets reversed by switching the

plug.

Page 53: January, 2010 First Edition

53 | P a g e

The dpdts available in the market are of two types on-off dpdt

(having 2 position + and -)and on-off-on dpdt(having 3 positions +,

neutral and -) . If we use on-off-on dpdt , then we does not need any

Push Button associated with it ever. If we are using it for such a

purpose where we need to pause then only the neutral position is

required, otherwise it is not required.

Page 54: January, 2010 First Edition

54 | P a g e

Page 55: January, 2010 First Edition

55 | P a g e

Sliding

Dpdt

Different catcher plug and dpdts

Push Button:Push Button:Push Button:Push Button: It is a 2 pin switch, with a button. It is connected in series in between any connecting wire. When we push the button, the connecting wires attached to its pin gets connected, hence the circuit gets completed.

Push button

In case of push button associated with catcher plug, the circuit

will be like the following diagram, otherwise it will be simply

connected with the 2 terminals of motor.

Page 56: January, 2010 First Edition

56 | P a g e

MultiMultiMultiMulti----chord wire:chord wire:chord wire:chord wire:

This type of wire will be helpful if you are using a wired remote

control. Each wire on the array is of different color and it

helps to identify the source and destination of the wire.

Gear Box and track belt:

Page 57: January, 2010 First Edition

57 | P a g e

Gear boxes are used to increase/decrease rpm of motor and to control the torque applied. They are also useful when we need to drive two wheels at exactly same angular velocity and in the same plane.

gear box track belt PrPrPrPropeller:opeller:opeller:opeller:

If the bot goes in water, Then we need propellers for it’s

movement. Vcd fans can serve as good propellers, but they are

not reliable in long run.

Page 58: January, 2010 First Edition

58 | P a g e

OffOffOffOff----road wheelsroad wheelsroad wheelsroad wheels:

For the movement of robot in land, available in different

suitable size in the market. It will be connected with the shaft of

the motor and rotate with the rotation of that motor.

Small robot wheels ball caster

(servo wheels) (used as a free wheel)

Page 59: January, 2010 First Edition

59 | P a g e

Main Concept behind a Main Concept behind a Main Concept behind a Main Concept behind a

simple robot capable simple robot capable simple robot capable simple robot capable

for moving in 2for moving in 2for moving in 2for moving in 2----

DimensionDimensionDimensionDimension:

Say, when wheels rotate in clockwise direction, the bot

will move in the forward direction. So, when both the wheels move in clockwise direction, the bot will move in the backward direction.

To turn the bot in right direction, we rotate the right wheels in anti-clockwise direction, while left wheels rotate in clockwise direction. This generates a torque to the bot forcing it to turn in right direction. In this mechanism, the bot turns fast, it is called HARD TURN. There is also another way for rotating in right direction, when only the left motor(s) of the bot rotate clockwise, then it takes more time(compared to HARD TURN) to rotate, it is called SIMPLE TURN.it will proceed a small distance forward also in this rotation.

To turn the bot in left direction, we rotate the left wheels

in anti-clockwise direction, while right wheels rotate in

clockwise direction. This generates a torque to the bot forcing

it to turn in left direction.

In this mechanism, the bot turns fast, it is called HARD TURN.

There is also another way for rotation in left direction, when

only the right motor(s) of the bot rotate clockwise, then it takes

more time(compared to HARD TURN) to rotate, it is called SIMPLE

TURN.it will proceed a small distance forward also in this

rotation.

Design of circuit for

simple 2d movement:

The connection will be as per the following diagram.

There will be 2 different catcher plugs for two different side

(i.e. for the motor(s) of left side, there will be 1 catcher plug and

for the motor(s), there will be another catcher plug).

Page 60: January, 2010 First Edition

60 | P a g e

If there are multiple motors on each side, then the connection

of all the motors of same side will be similar.

To make the bot forward/backward moving (or in case of HARD

TURN), we have to use both the catcher plug. In case of simple

turn, we have to use one catcher plug depending on the side of

rotation. Similar biasing of catcher plugs will leads to

forward/backward movement, whereas opposite biasing will

leads to rotation. TO BE CONTINUED…..

MAYUKH CHAKRABORTY (MODERATOR)

ANIK CHAKRABORTY (MODERATOR)

Page 61: January, 2010 First Edition

61 | P a g e

ETHICAL HACKING

Chapter 1: Setting the stage. Before you can start to hack systems you need a platform to work from. This platform must be stable and not easily traceable. How does one become anonymous on the Internet? It's is not that easy. Let us look at the

- 5 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost] different options (BTW if this chapter does not seem relevant you might want to skip it):

Permanent connection (leased line, cable, fiber) The problem with these connections is that it needs to be installed by your local Telecom at a premise where you are physically located. Most ISPs wants you to sign a contract when you install a permanent line, and ask for identification papers. So, unless you can produce false identification papers, company papers etc., and have access to a building that cannot be directly tied to your name, this is not a good idea.

Dial-up Many ISPs provides "free dial-up" accounts. The problem is that logs are kept either at the ISP, or at Telecom of calls that were made. At the ISP side this is normally done using RADIUS or TACACS. The RADIUS server will record the time that you dialed in, the connection speed, the reason for disconnecting, the time that you disconnected and the userID that you used. Armed with his information the Telecom can usually provide the source number of the call (YOUR number). For the Telecom to pinpoint the source of the call they need the destination number (the number you called), the time the call was placed and the duration of the call. In many cases, the Telecom need not be involved at all, as the ISP records the source number themselves via Caller Line Identification (CLI).

Let us assume that we find the DNS name "c1-pta-25.dial-up.net" in our logs and we want to trace the attacker. We also assume that the ISP does not support caller line identification, and the attacker was using a compromised account. We contact the ISP to find out what the destination number would be with a DNS name like that. The ISP provides the number - e.g. +27 12 664 5555. It's a hunting line - meaning that there is one number with many phone lines connected to it. We also tell the ISP the time and date the attack took place (from our logs files). Let us assume the attack took place 2000/8/2 at 17h17. The RADIUS server tells us what userID was used, as well as the time it was connected: (these are the typical logs)

6774138 2000-08-02 17:05:00.0 2000-08-02 17:25:00.0 demo1 icon.co.za 168.209.4.61 2 Async 196.34.158.25 52000 1248 00010 B6B 87369 617378 null 11

These logs tell us that user "demo1" was connected from 17h05 to 17h25 on the date the attack took place. It was dialing in at a speed of 52kbps, it send 87369 bytes, and received 617378 bytes. We now have the start time of the call, the destination number and the duration of the call (20 minutes). Telecom will supply us with source number as well as account details - e.g. physical location. As you can see, phoning from your

house to an ISP (even using a compromised or free ID) is not making any sense.

Mobile (GSM) dial-up Maybe using a GSM mobile phone will help? What can the GSM mobile service providers extract from their logs? What is logged? A lot it seems. GSM switches send raw logging information to systems that crunch the data into what is called Call Data Records (CDRs). More systems crush CDRs in SCDRs (Simple CDR). The SCDRs is sent to the various providers for billing. How does a CDR look like? Hereby an example of a broken down CDR:

99042300000123000004018927000000005216003 27834486997 9903220753571830 834544204 000001MOBILE000 0000001000000000000000000

Page 62: January, 2010 First Edition

62 | P a g e

- 6 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost] AIRTIME1:24 20377 UON0000T11L MTL420121414652470

This tells us that date and time the call was placed (1st string), the source number (+27 83 448 6997), the destination number (834544204), that it was made from a mobile phone, the duration of the call (1 minute 24 seconds), the cellID (20377), the three letter code for the service provider (MTL = Mtel in this case), and the unique mobile device number (IMEI number) 420121414652470. Another database can quickly identify the location (long/lat) of the cell. This database typically looks like this:

20377 25731 -26.043059 28.011393 120 32 103 "Didata Oval uCell","Sandton"

From this database we can see that the exact longitude and latitude of the cell (in this case in the middle of Sandton, Johannesburg) and the description of the cell. The call was thus placed from the Dimension Data Oval in Sandton. Other databases provide the account information for the specific source number. It is important to note that the IMEI number is also logged - using your phone to phone your mother, switching SIM cards, moving to a different location and hacking the NSA is not a good idea using the same device is not bright - the IMEI number stays the same, and links you to all other calls that you have made. Building a profile is very easy and you'll be nailed in no time.

Using time advances and additional tracking cells, it is theoretically possible to track you up to a resolution of 100 meters, but as the switches only keep these logs for 24 hours, it is usually done in real time with other tracking devices - and only in extreme situations. Bottom line - even if you use a GSM mobile phone as modem device, the GSM service providers knows a lot more about you than you might suspect.

How to So how do we use dial in accounts? It seems that having a compromised dial in account does not help at all, but common sense goes a long way. Suppose you used a landline, and they track you down to someone that does not even owns a computer? Or to the PABX of a business? Or to a payphone? Keeping all of above in mind - hereby a list of notes: (all kinda common sense)

Landlines:

1. Tag your notebook computer, modem and croc-clips along to a DP (distribution point). These are found all around - it is not discussed in detail here as it differs from country to country. Choose a random line and phone.

2. In many cases one can walk into a large corporation with a notebook and a suit with no questions asked. Find any empty office, sit down, plug in and dial.

3. etc...use your imagination

GSM:

1. Remember that the device number (IMEI) is logged (and it can be blocked). Keep this in mind! The ultimate would be to use a single device only once. - never use the device in a location that is linked to you (e.g. a microcell inside your office)

- 7 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost]

2. Try to use either a very densely populated cell (shopping malls) or a location where there is only one tracking cell (like close to the highway) as it makes it very hard to do spot positioning. Moving around while you are online also makes it much harder to track you down.

3. Use prepaid cards! For obvious reasons you do not want the source number to point directly to you. Prepaid cards are readily available without any form of identification. (note: some prepaid cards does not have data facilities, so find out first)

4. GSM has data limitations - currently the maximum data rate is 9600bps.

Page 63: January, 2010 First Edition

63 | P a g e

Using the 'net All of this seems like a lot of trouble. Is there not an easier way of becoming anonymous on the Internet? Indeed there are many ways to skin a cat. It really depends on what type of connectivity you need. Lets assume all you want to do is sending anonymous email (I look at email specifically because many of the techniques involved can be used for other services such as HTTP, FTP etc.). How difficult could it be?

For many individuals it seems that registering a fake Hotmail, Yahoo etc. account and popping a flame email to a unsuspected recipient is the way to go. Doing this could land you in a lot of trouble. Lets look at a header of email that originating from Yahoo:

Return-Path: <[email protected]> Received: from web111.yahoomail.com (web111.yahoomail.com [205.180.60.81]) by wips.sensepost.com (8.9.3/1.0.0) with SMTP id MAA04124 for <[email protected]>; Sat, 15 Jul 2000 12:35:55 +0200 (SAST) (envelope-from [email protected]) Received: (qmail 636 invoked by uid 60001); 15 Jul 2000 10:37:15 -0000 Message-ID: <[email protected]> Received: from [196.34.250.7] by web111.yahoomail.com; Sat, 15 Jul 2000 03:37:15 PDT Date: Sat, 15 Jul 2000 03:37:15 -0700 (PDT) From: RH <[email protected]> Subject: Hello To: [email protected] MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii

The mail header tells us that our mailserver (wips.sensepost.com) received email via SMTP from the web-enabled mailserver (web111.yahoomail.com). It also tells us that the web-enabled mailserver received the mail via HTTP (the web) from the IP number 196.34.250.7. It is thus possible to trace the email to the originator. Given the fact that we have the time the webserver received the mail (over the web) and the source IP, we can use techniques explained earlier to find the person who was sending the email. Most free web enabled email services includes the client source IP (list of free email providers at www.fepg.net).

How to overcome this? There are some people that think that one should be allowed to surf the Internet totally anonymous. An example of these people is Anonymizer.com (www.anonymizer.com). Anonymizer.com allows you to enter a URL into a text box. It then proxy all connections to the specified destination. Anonymizer claims that they only keep hashes (one way encryption, cannot be reversed) of logs. According to documentation on the Anonymizer website there is no way that even they can determine your source IP. Surfing to Hotmail via Anonymizer thus change the IP address in the mail header.

But beware. Many ISPs make use of technology called transparent proxy servers. These servers is normally located between the ISP's clients and their main feed to the Internet. These servers pick up on HTTP requests, change the source IP to their own IP and does the reverse upon receiving the return packet. All of this is totally transparent to the end user - therefor

- 8 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost] the name. And the servers keep logs. Typically the servers cannot keep logs forever, but the ISP could be backing up logs for analyses. Would I be tasked to find a person that sent mail via Hotmail and Anonymizer I would ask for the transparent proxy logs for the time the user was connected to the web-enabled mailserver, and search for connections to Anonymizer. With any luck it would be the only connections to the Anonymizer in that time frame. Although I won't be able to prove it, I would find the source IP involved.

Another way of tackling the problem is anonymous remailers. These mailservers will change your source IP, your <from> field and might relay the mail with a random delay. In many cases these remailers are daisy chained together in a random pattern. The problem with remailers is that many of them do keep logs of incoming connections. Choosing the initial remailer can be become an art. Remailers usually have to provide logfiles at the request of the local government. The country of origin of the remailer is thus very important as cyberlaw differs from country to country. A good summary of remailers (complete with listings of remailers can be found at www.cs.berkeley.edu/~raph/remailer-list.html).

Yet another way is to make use of servers that provide free Unix shell accounts. You can telnet directly to these servers (some provide SSH (encrypted shells) access as well). Most of the free shell providers also provide email facilities, but limit shell capabilities -e.g. you can't telnet from the free shell server to another server. In 99% of the cases connections are logged, and logs are kept in backup. A website that list most

Page 64: January, 2010 First Edition

64 | P a g e

free shell providers are to be found at www.leftfoot.com/freeshells.html. Some freeshell servers provider more shell functionality than others - consult the list for detailed descriptions.

How do we combine all of the above to send email anonymously? Consider this - I SSH to a freeshell server. I therefor bypass the transparent proxies, and my communication to the server is encrypted and thus invisible to people that might be sniffing my network (locally or anywhere). I use lynx (a text based web browser) to connect to an Anonymizer service. From the Anonymizer I connect to a free email service. I might also consider a remailer located somewhere in Finland. 100% safe?

Even when using all of above measures I cannot be 100% sure that I cannot be traced. In most cases logs are kept of every move you make. Daisy chaining and hopping between sites and servers does make it hard to be traced, but not impossible.

Other techniques

1. The cybercafe is your friend! Although cybercafes are stepping up their security measures it is still relatively easy to walk into a cybercafe without any form of identification. Sit down, and surf to hotmail.com - no one would notice as everyone else is doing exactly the same thing. Compose your email and walk out. Do not become a regular! Never visit the scene of the crime again. When indulging in other activities such as telnetting to servers or doing a full blast hack cybercafes should be avoided as your activity can raise suspicion with the administrators.

2. Search for proxy like services. Here I am referring to things like WinGate servers. WinGate server runs on a Microsoft platform and is used as a proxy server for a small network (read SOHO environment with a dial-up link). In many cases these servers are not configured correctly and will allow anyone to proxy/relay via them. These servers do not keep any logs by default. Hoping via WinGate servers is so popular that lists of active WinGates are published (www.cyberarmy.com/lists/wingate/).

3. With some experience you can hop via open routers. Finding open routers are very easy - many routers on the Internet is configured with default passwords (list of default passwords to be found at

- 9 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost]

www.nerdnet.com/security/index.php )Doing a host scan with port 23 (later more on this) in a "router subnet" would quickly reveal valid candidates. In most of the cases these routers are not configured to log incoming connections, and provides excellent stepping-stones to freeshell servers. You might also consider daisy chaining them together for maximum protection.

4. Change the communication medium. Connect to a X.25 pad via a XXX service. Find the DTE of a dial-out X.25 PAD. Dial back to your local service provider. Your telephone call now originates from e.g. Sweden. Confused? See the section on X.25 hacking later in the document. The exact same principle can be applied using open routers (see point 3) Some open routers listens on high ports (typically 2001,3001,X001) and drops you directly into the AT command set of a dial-out modems. Get creative.

The best way to stay anonymous and untraceable on the Internet would be a creative mix of all of the

above-mentioned techniques. There is no easy way to be 100% sure all of the time that you are not

traceable. The nature of the "hack" should determine how many "stealth" techniques should be used. Doing

a simple portscan to a university in Mexico should not dictate that you use 15 hops and 5 different mediums.

TO BE CONTINUED[.

JOYDEEP ROY (MODERATOR)

Page 65: January, 2010 First Edition

65 | P a g e

SECTION OF THE MONTH

THE SIXTH SENSE TECHNOLOGY Pranav Mistry Fluid Interfaces Group | MIT Media Lab

DRAWING ON A WALL ?? WATHING LIVE NEWS ON NEWSPAPER??

EVERYTHING AT YOUR FINGER TIPS

Page 66: January, 2010 First Edition

66 | P a g e

'Sixth Sense' is a wearable gestural interface that augments the physical world around us

with digital information and lets us use natural hand gestures to interact with that information. We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. Information is confined traditionally on paper or digitally on a screen. SixthSense bridges this gap, bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via natural hand gestures. ‘SixthSense’ frees information from its confines by seamlessly integrating it with reality, and thus making the entire world your computer.

The SixthSense prototype is comprised of a pocket projector, a mirror and a camera. The hardware components are coupled in a pendant like mobile wearable device. Both the projector and the camera are connected to the mobile computing device in the user’s

Page 67: January, 2010 First Edition

67 | P a g e

pocket. The projector projects visual information enabling surfaces, walls and physical objects around us to be used as interfaces; while the camera recognizes and tracks user's hand gestures and physical objects using computer-vision based techniques. The software program processes the video stream data captured by the camera and tracks the locations of the colored markers (visual tracking fiducials) at the tip of the user’s fingers using simple computer-vision techniques. The movements and arrangements of these fiducials are interpreted into gestures that act as interaction instructions for the projected application interfaces. The maximum number of tracked fingers is only constrained by the number of unique fiducials, thus SixthSense also supports multi-touch and multi-user interaction.

The SixthSense prototype implements several applications that demonstrate the usefulness, viability and flexibility of the system. The map application lets the user navigate a map displayed on a nearby surface using hand gestures, similar to gestures supported by Multi-Touch based systems, letting the user zoom in, zoom out or pan using intuitive hand movements. The drawing application lets the user draw on any surface by tracking the fingertip movements of the user’s index finger. SixthSense also recognizes user’s freehand gestures (postures). For example, the SixthSense system implements a gestural camera that takes photos of the scene the user is looking at by detecting the ‘framing’ gesture. The user can stop by any surface or wall and flick through the photos he/she has taken. SixthSense also lets the user draw icons or symbols in the air using the movement of the index finger and recognizes those symbols as interaction instructions. For example, drawing a magnifying glass symbol takes the user to the map application or drawing an ‘@’ symbol lets the user check his mail. The SixthSense system also augments physical objects the user is interacting with by projecting more information about these objects projected on them. For example, a newspaper can show live video news or dynamic information can be provided on a regular piece of paper. The gesture of drawing a circle on the user’s wrist projects an analog watch. The current prototype system costs approximate $350 to build.

Page 68: January, 2010 First Edition

68 | P a g e

TECHONLINE VIEW

Sixth Sense Technology May Change How

We Look at the World Forever

Basically, Sixth Sense is a mini-projector coupled with a camera and a cellphone—which acts as the computer and your connection to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures, like in the infamous Minority Report.

However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth Sense can do its magic—and a lot more—everywhere, even while you are jumping hysteric over Oprah's sofa.

The camera recognizes objects around you instantly, with the micro-projector overlaying the information on any surface, including the object itself or your hand. Then, you can access or manipulate the information using your fingers. Need to make a call? Extend your hand on front of the projector and numbers will appear for you to click. Need to know the time? Draw a circle on your wrist and a watch will appear. Want to take a photo? Just make a square with your fingers, highlighting what you want to frame, and the system will make the photo—which you can later organize with the others using your own hands over the air.

But those are just novelty applications. The true power of Sixth Sense lies on its potential to connect the real world with the Internet, and overlaying the information on the world itself. Imagine you are at the supermarket, thinking about what brand of soap is better. Or maybe what wine you should get for tonight's dinner. Just look at objects, hold them on your hands, and Sixth Sense will show you if it's good or bad, or if it fits your preferences or not.

Now take this to every aspect of your everyday life. You can be in a taxi going to the airport, and just by taking out your boarding pass, Sixth Sense will grab real time information about your flight and display it over the ticket. You won't need to do any action. Just hold it in front of your and it will work.

Page 69: January, 2010 First Edition

69 | P a g e

The key here is that Sixth Sense recognizes the objects around you, displaying information automatically and letting you access it in any way you want, in the simplest way possible.

Clearly, this has the potential of becoming the ultimate "transparent" user interface for accessing information about everything around us. If they can get rid of the colored finger caps and it ever goes beyond the initial development phase, that is. But as it is now, it may change the way we interact with the real world and truly give everyone complete awareness of the environment around us.

ANIK CHAKRABORTY

TECHONLINE.BIZ.LY

Page 70: January, 2010 First Edition

70 | P a g e

THANK YOU