After recording is complete it will show you another window asking what do you want to do with the video. You can edit or save to the harddisk for later use. If you select kazam screencaster and click on continue , you will get a window with various options to export your video.You can directly upload your video to YouTube. Move the video and audio slider to adjust qulality. Enter a suitable title, keywords and some description about the video. Select the appropriate category of the video and click on export. In the next screen, enter your YouTube user name and password to complete the export. After exporting you will the get the URL of the video.
Welcome to the world of opensource,linux and FOSS. Here you can find latest news about softwares, OS reviews, tips and tricks and how-tos.
Dec 31, 2010
kazam Screecaster
After recording is complete it will show you another window asking what do you want to do with the video. You can edit or save to the harddisk for later use. If you select kazam screencaster and click on continue , you will get a window with various options to export your video.You can directly upload your video to YouTube. Move the video and audio slider to adjust qulality. Enter a suitable title, keywords and some description about the video. Select the appropriate category of the video and click on export. In the next screen, enter your YouTube user name and password to complete the export. After exporting you will the get the URL of the video.
Dec 21, 2010
Mozilla Labs F1 extension
Mozilla Labs has launched a new extension for Firefox browser called 'F1'.This extension allows the users to share links across a variety of social networks and services. Currently this extension supports Facebook,Twitter, GMail, Google Apps and Yahoo! mail, as they are popular services. For this extension to work the user need to setup the accounts to share and after setup the they need do a single button click on the F1 toolbar icon to share.
Figure1 |
figure2 |
To download visit https://addons.mozilla.org/en-US/firefox/addon/252539/
After installing the extension click on the toolbar button on the top-right corner of the browser. This brings up a pop-up asking you to setup the accounts to share(see figure1).Click on the button which will open another tab to configure the accounts(see figure2).
After configuring the accounts users can share the links with those accounts with a single click.
Dec 17, 2010
Google Body Browser
Google has launched a new educational tool called Google Body Browser. Launched on the Google Labs website today, Google Body Browser uses HTML5 technology to let you examine the human body in fully layered, three-dimensional detail.
The application uses WebGL, a plug-in-free programming interface, to power its 3D graphics. WebGL is a relatively new standard, and most major browsers are still testing its implementation. For now, you can grab the latest beta version of Chrome or Firefox to check it out; eventually, the stable versions of those browsers (and most others) will offer integrated WebGL support.
http://bodybrowser.googlelabs.com/
The application uses WebGL, a plug-in-free programming interface, to power its 3D graphics. WebGL is a relatively new standard, and most major browsers are still testing its implementation. For now, you can grab the latest beta version of Chrome or Firefox to check it out; eventually, the stable versions of those browsers (and most others) will offer integrated WebGL support.
http://bodybrowser.googlelabs.com/
chrome 9 released
Google has just released Chrome 9 beta. Chrome 9 comes with many new features, unlike Chrome 7 and Chrome 8.
Chrome 9 Beta comes with the following features:
The Adobe Flash plug in has been sand-boxed.Carlos Pizano,software engineer at Google explains, "The sandbox adds an additional layer of protection to further guard against malicious pages that try to hijack your computer or steal private information from your hard drive." The sandboxed Flash Player has been released on Chrome for Windows only, but will be released for Linux and Mac soon.
One more important feature of chrome 9 is that it includes WebGL support by default.WebGL is a revolutionary new Web technology that brings hardware-accelerated 3D graphics to the browser without installing additional software
The Adobe Flash plug in has been sand-boxed.Carlos Pizano,software engineer at Google explains, "The sandbox adds an additional layer of protection to further guard against malicious pages that try to hijack your computer or steal private information from your hard drive." The sandboxed Flash Player has been released on Chrome for Windows only, but will be released for Linux and Mac soon.
One more important feature of chrome 9 is that it includes WebGL support by default.WebGL is a revolutionary new Web technology that brings hardware-accelerated 3D graphics to the browser without installing additional software
Google Instant has been integrated on the browser and needs to be enabled for use.with the google instant feature the webpages that you frequently visit will load as you begin typing in the address bar.
http://chrome.blogspot.com/2010/12/safer-plug-ins-faster-search-and-richer.html
http://chrome.blogspot.com/2010/12/safer-plug-ins-faster-search-and-richer.html
Nov 12, 2010
Google Goggles for iPhone now available
Google Goggles, a downloadable image recognition application used for searches based on pictures taken by handheld devices, is finally here for the iPhone as well. Primarily developed for Android operating system, Goggles is available for android based smart phones almost since a year. The new version of the Goggles allows you to just tap on the camera button to search. Goggles will analyse the image and highlight the object it recognizes.
Nov 11, 2010
Firefox for mobiles is here!
The domination of Firefox will continue in the browser world as mozilla has launched the mobile version of the Firefox. The mobile version named "Fennec", is built on same technology that powers desktop Firefox and is the first mobile browser to offer add-ons. Fennec is currently available for Nokia N900 and Android devices running 2.0 or higher.
Fennec is feature rich and has a touch friendly interface. zoom with ease and can type less with the awesome bar. The great thing about Fennec is that the browser interface will run in separate process from one rendering the web content. This way Fennec is able to react much faster to user input while pages are loading or CPU intensive Java Script is running
To download firefox for mobile visit www.mozilla.com/en-US/mobile/
Oct 2, 2010
WebP: Google's new image format
Google has released a new image format called WebP, pronounced as "WEPPY" which reduces your size, bandwidth and hosting costs for images.This new image format reduces the file size by 40% compared to JPEG without compromising the quality. Also Google has open sourced this format.
WebP is a method of lossy compression that can be used on photographic images. The degree of compression is adjustable so a user can choose the trade-off between file size and image quality.
A WebP file consists of VP8 image data, and a container based on RIFF. Webmasters, web developers and browser developers can use the WebP format to create smaller, better looking images that can help make the web faster.
A WebP file consists of VP8 image data, and a container based on RIFF. Webmasters, web developers and browser developers can use the WebP format to create smaller, better looking images that can help make the web faster.
Working of WebP
WebP uses predictive coding to encode an image, the same methodology used by the VP8 video codec to compress keyframes in videos. Predictive coding uses the values in neighboring blocks of pixels to predict the values in a block, and then encodes only the difference (residual) between the actual values and the prediction. The residuals typically contain many zero values, which can be compressed much more effectively. The residuals are then transformed, quantized and entropy-coded as usual. WebP also uses variable block sizes.
WebP uses predictive coding to encode an image, the same methodology used by the VP8 video codec to compress keyframes in videos. Predictive coding uses the values in neighboring blocks of pixels to predict the values in a block, and then encodes only the difference (residual) between the actual values and the prediction. The residuals typically contain many zero values, which can be compressed much more effectively. The residuals are then transformed, quantized and entropy-coded as usual. WebP also uses variable block sizes.
for more information visit http://code.google.com/speed/webp/
Sep 11, 2010
Ubuntu 10.10 Beta released
The Ubuntu developers are moving quickly to bring you the absolute latest and greatest software the Open Source community has to offer. The Maverick Meerkat Beta is the beta release of Ubuntu 10.10, bringing with it new features for the next version of Ubuntu. The final stable version will be released on October 10, 2010.
The beta ships with GNOME 2.31, which introduces support for the new dconf configuration storage system. Ubuntu's standard F-Spot photo tool has been replaced by Shotwell, a relatively new application that is developed by nonprofit software group Yorba."
Jul 1, 2010
new Opera 10.60 is 50 percent faster
Opera Software has released the final version of its 10.60 browser and claims that the “fastest browser on Earth” is now 50 per cent quicker than its previous release.Opera attributes its increased speed in part to its Opera Turbo feature, which compresses data travelling over internet connections by up to a factor of two or more.
The new browser also offers improved features. Its ‘AppCache’ allows users to run web-based applications such as word processors and spreadsheets without an internet connection.
Opera has included a Speed Dial feature to quickly connect users to their favourite sites, and built-in video playback that lets consumers view video within the browser.
Search enhancements include instant search suggestions when using sites such as Wikipedia, and a greater choice of search engines included in the browser.
New in Opera 10.60
Integrated Web searchSearch the Web directly from the address field by simply typing in your search term.
Sophisticated tabs
See your open webpages easily with visual tabs, or use private tabs to protect your privacy.
Content blockingControl your view of webpages by easily removing annoying images, animations and content.
The new browser also offers improved features. Its ‘AppCache’ allows users to run web-based applications such as word processors and spreadsheets without an internet connection.
Opera has included a Speed Dial feature to quickly connect users to their favourite sites, and built-in video playback that lets consumers view video within the browser.
Search enhancements include instant search suggestions when using sites such as Wikipedia, and a greater choice of search engines included in the browser.
New in Opera 10.60
- further-optimized JavaScript engine is over 50% faster than in Opera 10.50.
- Enhanced support for advanced Web standards such as HTML5 and WebM video is now included.
- Opera can prompt you to share your location, making geolocation-supporting websites more useful.
- Search suggestions for selected providers help you find results more easily.
Integrated Web searchSearch the Web directly from the address field by simply typing in your search term.
Sophisticated tabs
See your open webpages easily with visual tabs, or use private tabs to protect your privacy.
Speed Dial
Access your favorite webpages instantly with a single click.
Access your favorite webpages instantly with a single click.
Content blockingControl your view of webpages by easily removing annoying images, animations and content.
Mouse gesturesPerform common browser actions easily with quick movements of your mouse.
add-onsEnhance browser functionality with Opera Widgets and Opera Unite, or select a new skin
Opera TurboSpeed up browsing on slow connections by compressing webpages before downloading them.
http://www.opera.com/browser/
http://www.opera.com/browser/
Jun 27, 2010
iPhone 4 will be available in India in September
After launching it in Europe and US, Apple is all set to offer its highly demanded and successful gadget iPhone 4 in India in coming September. The gadget has been very successful in western markets and is selling like a hot cake. Indian gadget freaks are desperately waiting for the gadget to arrive in the country.
iPhone 4 operates its functionality on iOS4, the latest software developed by Apple for its mobiles. The software enables the device to run more than one program simultaneously. The new Apple iPhone 4 features:
The cost of this new device in western markets is set at $199 and $299 for 16GB and 32GB respectively. For Indian users, the 16GB version of the device is expected to cost around Rs. 35,500 while the 32GB version will be priced at around Rs. 41,500.
Earlier, Vodafone announced that it is all set to bring the iPhone 4 to the Indian market in the coming months.
iPhone 4 operates its functionality on iOS4, the latest software developed by Apple for its mobiles. The software enables the device to run more than one program simultaneously. The new Apple iPhone 4 features:
- FaceTime,
- supports video calling
- Apple's new Retina 960×640 pixelsdisplay, the highest resolution display ever built into a phone,
- HD video recording
- Apple's A4 processor
- a 3-axis gyro and up to 40% longer talk time – in an all-new design of glass and stainless steel.
- LG LCD Display technology called In-Plane Switching technology (IPS) for enhanced viewing experience
The cost of this new device in western markets is set at $199 and $299 for 16GB and 32GB respectively. For Indian users, the 16GB version of the device is expected to cost around Rs. 35,500 while the 32GB version will be priced at around Rs. 41,500.
Earlier, Vodafone announced that it is all set to bring the iPhone 4 to the Indian market in the coming months.
NETRA:Tool for Refractive Assessment
THE HUMBLE mobile phone is soon going to be your ophthalmologist. You will be able to self-test your eyesight just as you check your body temperature, blood pressure or blood glucose using digital devices. All you will need to do is run a simple application on your phone, look at the screen through a tiny attachment and press a few keys.
And within seconds, you will have the status of your eyesight on your phone's screen. This is an innovative piece of technology developed by a group of researchers led by India-born Ramesh Raskar at the media lab of the Massachusetts Institute of Technology (MIT).
It has yielded encouraging results and will soon be field-tested in India in collaboration with the Hyderabad-based L. V. Prasad Eye Institute.
The device has been named NETRA or Near-Eye Tool for Refractive Assessment. The device has the potential to make routine eye-testing simpler, cheaper and accessible to millions of people. It takes advantage of the huge improvements in the resolution of digital displays and their widespread proliferation on mobile phones, which have become ubiquitous in developing countries.
NETRA currently works with phones having high-resolution displays. But researchers are expanding the range of phones that it can work on and are also developing pattern designs that can work with low-resolution phones.
"You can think of it as a thermometer for visual performance. Just as a thermometer measures corporal temperature and does not prescribe medicine, NETRA measures the refractive error and does not necessarily prescribe glasses," says Raskar, who heads the Camera Culture group at the media lab. "It allows a user to self- assess the performance of his or her eyes over time. The goal is to empower people, not replace optometrists."
Apart from the software to run on the phone, all that's needed is a snap-on plastic device, which, researchers say, can be produced for about $2 (about Rs 93). But it would cost much lesser if produced in large quantities. The plastic device can be clipped on to the front of a cell phone's screen.
The micro-lens array in front of the LCD essentially creates a 4D display. The user looks into a small lens and presses the phone's navigation keys until sets of parallel green and red lines overlap. This is repeated eight times, with the lines at different angles, for each eye.
The whole process takes less than two minutes, at which point the software loaded on to the phone provides the prescription data. The prototype developed by Raskar's team has an array of tiny lenses and a grid of pinholes that, combined with the software on the phone, forces the user to focus at different depths.
Swype: a software that predicts words as you glide across your keyboard
Seattle-based Cliff Kushler,the man who invented the T9 software for quick typing on cell phones, has created yet an another path breaking software called Swype with partner Randy Marsden which predicts words as you slide your fingers on the keypad.
Swype allows users to glide a finger across the virtual keyboard to spell words, rather than tapping out each letter.
"We've squeezed the desktop computer, complete with keyboard and mouse, into something that fits in a pocket. The information bandwidth has become very constricted. I thought, if we can find a better way to input that information, it could be something that would really take off," the New York Times quoted him as saying
He said that Swype is a big breakthrough that could reach billions of people.
Swype's software detects where a finger pauses and changes direction as it traces out the pattern of a word.The movements do not have to be precise because the software calculates which words a user is most likely trying to spell.Capitalization and double letters can be indicated with a pause or squiggle, while spacing and punctuation are automatic.
Kushler, who is chief technology officer of Swype, estimates that the software can improve even the nimblest text-messager's pace by 20 to 30 percent.Swype charges phone makers a licensing fee for each device sold and is also contemplating for add-ons.
Jun 16, 2010
Thunderbird 3.1 release candidate issued
Mozilla issued a second release candidate for version 3.1 of its open sourceThunderbird email and news client, code named "Lanikai". Mozilla developers consider the latest development milestone to be stable and it is expected to be the last release before the final version of Thunderbird 3.1 arrives "around mid-June".
Thunderbird 3.1 will be the next major release of the popular cross-platform email client and is based on the Gecko 1.9.2 platform.
New features include
New features include
- addition of a new quick filter toolbar
- Saved Files Manager
- an updated migration assistant.
- better Personas theme support
- interface design changes
- stability and memory improvements.
- Upgrading from version 2.x of Thunderbird has also been improved.
The second release candidate addresses several bugs, including a critical issue that caused it to crash on some Mac OS X systems. As with all development releases, use in production environments and on mission critical systems is not advised. Users testing the release are encouraged to provide feedback and report any bugs that they encounter.
More details about the release, including a list of known issues, can be found in the release notes. Thunderbird 3.1 RC2 is available todownload for Windows, Mac OS X and Linux. Thunderbird binaries are released under the Mozilla Thunderbird End-User Software License Agreement and the source code is released under disjunctive tri-licensing that includes the Mozilla Public Licence, GPLv2 and LGPLv2.1. The latest stable release is Thunderbird 3.0.4 from the end
Jun 15, 2010
no Ubuntu for tablets
Ubuntu sponsor Mark Shuttleworth has told IT news service Golem that rumours circulating in recent days of a special version of Ubuntu Linux for tablets are based on a misunderstanding. During LinuxTag in Berlin, Shuttleworth told the news service that comments in an interview with Chris Kenyon, Business Development Director at Canonical, have been misinterpreted.
Future Ubuntu versions will continue to be developed for netbooks, desktops and servers. According to Shuttleworth, Ubuntu is working with OEMs on Ubuntu Light, a special netbook version which will be pre-installed on laptops and netbooks and used in parallel with Windows as an instant-on system, but that there was not a special Tablet version of Ubuntu in development.
Samsung's bada platform now in India
A new mobile operating system has hit the Indian market. Samsung Electronics launched its new smartphone platform bada in India. First announced in November last year, this new addition to Samsung's mobile ecosystem enables developers to create applications for millions of new Samsung mobile phones, and consumers to enjoy a fun and diverse mobile experience.
The bada platform was launched at the Global Developer Day organised by Samsung Electronics in Bengaluru.
Samsung bada supports various service-centric features such as social networking device synchronisation, content management, location-based services and commerce services -- all supported by back-end bada servers. These developer-friendly features support developers to implement various services with minimal effort.
Samsung bada enables developers to take full advantage of mobile device capabilities to create applications with ease. Applications can use device functions to make phone calls, send messages or access the contact list. Also, various service applications can share information such as personal profiles, social relations, schedules or contents with a simple user confirmation in order to provide services with greater personal relevance and cooperative service extension.
The company also announced the Samsung bada Developer Challenge at today's launch event. The Challenge is the first chance for developers to win a share of a $2,700,000 prize fund, simply by using the features of the new bada platform to build a variety of applications for bada devices. The Samsung bada Champion (Ist Prize winner) wins a grand prize of $300,000.
Jun 14, 2010
Speed Dreams 1.4.0 is finally available
The open-source racing game "Speed Dreams" is available for both windows and Linux after 2.5 years of graphics and code development.The teams plans a version 2.0 release at the end of the year.The currently supported platforms are Linux (x86, x86_64) and the 32-bit windows.
The current official release features :
- visually reworked menus
- 3 amazing fine tuned and balanced new car sets
- An updated TRB1 car set (well balanced, more realistic behaviour),
- 3 exciting new tracks and many visually improved ones,
- Smashing liveries for all these cars
- 2 new TRB first-class robot for the Supercars, 36 GP and TRB1 car sets
- 2 new leader-board modes smoke on spinning tires
- brand new gauges, and many many other small visual improvements,
- experimental Simu V3 physics engine
Jun 11, 2010
Official Google Blog: Announcing Google TV: TV meets web. Web meets TV.
Official Google Blog: Announcing Google TV: TV meets web. Web meets TV.: "We’re working together with Sony, Logitech and Intel to put Google TV inside of televisions, Blu-ray players and companion boxes. These devices will go on sale this fall, and will be available at Best Buy stores nationwide. You can sign up here to get updates on Google TV availability."
Google TV: web meets TV
If there’s one entertainment device that people know and love, it’s the television. In fact, 4 billion people across the world watch TV and the average American spends five hours per day in front of one*. Recently, however, an increasing amount of our entertainment experience is coming from our phones and computers. One reason is that these devices have something that the TV lacks: the web. With the web, finding and accessing interesting content is fast and often as easy as a search. But the web still lacks many of the great features and the high-quality viewing experience that the TV offers.
Google TV is a new experience for television that combines the TV that you already know with the freedom and power of the Internet. With Google Chrome built in, you can access all of your favorite websites and easily move between television and the web. This opens up your TV from a few hundred channels to millions of channels of entertainment across TV and the web. Your television is also no longer confined to showing just video. With the entire Internet in your living room, your TV becomes more than a TV — it can be a photo slideshow viewer, a gaming console, a music player and much more.
Google is working together with Sony, Logitech and Intel to put Google TV inside of televisions, Blu-ray players and companion boxes. These devices will go on sale this fall, and will be available at Best Buy stores nationwide. You can sign up hereto get updates on Google TV availability.
read more about google TV http://googleblog.blogspot.com/2010/05/announcing-google-tv-tv-meets-web-web.html
Google TV is a new experience for television that combines the TV that you already know with the freedom and power of the Internet. With Google Chrome built in, you can access all of your favorite websites and easily move between television and the web. This opens up your TV from a few hundred channels to millions of channels of entertainment across TV and the web. Your television is also no longer confined to showing just video. With the entire Internet in your living room, your TV becomes more than a TV — it can be a photo slideshow viewer, a gaming console, a music player and much more.
Google is working together with Sony, Logitech and Intel to put Google TV inside of televisions, Blu-ray players and companion boxes. These devices will go on sale this fall, and will be available at Best Buy stores nationwide. You can sign up hereto get updates on Google TV availability.
read more about google TV http://googleblog.blogspot.com/2010/05/announcing-google-tv-tv-meets-web-web.html
Jun 10, 2010
some Tips and tricks to maintain a virus free computer
Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some of them are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the some tips and precautions to maintain a virus free computer.
- E-mail is one of the easiest ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. NEVER click on any links in the emails that comes from untrusted sources.
- USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive.
- Another way is through e-mail client Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla),Evolution mail, or a web-based program such as Hotmail or Yahoo (In Firefox).
- Internet is the main source of all the malicious programs including viruses, worms, trojans and other viruses. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.
- Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
- You can also use a pop-up blocker to automatically block those pop-ups.
- Most of us use search engines like Google to find what we are looking for on the web. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.
- Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virus. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides real time security for your PC. Make sure that this feature is turned on.
- Install a good Antispyware program, that operates against Internet malware and spyware.
- Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.
- Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.
- Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
- While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.
- And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.
- The major issue is the OS. Most of the computer viruses are created for Microsoft's windows operating systems.You can completely get rid of the menace of viruses by using open-source Operating Systems. These open-source OS use the Linux kernel which is very secure and robust. There are various Linux distributions to cater the needs of the users. Some of them are Ubuntu , Suse, Fedora, Mandriva, etc,.These OS are offered for free and are immune to viruses. It is recommended that you use these Linux operating systems.
Jun 5, 2010
Nokia launches bicycle-powered charger
NOKIA, The world's largest mobile phone maker, launched four low-priced handsets and a recharger that can be connected to a bicycle's dynamo which charges when the wheels turn.The bike kit has a charger, dynamo and a holder to secure the phone to the bicycle.
The bicycle charger kit and handsets, come with a standby battery time of up to six weeks, FM radio and flashlights are aimed at users with limited access to electricity.
The bicycle charger kit and handsets, come with a standby battery time of up to six weeks, FM radio and flashlights are aimed at users with limited access to electricity.
The price of the charger kit, which also includes a holder for securing the phone to the bicycle, will vary according to market, but in countries like Kenya, it would be around 15 euros (18.43 dollars)
The dynamo, a small electrical generator, uses the movement of the wheels to charge the handset through a standard 2 mm charging jack used in most Nokia handsets.
To begin charging, a cyclist needs to travel around six kilometres per hour (four miles per hour), and while charging times will vary depending on battery model, a 10 minute journey at 10 kmh produces around 28 minutes of talk time or 37 hours of standby time, the spokesman said. The faster you ride, the more battery life you generate.
The charger is set to become available through selected retailers and the company's online store before year-end, Nokia said.
To begin charging, a cyclist needs to travel around six kilometres per hour (four miles per hour), and while charging times will vary depending on battery model, a 10 minute journey at 10 kmh produces around 28 minutes of talk time or 37 hours of standby time, the spokesman said. The faster you ride, the more battery life you generate.
The charger is set to become available through selected retailers and the company's online store before year-end, Nokia said.
Jun 3, 2010
Myah OS
Myah OS is a linux distribution specifically for internet multimedia office gaming. it uses KDE the popular desktop environment. The latest version is Myah OS 3.0 Dragon.Dragon is the code name for Myah OS built around the KDE 3 desktop.
Myah OS has full multimedia support and a wide range or software. There is a complete KDE desktop as well as Koffice, Ktorrent, Amarok and many more KDE base software. Dragon brings the best of KDE and the best of Myah OS together in the same system.
http://myah.org/index.php
Myah OS has full multimedia support and a wide range or software. There is a complete KDE desktop as well as Koffice, Ktorrent, Amarok and many more KDE base software. Dragon brings the best of KDE and the best of Myah OS together in the same system.
http://myah.org/index.php
Jun 2, 2010
ROCK Linux
ROCK Linux is a modern Linux Distribution with a powerful auto-build process. It's mostly designed for skilled Linux/Unix Administrators. It's available for multiple platforms. ROCK Linux is a small distribution, but it's not a "mini distribution". It comes with over 200 packages including X11 and the GNOME Desktop - but excluding menu driven configuration tools (most professional users prefer configuration files). A reasonably well configured installation of Rock Linux should be useful for any computer user (even beginners).
ROCK Linux is a distribution build kit, a group of tools to build GNU/Linux distributions from source. It comes with a set of predefined distributions like the Crystal ROCK desktop target or the small, bootable bootdisk target, and allows users to easily customize the build process and create new targets.
The distributions that ROCK Linux generates are sometimes called ROCK Linux themselves, although the term ROCK Linux based distribution is more appropriate.
In a way ROCK Linux is a tool for managing OS solutions. It comes with the package managers mine and bize, the rocket tool for updates over network, and the ability to build (emerge) single packages into an existing Linux OS. For system administrators, a setup tool (stone) and reasonable System V style init scripts as well as other configuration files are provided.
The distributions that ROCK Linux generates are sometimes called ROCK Linux themselves, although the term ROCK Linux based distribution is more appropriate.
In a way ROCK Linux is a tool for managing OS solutions. It comes with the package managers mine and bize, the rocket tool for updates over network, and the ability to build (emerge) single packages into an existing Linux OS. For system administrators, a setup tool (stone) and reasonable System V style init scripts as well as other configuration files are provided.
BlueCat Linux
BlueCat is LynuxWorks' distribution of open source Linux, enhanced to meet the requirements of embedded developers. BlueCat includes a royalty-free, open source Linux distribution and is compatible with the LynxOS RTOS, an industry leader in hard, real-time embedded software. With its heritage of reliability, availability, and serviceability, BlueCat has a common source base and development tools for multiple embedded targets.
BlueCat Linux delivers the flexibility and cost benefits of open-source software. It's uniquely constructed to be a stable, commercial-grade embedded operating system release which provides immediate productivity and optimized performance through:
- Packages that are tailored to your varying requirements for tools and technical support
- A comprehensive set of tools and board support packages for developing, debugging and deploying Linux into embedded environments
- 20 years of LynuxWorks™ expertise and experience in embedded operating systems, the UNIX® programming model, POSIX® and more
BlueCat Embedded Linux features
- Cross-development environment
- 2.6 kernel
- Microsoft Windows XP Pro
- Red Hat Enterprise Linux 4
- Target support:
- Intel® IA-32, XScale®, PowerPC® 4xx, Embedded Xilinx FPGA-based processors and MicroBlaze
- LynuxWorks development environment
- Luminosity Eclipse-based IDE
- GNU tool chains, gdb and gcc
- Multithreaded debugger
- Kernel debugging capabilities
- Embedded target tools
- Footprint minimization and kernel configuration
- TinyLogin support
- BusyBox support
- Watchdog timer (for specific BSPs)
Jun 1, 2010
ScribeFire now available for google's chrome browser
The FireFox's popular extension,'ScribeFire' for blogging, is now officially available for Google's chrome browser.
ScribeFire is a full-featured blog editor that integrates with your browser and lets you easily post to all of your blogs. You can post to blogs from Wordpress, Blogger, TypePad, Windows Live Spaces, Tumblr, Posterous, Xanga, LiveJournal, or any other blog that supports the MetaWeblog or MovableType APIs. You can edit and update existing posts. You can schedule posts for the future (if your blog allows that). You can delete posts. You can save drafts. You can tag and categorize. ScribeFire for Chrome has a simple interface that is so simple even a caveman could use it, and anything you're working on is saved if you close the editor and restored when you come back. It really is the easiest way to update your blog.
The disappointing thing is that it lacks many features of the Firefox's version.
May 30, 2010
create a multi boot CD using multicd.sh script
multicd.sh is a shell script designed to build a multiboot CD image containing many different Linux distributions and/or utilities. After creating a multiboot CD you can choose the OS you wish to install at the boot time.
The avantages to making a CD with this script are:
1. Make a folder for building the image. You can give it any name; I call mine multicd.
2. Download the multicd.sh script and save it into that folder. (For version 5.0+, either download multicd[version]- combined.sh to that folder or untar multicd-[version]-seperate.tar.gz to that folder.)
3. Copy or symlink some of the supported boot images to files in that folder. Note: they must have the names below (i.e. Puppy must be puppy.iso, etc.) Also, only distros supported by this script will work.
4. Install mkisofs or genisoimage. If your distribution comes with CD/DVD burning sftware, you probably have it already.
5. Open a terminal, go to the multicd folder (made in step 1) and type:
chmod +x multicd*.sh
sudo ./multicd*.sh
The script will detect which images are present and make a CD for you. They will appear on the menu of the final CD in the order they are listed. (Note: if the final size is over 700 MB, you will have to use a DVD.)
supported linux distributions:
Linux Mint → linuxmint.iso
PCLinuxOS → pclos.iso* PCLinuxOS LXDE → pclx.iso* Knoppix → knoppix.iso (Versions 5 and 6 supported. If you use the DVD version, KNOPPIX2 will be dropped. You can also use the 5.3.1 Japanese Edition if you prefer KDE.)
*the two plugins can both be used for any other version of PCLinuxOS 2009 -customized-
Debian Live → binary.iso
-compilation-
Ultimate Boot CD → ubcd.iso
-not too large-
Slax → slax.iso
Tiny Core Linux → tinycore.iso
Puppy → puppy.iso
Macpup → macpup.iso
Feather → feather.iso
SliTaz → slitaz.iso
Austrumi → al.iso
GeeXboX → gbox.iso
DSL → dsl.iso
Slax modules → *.lzm
DeLi Linux → deli.iso
TinyMe → timyme.iso
antiX → antix.iso
Wolvix → wolvix.iso
CDlinux → cdl.iso
-partitoning and specialized-
RIPLinuX → riplinux.iso
SystemRescueCd → sysrcd.iso
Trinity Rescue Kit → trk.iso
INSERT → insert.iso
Parted Magic → pmagic.iso
GParted Live → gparted.iso
BackTrack Linux → backtrack.iso
WeakNet Linux → weaknet.iso
Offline NT Password & Registry Editor → ntpasswd.iso
EASEUS Disk Copy → diskcopy.iso
Clonezilla → clonezilla.iso
PING → ping.iso
Endian Firewall → efw.iso
NetbootCD → netbootcd.iso
Ubuntu (hardy or jaunty) mini.iso → ubuntu-mini.iso
Debian (lenny, squeeze or sid) mini.iso → debian-mini.iso
Fedora 11 netinst → fedora-boot.iso
openSUSE NET iso → opensuse.iso
Mandriva boot.iso → mandriva-boot.iso
Arch Linux FTP or CORE → arch.iso
FreeDOS base or full CD → fdbasecd.iso/fdfullcd.iso
Any floppy disk image → *.img or *.imz (could be Super Grub Disk, MS-DOS, etc.)
Any floppy disk image → games/*.img or games/*.imz (for bootable DOS disk images with games)
GRUB4DOS grub.exe → grub.exe
DBAN iso image → dban.iso
Memtest86+ → automatic
for more information visit http://multicd.tuxfamily.org/
The avantages to making a CD with this script are:
- You don't need to burn multiple CDs for small distribution
- If you already have the ISO images, it is not necessary to download them again.
- When a new version of one of the distributions is released, you can simply download the new version and run the script again to build a new multiboot image.
1. Make a folder for building the image. You can give it any name; I call mine multicd.
2. Download the multicd.sh script and save it into that folder. (For version 5.0+, either download multicd[version]- combined.sh to that folder or untar multicd-[version]-seperate.tar.gz to that folder.)
3. Copy or symlink some of the supported boot images to files in that folder. Note: they must have the names below (i.e. Puppy must be puppy.iso, etc.) Also, only distros supported by this script will work.
4. Install mkisofs or genisoimage. If your distribution comes with CD/DVD burning sftware, you probably have it already.
5. Open a terminal, go to the multicd folder (made in step 1) and type:
chmod +x multicd*.sh
sudo ./multicd*.sh
The script will detect which images are present and make a CD for you. They will appear on the menu of the final CD in the order they are listed. (Note: if the final size is over 700 MB, you will have to use a DVD.)
supported linux distributions:
Linux Mint → linuxmint.iso
PCLinuxOS → pclos.iso* PCLinuxOS LXDE → pclx.iso* Knoppix → knoppix.iso (Versions 5 and 6 supported. If you use the DVD version, KNOPPIX2 will be dropped. You can also use the 5.3.1 Japanese Edition if you prefer KDE.)
*the two plugins can both be used for any other version of PCLinuxOS 2009 -customized-
Debian Live → binary.iso
-compilation-
Ultimate Boot CD → ubcd.iso
-not too large-
Slax → slax.iso
Tiny Core Linux → tinycore.iso
Puppy → puppy.iso
Macpup → macpup.iso
Feather → feather.iso
SliTaz → slitaz.iso
Austrumi → al.iso
GeeXboX → gbox.iso
DSL → dsl.iso
Slax modules → *.lzm
DeLi Linux → deli.iso
TinyMe → timyme.iso
antiX → antix.iso
Wolvix → wolvix.iso
CDlinux → cdl.iso
-partitoning and specialized-
RIPLinuX → riplinux.iso
SystemRescueCd → sysrcd.iso
Trinity Rescue Kit → trk.iso
INSERT → insert.iso
Parted Magic → pmagic.iso
GParted Live → gparted.iso
BackTrack Linux → backtrack.iso
WeakNet Linux → weaknet.iso
Offline NT Password & Registry Editor → ntpasswd.iso
EASEUS Disk Copy → diskcopy.iso
Clonezilla → clonezilla.iso
PING → ping.iso
Endian Firewall → efw.iso
NetbootCD → netbootcd.iso
Ubuntu (hardy or jaunty) mini.iso → ubuntu-mini.iso
Debian (lenny, squeeze or sid) mini.iso → debian-mini.iso
Fedora 11 netinst → fedora-boot.iso
openSUSE NET iso → opensuse.iso
Mandriva boot.iso → mandriva-boot.iso
Arch Linux FTP or CORE → arch.iso
FreeDOS base or full CD → fdbasecd.iso/fdfullcd.iso
Any floppy disk image → *.img or *.imz (could be Super Grub Disk, MS-DOS, etc.)
Any floppy disk image → games/*.img or games/*.imz (for bootable DOS disk images with games)
GRUB4DOS grub.exe → grub.exe
DBAN iso image → dban.iso
Memtest86+ → automatic
for more information visit http://multicd.tuxfamily.org/
First man to be 'infected' by computer virus
A British scientist has laid claim to being the first man to be infected by a computer virus, after he used a contaminated chip implanted in his hand to attack a lab security system.
Dr Mark Gasson,a British scientist, programmed the microchip, similar to those used to "tag" pets, to remotely open his lab's security doors and unlock his mobile phone before having it inserted under his skin.He also infected the implant with a virus, to prove that it could be transferred as the chip and the security system wirelessly exchanged electronic data.
The virus could then have been passed on to other devices interacting with the control system, such as colleagues' swipe cards, in the same way viruses are able to spread across computer networks.
The results raise the possibility that in the future, increasingly advanced medical devices such as pacemakers, inner ear implants, and other medical devices could become vulnerable to cyber attacks from other human implants.
Dr Gasson said: "Our research shows that implantable technology has developed to the point where implants are capable of communicating, storing and manipulating data.
"This means that, like mainstream computers, they can be infected by viruses and the technology will need to keep pace with this so that implants, including medical devices, can be safely used in the future.”
He stressed it is not currently thought possible to exploit medical devices such as pacemakers because they have not been analysed for flaws, but said they could theoretically be vulnerable.
He said: "We do not know of any medical device that can be exploited in this way yet but we are very much on the cusp of it being possible.
"It is possible that you could create a virus that completely corrupts the device to the point where it does not work any more."
Implanted technology has become increasingly common in the United States, where medical alert bracelets can be scanned to bring up a patient's medical history.
Dr Gasson said the technology is likely to become more widely used in the future, even for non-medical purposes such as increasing someone's memory.
He said: “Our next evolutionary step may well mean that we all become part machine as we look to enhance ourselves, either because it becomes as much of a social norm as say mobile phones, or because we’ll be disadvantaged if we do not.”
Dr Mark Gasson,a British scientist, programmed the microchip, similar to those used to "tag" pets, to remotely open his lab's security doors and unlock his mobile phone before having it inserted under his skin.He also infected the implant with a virus, to prove that it could be transferred as the chip and the security system wirelessly exchanged electronic data.
The virus could then have been passed on to other devices interacting with the control system, such as colleagues' swipe cards, in the same way viruses are able to spread across computer networks.
The results raise the possibility that in the future, increasingly advanced medical devices such as pacemakers, inner ear implants, and other medical devices could become vulnerable to cyber attacks from other human implants.
Dr Gasson said: "Our research shows that implantable technology has developed to the point where implants are capable of communicating, storing and manipulating data.
"This means that, like mainstream computers, they can be infected by viruses and the technology will need to keep pace with this so that implants, including medical devices, can be safely used in the future.”
He stressed it is not currently thought possible to exploit medical devices such as pacemakers because they have not been analysed for flaws, but said they could theoretically be vulnerable.
He said: "We do not know of any medical device that can be exploited in this way yet but we are very much on the cusp of it being possible.
"It is possible that you could create a virus that completely corrupts the device to the point where it does not work any more."
Implanted technology has become increasingly common in the United States, where medical alert bracelets can be scanned to bring up a patient's medical history.
Dr Gasson said the technology is likely to become more widely used in the future, even for non-medical purposes such as increasing someone's memory.
He said: “Our next evolutionary step may well mean that we all become part machine as we look to enhance ourselves, either because it becomes as much of a social norm as say mobile phones, or because we’ll be disadvantaged if we do not.”
May 24, 2010
Find invisible users in your Gtalk buddy list
Most instant messaging protocols like yahoo messenger, msn, gtalk, etc,. support invisible users. Anyone can remain online without being noticed by anyone in their buddy list. In this post I'm going to explain how to find the invisible users in your GTalk list. For this i used:
- operating system: ubuntu 9.04
- programming language:python language.Install this by running
sudo apt-get install python
- xmpp module for python language.you can install this by running the following command:
sudo apt-get install python-xmpp
The interesting thing about GTalk implementation is that it implements user 'invisibility' on the client side, not on the server side. we can find such invisible-yet-online users by listening to their presence notifications. When ever a user or client joins a sever/network, it sends presence notification for the users. when the user authenticates to the server and becomes invisible, the client sends an 'unavailable' presence to all buddies in the roster. Thus, presence notifications with a presence type of 'unavailable' means that the user is in invisible mode. All Gtalk clients ignore this type of presence; hence, those users are not shown in the buddy list.
using the below python program we can grab the list of invisible users.It uses XMPP module for python. You can install this module in Ubuntu and other debian based distribution by running the following command:
sudo apt-get install python-xmpp
#!/usr/bin/python -W ignore::DeprecationWarning
import xmpp
user="username@gmail.com"
password="password"
server="gmail.com"
def presenceHandler (conn, presence):
if presence:
password="password"
server="gmail.com"
def presenceHandler (conn, presence):
if presence:
if presence.getType() == "unavailable":
print presence.getFrom().getStripped()
print presence.getFrom().getStripped()
print "Invisible users:"
jid = xmpp.JID(user)
connection = xmpp.Client(server,debug=[])
connection = xmpp.Client(server,debug=[])
connection.connect()
result = connection.auth(jid.getNode(), password, "client Name")
connection.RegisterHandler('presence',presenceHandler)
connection.sendInitPresence()
connection.sendInitPresence()
while connection.Process(1):
pass
pass
Write the above code in a text editor and save it as 'invisible.py' (without quotes)
open the terminal and go to the directory containing the invisible.py file and type:
chmod a+x invisible.py to get root powers to execute the code.
now type:
./invisible.py
This will print the list of invisible users on the command line itself.
Subscribe to:
Posts (Atom)