Wednesday, August 31, 2011

17 New Confirmed Features with Windows 8

As the release date of Windows 8 (beta) gets closer, many new features of it end up being leaked and people couldn't wait to get their hands on it. Microsoft couldn't stop the leakage of Windows 8 screenshots and features, but I guess they're now releasing information more willingly.

Here is a list of Windows 8 features, and these are confirmed ones, not rumors.

What's new in Windows 8?

  • Windows 8 (beta) aka Windows Next(beta) is confirmed to release in September (that's just a few weeks away), although the stable version will be available in 2012.
  • Windows 8 will support Tablets too, just like Android and iOS. So, the mobile OS wars won't be boring anymore.

Image 001 thumb1 17 New Confirmed Features with Windows 8

  • Windows 8 will feature a customizable start screen showing tiles of most of used apps (as in the picture above), so you don't need to keep those shortcuts on your desktop.
  • Windows 8 will support web technologies like HTML5 and Javascript. These apps will run just like the normal ones. If you haven't experienced HTML5 yet, check out Beat The Boot, it's a game from Google, powered by HTML5.
  • Windows Explorer will get a ribbon UI just like Paint, MS Office and other Microsoft products. It will also get a 'up' button beside the forward button.

windows 8 explorer1 thumb 17 New Confirmed Features with Windows 8

  • Windows 8 will come preloaded with Internet Explorer 10, even though most of them might not be interested in it.
  • You can integrate Windows 8 with your Live ID, this means all Microsoft products like Hotmail, Live Mesh etc will be easier to manage. Although, this is optional.
  • The 'Time Machine' feature which is present in the Mac OS is available as History Vault in Windows 8. With History Vault you can backup important files to another drive.

windows 8 history vault1 thumb 17 New Confirmed Features with Windows 8

  • Another feature 'System Reset' will let you to restore system settings to default ones (factory settings). This is useful especially when you find your system unstable and unable to find which software is the culprit.
  • If you've a Pen drive of at least 16GB size, you can run Windows 8 from it! This feature named 'Portable Workspace' let's you run Windows 8 from a USB (which contains the setup files).

win8portableworkspace2 thumb 17 New Confirmed Features with Windows 8

  • Compared to Win 7, Windows 8 will take less time to boot with 'Hybrid Boot'. With Hybrid Boot, Windows 8 keeps certain files pre-loaded, thus, it takes less time to boot.
  • Another improvement in the interface section is 'Aero Auto-colorization', with this you can predefine the color of the elements like Taskbar, Start menu, Windows Explorer etc.

Windows 8 Aero Automatic Colorization thumb 17 New Confirmed Features with Windows 8

  • You don't need to use file copiers like Teracopy etc on Windows 8 as the File copying process is optimized
  • Windows 8 will support USB 3.0 which promises super fast file copying, as fast as 1 GB/ 5 seconds!
  • Windows Appstore is now confirmed, this also means that installing and uninstalling apps will be as easy as pie!
  • Built in PDF viewer, no more sluggish Adobe Reader. This is another feature Microsoft took from Mac OS.
  • Native ISO and VHD files support, you will no more need 3rd party tools to create and manage ISO files.
 4617.Mounting a new ISO thumb 0F3B3168 17 New Confirmed Features with Windows 8

Those are the confirmed Windows 8 features with leaked screenshots.

Will Windows 8 be another Vista? Do tell us what do you think.


Source: http://devilsworkshop.org

Tuesday, June 7, 2011

Finding Your Stolen Mobile.. !!

Finding Stolen Camera can be like a joke you might be thinking but its now possible with the help of EXIF data technology and with the main help of the serial number stored inside your photographs. Well how this thing works when ever you click pictures with your camera it creates some useful data known as EXIF data file which is then stores right in your pictures it is used by computer to determine when this photo was clicked and what settings were used and so on.
So a website called Stolen Camera Finder is claiming that it can help you in finding your Camera with help of tracing the same images taken by that camera on the internet. Now this will work when ever the thief uploads a image on the internet than this website will trace the serial number on the image you uploaded to this website with the same on the internet if it finds it will trigger out the thief hence giving you the location to catch and ban him. Some people even claims that this website can also be used to locate your stolen camera mobile(Multimedia Mobile).

Procedure for tracing out your Camera .:

1. Go to their website Stolen Camera Finder
2. Drag and upload image as they say on their homepage.
3. It will initialize the image and give you the exact details about the location.
4. In some cases it says Fail ( due to uploading a image clicked by mobile phone or other gadget it will not detect )
5. Use only the camera shots to make it able to detect your Images and search out your camera.

[Article SOURCE]

Published By: Ashish Dandgawhale

Sunday, June 5, 2011

10 Ways to to Protect Yourself from Cell Phone Radiation

[SOURCE]With the World Health Organization confirming the fears established earlier, that there is “a possible connection between cell phones and two type of brain tumors: gliomas and acoustic neuromas,” or in simple words: cancer, there is an increasing sense of panic among mobile users. However there are ways that you can protect yourselves from these effects.
The effects start showing on people who constantly use their mobile phones (on an average) for at least 30 minutes daily. So the main precaution you can take is to reduce your phone usage.

Just keep these tips in mind :

  • Reduce phone usage the most you can.
  • Use headphones or hands-free kits, as they keep you away from the radiation emitted by the phones. You could also use the speaker mode while calling.
  • If available use a land-line phone.
  • Text instead of calling.
  • Keep your calls short.
  • Strive for minimal usage in areas having low signal (1 bar) such as rural areas.
  • Don’t allow small children to use mobile phones, unless necessary. Radiation may penetrate deeper due to their skulls still being in a development stage.
  • Don’t cover the area, where the internal antenna is located within your phone (mostly in the middle-back part of your phone), with your hand. When you cover it, the phone emits more waves to find a proper signal. Refer to your phone manual to check the exact position of the internal antenna.
  • Use phones having low SAR (specific absorption rate.) This is a measure of how much Radio Frequency (RF) energy the body absorbs.
  • Use a 3G phone. There are reports that state that they emit lesser radio waves to the brain.
These are some of the tips you could follow, that will surely help you in the long run.

Published By : Ashish Dandgawhale

Sunday, May 29, 2011

An Emergency News - TECH_TUNNEL Got Hacked

Hello my dear friends, and all my fellow readers today I have a very important announcement to all of you. Something you may say it a bad news or whatever. May be some of you already got to know about it that our rapidly growing group Tech_Tunnel got hacked by somebody and he deleted our group. So I am feeling very bad to tell that from today I will not be able to post any trick on your lovely group TECH_TUNNEL. since it is now deleted. Now please do not send any message to join it, because now it is under somebody's else control.

what you think? who may have deleted it? May be any of my enemy? may be but as far as I think I don't have any enemy .well,let it be. I don't care of him. Well actually the person who deleted my group is thinking himself a big hacker. I want to bring it under notice of him that spoofing one's mobile number is not a hacking, what you think you spoofed mobile means you are a hacker? he hehe, dear, If you want to know who are actually hackers, have a look on this article THIS. Do you think, you have even a bit of skill like that?
On today's morning (28-05-2011) I received a message claiming me that he hacked my group and deleted. You kno? from who's number I received that message, From my own number ...yes I revived the message from my own number claiming me that “I hacked your group.” Ahead the two line the person was challenging me to hack his group..he claims that He is the owner of group

1. MP******

2. MARA****

(As per the the claim of original owNer Above Names are Made Hidden)


He challenged me to hack above two group. He claims he is owner so he thinks I will hack group. I don't know why but I am damn sure he is not the owner of those group

So Mr. Hacker( Who hacked my group) ...I want to make it clear that the person like you are not new to me, I know these world is full of anti social elements like you, Don't think you made me unhappy. Cheap person like you can never make me angry because I know you can do nothing more than that...seriously your thinking is very cheap and vulgar (I Remember your sms). What are you thinking you took any revenge on me? All terrorist think that they are taking any revenge or they are fighting for good and truth, but reality is vice versa, same case is with you. Well if you are feeling good to delete my group then I hearty wish you, have a happy feelings, CELEBRATE IT. But remember, even if terrorist get success in his evil motives he is still terrorist and nobody likes him. understood?
Well after this all mess, I have a good announcement to all my readers, since our old group is deleted, We have made a new group "tech_TUFAN", We ASSURE To all the fans of tech_Tunnel that our new group will be more good and satisfactory than our old one, Since now we have a reason to go at top. Nobody can stop us. We are tech geek. So hurry ...Join our new group TECH_TUFAN By sending

sMS:

JOIN tech_TUFAN

To: 9870807070
Seriously this new group will bring TUFAN In Internet And Technology World, I am sure all my friends and you all  readers are with me. Tell everybody, as many people to you can tell to join our new group. Tell to those who had joined our old group but now don't know about our new group. Support us. We are never going to stop..We are going At The Top Of Tech World. May be we will be the founder of first Indian technical TV channel like Discovery is channel of science and nature.

So I think you may have known who we are? How far are our motives and intension... Our each step towards success is a slap on cheek of those who jealous on us..right?

Wednesday, January 19, 2011

My Encounter With Dr. A.P.J Abdul Kalam - Must Read

Hello friends today I am going to write about my encounter with our honorable x-precedent Dr. A.P.J Abdul kalam. Yes friends I am not lying. I really met him. You know? He had come here at my city Amravati (Maharashtra) to address the student at national-level techfest named 'Technolon'. Program was to be conducted in Zilha stadium-Amravati what is 15 Km far from my hostel, so today I woke up early in morning at 8 am ( hahaha… It’s early for me) then I got ready within next 1 hour, up to 9 am I put my first step out of my hostel. Though I woke up early in morning, it was too late to go there because I should had to reach there up to 9:30 Am..But let it be I got bus on right time, When I reached near stadium, I was surprised to see crowd of students.. Hey believe me there was Q of students up to almost half Km, previously I was such late to reach there. So I was thinking now what to do.. How to go in stadium.. What if I couldn’t go in stadium? I was too nervous due to this rush of students… But ya, at the same time I was thinking some unconventional ways (Being an IT student...ha ha) to go in stadium and suddenly my friend spoke hey let’s try to convince student in front side of that Q. I agreed but was hesitating to do it. So my friend himself tried to do it... And I don’t know how that guy agreed to let us stand in that Q. After few minutes we were in stadium... Voilla..!! I had won almost half race… I was in, Feeling like a heaven. . 

Now we were waiting for our ideal... as the time was passing our excitement towards him was increasing and crowd in ground was also getting doubled, after each few minutes. And finally a full stop came to our waiting, and he arrived at ground. A man who was more than 83 year old, attracted more than 30,000 (Thirty thousand) students was on ground. We were too much thirsty but his arrival made us to forget it..Some strange feeling was making my blood to flow with double speed.. There was too much noise on ground but I think my ears were tuned to listen only one voice which was of frequency of Dr. Kalam. He started to address students with one sentence “Hello India”

Dr Kalam discussed about vision 2020, and how we can make it true, he encouraged the students to try their luck in politics to make it pure and corruption free. While discussing all these things he suddenly asked a question to student do you want to be unique person or a person like ordinary people? Most of the students replied him “Yes, we want to be unique person”, Dr. Kalam said “yes, it’s the point I want to tell you..if you all want to be unique then why all of you students are studying and behaving like ordinary people. If you want to do something different then you will have to think differently,” Dr. Kalam then turned his discursion to  successful person, or how to become like him

According to Dr. Kalam..To become successful person we must follow following four points

  • We must have our AIM up to age of 20 [AT least we should know filed of our carrier]
  • We must acquire knowledge of our field as much as we can..
  • We must do hard working
  • Don’t fear to problems
  • Small AIM is big offense

One point which I liked at his speech is “why students thinks that their hands are to just beg for jobs why don’t they think their hands to give jobs to others” really if student will think in this attitude they can be somewhere else..

Finally at last section of his speech he told students to speak as he is speaking… means to utter each of his sentences.. He said

“ I am the good citizen of India, I will never support corruption. “
“I will be the good member of my family”
“I will be the responsible citizen of society”
“I will be the good person of our nation”
“I will be good person of this world” 

After taking this pledge from students many students were thinking to ask few questions to Dr. kalam but before arrival of any question he said “if somebody wants to ask anything to me he/she may contact me at my email ID apj@abdulkalam.com” each question will get answered

So..Finally Dr. kalam’s session got completed and I was still thirsty but this time not for water, indeed this time I was thirsty to listen him once more or for more time. There were more than many people who were thirsty for same.
Students had started to think.. Many questions were in minds of students-“how can we change India” many students were looking too much confident. Thinking doesn’t bring change but it is first step towards change..Isn’t? I really realized Speed of thoughts is really more than speed of light…

Now I think  REALLY HE IGNITED THE MINDS OF STUDENTS…BUT WILL IT BE IGNITED FOREVER?

Written By Ashish Dandgawhale


Monday, January 17, 2011

How to Hack Nokia Phones – Remote DDOS Attack using SMS

Nokia S60 hacked -  rdhacker.blogspot.comSOURCE Yep,One can hack Nokia phones by just sending a SMS,seems devilish isn't it? Although this vulnerability was found more than an year ago, I recently tried it and found it working in many sets. Thevulnerability dubbed as “Curse of Silence” affects all Nokia Symbian 60/Series 60 devices and allows for remote SMS/MMS Denial of Service.One can send a specially crafted sms to lockup/crash any Series 60 device.

What is Required ?

  • MSISDN of the target.
  • Mobile phone service provider which allows sending of SMS messages (Airtel in my case)
  • (Almost) any Nokia phone (or some other means of sending SMS messages with TP-PID set to "Internet Electronic Mail" )
Risk Levels 
 
Although the vulnerability is spread across many versions of S60 platform,the Risk level is quite high for (for S60 2.6 and 3.0 devices)as upon attack,the target will not be able to receive any SMS or MMS messages until the device is Factory Resetted and Medium for S60 2.8 and 3.1 devices as upon Ddos attack,the target will not be able to receive any SMS or MMS messages while the attack is ongoing. After that, only very limited messagereceiving is possible until the device is Factory Resetted.
 The Series 60 N Series, E Series and some more phones can Be hacked - rdhacker.blogspot.com


The Attack
One can send an email using an sms by setting the messages Protocol Identifier to "Internet Electronic Mail" and formatting the message like this:


The simplest attack will be -
123456789@123456789.1234567890123
If such messages contain an with more than 32 characters, S60 2.6, 2.8, 3.0 and 3.1 devices fail to display the message or give any indication on the user interface that such a message has been received. They do,however, signal to the SMS Career that they have received the message.Nokia Series 60 3.0 Prominent phones -  rdhacker.blogspot.com
Devices running S60 2.6 or 3.0 will not be able to receive any other SMS message after that. The user interface does not give any indication of this situation. The only action to remedy this situation seems to be a Factory Reset of the device (by entering "*#7370#" ) or using a Vulcan Death Grip. Nokia Series 60 3.1 Prominent phones -  rdhacker.blogspot.com
Devices running S60 2.8 or 3.1 react a little different: They do not lock up until they received at least 11 SMS-email messages with an email address that is longer than 32 characters after that the device will not be able to receive any other SMS message and the phone will just display a warning that there is not enough memory to receive further messages and that data should be deleted first. This message is even displayed on an otherwise completely "empty" device. Nokia Series 60 2.8 Prominent phones -  rdhacker.blogspot.com

After switching the phone off and on again, it has limited capability for receiving SMS messages again: If it receives a SMS message that is split up into several parts it is only able to receive the first part and will display the "not enough memory" warning again. After powercycling the device again, it can then receive the second part. If there is a third part, it has to be powercycled again, and so on.
Also, an attacker now just needs to send one more "Curse Of Silence" message to lock the phone up again. By always sending yet another one as soon as the status report for delivery of the previous message is received, the attacker could completely prevent a target from receiving any other SMS/MMS messages.
Only Factory Resetting the device will restore its full message receiving capabilities. Note that, if a backup is made using Nokia PC-Suite *after* being attacked, the blocking messages are also backuped and will be sent to the device again when restoring the backup after the Factory Reset.





Detailed List of affected phones
Tested on several S60 2.6, 3.0 and 3.1 devices. Since the vulnerable component is a S60 base functionality, it seems safe to assume that all devices with these OS versions are affected. I short if you own one of these,you are rounded unless u have a firmware upgrade/fix release by Nokia which fixes this attack.
S60 3rd Edition, Feature Pack 1 (S60 3.1)

  • Nokia E90 CommunicatorSeries 60 Affected Devices - rdhacker.blogspot.com
  • Nokia E71
  • Nokia E66
  • Nokia E51
  • Nokia N95 8GB
  • Nokia N95
  • Nokia N82
  • Nokia N81 8GB
  • Nokia N81
  • Nokia N76
  • Nokia 6290
  • Nokia 6124 classic
  • Nokia 6121 classic
  • Nokia 6120 classic
  • Nokia 6110 Navigator
  • Nokia 5700 Xpress Music
S60 3rd Edition, initial release (S60 3.0)
  • Nokia E70
  • Nokia E65
  • Nokia E62
  • Nokia E61i
  • Nokia E61
  • Nokia E60
  • Nokia E50
  • Nokia N93i
  • Nokia N93
  • Nokia N92
  • Nokia N91 8GB
  • Nokia N91   
  • Nokia N80
  • Nokia N77
  • Nokia N73
  • Nokia N71
  • Nokia 5500
  • Nokia 3250
S60 2nd Edition, Feature Pack 3 (S60 2.8)
  • Nokia N90
  • Nokia N72
  • Nokia N70
S60 2nd Edition, Feature Pack 2 (S60 2.6)
  • Nokia 6682
  • Nokia 6681
  • Nokia 6680
  • Nokia 6630

Hey please  Don't use it for illegal purpose, we will meet again Now Bye, your friend

Ashish Dandgawhale
 
For daily updates you can fallow me at twitter at name Ashish_net

About Your Coment

Dear readers, I am requesting to all of you to post your comment. What did you feel about article by reading it ? Any other question or query about article which you could not understand. Please let me know, post your comments by clicking on comment. So that I can completely satisfy that you have got all whatever you accepted from my site.