Friday, February 4, 2011

ProPen - The world is your Screen!


PROPEN – THE WORLD IS YOUR SCREEN

  • Wouldn’t it be nice if all you had to bring to a business presentation was a pen?
  • Do you still want to carry bulky projectors around boardrooms and seminar halls?
  • What if you had the enviable power to project on any surface you want to?
  • And how about all those jaw-drops when you whip out your pen and start projecting pictures, so effortlessly?

The latest concept design from the house of Uber Systems is the PROPEN. This has nothing to do with the similar sounding medicinal pill. The PROPEN stands for Portable Projector Pen, a game-changing device for corporate firms and educational institutions.

Specifications

  • Weight – 300 gm
  • Charging – Via USB
  • Charge Time – full charge: 2 hrs, 50% charge – 30 mts.
  • Projection Time – 5 hrs per charge.
  • Stand – The Pen Cap

Marketing Strategy

ProPen is going to be the first electronic device by Uber Systems which will be reached to marketers only through the Web. Some would feel that the non-usage of traditional media such as papers, tv, etc. is a big risk. But the ubiquitous social media of today, where people spent at least 2 hrs per day, can be harnessed to be relied upon as the sole marketing agent.


Check out our FLICKR page:

http://www.flickr.com/photos/55305196@N05/5415645216/

Check out our Orkut page:
http://www.orkut.co.in/Main#Album?uid=10224096311310549597&aid=1296789646

Check out our blogs:
propen.wordpress.com
http://ajustanotherblog.blogspot.com/

Follow us on Twitter:
http://twitter.com/projectorpen

Follow us on Facebook:
http://www.facebook.com/pages/ProPen-Project-At-Will/189119637775615

Youtube Video:
http://www.youtube.com/user/heshamaj?feature=mhum

Saturday, July 24, 2010

STEGANOGRAPHY!



Ya... This is another method of hiding texts in websites... Font Color - White...
Steganography, deserves a post in my blog, as it is my first and extensively researched topic... The art of hidden writing, is followed by most of the people, including Osama bin Laden... Its said that, Osama is a Master in Steganography and he used text messages hidden inside pictures and uploaded these pictures in ebay website! Already, the website contains millions of pictures and finding these hidden ones is same as finding an oil drop in the ocean... But still, there was one US officer, (vetti paiyan) who searched manually each n every picture in ebay website and finally failed to provide a proof....
BINGO!
Here's an example of how to hide a picture inside another picture...
I used the software - S-Tool (272KB)
Hiding texts in websites is also Steganography!
U might wonder, what Harish's pic s doing in this post... @Harish, sorry buddy, din't find any other photo to experiment with... Also, the original photo was good, I made it serrated purposely, to hide the content better... Follow the following steps to see whats inside Harish... :P

1) Download the S-Tool Software... Its a very small application, no installation... Jus run it..

2) Save (the above) Harish's picture (filename - hidden.bmp) ... Drag the pic n drop it in the s-tool application window...

3) Right click on the picture, and click "Reveal"....

4) Give "harish" in the first 2 fields(password) and in the third combo box, select "Triple DES"

5) Voila! It'll show the revealed pic's filename.... Right click it and save it and see the pic...

Leave a comment, what u find inside harish...

Note that, we've steganographic techniques even with audio n video formats... And its practically impossible for someone to know the hidden secret content... Hence Steganography is considered to be more secure than Cryptography...

(To harish: Wish u good luck in Patni! Hope to see FPP soon!!!)

P.S. There are some more hidden stuffs in this post... Can u find it out????? Leave a comment if u can find it out!!! Lets see who finds it first...

P.P.S. Don't break ur head, thinking what could be hidden... Its just a simple technique to hide stuffs... Nothing technical...

Monday, July 12, 2010

ebuks, Codes and other useful Stuffs!!!

Am jus cleaning my system and I'll keep updating the contents of this post for the next few days until I upload every single useful file available... 90% of the programs which I upload here are done either by me or Arch(seriously, we did.. for each n every lab)... We just felt, all the coding works which we did in these 3 years are jus goin to be a waste once I join MBA, but I think I'll be stickin with Technology n programming for quite a long time...

If you need any book or prog code, jus leave the names in the comment section...

AI

1) Prolog programs... http://www.megaupload.com/?d=09AQ3RMK (18KB)
2) SWI PROLOG Editor... http://www.megaupload.com/?d=Q5WRICIY (7.83 MB)
- Best of all prolog editors..

3) Prolog ebooks... http://www.megaupload.com/?d=JBH2KPT6 (4.83 MB)
- Follow the book by the author Nillsson... Practical Exam questions will be based on the book...

4) LISP compiler... http://www.megaupload.com/?d=KYAZVOUY (14 MB)

5) LISP ebuk... http://www.megaupload.com/?d=WBKG8VJC (4.42 MB)

6) Prolog ebook... http://www.megaupload.com/?d=RV8L5NX5 (31 MB)
- This s the best prolog programming book available...

ITWD

1) Theory, all 5 units soft copy... http://www.megaupload.com/?d=RDIWP1IN (79KB)

2) Comp. Ref. Web, Powell, ref buk..http://www.megaupload.com/?d=9LY4OQQW (62 MB)

For ITWD lab, u'll be doin web designs using ASP, JSP, PHP, Servlets and o'course HTML...




6) Servlets ebuks.. http://www.megaupload.com/?d=Y33BCGEX (39 MB)


DBMS

1) ORACLE press, 9i... http://www.megaupload.com/?d=V7AWTQOY (21 MB)

JAVA

1) JAVA Complete Ref... http://www.megaupload.com/?d=WU6N5IO5 (11MB)

(DISCLAIMER: This blog doesn't hold any Illegal material... :-P )

Wednesday, June 16, 2010

Cracking WEP encryption using Backtrack!

WEP(Wired Equivalent Piracy) is one of the most commonly used wireless networks. This post is important for those who've wireless-enabled modems... U can see how easy it is to decrypt a WEP key... And after reading this post, the first thing you've to do is to disable Wireless mode whenever its not in use... This post s also helpful for ECE n IT guys of our coll... They're in the same building with us, CSE, but still, whenever they open their laptops, they see a password protected wireless network connection installed by our seniors, for us, to download torrents... :P
Am not goin to explain how to do it coz its so common... Just google the title of the post and u'll get all necessary info...(If you feel lazy to google, check this video or this site...) By following the steps, we can exploit any wireless network secured by WEP. Even WPA is cracked... But mostly, for BSNL connections, its WEP...
One more highlight with backtrack is, "macchanger" tool... MAC address, which is supposed to be unique and unchangeable, can also be altered by this tool. Similarly, IPchangers are also available to alter ur IP address...

Sunday, June 13, 2010

A Glimpse on Fifa'10!

I take a look at the Germ vs Aus match goin on right now, for every 5 words i type... All eyes on the man with a Golden boot, Klose... My average typing skills allow me to type with eyes on TV... If u guys like to better ur typing, try this site and TypeMaster 2010... Am not a fifa freak like ajit or parthasarathy, but still follow the game closely...
Its really sleepy when u see a zero scoring game and that too when the current france team is playing... I don think they deserve to be in the WC... England's die hard fan like Partha will definitely feel like banging his head on the wall when the GK plays so sloppy like the Indian cricket team... So far all superstars flopped out... Messi, henry, rooney... But the captains played responsible... like Jung from Korea, Gerrard...Wow.. Germany plays awesome.. no offside called... Goal by Podolski...
The Africans too play very good, except Nigeria, who had no chance.. Loads of fan support too.. U shud see the Ghana fans jumping up n down after their last min goal... But as Maradona says, even the best teams n best players of the world should be afraid of playing against these africans... God.. are they humans?? They look like mini-minotaurs and bully everyone comin thro.. The refree was busy with his cards but the bullying never ends... Also, these football players are trained actors... They cry holding neck for getting injured in the leg.. and that too till the referee says "Thats enough... I gave an yellow for ur opponent..."
Funny things goin on here with the aussies... I guess the referees are quite strict this year... An Aussie s given yellow card for saying %&#* off... lol... And the funniest thing is that, its being showed in slow motion replays... Wow.. Superb goal by Klose... Well, that means, I've been typing this post for 20 mins... Watta do.. The game s fast paced... I guess Germans ll manage to get half a dozen goals before I finish typing this post... I'll better end it here... Cya...

UNetBootIn!


I wonder how the new technology products kick the old ones out so quickly... My CD n DVD drives were working fine until I bought a pen drive... Now these drives and so the discs such big time... There are situations where my windows die fighting with my linux partition and I end up with an UBUNTU disc in my hand, without knowin wher to boot it from... UNetBootIn came to my rescue...
With this software u can easily create live-pendrive... something like a live-disc.. especially when u want to use it as a rescue-disc... First of all select the distribution and version of ur linux and then follow the steps indicated in the image...
The purpose of introducing UNetBootIn in this post is, to create a live-disc of Backtrack linux... For using the tools available in Backtrack, you needn't install it... U can very well use the tools from the live disk itself... It makes no difference... And its better to go for a pen drive coz it'll be lot faster than a CD or DVD... Download the Backtrack, latest version 4 (1.5GB), from here... Or get it from me... More about Backtrack, later...
Now, here's a small trick regarding hacking websites... If you ever build a website in ASP(Active Server Pages), make sure that its not vulnerable to the following trick...

1) Search for the login page from google... type "inurl:login.asp" (mostly login pages are named "login.asp"... convention, right?) Anyway the idea s to search for the login page... If login.asp doesn't work, try admin-login.asp, etc. Hope u get it...

2) In the login page, sign in as ADMIN.... give username as "admin".. (These admins are lazy enough not to change the default usernames... And that too, most of them have their admin password as "admin")

3) In password... type.... /1'or'1'='1/ (Everything inside / /.. If that doesn't work, try /'or''='/ )

This technique is a type of "SQL Injection"... These days it has become mandatory for every website creator to test the website which he creates so that it becomes hack-proof... Try to google the keyword to know more about it... There are easier ways to hack PHP and HTML pages... And by the way, it wasn't me who hacked our college website :D... But definitely it must be one of my classmates... Anyway, whoever did it, must be careful... Last heard, he has left a lot of tracks in the logs....
Sorry for the delayed post... was down with "Fifa fever"... More to come.. Enjoy..

Warning: Hacking is extremely "injurious to ur health"... Do NOT try this at "home"... :P


Saturday, June 12, 2010

Key-loggers!

When someone types his password, we are so tempted to look at it... but still we turn our heads towards the wall or look at the watch though we could always see the time in front of us in the computer, just to show that we are saints to control all temptations... But therez always a second category of people who keep their eyes just above the keyboard and challenge us to type fast enough for them not to re-construct the password... There is a better way of doing this password sniffing and it is thro' the use of key-loggers...
If you guys call me porups or padips, I would definitely recommend you to have a look at my brother... He's the one who highlighted me the importance of knowing about key-loggers in corporate world... He never "types" passwords unless someone is around... Key-loggers are so common in organizations that people are forced to use "Virtual Keyboard Assistant" or "on-screen keyboard" in windows... Recently, the internet banking started giving a built-in on-screen keyboard interface for entering passwords... Even I saw paypal havin one such virtual keyboard when I changed my password...
The picture shows an hardware key-logger. Even I've one such thing but its jus a DIN to mini-DIN converter... These days, hardware key-loggers come even in USB flavors... Anyway, a software key-logger is way too easy and of course, free... Even I've written one but my avast starts its loud siren whenever I take my mouse pointer near the icon... Though so many key-loggers are available in the net, very few of them goes undetected by the anti-virus...
A key-logger daemon is easy to create in Visual Basic by jus writing 10 lines of code under the keypress(keyup or keydown) event inside an infinite looping while.. It can save everything you type at a particular location... A software key-logger by itself is useless unless its connected with the automatic mailing system which when scheduled, can mail us the saved log file from the system in which the key-logger is running... Now, start searching ur system for my key-logger.. :P