VJ: 2007
"I write for the same reason I breathe. If I didn't, I would die."
Sir Issac Assimov,



Sunday, December 16, 2007

Ping Pong Matrix

1 comments
Digg it | Stumble it | Save to Del.ico.us |
What ping pong would look like if it was in The Matrix.



[Via]: http://www.collegehumor.com/video:24992
Read more...

Incredible machines from Japan

1 comments
Digg it | Stumble it | Save to Del.ico.us |
Incredible Mind | Incredible machines from Japan.


Read more...

Colourful Milk | This is for all Artistic folks | Sorry about the music

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Wanna see a Rainbow ? No need to wait for the rain.


Wanna see a Rainbow ? No need to wait for the rain.Check out the Milk Rainbow...
Read more...

Is that a cricket ball? Is that a rubber ball? Its the techno Cam |Satugo

0 comments
Digg it | Stumble it | Save to Del.ico.us |

All techno gadgets freaks get closer then you ever imagined to the oddities of nature with a SatuGO camera, simply throw the SatuGO and capture your picture with the built-in timer. Add seconds to the timer simply by knocking the SatuGO, throw it and the countdown begins.
Shoot From your hips: If you want to take ordinary pictures, grab the SatuGO camera push it towards the motive until the cord is stretched, and it takes a picture. By stretching the cord the lens is fixated and gives you the possibility to take quick but steady pictures. The cord is also the USB cable and comes in handy when you want to move data, or see your pictures.

[Via] http://www.satugo.com/
Read more...

Wednesday, December 5, 2007

Call centers | Support |Screenshot|Need help?|Techno Geeks

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Support: Could you send a screentshot of the issue?
Customer: Sure I can,give me moment.

If you enjoyed this post, make sure you subscribe to the VJ-News RSS feed!




Technorati is cool!!!!
Courtesy:aboutcolonblank.com
Read more...

“iPod” apartments | Dubai Rocks

0 comments
Digg it | Stumble it | Save to Del.ico.us |


The “iPod” apartments design was reportedly created by Hong Kong architecture company James Law Cybertecture, and will be executed by intelligent building developer Omniyat Properties. The building will be built in Dubai's Business Bay.
Starting prices according to Dubai based realtors GoWealthy.com are as follows:

Studio US$343,688
1 Bedroom US$362,372
2 Bedroom US$901,158
Currently two-bedroom apartments in the more conventional West Wharf development are being sold for around US$550,000. This is a development by Corporate Finance House scheduled for completion about a year ahead of the Pad.Nicknamed the “iPod” apartments, “The Pad” is a 230 apartment block building schecduled for completion in 2008.

Futuristic intelligent features of the Pad will include the following:

• Rotating living and dinning rooms so as to enjoy views on either side of the waterfront building
• Virtual panoramas from other parts of the world projecting on windows (iReality)
• Video-conferencing in the dinning room
• Reactive lighting able to respond to your mood or even to telephone calls (iAmbiance)
• Bathroom health monitoring equipment

The purpose of room rotation is aesthetic rather than the space-saving device developed by Luigi Colani in Germany in recent years. The 360 degree views referred to in the Omniyat Property press release are not clearly reflected in all of the floor plans but the feature will certainly allow for the flexible use of the accommodation. Some apartments appear from floor plans to also include rotating double beds.

At the time of its launch Omniyat made clear that it hopes to incorporate robotic features into its developments such as robot vacuum cleaning but that seems to be some way in the future.

Facilities for residents will include a retail area, parking, the iClub, swimming deck, media Jacuzzi, underwater concert, media deck chairs, aerobics section, lap pool, half basketball court, running track, barbeque & gathering Area.


If you enjoyed this post, make sure you subscribe to the VJ-News RSS feed!

Technorati is cool !!!!!!!
Read more...

Monday, December 3, 2007

World thrilling live Footage | Live Sucide Bomer from Srilanka

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Sucide Bomer Attck | Live Footagefrom Srilanka



In this chilling security camera footage, a female suicide bomber (Tamil Tiger terrorist) on a mission to kill a Sri Lankan Cabinet minister Douglas Devananda (a moderate Tamil political leader) is seen patiently answering questions in a bustling government office before calmly standing up and detonating the bomb hidden in her bra. 'Madness of Terrorism' - LTTE Human Bomb in Action, courtesy of defence.lk (Ministry of Defence, Sri Lanka).

[Via] http://youtube.com
Read more...

Secret of Blogging | Bloggers Secret | Make Money Online |Tips for bloggers | Top 10 things for bloggers to know

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Step 1.
For any blog, you need to write content. Make sure you post a minimum of 3 to 5 new entries in your blog per week.
Doing this, and posting meaningful article that people want to read, will generate more revenue for you!

Step 2.

Once your happy with the amount of content in your blog, its time to interrogate AdSense, for people who don't already know what AdSense is, you can find out here:
http://www.google.com/services/adsense_tour/index.html

TIP: Interrogating Google AdSense at the top of your page is known to convert more clicks for you, also make the ad look like part of your content by using the same background & font colors ect.

Step 3.
Use Section Targeting html triggers ti target you adsense.

Enter your text or blog about any topic to target the adsense

( Since the section targets are part of the html codes I am unable to include them here in my blog, please email me to vijaybhaskaran78@gmail.com by subscribing to my blog.I will send the codes personally to your email address)
The google algorith would search
The google algorith would search only these contents and will popup the adesen according to this topic and thsi way you can target your adds based on the customers that you interact.


Step 4.
Promote your blog! Some blogs help promote them self to search engines, but that isn't enough. You need to link to your blog as much as possible. Participate in link exchanges and link to your blog in your forum signature. You should soon see an increase in traffic.Use Text links Add sales whcih woudl also give big easy money.Links are good for traffic building.use Blog Directories and use http://scoop.isedb.com/

Step 5: Use technorati & pinggoat . This is the most powerful way to ping the website. Use these two key words in all your keywords.This will pull maximum traffic.

Step 6: The step to increase the readers to vist your blog is to publish a full feed rss.Dont worry about people who would be just held up in their emails and not visit the blog. The solution to this problem is to provide intractive contents by embeding the videos and also link to the old posts and also reply to the comments form all the readers in your blog and also in their blog.


Step 7: Dont write it in a hurry because you got an important information which might increase the traffic. If you dont write well it might also end up to be a bad article. Always be calm,relax and enjoy your writing.


Step 8: The most important is to use Wordpress and Adsense Delux. remember not to use any free hosting like blogspot.. Hey u think i am also using the blogspot... ye but i am shifting to wordpress .Most of the top bloggers that I met use Wordpress.

Step 9: Now, for most bloggers AdSense earns them a steady amount. But for people who really want to maximize their earning, I suggest using Kontera's Content Link. This is a service that places sponsored links on certain keywords within your blog entries, just like AdSense, when people click on them you get money.
More Info: http://kontera.com/

Step 10:Give lots of free stuffs and shall you receive.try some link baiting techniques and most of all is believing in you.

I have got some money from adsense and so i am buying 7 domains and going to host my website in all of them. I have learnt the ways of making cool money. hope you also learn them and make more extra pocket money.I have been trying more, for a long time and spent a lot to learn all these but I do not wnat otehrs to do this and waste time. Hope you all get more money and if you think this article has really helped you then you can comment and also link my website or subscribe me through email and ensure to activate them. I will come with yet another article soon.
Read more...

Norton Ghost | Beta Norton Ghost |Do u like Ghost 2003| Download|Offers

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Hey I am excited to let you know that Ghost 14 is going to get released soon and if you did not had a chance to test the beta in your system then you can do so by using the link below.If you download now u can you it for 30 days for free then enroll yourself in the following link. If you enroll now you can downlod the beta software of both Ghost and N360 .
https://et.symantec.com/signup/default.html

If you have any comments or clarification please leave a note to me.
Read more...

Text Links Want Link popularity | Want Page Ranking ?

0 comments
Digg it | Stumble it | Save to Del.ico.us |
When search engines such as Google began to rank Websites based upon the number and quality of sites that linked to them, those search engines created a digital cottage industry called link placement. Emailing for link swaps was wildly popular with some, while others placed banner ads containing direct links to their own sites. Both solutions fit well with search engine's immature algorithms.
http://www.text-link-ads.com/
Since then, search engines have vastly improved their systems for the filtering or removal of paid advertising links. Some of these steps have turned out to be unfair to many smaller Websites that are not connected to the larger Web publishers. As Google changes its algorithm, so the shape of the Web changes with it.
The service offered by Text Link Ads is a little different to other advertising solutions - rather than pay per action, click or impression, payouts are based on an allotted value per month for a text link placed on a given site.

The system itself is a little more involved than JavaScript-based solutions, such as AdSense - it requires the insertion of code in PHP, or whatever language your site runs on (everything under the sun is supported, from ASP, .NET, RoR, to standard blogging platforms such as WordPress). Ads are served from an XML file stored on your server, and managed by the scripting that you install. It all seems speedy on the backend, so there's none of the delay associated with JavaScript ads.

The revenue is based on a number of factors - Alexa ranking seems to be one, with PageRank and Technorati rankings also being potential considerative factors. The more important your site is deemed, the more revenue per ad slot you will get. The higher-paying sites earn up to around $300/month, per slot - and with up to 10 slots available to sell, there's good potential for consistent earnings.

What are text links?

DEFINITION
Links and Hyperlinks are used interchangeably.A text link is a text hyperlink that typically links to another online document, such as a webpage, PDF file, video, Excel spreadsheet, etc. Text links can also point to another location on the same page.

The hyperlinks are typically underlined and highlighted in blue for unvisited links and purple for visited links. Internet users travel from one document to another by clicking on the links.

Here are some examples of the underlying HTML code for a text link:

homepage
Google
What do text links have to do with search engines?
Search engines send out automated software programs called spiders (also known as crawlers or robots) to crawl the World Wide Web indexing retrieve webpages, documents, and other files to be used to create search indexes.

Text links are like the highways that search engine spiders travel along to find online documents. Text links help search engines better understand the topic of a link destination because spiders can index the link text (also known as Anchor Text) contained within text links. They are basically descriptive markers of what the linked document is about. In effect text links are like road signs.

How do text links improve search engine rankings?
In the Google Webmaster Guidelines guide, under the "Design and content guidelines" section, it suggests and I quote,

"Make a site with a clear hierarchy and text links. Every page should be reachable from at least one static text link."
You can't get a clearer guideline than that.

So firstly, text links help search engine spiders find, crawl and index all the webpages in your website. After all, if search engines can't find your webpages, they won't show up in the search results.

And second, as I mentioned above, text links help search engines understand the topic of a link destination. Search engines spiders doesn't recognize text contained in images. Although there are ways to help spiders understand the content of image links (as explored in the Image Links guide), text links are the preferred method.


How do I get people to link to my web site?
A link is the online equivalent of a "word of mouth" recommendation in the real world. Have you ever recommended a movie or a restaurant to someone you know? Why did you do that? Because the movie or restaurant was great and you wanted to share it with them, right?

Well, people "recommend" websites for the same reason you recommend a movie or restaurant. They do this by linking to the websites they like.

So the secret to getting people to link to your website is to create great content or web tools that other people like to share with their website visitors.

What is link traffic?
Link traffic is traffic generated by links to your website. So getting people to link to your website isn't just about improving search engine rankings. It also generates traffic.


What is link popularity?
DEFINITION
Link Popularity is sometimes shortened to Link Pop.Link popularity is a measure of the number of links pointing to a webpage, without any regard for the quality of the links.

Text Link Ads offers 10,000s of PageRank 4 to 9, static text link ads, on 1000s of websites, blogs, and forums, as well as sell text links on your websites to other internet marketers. Get $100 of free links!

Read more...

Tuesday, November 27, 2007

Football player wounded in shooting dies | Redskins' Taylor dies after shooting

0 comments
Digg it | Stumble it | Save to Del.ico.us |
The 24-year-old died in a Florida hospital where he underwent nearly seven hours of emergency surgery Monday to repair a severed femoral artery, the team confirmed in a website statement. "He never regained consciousness," Sharpstein told CNN. "He was unconscious when the fire rescue people arrived. It's a senseless tragic death." Redskins running back Clinton Portis, who played with Taylor in college, told reporters yesterday that Taylor changed after the birth of his daughter last year.

``It was like a new Sean,'' Portis said.

Taylor signed a seven-year, $18 million contract with the Redskins in 2004 after being selected an All-American and the Big East Conference's Defensive Player of the Year during his senior season at Miami. He played four seasons for the Hurricanes and in 2001 was one of just four freshmen to play for Miami during its national championship campaign.


Official Website: http://seantaylor.kcbsportsmarketing.com/
Big HitZ of Sean Taylor



MIAMI (AP) - Washington Redskins safety Sean Taylor has died in a Florida hospital, one day after being shot at his home.
Sharpstein calls Taylor's death a "tremendously sad and unnecessary event." He says the player was a "wonderful, humble, talented young man, and had a huge life in front of him."
Doctors had been encouraged last night when Taylor squeezed a nurse's hand. But Sharpstein said he was told Taylor never regained consciousness after being transported to the hospital.
Police are still investigating the shooting as a possible armed robbery.

Taylor's former lawyer, Richard Sharpstein, says he received the news this morning from Taylor's father. Taylor was recruited by the University of Miami and enrolled in 2001. That year, he was one of just four true freshmen to play for Miami in the 2001 national championship season, carving a niche for himself in Miami's secondary in nickel and dime coin packages. Taylor was named "Big East Special Teams Player" of the Week for his performance against the University of Pittsburgh.[5]
In 2002, Taylor was a second-team All-Big East selection by the league's head coaches in his first season as a starter. He finished third on the team in tackles with 85 (53 solos), broke up 15 passes, intercepted 4 passes, forced one fumbles, blocked one kick and returned a punt for a touchdown. He led all defensive backs in tackles, interceptions and passes broken up and had a career-high 11 tackles (2 solo) and intercepted 2 passes in the Fiesta Bowl loss to Ohio State University.
During his final year at Miami, Taylor produced a historic season that culminated with a plethora of honors and awards. He was a named a consensus first-team All-American, the "Big East Conference Defensive Player of the Year" and a finalist for the "Jim Thorpe Award" given to the nation's best defensive back. He led the Big East Conference and ranked first nationally in interceptions per game (0.98) with 10, tying the record for interceptions in a season with former Hurricane standout Bennie Blades. He finished first in total tackles with 77 (57 solos). He intercepted two passes in Miami's impressive 28-14 win over Pittsburgh, playing a key role as the Hurricanes limited All-American receiver Larry Fitzgerald to two receptions for 13 yards. He returned interceptions for an average of 18.4 yards, including a 67-yard touchdown return at Boston College, a 50-yard scoring runback at Florida State, and a 44-yard scoring runback against Rutgers. His three TD returns of interceptions is a Miami single-season record.
Read more...

Free Wifi | Google Free Wifi | Google TiSP | Installling Google Wifi (sanitary process )

0 comments
Digg it | Stumble it | Save to Del.ico.us |

For those who haven't seen the news yet Google TiSP (BETA) is a fully functional, end-to-end system that provides in-home wireless access by connecting your commode-based TiSP wireless router to one of thousands of TiSP Access Nodes via fiber-optic cable strung through your local municipal sewage lines.Solution for the last hundred yards. It's in BETA, and those wishing to participate must apply soon.

How can Google offer this service for free?
We believe that all users deserve free, fast and sanitary online access. To offset the cost of providing the TiSP service, we use information gathered by discreet DNA sequencing of your personal bodily output to display online ads that are contextually relevant to your culinary preferences, current health status and likelihood of developing particular medical conditions going forward. Google also offers premium levels of service for a monthly fee.
Read more...

Adobe AIR brings the desktop | Beta Air from Adobe

0 comments
Digg it | Stumble it | Save to Del.ico.us |

A new version of the Adobe AIR SDK download was posted on 10/1/2007.The Adobe Labs has released the Adobe Integrated Runtime (AIR), which provides this functionality.
Adobe describes AIR as a cross-operating system runtime that allows developers to leverage existing Web development skills to build and deploy rich Web applications to the desktop. It provides support for Flash, Flex, HTML, JavaScript, and AJAX.

Getting the software:
This download provides the beta 1 version of Adobe AIR. This runtime is no longer recommended for use, but may be required for applications that have not been updated to use beta 2. The Adobe AIR beta 1 was released on June 11, 2007 and contains a timeout that will cause it to stop working on December 11, 2007.
English
Download for Macintosh (DMG, 8 MB)
Download for Windows (EXE, 9 MB)

To get started with AIR development, you must install the AIR runtime on your computer. Once it is installed, you may download sample applications to see AIR in action and possibly take a peek under the covers at its code.



There are two downloads relevant to AIR development:
•Runtime provides the runtime environment for running AIR applications. Downloads are available for both Windows and Macintosh operating systems.
•Software Development Kit (SDK) provides everything necessary to build AIR applications. This includes templates, Adobe AIR APIs, and debugger and developer tools. The SDK is available for both Windows and Macintosh platforms. The command line debugger and developer tools require a Java installation (JRE or JDK version 1.4.2 or newer).

Additional downloads are available that allow you to build AIR applications within specific Web development tools:
•Adobe Flex Builder 3: Includes support for building Flex applications on Adobe AIR from within Flex Builder.
•Adobe Flex SDK: Allows you to build AIR applications via Flex.
•Adobe AIR Extension for Dreamweaver CS3: Adds support for building AIR applications within Dreamweaver CS3.
•Adobe AIR Extension for Flash CS3 Professional: Allows you to build AIR applications with Flash CS3 Professional.
In addition, a plug-in is available for the Aptana IDE. Once the runtime is installed, you can easily install and run AIR applications, and the SDK allows you to build AIR applications.

More Information:

http://blogs.techrepublic.com.com/programming-and-development/?p=559&tag=nl.e055
http://labs.adobe.com/technologies/air/
Read more...

Sniffers | Packet Sniffers | How to use Sniffers | How to Prevent from Sniffers

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Sniffers
A sniffer is a piece of software that grabs all of the traffic flowing into and out of a computer attached to a network.. A packet sniffer is a program that eavesdrops on the network traffic. Like a telephone wiretap allows one to listen in on other people's conversations, a "sniffing" program lets someone listen in on computer conversations. Sniffing is the act by a machine S of making copies of a network packet sent by machine A intended to be received by machine B. Once a copy is made, the sniffer program can do, time and resources permitting, an arbitrary computation on the copy such as displaying it nicely in a GUI window. A sniffer can be used for a good purpose: to audit your own network, and to demonstrate the insecurity of plaintext network protocols. A sniffer machine can be discovered by other network tools.
In this lecture, we are considering sniffers where the sniffer (program/ machine) S network-topologically sits between A and B. But, be aware that it is possible to route the messages between A and B to go past S when A and B are on different subnets.
Sniffer activity occurs widely within organizations. It is no longer a newsworthy item. So, we can find only the following. In 1994, a sniffer program was installed by unidentified individuals at PANIX (Public Access to UNIX in New York). Within days, thousands of user names and passwords were stolen. Shortly thereafter, a similar incursion was successfully accomplished at BarNet in California.

Examples of Sniffers
Below is a select list of example sniffers from the open source archives. Visit http://www.packetstormsecurity.org/ and search for "sniffers." Many of these work on both Linux and Windows.
1.tcpdump: The grand daddy of packet sniffers. Ships by default on many Linux distributions.
2.ethereal: Excellent GUI based sniffer. It can dissect many protocols.
3.hunt: A well written sniffer with some attack tools included.
4.Ettercap: Ettercap is a network sniffer for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. It can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection.
5.dsniff: As an article puts it, ``Dsniff is the Swiss army knife of privacy invasion''. The package ships with a handful of nasties: urlsnarf, msgsnarf, mailsnarf, webspy, dsniff etc.
6.sniffit: Clever little packet sniffer with good filtering. We will be using it in the experiment described below.

What Does Sniffed Data Look Like?
It is easy to grasp the concepts discussed above by watching a sniffer in action. The information in the following example was derived using tcpdump, a program that has been around for quite sometime and is available for many platforms. This particular snippet is an abbreviated exchange between a machine and the SecurityFocus Web server.
"CONTENT FROM HERE HAS BEEN REMOVED AS THE FEEDBURNER STOPPED THE SYNC PROCESS DUE TO THE INFORMATION LOCATED HERE " Only the subscribers will gte the complete information on this section
Prevention of Sniffing -Encryption
Encryption is the best protection against any form of traffic interception. It is reasonable to assume that at some point along a path, data can always be compromised. Therefore, your best defense is to ensure that traffic is essentially unreadable to everyone but the intended receiver. This isn’t difficult to do, since many organizations have deployed services that make use of Secure Socket Layers (SSL), Transport Layer Security (TLS) and other methods that provide secure messaging, web browsing and more. Use switches instead of hubs. However, many commercial switches can be "overwhelmed" into behaving as though they are hubs. Use Symantec pcAnywhere when you try to access any remote files or while transferring any contents. The encryption technology used in it will avoid any packet sniffing and also use Norton Internet Security to block any intrusion.

Sample Script:
http://blog.robbiefoust.com/2007/11/powershell-ip-packet-sniffer-script.html

This document is for educational purpose only.
Read more...

Monday, November 26, 2007

Free Music| MP3 free Download | Google Hack - Part II

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Every one like to listern to music. From heavy metal to hiphop anything is free here in the world of Google.

Check the following steps to enjoy free music

Step 1: Go To www.Google.com

Step 2: Tepe the follwoing the search bar
intitle:'index of' mp3

Booommmmmmm you can see lot of mp3 files , just download them . This information is for education purpose only.Remember that all the music files are copyrighted .
Read more...

Google Hacking | Hacking Exposed | Untimate Hacking Part - I

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Have you ever wondered if you password is seen by millions of people ? Yes its true, if you have the habit of saving the password in text then obviously anyone can have it. Check out the steps on how to Google Hack the password that are saved in text documents.

step 1: Go to www..Google.com

Step 2: Type this in the search

ext:log inurl:password

You can get all the passwords that are stored in the text documents.

This information is for educational purpose only. Ensure not to save any username or passwords in any text documents.
Read more...

Human Tetris | Angels play | Game

0 comments
Digg it | Stumble it | Save to Del.ico.us |
I was enjoying my weekends in my home and came up with this video which was sent from my friend from his blog. This was acually the most viewed video EVER....


Sexy Tetris Real Live - video powered by Metacafe



Hey this is just a game... No naughty feelings.............. :)
Read more...

Sunday, November 25, 2007

Camtasia for Free | this is not a crack | Full version of version 3 Camtasia | Limited offer

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Want to get the camtasia for free? This is a promotional offer by techsmith for limited period.

Here are some clearer instructions -

Step 1
Download the software from here -
(save the file to your desktop).

http://download.techsmith.com/camtasiastudio/enu/312/camtasiaf.exe

Step 2
Go to this page, complete your name, country and
e-mail address and Techsmith will send you a
software key to unlock the program.

http://www.techsmith.com/camtasia/pcpls.asp

Step 3
Install the software and then input the key to
unlock it and you will have the full working
version of Camtasia Studio 3.

Note: Unfortunately this offer is only for PC
users, sorry to the Mac people out there!

Courtesy : Yaro Starak , TechSmith
http://www.blogmastermind.com
Read more...

Friday, November 23, 2007

Black Night| Deep Purple | Guitar Master | mastertheguitar.co.uk - MTR13! | Smoke on the water

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Excellent teaching by this geek who plays this stuff. I was amazed to listern when he played. Simply amazing....he rocks/ I love the orginal version and hope you also love this music.

Johnny B Goode-Guitar Lesson | Excellent Teacher



Speed Kills - Guitar Lesson Introduction|No Boundaries by Michael Angelo Batio


Impossible Guitar | Divine Quality


Jason Becker - Guitar Clinic| Guitar Freak | The MASTER




Check out this video:Amazing Stuff


Kid teaching| Check this out | How to Play Smoke on the Water


Check this out | Improved Version | Smoke on the water


The Real Note | Smoke on the water



You wont miss this one | WHITESNAKE IN THE STILL OF THE NIGHT



Enjoy your weekend everybodyyyyyyyyyy :)
Read more...

Tuesday, November 20, 2007

Mind Control | Brain wave sensor | Future Gaming |Silicon Valley |

0 comments
Digg it | Stumble it | Save to Del.ico.us |
How would you feel if the music player play songs depending on your mood, how would u feel when you can lift an object by just using the brain wave ? Sounds interesting ?

NeuroSky is developing some consumer technology that might lead the way to some intense game control in the near future!

“NeuroSky has developed a cost effective bio sensor and signal processing system for the consumer market. Our wearable technology unlocks worlds of new applications such as consumer electronics, health, wellness, education and training.





The neurons that comprise the brain work on electrical impulses. The last century of neurological research has shown us that brainwaves of different wavelengths indicate different emotional states, like a focused awareness, a meditative state, or drowsiness. Brainwaves have been used in medical research and therapy for years. We’re bringing it to the consumer world. ”





Five companies, including a Bluetooth headset provider, game console maker and trucking company, are said to have signed up to market end-user products containing NeuroSky's chips. Its biggest customer thus far is Ziyitong Technology Co. Ltd. (China Mobile), which has more than 100 million cell phone subscribers, 13 million of whom have high-speed 3G service.

Reference:
http://www.eetimes.com/news/latest/showArticle.jhtml?articleID=163701653
Read more...

Free Wifi | Easy WifiRadar | Hacking Wifi | Norton Internet Security

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Some things in life are free. Easy WiFi Radar helps you find and connect to open wireless access points with a single mouseclick.






Steps to setup the wifiradar:
Step 1: Go to www.makayama.com/easywifiradar.html
Step 2: Click Download
Step 3: Unzip and click on the .exe file and install the product.
Step 4: Click the play button and let it scan for any nearby wifi connections. All red access points indicate that the wifi connections are "password encrypted" the green indicates that the connection is not protected.The green connections can be used to connect to the internet.

Four steps to protect Wi-Fi networks from hackers
1. Stop broadcasting to the world.
2. Change the password on your access point.
3. Use encryption.
4. Enable Media Access Control (MAC) filtering.
5. Use Norton Internet Security to protect the system from any intrusion.
Read more...

eBay Web attack using custom- built botnet | eBay users "ALERT"

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Seeding genuine web sites with malware is nothing new, but the practice has been gathering steam this year.The site was compromised by SQL injection vulnerabilities and then IFrame attack code is inserted.Yet another sophisticated Web-based attack against eBay and its users is being investigated by a Tel Aviv-based security vendor that discovered a similar attack two months ago involving a custom-made bot designed to steal accounts.Ofer Elzam, Aladdin Knowledge Systems’ director of product management, says his firm has determined in the last few days that at least two Web sites, one called Save Our Planet and another called Nova Radio, appear to have been compromised with malicious code that combines to launch an attack against a site visitor. Aladdin Knowledge Systems Ltd.(NASDAQ: ALDN) announced that the Aladdin eSafe Content Security Response Team (CSRT) has uncovered significant new details surrounding the eBay botnet attack it first discovered on September 6, 2007 .The attack, which is one of the first of its kind to employ extremely complex, multi-stage attack methods, performs a distributed and covert brute force attack on eBay accounts in an effort to obtain personal information and/or items sold/purchased via the eBay site. Two new details provided by the Aladdin eSafe CSRT were made available this afternoon:

The goal of the re-attack today is to combine code to break in through the browser to the victim’s desktop and install a Trojan to collect eBay user account information, if it’s found, and connect to eBay to use that account information to commit fraud. “There are a chain of sites that work together,” says Elzam. “One Web page uses a trick with JavaScript to open a size-zero window, which takes content from a third-party site.” Elzam says Aladdin hasn’t yet been able to reach the operators of the Save Our Planet and Nova Radio sites- and notes that forty more Web sites may be tied to this attack, which is very fluid and changing-- but it has been in touch with eBay.
Read more...

Thursday, November 15, 2007

Trojans can use your Affliate I-D | An Exclusive report -Takashi Katsuki

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Trojan is a general term for malicious software that is installed under false or deceptive pretenses or is installed without the user's full knowledge and consent. Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.Trojan.Farfli can download and execute additional threat on the infected computer. It can also modify the Internet Explorer Start Page and change many settings related to online transaction and one such example would be the Affliate ID to get more profits through the clicks.
Takashi Katsuk from Symantec is under an investigation of Trojan.Farfli. He Says" Trojan has daily tasks that are closely related to updating Trojan.Farfli. We have seen Trojan.Farfli updated three times a day on average and sometimes as much as seven times a day, and the total number of variants has reached more than 300 since July. In comparison, Trojans discovered around the same time have far fewer variants. For example, Trojan.Hachilem and Trojan.Srizbi have only 150 variants and 40 variants, respectively. Precisely speaking, because there are files dropped by this Trojan that are polymorphic there are hundred and hundred variants of this Trojan "

To read the complete report use the following link
http://www.symantec.com/enterprise/security_response/weblog/2007/11/trojan_writer_lusts_for_money.html


HOW TO REMOVE Trojan.Farfli:

1. Temporarily Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Reboot computer in SafeMode
4. Run a full system scan and clean/delete all infected file
5. Delete/Modify any values added to the registry. [Take extream caution when editing the registry- Use this only if you are tech savy]

Navigate to and delete the following entries:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 2] HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IE4\"Main"= [random]

6. Exit registry editor.
7. Delete the Web sites added to the Internet Explorer Favorites menu.
a) Start Microsoft Internet Explorer
b) Click Favorites > Organize Favorites
c) Delete the Favorites added by the risk: http://www.6781.com/?001

8. Restore the default settings in Internet Explorer. [how to]
9. Restart the computer.

Ensure you have Norton Internet Security installed in your computer to be confident and safe in this connected world.
Read more...

“Storm Trojan” Illustrated | Security Response Lab | Cyber Cops from Symantec

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Cyber crime never sleeps — so the crime-busters have to work round-the-clock too. Which is why U.S.-based Net security leader Symantec, best known for the Norton anti-virus products, has just set up in Pune, its first "24 x 7" Security Response Lab. It is equipped to keep tabs on the world's Internet traffic, monitoring 40,000 of its own sensors buried in cyberspace, across 180 countries, tracking 150 million anti-virus systems — and sending two million dummy e-mails to test the Web's defences.

The lab work is done in four shifts by Indian security specialists or Cyber cops, backed by Symantec's 2000-strong India-based development muscle.

Why Pune? "Because of the strong security expertise and programming skills available in India," explains Anil Chakravarthy, vice-president for India Technical Operations. "We have groups here who are experts in anti-fraud operations," says Vincent Weafer, Symantec's U.S.-based Senior Director (Global Operations).

In fact, Pune engineers have filed four global patents in recent months in the area of Net security. And Vishal Dhupar, Symantec India's Managing Director, feels: "The India-based Security Response Lab is a major contributor to our global response to Net threats — and will also help us track the security landscape in the country from a global vantage point."

The Pune Centre will work in tandem with response labs in seven other locations spread across North America, Europe and the Far East as they try and neutralise viruses, spam (unsolicited mail), phishing (trying to steal sensitive information) and `bots' (robot-like invaders into unsuspecting computers)... often within minutes of the threats appearing.

The Pune lab is the only one that works 24 hours, 365 days of the year.
Symantec illustrates the "Strom Trojan findings in the following link
http://www.symantec.com/content/en/us/home_homeoffice/media/flash/peacomm.html

The threat searches for some particular hashes (searches are done by hash, not by specific filename) and eventually it receives a reply that includes some 'meta tag' information. The meta tag information is encrypted and contains information on where/what to download (e.g. Mixor.Q, Trojan.Abwiz.F).
Read more...

Eye Tracking | Usability Testing

0 comments
Digg it | Stumble it | Save to Del.ico.us |
What would you do if you get an oppurtunity to know where the user see on your website .First when I saw this technology from etre I got thrilled.

Eye tracking services allow you to climb inside the users' head and see your designs through their eyes.This can increase the internet sales for any Online Internet Marketing. Amazed seeing this video file , check this out its a must see video

DONT MISS IT

Read more...

Cyber Cops | Email Tracing | Symantec Antivirus |

0 comments
Digg it | Stumble it | Save to Del.ico.us |

Today we are going to see how to trace email for free. Would you like to know how to do email tracing for free ?. We would have seen many products in the internet which would help you to trace the emails . Before moving on to the topic on email tracking lets see why we need to do that? Is that legal ? To some extent yes. We would be very curious on how we get an unsolicited email. No wonder that we can download the products available in the market and trace the email however what can can do after that?

In this topic we would see on how to trace an email and also on what to do with the collected data.Depending on the response I would post a Video on the email tracing process. Forensic tracing of e-mail is similar to traditional gumshoe detective work. Checking involves looking at each point through which an e-mail passed, with the detective working step-by-step back to the originating computer, and, eventually, the perpetrator.To know this process we have to know how the emails work,but with a email tracing software we dont need to much about how email works.
http://www.iinfosearch.com/email-tracing-software.htm
http://www.msgtag.com/Email_Tracking_Software.html

We may see some of the tools like Neo Trace,emailtrackerpro etc are the few which you can buy to trace email . However there are may more free Free Email Tracing Software available in the market to download and some of the free softwares are listed below.

If you want to trace an email instantly and dont want to download any software, then use the link below for tracing
Email Tracing
Extracting Email Headers link will guide you on how to use this email tracer.In this help document youw would not see on how to trace the email from gmail. This can be done in a very simple way.

Email Tracing Tutorial

step 1: Click on to any email that yoou want to track in gmail
step 2: Click on the option next to reply as seen in the picture
step 3: Click Show Original form the option listed
Step 4: Copy all the contents in the window and paste in the online email tracer.
http://www.cyberforensics.in/OnlineEmailTracer/index.aspx
Step 5: Click "Start Tracing"
If you want to analyze the results the the best tutorial would be
http://www.visualware.com/resources/tutorials/email.html#emailtrackerpro


You would see a video soon on email tracing in my next blog,I would request you to subscribe my blog. We would also discuss on the Assembly language.

Use Symantec Software to secure your online transaction.
To get ASCL Certified Cyber Crime Investigator click the link below to know more
http://www.asianlaws.org/courses/cci/index.htm
Read more...

N360 -comprehensive consumer security solution

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Norton 360™ from Symantec™ is a comprehensive consumer security solution that offers a full circle of protection. Easy to use, it provides automatic and transparent protection from viruses and spyware, fraudulent Web sites, phishing scams, hackers, identity theft and more. With a renewable subscription, up to three PCs in your household are continuously protected, safeguarding your family when they play games, send email, download files, chat, or surf the Web. Transaction security features allow you to shop and bank online with confidence.

HighlightsDefends your PC against a broad range of threats
Transaction security safeguards you against online identity theft
Automatic backup and restore protects your important files from loss
Keeps your PC tuned up for peak performance
Provides a hassle-free user experience
Protects against the latest online threats


Norton 360™ also keeps your PCs tuned for peak performance and protects the data on them by making it easy to back up photos, music, financial documents, other files and restore them at any time. Flexible options allow you to back up your files to CD, DVD and USB devices. For even more convenience, you can also set up automatic backups to an attached hard drive or a secure online storage service to protect your important files in the event something happens to your PC. In addition to this, a smart background scheduler automatically schedules key Norton 360™ functions such as scans, backups, and tune-ups so that they don’t interfere with your PC activities.



BuyTV, Episode 071, Product Feature, Symantec, Norton 360.

Add to My Profile | More Videos
Read more...

Internet Security Threat Report

0 comments
Digg it | Stumble it | Save to Del.ico.us |
The goal of this podcast is to alert listeners to emerging threats and trends that Symantec has identified in the Symantec Internet Security Threat Report Volume XII.
Click here to know the complete report
themeid=threatreport

Read more...

iPhone Hype

0 comments
Digg it | Stumble it | Save to Del.ico.us |


An Exclusive Interview with the IPhone Freaks

Eric Schimdt Google CEO joined Apple's board few months ago and this is the first product to come out of the relationship between Apple and Google.Ipod Build Specifications:- So lets discuss about the iphone and the features that make everyone crazy over the Iphone. The dimensions of Iphone are 115 x 61 x 11.6 mm or 4.5 x 2.4 x 0.46 inches and it weights about 135 grams . The Front is almost occupied by a huge display with a small speaker on the top and a Home Button below it. It is not a flip Phone or even a slide Phone. There is no QWERTY keypad or even the Number pad in the Iphone. On the left hand side Iphone is having a speaker and a ring/Silent button. On the top a standard headset Jack, a Sim Card slot and a Sleep/wake Button.A dock is Provide for charging the Iphone and is compatible with Ipod. On the back it has a 2Mp Camera on the top Left Corner.The most promising feature of Iphone is Large touchscreen. Even the Nokia N95 is also not comparable with resolution and display size provided by Apple Iphone.Another Promising feature of Iphone is Multi-touch user interface. It can recognize you finger gestures and actions and has the ability to ignore unintended touches. Apple claims Iphone as a non Stylus needed touch sensitivity phone. Wit the Multi Touch feature Iphone can recognize your fingers whether you are using a single finger or Multiple fingers.So while browsing a web page for example you can click with a single finger to open a link at the same time use the second finger to scroll around. Even Iphone recognizes unintended touches (i.e) if you place all the fingers at a time and do something on the iphone, Iphone would not react to your actions and stays like a teddybear.The thrilling feel of the Multi-Touch interface is the Pinch and Zoom feature.
The typical iPhone buyer is a young man with a college degree and a higher than average annual household income, according to the group's online survey of buyers.
The iPhone, to cost between $500 and $600, will be available online and in Apple and AT&T stores।
Have You got one YET
Read more...

Monday, November 12, 2007

Brisk Walking Fight's Nicotine | Walking For Exercise

0 comments
Digg it | Stumble it | Save to Del.ico.us |

Do you walk everyday atleast for 30 min ? Can you ask this question to yourself ? Hey wait ...dont start to walk now...read this and make sure you walk for atleast 30 min a day. But don't sleep walk. :)

Studies show that walking can:

Reduce the risk of coronary heart disease and stroke
Lower the Nicotine content in the body
Lower blood pressure
Reduce high cholesterol and improve blood lipid profile
Reduce body fat
Enhance mental well being
Increase bone density, hence helping to prevent osteoporosis
Reduce the risk of cancer of the colon
Reduce the risk of non insulin dependant diabetes
Help to control body weight
Help osteoarthritis
Help flexibility and co-ordination hence reducing the risk of falls

Exercise is just downright good for you. If you name any random 10 medical conditions and diseases, I’m willing to bet money that some form of frequent exercise is a good treatment or preventative measure for at least 9 of them. Diet and exercise pop up as treatments and preventative measures in so many of the diseases that ail us today, and both of these areas are a good place to focus on if your concerned about your health. Even just some simple walking for exercise can go a long way to improving your health. Walking for exercise is fun, easy, and is a great stress reducer.

Walk Lyrics“Withdrawal symptoms related to smoking can be better handled with walking”, says a research finding. This was published in the medical// journal Addiction.

Dr. Adrian Taylor from University of Exeter who is the lead author of this study revealed that moderate exercise certainly had a better effect on people who are keen to quit smoking. He also added that if the same effect was found in a drug, it would have been immediately marketed as an effective tool to give up smoking.

Taylor and his team analyzed 12 different papers which discussed about the relationship between exercises and nicotine withdrawal. The emphasis was on exercises that could be done outside a gym like walking, isometric exercises, flexing and tensing muscles.

It was found that a minimum of five minute exercises was sufficient for smokers to keep their craving for a cigarette under control. According to Taylor, exercise produced dopamine responsible for mood enhancing which reduced the smoker’s craving for nicotine.

Dr. Robert West, professor from University College London felt that these exercises could come in handy for a shorter bout of craving. For a long time effect it will have to be combined with anti-smoking techniques

The great thing about walking for exercise is that you can do it anywhere. You have absoultuely no excuse for not getting up and walking around for at least 30 minutes a day. So it’s raining out? Take an umbrella! Seriously, just get out for a short walk around the block a couple times and you’ll thank yourself for it later. If its absolutely miserable out, just walking around your house or apartment a while is better than nothing.

Walking for exercise is extremely low impact, and so anyone of any age can do it safely and frequently without worrying about damaging themselves. Running and other more strenuous forms of exercise can cause all kinds of joint pain and soreness, and isn’t recommended unless you are in otherwise good shape.
Walking for exercise
A lot of recent studies into different forms of exercise are showing that walking is every bit as good for you as running or other more vigorous exercises, you just need to do it longer. If you are walking for exercise, go for at least 30 minutes or even an hour. The more the better, as you can’t hurt yourself by walking too much.

There are a lot of exercise programs that are beginning to realize the benefits of walking for exercise. As it is something virtually anyone that can walk can do, there is a huge target market for walking programs. I’d recommend any program that motivates you to walk frequently,a walk to remember. Even without one, there are hiking and walking clubs all over the place to join. Not only can walking for exercise be a way to maintain good health, but it can be a good way to meet new people and form new networks.

With so many benefits and virtually no cons, you can’t go wrong with walking for exercise. Its only drawback is that it takes time to do, but it is time well spent. What is the value of good health and longevity?
Read more...

Thursday, November 8, 2007

Symantec

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Symantec commissions have been increased to 15%! The base commission rate is now 15% for all Symantec products. In addition, you will continue to earn 25% on sales of our featured product, Norton 360. Contact your oneNetworkDirect Affiliate Manager today to find out how you can qualify to earn up to an 18% base rate.
http://affiliates.digitalriver.com/blog/index.php/category/onenetwork-news/symantec-affiliate-program/
Symantec
Read more...

Wednesday, November 7, 2007

0 comments
Digg it | Stumble it | Save to Del.ico.us |


Happy Diwali to all of you

'Come out into the universe of light.Everything in the universe is yours,
stretch out your arms and embrace it with love'

-Swami Vivekananda
Read more...

Thursday, November 1, 2007

All about my dreams.........

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Time Travel has been a fascination for many of us. When i first saw some movies on time travel during my childhood days i wondered how would I get that machine for myself.. bcoz i thought i can go to school at a click of the button. I used to travel by walk for about 5 or 8 km to school with a big bag in my back..... and I used to dream every day about the time travel machine that i can possess to get to play long hours in the school breaks and go to school in a second without any stress. As the time goes on……… my dreams also changed ,I was attracted to fly like a superman. I would get dreams like I fly to school... and save some of my friends from trouble..It seems to be so funny when i think of those past moments.
Then I got to dream about the " Alien space shuttle" the movie "Flight Of The Navigator" this was the best sci-fi movie of 80's , it also talked about time traveling. The movie is about a young boy who is somehow transported in time eight years into the future without aging.Then comes the fav of all the Star Trek....All these have one thing in common …. that is the " Time Travelling" though this is beyond imagination it’s seems to be theoritically possible now and should be possible practically in future…., If that happnes where would I be..... Any Guess? you know me very well..... I will leave it to your imagination now...... still dreaming............dreaming big... oh ye………. Bye everybody……leaving this dreaming world for a while and moving into the reality ……coz I got lot of work to do……………………..
Read more...

Thursday, October 18, 2007

Sepultura in इंडिया --http://www.ticketpro.in/sepultura.html

0 comments
Digg it | Stumble it | Save to Del.ico.us |

Read more...

Rockin DUDE-----------Its time for MOSHINGGGGGGGGGGGGGGG

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Mosh Pit :is common in every metal show. The cops in India should be explained that if a mosh pit occurs not to intervene as it is part of the show.

A mosh pit is when people collide against each other just like atoms and molecules. If this starts and it’s your first time stay away from it as it may injure you. If you want to have some fun you can join the pit for once in a life time experience (but carefully).

Wall of Death : is another way of enjoying a metal concert.

People stand in two opposite corners like a wall and when one side charges, the other side also charge towards each other. Its almost like two trains colliding head-on with each other.

Hopefully all these things will make your concert more injury free. If you are not a freak then go somewhere in the corner for shelter. The first Metal bands to come to India and the security are surely going to have a tough time handling the violent crowd.



How to Mosh in a Mosh Pit
Are you going to a concert this weekend? Have you seen the pits and have always been curious, but are concerned that you may come out with a broken face? With a little know-how and a lot of courage, you can make your way through a mosh pit and who knows? You might jump right back in.
For more informatiogn check out the http://members.aol.com/rik0lar/moshing/how2.htm

Know the protocol and unwritten rules. While it may seem otherwise, moshing is by no means a way to hurt someone. Moshing is about realeasing aggression, and having fun while enjoying some awesome music. The 'rules' are mainly common sense.
"Falling" Lift that person and make sure they are not hurt. They will probably just laugh and thank you before joining back in or stepping out but if they are hurt (which isn't as likely as one would think given the normal goers of metal shows recognize the metal brotherhood for what it is and will try not to hurt another.) contact someone working in the venue and maybe signal to some people around you, chances are they will gladly assist.
"Copping a feel" It's wrong. Don't do it. Every female mosher isn't a groupie and if she doesnt get revenge the guy beside you will.
"Hitting" It's not a fight! If you hurt someone it is etiquette to maybe shake their hand or clap their shoulder. Do a friendly gesture and apologize. Chances are they will forgive you, also maybe help them out if they want, if they don't forgive you as much, step out for a bit, they will calm down.
Know what you're getting into. Be objective and recognize that you may get hurt, and you're definitely going to get covered in sweat (and maybe even the saliva or blood) of complete strangers. While the objective of a mosh pit is to make physical contact without getting hurt, there is a good degree of unpredictability and risk. Much of the risk comes from the type of music playing. some ska and punk will be more relaxed depending on who goes (it will depend on your local scene, if you have a big punk and/or skinhead scene it will probally be pretty ruff). hardcore metal or hardcore punk should be left to the more seasoned mosher. If you're considering making your debut in a mosh pit, be aware of the potential consequences and make sure that they're worth the thrill.
Wear the right gear. Wear clothes that you don't mind getting stained or even ruined. Your outfit should also be comfortable and light, since it will get hot in the pit. Make sure your shoes fit tightly and lace them well, because if it falls off, you'll have a hard time getting it back and your unprotected foot will suffer in the meantime. Boots are recommended, but avoid the ones with high heels or any other bells and whistles, those are not made for moshing, just for showing off. Also be sure to remove any spiked wristbands or other dangerous accessories, as they could injure a fellow mosher (or even yourself). Unusual and easily injured piercings may look cool, but will be a liability in the pit. If you can see considerably well without your glasses, take them off and leave them with a friend who is not moshing.
Brace yourself. Whether in the mosh pit or out, you need to keep your hands and more specifically your arms prepared. Don't look like you're ready to strike someone (you'll freak people out and probably get yourself beat up), but certainly don't put yourself in a position where your hands are going to be stuck to your sides and you accidentally get your face knocked by someone's skull flying at you, but you weren't ready for it.
Watch and observe from the side. How brutal are the individuals bouncing around this particular pit? Are people just having fun, or are they going for blood? Know the difference between those who are slam dancing and the idiot high school football player who's running around smashing people in the face with his knuckles. There are many different types of moshing, and adapting to these is an important step if you want to enjoy it.
Participate on the side line by pushing people back in the pit and embracing mosh pit kids from falling to their deaths as they circulate the rim. There are going to be people flying back and forth, side to side, up and down and all over the place. When you're ready to deal with this, it's time to enter.

Circle the circle pit. You're going to continue pushing, bouncing, and slamming off of other people in the pit. Eventually you're going to be able to control your direction and choose your hits, maybe even on your first night. Go at the speed of the crowd and be ready for the dropper: the dropper (or breakdown) is the violent outburst that many metal, hardcore, alternative bands, punk rock, and similar types of music have that goes from normal lyrical music to a crashing point which will set off the adrenaline of every kid around you and is virtually the "go" sound or green light that it is time to smash and slam again. If you're unfamiliar with the music, this is going to be hard to spot, but if you see it coming, you're going to have one up on half of the kids at the show. Similar to breakdowns, many songs include pauses. Typically, all moshers who know this is coming will treat it like a breakdown, meaning that they clear the pit and start after the pause. Be sure to either know the music or be ready for pauses to occur, because not clearing the pit during one of these pauses is not advisable.
Open up the pit Sometimes mosh pits occur in very crowded places. When this happens, there will be a natural tendency of the crowd to push the outer rim of the pit towards the center. Eventually this will close the pit unless the crowd is continually pushed back. Seasoned moshers, or enthusiastic neophytes, will typically counteract this by launching themselves into the sides of the pit in various ways. Basically, if the people on the cusp of the pit have more incentive to stay out of your way than to let the crowd push them into the pit, the pit will stay open. Some strategies for doing this include...
"Crack back" by having several people lean back onto the walls of the pit their your arms outstretched
"Cluster" a bunch of people with their arms over each others' shoulders and have them bouce around the walls of the pit
"Slingshot" into the sides by using another person's momentum to launch you.
"Circle pit" by creating a whirlpool of people running around the outside of the pit.
Anything that involves flailing limbs that looks like it will hurt if someone gets too close. There are numerous hardcore dances that can facilitate this. Look to the crowd for inspiration.
Switch things up.
Bodyslam. Jump into the air, aiming to have your upper body make contact with another mosher. A collision is the goal here.
Pogoing. Basically just jumping up and down.
Slamdancing. Jump into the air, aiming to have your upper body make contact with another mosher. A collision is the goal here.
Stage dive. Push your way past the crowd and the bouncers if you can so that you can get on stage. Without disrupting the band or any of their equipment, dive into the crowd (make sure they see you coming) and tense up when you land so that you're easier to catch. Be warned: Many venues will eject you from the concert for stage diving. Make sure you know the rules of the club.
Crowd surf. You can start off either by stage diving or by hoisting yourself up on two (taller) people's shoulders. Don't have somebody lift you up by the foot with their hands because odds are, the people around you won't have enough time to see you coming and somebody (including but not limited to you) will get hurt, extremely hurt!

Find safety in the "eye of the storm". If you are in a pit that is too intense and you are feeling fatigued, there is safety in the center. Just like a spinning bicycle wheel or a record, the tangential velocity is smaller closer to the center. (Depending on the motion of the pit however this may be ineffective, so keep an eye out and see if people are charging across. Many times people standing in the center are just sitting ducks.)
If you are are struggling with being pushed too much and you want to get out of the pit, DO NOT bend down or you risk falling over and getting injured by people around you accidentally stepping on you. Bring your hands up towards your face and use your arms as stabilizers while working your way out of the mosh pit. Don't panic: it's more important to stay upright and take longer to get out than to hurry out and risk falling over.
In some violent mosh pits walking slowly out will get you run over. In this scenario it's usually best to keep going until you get pushed into the crowd surrounding the pit. Slow down as you near the edge and let anyone on the sideline pushing you know that you're coming out.
If someone falls down, you immediately help them up. This is the unwritten protocol of all mosh pitters. If you keep going and someone is down, you risk seriously hurting or even killing them (and if that doesn't happen, some large mammal of a man is going to hurt you for not following this protocol).
If you find someone's sneaker, wallet, or other personal belonging, it is also mosh etiquette to hold it up in the air to be claimed by its owner.
If you crowd surf, keep your feet raised. Hitting people in the head with your shoes will guarantee removal of one or both of your shoes which will then be flung towards the stage with maximum velocity, rendering you shoeless for the rest of the gig/day/festival weekend.
Be sure that your valuables (e.g. wallet, phone) are tightly secured, or else they might fall off or get snatched in the pit. Better yet, leave as much as you can at home. Leather wrist bands with snaps can easily fall off and disappear; use the kind with buckles.
Hold on to your glasses--if you must wear them, try to secure them around your neck. Otherwise, they might fall off and break in the pit. If they don't manage to break immediately, it will be guaranteed they will be stepped on. But don't leave them at home, because you'll need to see what you're doing (and what others are doing) while moshing.
Stay hydrated. It's hot and sticky in the mosh pit, and you'll be getting quite the workout. Make sure you bring extra water since venues typically overprice them. (e.g. a water that typically costs $1 would most likely be priced at $4 or more. you could pass out if you find yourself dehydrated, passing out in the pit could get you killed.)
You'll know when you've had enough. Moshing is seriously athletic you will get very tired. It may take you all night to get there, or it may be after your first run. When that happens take a break and enjoy the music from outside the pit.
Go with some friends and stick with them. That way, you'll have a few landmarks and lifesavers. If it's a large pit, pick a place to meet up after the show in case you lose them. It sucks to wander about aimlessly for hours trying to pick them out from a crowd of 600 people who are moving around.
When crowd-surfing, try to stay relaxed, yet as still as possible, and go with it. Don't flail around and hit/kick people as it is very likely you will get hit back or even dropped
Pay attention to what type of mosh pit it is. Some mosh pits are more about contact and running into each other while others are more centered on "mosh pit dancing". Don't go slam into the person doing a dance solo in the middle of the pit and likewise don't start swinging your arms around dancing in the middle of a high contact pit. Remember, everybody is there to have fun!
If you have hair long enough to be tied back please do so. It makes things more pleasant for all.
Be nice! Despite the violent nature of pits, moshing is always best if nobody gets seriously hurt. Help people off the ground if they fall and don't go around trying to start fights. Whatever attitude you bring to the pit is what you'll find people bringing right back to you.
Tie your shoes tightly while moshing and especially before stage diving. Some people that don't like getting stage dived on will try to take your shoes. While maybe you deserve it, it sucks to have your shoes stolen and those people are jerks. Don't let them do it.
Don't smoke in the pit! It's bad form (and bad etiquette) to smoke inside a mosh pit. You're probably going to burn someone, or, the same very large mammal of a man who would hurt you for not picking up a fallen fellow mosher may burn you with it.
when your not mosh pitting, you should be either, tired and sweaty, or you just think the pit is a bit scary, or you appreciate music better by sitting, or what ever. never ever, (for fucks sake), stand around because you think your too cool to dance, or because you came with your boyfriend and you think it will make you look like a loser if you do dance. usually, depending on how many people are not dancing, you will become a target and you will probally get beaten up (this means you trendys and emos) show some emotion and have fun, thats what music is all about! if you do think the mosh pit is a bit scary, dance at the back with your friends, or on your own, it doesnt matter unless your having fun.
Remember that metal is a brotherhood. Unlike other musical styles there is a certain brotherly love fans seem to share. If you show it, it will be shown to you. You can find yourself with some very friendly people at a show and it is your job to show them friendship. (Don't be to trusting and let them hold your wallet or something though)

[edit] Warnings
You're going to get hit. As long as you're not a target of another and you're keeping your hands in a position not to get tagged in the face and you're leaning backwards, you'll be safe. But it is possible to become severely injured in a mosh pit, so understand the risks. People have broken ribs, noses, etc. in moshpits.
Watch for kids who wear spike bands in a pit. They will leave scars.
If you have done something to become the target of a much larger/more aggressive mosher, it is generally best to leave the pit for a little while. These overly aggressive moshers may single you out and make every effort to hit you as hard as possible which can cause undesired injury and quickly put a damper on your concert mood.
Women, beware. There are guys in the pit who are going to go for the gold and try to cop an anonymous feel or even try to pull down your pants (this has happened before). If you get harassed, get a good look at the perpetrator and don't hesitate to announce what he did. Most will disapprove and act accordingly.
While participating on the side line is perfectly acceptable, understand that you are shoving moshers from their "blind spot" in most cases. A violent push from the side can send an off-balance mosher directly into an oncoming elbow or head that would've otherwise been averted. Furthermore, you can and will be specifically targeted for retaliation if you do this throughout the show.
While climbing onto the stage and doing a stage dive may be glorious, note that if you get caught by security after getting on the stage, you may become a victim of retaliation from them. This is dependent on the group doing the security, but you may be ejected from the concert.
Avoid stage diving directly into the mosh pit as people will generally be too busy running into each other to catch you. To avoid injury, instead jump to the crowd surrounding the pit. Make sure that they see and know that you're coming.
Know your surroundings. If you're seeing a band in a small coffeeshop or even a house show, don't start spinkicking and pushing people. Often times these shows have little or no stage and nothing ends a show quicker than crushing the band.
At some outdoor festivals, tents are put up over the stage and crowd areas. Be mindful of hazards and obstacles in these situations, nothing ruins the fun like running into a tent pole and getting a concussion or tripping over a tent spike and losing an eye. If something like this happens to another mosher, try to assist them, warn others nearby and send for the venue's security or medical staff.
Consider yourself very lucky when you participate in a pit where most participants are following these rules of etiquette, the uninitiated more likely than not will ruin your good time.
Read more...

Tuesday, October 16, 2007

Google Unveils Copyright Protection Tools For YouTube

0 comments
Digg it | Stumble it | Save to Del.ico.us |
http://money.cnn.com/news/newsfeeds/articles/djf500/200710160037DOWJONESDJONLINE000017_FORTUNE5.htm
UPDATE: Google Unveils Copyright Protection Tools For YouTube
October 16, 2007: 12:37 AM EST
SAN FRANCISCO (Dow Jones) -- Google Inc. on Monday unveiled widely anticipated technology designed to prevent illicit access to copyrighted material on its YouTube video-sharing service, hoping to defray a nasty, ongoing spat with large media companies that has resulted in a $1 billion lawsuit.
The technology can identify video content owned by media companies and dictate its usage on YouTube, which Google acquired for $1.65 billion in October of last year.
However, it cannot preempt the posting of potentially infringing content, and it leaves much of the work of identifying content up to media companies such as Viacom, which sued Google (GOOG) earlier this year alleging "massive" copyright infringement.
The technology unveiled Monday requires that copyright owners first upload their movies, TV shows and other video content to a Google database. The video content is then broken down into data points and analyzed, so that any matching, infringing versions that get posted - for example, a video taken of a television broadcasting the content - can be automatically identified.
YouTube product manager David King said that while the technology cannot yet prevent copyrighted content from being posted initially, it can pull flagged content off the site "in a matter of a few minutes."
Viacom general counsel Michael Fricklas released a generally positive initial assessment of the new technology in a prepared statement. "We're delighted that Google appears to be stepping up to its responsibility and ending the practice of profiting from infringement," Fricklas said.
Google said nine media companies have been testing the technology, including Time Warner and Walt Disney Co. "We need them to help us to help them," King said. King said that while the database is starting from scratch, as its contents increase, its ability to police YouTube should grow.
The issue of copyright violation has dogged Google since its acquisition of YouTube, and the company has long said that technology for keeping copyrighted material off of the service was in the works.
Michael Kelber, a partner with the intellectual property group at the law firm Neal, Gerber & Eisenberg LLP, called the technology "a first step toward a potential resolution" of the YouTube infringement issue.
However, the technology may yet conflict with whatever plans media companies may have for driving Internet traffic to their own sites to view their video content.
"Getting paid for your content is not the only issue," Kelber said.
Long in coming
In its suit against Google filed in March, Viacom (VIA) complained that shows such as "The Daily Show" were appearing on YouTube without proper consent. A month later, Google CEO Eric Schmidt said publicly that the company had begun working on technology to sift copyrighted content from the service.
Zahavah Levine, YouTube chief counsel, said the technology "will be available to Viacom on the same basis that it's available to everybody else."
It's unclear yet whether even after the introduction of the new technology, Viacom may yet pursue Google for damages related to past infringement of its content. Viacom's suit is still tentatively headed for trial at an undetermined date, according to court records.
The Motion Picture Association of America, which has also sued Internet companies for hosting pirated content, sounded a somewhat positive note about Google's new effort.
MPAA spokeswoman Kori Bernards said that, "While we've not yet had a chance to evaluate this specific technology, we support any and all efforts to provide consumers with legitimate content and protect copyright."
King said that Google had actually been developing the technology for years before its acquisition of YouTube. After that, King said, "we really ramped this up as a priority."
King acknowledged that the technology requires a great deal of work by media companies.
However, he said, "What we're announcing today is a big improvement from the current situation."
Kelber said it's true that media companies face a daunting task in order to benefit from the new technology. "If you think about the volume of content out there, it's going to be a lot of work," he said. But, Kelber said, once past the initial hurdle of uploading the content to a database, tracking it becomes relatively easy.
The unveiling of copyright protection technology for YouTube comes shortly after Google announcement last week that the company would begin tying the video service into its popular AdSense online advertising distribution tool.
The result of that combination, among Google's first attempts to actively pull revenue from YouTube, is that alongside more traditional text-based advertisements served up to publishing partner Web sites, YouTube videos containing ads may be served up as well.
Read more...
Online Reference
Dictionary, Encyclopedia & more
Word:
Look in: Dictionary & thesaurus
Medical Dictionary
Legal Dictionary
Financial Dictionary
Acronyms
Idioms
Encyclopedia
Wikipedia
Periodicals
Literature
by:
Word of the Day

Article of the Day

Today's Birthday

In the News

Quote of the Day

Spelling Bee
difficulty level:
score: -
please wait...
 
spell the word:

Match Up
Match each word in the left column with its synonym on the right. When finished, click Answer to see the results. Good luck!

 

Hangman