Powered By Blogger

Thursday, August 18, 2011

Bringing solar light bulbs to the world


Denver (CNN) -- It started with such a simple concept: A solar light bulb that charges up during the day and lights the night when the sun sets.

Inventor Steve Katsaros perfected his design in June 2010, and four days later he had a patent in hand.

He knew it was a good product, but he didn't know what to do with it.

"It wasn't until after we created it that we asked ourselves, 'How do we market this,'" Katsaros says. "And we learned that the largest market was the developing world."

As Katsaros began researching markets in developing countries, he began to realize that his solar light bulb could potentially make a huge impact on the 1.4 billion people around the world who don't have access to an electrical grid.

Many use fuel lamps that burn kerosene, which is costly, dirty and can also be unhealthy.

He dubbed his company Nokero -- short for "No Kerosene" -- and set out to get his bulbs into as many hands a possible in the developing world.

First, Katsaros had to answer a key question that would determine how he would have the strongest impact: should his company be nonprofit, or for-profit?

Katsaros found inspiration from the 2008 book by Paul Polak, "Out of Poverty."
Communities that do not have access to electricity could benefit from Katsaros' solar light bulbs.

Polak, who has worked in developing nations for 30 years, believes that the charity model of aid used by nonprofit organizations doesn't work -- despite its good intentions.

CEO Richard Branson: Treat charity like a business Video

The best way to help people, according to Polak, is to treat them as consumers. If you can sell to them, he says, you can help them.

"In the beginning I was a nut case and nobody paid attention," Polak says. "The consensus was 30 years ago that this is what caused poverty, and to be involved in business was outrageous and evil."

Today, that is starting to change, he says. But that doesn't mean that nongovernmental organizations have rolled out the red carpet for Polak's ideas.

"Many NGOs say it's making money on the back of the poor, but I love to make money on the back of the poor," Polak says.

"You can feel really good about yourself giving stuff away ... but if you are going to sell things to people, you need to have respect for them because no one is going to buy something if you have contempt for them."

He says market forces will ensure that the right products get into the marketplace and ultimately lead to empowering people in developing countries to be better able to fend for themselves.

"If you have a village that's used to the dole, it's very hard to get them off of the dole," Polak says. "We have to face the fact that conventional development aid has failed.

"It just doesn't work."

After interviewing more than 3,000 families who live on $3 a day or less, Polak concluded that they know best how to care for their families.

They will respond to a free market that presents them with products that will fit their needs, he says.

"They are stubborn creative survival entrepreneurs," Polak says. "They make life and death decisions about how to spend their meager income. They are used to investing their money very wisely."

In 1981 he founded International Development Enterprises. Though the company itself is a nonprofit, it uses a model called "social entrepreneurship," which utilizes capitalist principles to assist people in the developing world.

What Google is buying: Motorola's 83-year history of invention


When Google agreed to buy Motorola Mobility, it bid for a company that predates it by 70 years.
Brothers Paul and Joseph Galvin founded the Galvin Manufacturing Corporation in 1928, based in Chicago. Their first product was a battery eliminator, a power converter that allowed battery-powered radios to be plugged into household electrical outlets.
The company soon began to try its hand at revolutionizing the radio itself, putting radios in everything from cars to backpacks to hands. Three-quarters of a century and one name change later, Motorola has amassed 17,000 patents and developed some truly groundbreaking technology.

Saturday, August 13, 2011

The 3rd Generation Of The Games System From Sony Was Released To Worldwide Fanfare.

I am not sure the precise statistic, but I know that a scratched disk isn't altogether odd. Having a backup of a game disk is a massive relief when you're playing. Pondering it on another level, this also defends your original purchase, keeping the disk in spotless condition, which is excellent for resale. I know That I fret about it whenever I am playing with the original. The 3rd generation of the game system from Sony was released to worldwide fanfare. Playstation three was originally released and sold out in 2006. The games system was such a hot item that stores could not keep them on the shelving and folk waited patiently for hours so as to be well placed to put this present under the tree for their children. The system sold about 100,000 units inside twenty-four hours of being released.


Now on to the controller – The Playstation three controller is lighter and masses more cosy to handle than that of the Playstation two. Now onto the Xbox 360 controller that has also had a new design. The changes in design are meant to permit the user hours of enjoyment with sore hands. It's been designed with huge buttons to permit straightforward gameplay. For both games systems the new controller design has been well received. Sony is anticipated to release a cheaper version of Playstation three and Microsoft has just recently released a colourful Radiance three version of Xbox 360 at a lowered price.

Sales of the Playstation three Nintendo game consoles have been modest at best since its release. That is because of lots of factors including a pricey first sales cost of five hundred to six hundred bucks per unit, and an absence of any computer games that have achieved cultural phenomenon standing like Radiance three did with Xbox 360. Xbox and Playstation three don't have this function. Nintendo Wii has been outselling both typically because of its reasonable cost of two hundred and fifty bucks, and the technically advanced Wii remote with the motion sensor feature. This is also found on the Playstation and Wii consoles but Microsoft has incorporated more functionality to its online market. This allows for a rather more delightful online play of games. Xbox 360 is the best console to play games against your mates without being in the same room as them.

The WEP And WPA Encryption Further Secure Connection.

Cisco is a renowned for its products in networking like Linksys ADSL Wireless Router. It preferred product Linksys ADSL Wireless Routers and wire routers are famous across the entire world. Launched in California in 1988, it not only brought revolutions in the world of LAN and Dismal , but also in Linksys ADSL Wireless Routers. These are the most trusty and most productive routers now present in the market. It's one of the best feature that several routers have just one input port to attach to the Net. Usually , a wireless router features many a router, modem, firewall, port switch and a wireless access point.

It makes your broadband simply sharable among others in you office or at home. While installation, it must watch out about which socket on your router is the proper one for connecting it to the port on the wall. Unacceptable connection could well lead to transient access loss consuming hours together to mend it. Setting up a wired router should be relatively simple by following the directions manual given with the router. For your security, this device supports WPA and WEP encryption.


This model enables net sharing either wirelessly or wired. It may also function as an access point and an adapter. The WEP and WPA encryption further secure connection. It has an automated switching capacity from access point to router mode so it does away with any reconfiguring. When it comes down to lower cost, easy paths to get web access, inexpensive wireless routers reign ultimate. If you do enough research, you will presumably find an ISP that provides their clients with a router to hire so as to create a Net connection, these rentals often run less than 5 bucks a month. Most wireless users feel that inexpensive routers have a minuscule money risk and permit them to experience the web while deciding if a wireless PC network is the best call. After you gain a larger understanding with reference to PC networks and wireless web connections, you'll have a brilliant idea of irrespective of whether it is time to upgrade your router. The smooth metal surrounding features curved edges with an easy fan exhaust grating built into the interior lip on top of the device to keep the electronics cool. The plastic stand permits you to position or mount the device in a way that's handy for your style and office space.

This is an excellent product to optimise the wireless coverage in all areas of your house. Netgear DGND3300 RangeMax Twin Band Wireless-N Router with Inbuilt DSL Modem For active online game players or people who stream live video frequently, this model of Netgear wireless routers offers a fast alternative choice to the Wireless-G gizmo. The firmware has compatibility with older PCs too, whether or not they continue to use the 802.11b custom – any mandatory adjustments will configure mechanically, so all you have got to do is add the PC to the network and let and let the most widely-applicable of the Netgear routers do the rest.

Friday, August 12, 2011

quick scan.exe

Here comes another story from my laptop.Recently i was busy with offline work and i haven’t posted anything on my blog.whenever i try to search in my blog or on any site the results links will take to me a page where i need to download and buy that software to fix this exe virus.
I have downloaded several software like malware bytes,super antispyware,avast and much more but none of them found anything.I tried to check on other sites but the problem shows on my laptop since every link drive m to that virus site.
I at last deleted cookies,temporary files and all even in internet explorer to clean everything.Once i did the virus was gone and now i can search with safe.I suggest to you all if you got any virus then dont go to the product website since it was a scam just try to use your anti virus programs that can get fixed for you.
Sapphire has Launched another Video card 5970 and it has more capacity to play games. It even had a cooling fan to cool the video card. This video card has 2gb DDR5 internal memory to run quicker than, other Graphic cards. Sapphire has produced better this time with clock at 4.0 GHZ at a rate of 512 bit
Sapphire video card comes with power supply of 600 watts with 1X75w 6 PIN and 1X150w 8 PIN PCI Express power connectors and the company recommended this with full retail version dirt cheap Game.
Sapphire Video card comes with PCI-Express 2.0 x16 RAMDAC: 400 MHz.The video card provides a maximum resolution of 2560×1600.There is also mini display port with PCI Express card.
Overall Sapphire provides 2 years on-site warranty to replace if there are any faults after the purchase. This is very good opportunity to get a warranty for 24 months

Thursday, August 11, 2011

Amazing dell mini desktop

dell has been recently announced inspiron zino for low cost desktop and it is even small to keep anywhere in home.Tahis new desktop hs powered with AMD Phenom™ II processor.This processor has built in quad core which can give best performance in games multi media music and much more.It is an ideal for family to use anything either computing or entertainment.viewing family photos or party photos whatever this inspiron can enhance smooth viewing with the graphics card.

This inspiron zion can be used in your house such as home theatre hub TV clear image with clear sound.The system comes with AMD Triple-Core P860 Processor 2GHZ 1.5 MB cache for enhancing the programs with ultimate speed.The system comes with preloaded software of windows 7 homebasic or home premium, professional 64 bit.you can choose the best one that suits for you.I must suggest to you use professional and it is latest windows version.
The Inspiron zion desktop comes with DDR3 2GB ram with single slot DIMM.This desktop cannot upgradable further so think before buying.For storing data their is a 320GB3 SATA hard drive (7200RPM).This can be used for storing movies, songs games.Play movies or music from optical drive too by using Blu-ray Disc (BD) Combo Drive (BD-ROM, DVD/CD Burner).for better graphics dell has come up with ATI Mobility Radeon™ HD 5450 MXM Discrete Graphics Card.Theirs no display and you have to use your own tv i suggest to you use LED TV.
Their are so many additional features for connecting other devices and even sata hard drives.One can connect internet through wire or wireless using Dell™ Wireless 1520 (802.11a/g/n) WLAN Half-Height mini-Card.
The system comes with more features 4 in 1 memory card reader which can read data from memory cards.Their are two additional usb 2.0 ports and reads data very fast from this ports.A head phone is good for family when we want to hear for ourselves so dell provides a connector for head phone.One can even connect to the sata drives using the rear ports on the desktop.overall the size of the desktop is height 89mm and width 197 mm that is nearly 200mm.It weights only 2 kg for easy to carry and connect to any tv like laptops.

HP Mini netbook 110 series

Hp always bringing new products into the market for the human needs.this is another laptop with sleek in design and 1 inches thick and the weight is 2.52 lobes with advanced wireless options to connect new products.This can run without AC upto 4.5 hours through battery.This laptop can be connected to social media blogs or websites from anywhere in the world through wireless connections.This is very powerful laptop for connecting wireless devices.

This mini laptop is powered by inlet atom N455 processor with newest technology and energy efficient performance but my suggestion is upgrade N57 processor which even works faster than the N455 processor.This laptop comes with preloaded windows 7 version.As hp company says windows 7 internet explorer 7 version is best for easy and fast surfing with security but i suggest to you use Firefox which can be easy to handle any sites.
This laptop has built in two color choice
black or Sonora red.The screen size is 10.1inches diagonal with LED system and better for protection to eyes.Memory is another important and this laptop has 1 GB but you can upgrade up to 2 GB.The hard drive comes with 250 GB for storing data such as photos,songs.For connecting additional devices the laptop has 3 USB ports and this can used for connection digital products.Their is an optional CD/DVD ROM drive for playing music and movies DVDs
Special thing is it can get connected through wireless technology and easily drive through anywhere in the world.the laptop has built in camera and enhanced for family chatting etc.It has been come with integrated 4 in 1 media card reader with 5 free HP games so it can even make fun while traveling you can play games with the free or install additional your favorite games.The laptop has one year solid warranty and it comes with 60 days of Norton antivirus removal software.you can purchase this antivirus for additional amount.Thus it is easy to carry play games surf internet and much more with this mini laptop.

Wednesday, August 10, 2011

Latest Nvidia graphics card

Nvidia has developed a new graphics card quadro FX 5800 gives an extra solution for high end users designers,scientists,engineers and technical persons.Quadro FX 5800 comes 4GB frame buffer providing the professionals to deliver the right tools that required for visualization beyond 3d tradition.

This is the latest industry 4GB graphics card and their is no one had developed 4gb graphics card still today.The previous graphics cards allows you to make 3d modelling but with this you can make 4d modelling.This graphics card can visualize with fast computing and enhances programs to run easy.NVIDIA the only company offers industry solutions for enhanced designers and engineers.
Device specifications :
NVIDIA graphics card comes with 240 CUDA CORE.This graphics card memory size is 4GB, memory interface is 512 bit,and memory bandwidth is 102GB per second.
Nvidia Displaying port is 1 with dual link DVI (2).The digital output is 3 and analog output is 2.The maximum resolution display is 2560×1600 and this is the highest resolution i have seen in my life.The grphics card is enabled with 3d vision and 3d vision pro with stereo sound of 3 pin with mini DIN.
More specifications follows in short
shader model version is 4.1 and opne gl is 3.1 comes with directx 10.This new nvidia graphics card supports multi operating system and CUDA architecture.FSAA mazimum is 32 and slots allotted only 2.maximum power consumption is 189 watts

Tuesday, August 9, 2011

new motherboard DX58SO2 from intel

Mother board specifications :This all newer motherboards supports ATX form factor as it is the only enabled power supply.The motherboard supports with later driver updates for BIOS and the bios id string is SOX5820J.86AThis mother board supports Intel core i7 processors in an LGA1366 socket and also please check the list from Intel website or else leave a comment here.
Memory is the another important thing for every motherboard as per the latest technology Intel has developed for DDR3 1600+ /1333 /1066 MHz DIMMs.Their are six dimm socets for enabling large memory to run programs fast.The chipset is Intel® X58 Express Chipset supports Intel high definition audio with 10 channel.(7.1 + 2 independent multi-streaming).Lan is imposrtant for every computer and this intel has comeup with Gigabit controllers
The motherboard comes with additional features for attaching other devices.Their are two USB ports 3.0 and can connect upto 12 with 12 usb 2.0 ports.Two serial ATA 6.0 ports and six Gb/s ports and two IEEE 1394a ports/ 1 internal and one external.Six serial ATA 3.0GB/s and consumer infra receiver plus emitter too.Their are three PCI expansion cards for adding other extra things.

3D printing: The world's first printed plane

The promise of 3D printing has finally taken off with the development of a drone that takes just a week to create
Under darkening skies on a grass airstrip in the UK's Wiltshire Downs, north of Stonehenge, I am watching half a dozen aeronautical engineers rushing to assemble an uncrewed aircraft before the weather takes a turn for the worse. They are hoping to show how 3D printing will revolutionise the economics of aircraft design – by flying the world's first fully "printed" plane.
Led by Andy Keane and Jim Scanlan of the University of Southampton, the team believes that 3D printing will soon allow uncrewed aircraft known as drones or UAVs to go from the drawing board to flight in a matter of days. No longer, they say, will one design of UAV be repeatedly manufactured on a production line. Instead, designers will be able to fine-tune a UAV for each specific application – whether it be crop spraying, surveillance or infrared photography – and then print a bespoke plane on demand.
3D printing has come on in leaps and bounds since its origins as an expensive prototyping tool over two decades ago. It uses laser-assisted machines to fabricate plastic or metal objects, building up the item layer by layer, each slice just 100 micrometres thick.
To do this, the 3D printer first slices up an object's computerised design into hundreds of easily printable layers. Each layer is then "printed" by training a laser beam on a bed of polyamide plastic, stainless steel or titanium powder – depending on the object being created – tracing out the entire 2D shape required for that layer. The laser's heat fuses the particles together at their boundaries. Once each layer is complete, more powder is scattered over it and the process repeated until a complete artefact is produced.
What the printer spits out is a powdery "cake" from which the desired object can be retrieved simply by pulling it out, like a child yanking a buried toy from a sandpit
To create a stronger object that can withstand higher loads and stresses, an electron beam can be used in place of a laser to melt the powder particles completely. And because 3D printing involves no cutting or grinding of metal, it offers vast design freedom.
This is a huge deal for aircraft designers. Some of the best ideas in aviation history have involved designs which proved too pricey and tough to make. The Supermarine Spitfire, for example, was among the most manoeuvrable fighter aircraft of the second world war because its wings were of an ultra-low-drag elliptical design. But it was a nightmare to produce, requiring complex machinery and production expertise.
"With 3D printing we can go back to pure forms and explore the mathematics of airflow without being forced to put in straight lines to keep costs down," says Keane.
So Keane's team set out to see how quickly they could design a 1.5-metre-wingspan, super-low-drag UAV, print it and get it airborne. A UK-based 3D-printing firm, 3T RPD of Greenham Common, Berkshire, joined the venture, agreeing to print the UAV out of hard nylon.
"We designed in printable hinges that would let the ailerons move," says 3T RPD spokesman Stuart Offer. "And we decided where to split the fuselage so the nose could be snap-jointed to the fuselage easily."
The budget for the Southampton University Laser Sintered Aircraft (Sulsa) was £5000, which imposed a number of design constraints. The aircraft would have no undercarriage to keep complexity and weight down, necessitating the use of a launch catapult – and a belly landing. It would be electric-motor-powered to eliminate the need for starting equipment and heavy fuel. And it would have a V-shaped tail rather than the usual upside-down-T, so that only two parts had to be printed instead of three.
Cost savings here meant that the plane could have Spitfire-style elliptical wings, as well as a strong geodesic airframe – another expensive second world war-era design, this time from the stout Vickers Wellington bomber, which was extraordinarily resistant to anti-aircraft fire.
Back at the airstrip, two wings, a nose cone and a fuselage with a built-in V-shaped tail have been ripped from nylon cakes, dusted down and delivered. Sulsa's airframe designers Jeroen van Schaik and Mario Ferraro, both grad students at the University of Southampton – which launches a UAV masters course in September – are assembling the aircraft after stuffing it with electronics, servos and batteries.
Nearby, Matthew Bennett of autopilot-maker SkyCircuits is discussing with the aircraft's ground-based pilot, Paul Heckles, how to hand manual control to the ARM-microchip-based autopilot once the plane is airborne.
Soon it's flight time. Sulsa twitches like a giant, grounded butterfly flexing its wings as ailerons and rudders are tested. Then the powerful launch catapult is cranked back. As soon as Sulsa clears the rail, Heckles punches the throttle – and the plane takes to the sky.

Foxconn aims for a million robot workers by 2014

It's certainly one way of dealing with a bit of bad publicity. Foxconn, the Taiwanese manufacturer that assembles gadgets for the likes of Apple and Nintendo came under fire last year after a spate of high-profile suicides by its workers. Now it says it plans to replace much of its human workforce - with a million robots.

Foxconn is currently the largest private-sector employer in China with over one million employees. Last year 17 workers killed themselves - most by throwing themselves from factory buildings - while many more were stopped from doing so. The ensuing criticism and bad headlines worldwide forced the manufacturer to double its workers' salaries.

Now founder and chairman Terry Gou says he wants to cut rising labour costs and improve efficiency by replacing workers with robots that can perform tasks such as spraying, welding and assembling. He says Foxconn will boost its robotic workforce from 10,000 to 300,000 next year before reaching 1 million by 2014.

Forget visions of identical humanoid robots working side by side though, as the machines are unlikely to be any more than robotic arms. Statistics from the International Federation of Robotics (IFR) also suggest that Foxconn has set its sights incredibly high compared to the current state of industrial robotics.

The IFR says that there were around 1,020,000 industrial robots operational in 2009, and it predicts that total will reach just under 1,120,000 by the end of 2013. It also says that only 2,230,000 industrial robots have ever been built since they were first introduced at the end of the 1960s.

LATEST MOBILE UPDATES

Among the newest class of telephones are the handsets of Sony Ericsson and BlackBerry mobiles. The newest mobile telephones of these 2 firms play a serious role in connecting folk and bringing entertainment in their life. The widgets of the 2 firms are truly good vis the features, design and connectivity options that they offer. The Sony Ericsson cellphones are known for their smooth and stylish looks.

The widgets are also renowned for their wonderful ring-tones. The clash of Blackberry mobiles vs LG mobiles doesn't yield much result as both the brands attract the users according to their selections and needs. The blackberry widgets feature a total Full keyboard for simple text and numeric input. Also , these devices let the users to make, send and receive Emails . These smart telephones support document spectator facility so the users can go thru the MS Word, Excel, PowerPoint for example. Its handsets come packed with many helpful features that are required by the common as well as worldwide folks.


Those days are gone when folk had to carry heavy cameras together with them, while going outside to make a note of their occasions. Moving ahead, the Bluetooth is the another beneficial technology that's available in a number of Nokia’s models. However nowadays, they can carry the light weighted camera telephones. This is a wireless technology, by which video clips, photographs, songs and great quantity of information and files can be moved to other compatible devices and that too freed from cost. The users will find support of musical formats like AAC,WMA & AAC. At last, it can be opined that both the aforesaid widgets are improved with latest features that are stupendously liked by folk. The music pleasure also includes polyphonic tones and FM radio. Its totally charged battery can deliver 3.5 hours of talk time and three hundred hours of standby time.

So , such LG mobile telephones are a must purchase devices without any 2nd thought that may add to one’s character and look. You may also enjoy its other engaging features that include gorgeous wallpapers, screen-savers etc, to electrify the aspirants. For inquiring extra information about new Samsung cell-phones, you can peruse the Web where you can view masses of portals offering info on each cell-phone. Its convenient to use features and fashionable designs will certainly give you gigantic satisfactio

Monday, August 8, 2011

How exercise benefits nerve cells

Nerve cell communication gets better with use. A neuron’s electrical activity triggers other cells to come and slather on a protective coating that makes messages travel faster, a study published online August 4 in Science shows.
Like rubber insulation around electrical wires, myelin wraps around message-sending axons, protecting and speeding electrical impulses. Specialized brain cells called oligodendrocytes wrap up to 150 layers of this insulation around a single axon. In this image, a single oligodendrocyte (green) wraps several axons (purple).
The process begins when neurons fire off an electrical signal and the chemical messenger glutamate is released. Mouse neurons treated so they were unable to release glutamate had lower levels of myelin, Hiroaki Wake of the National Institute of Child Health and Human Development in Bethesda, Md., and colleagues found.
When the team activated normal axons, boosting their glutamate production, oligodendrocytes produced more of the fatty proteins that make up the myelin coating.
The results suggest one way that the brain quickly adapts and improves when a person practices new tasks such as playing the violin or juggling

How to unlock and start a car - with a text message

Thought your shiny new car looked pretty impregnable? Think again. Two researchers have shown that they can unlock a car  - and even start the engine - using a simple text message.

Don Bailey and Matthew Solnik, researchers at iSEC Partners presented their work at the Black Hat 2011 security conference in Las Vegas, explaining how they can use an Android phone to carry out a  technique they've dubbed "war-texting". The new technique relies on intercepting text messages, which many devices use to send commands or even firmware (permanent software programmed into a read-only memory) updates.

By setting up a local GSM network in the vicinity of a Subaru Outback, the team were able to intercept password authentication messages sent between the electronic key fob and the vehicle. What happens next is not exactly known, because the researchers haven't divulged all their secrets as a courtesy to the manufacturer.

However, what we do know is that intercepting those authentication messages allowed the team to understand the basic commands required to communicate with the security system of the car. Once they knew those details, they were able to send their own messages to the system in order to reverse-engineer the firmware - effectively learning how the entire device works.

From there, they could work out which commands were useful, and write their own messages to send that could unlock - and even start the engine of - the car. The whole process took them just a matter of hours. The team haven't gone into detail about which other cars might share these vulnerabilities, but the communication devices built into the vehicle are generic items - so the chances are that the problem could be widespread.

More worryingly, their technique could be used to attack other systems. Any device that routinely recieves firmware updates via text message, such as traffic control systems and security cameras, could be fair game. Perhaps worst of all, it could also attack SCADA sensors, which are used to monitor industrial systems such as the power grid and water supplies. "I could care less if I could unlock a car door," Don Bailey told CNN. "It's cool. It's sexy. But the same system is used to control phone, power, traffic systems. I think that's the real threat."

Though there has been no formal statement made by Subaru, Bailey has notified the manufacturer, and they are apparently taking steps to remedy the situation

US internet providers hijacking users' search queries

Searches made by millions of internet users are being hijacked and redirected by some internet service providers in the US. Patents filed by Paxfire, the company involved in the hijacking, suggest that it may be part of a larger plan to allow ISPs to generate revenue by tracking the sites their customers visit. It may also be illegal.
Reese Richman, a New York law firm that specialises in consumer protection lawsuits, today filed a class action against one of the ISPs and Paxfire, which researchers believe provided the equipment used to hijack and redirect the searches. The suit, filed together with Milberg, another New York firm, alleges that the process violated numerous statutes, including wiretapping laws.
The hijacking seems to target searches for certain well-known brand names only. Users entering the term "apple" into their browser's search bar, for example, would normally get a page of results from their search engine of choice. The ISPs involved in the scheme intercept such requests before they reach a search engine, however. They pass the search to an online marketing company, which directs the user straight to Apple's online retail website.
More than 10 ISPs in the US, which together have several million subscribers, are redirecting queries in this way (see below for a complete list). None of the companies would comment on the redirection scheme, but evidence collected by Christian Kreibich and Nicholas Weaver at the International Computer Science Institute in Berkeley, California, who discovered the redirection and have been monitoring it for several months, suggest that the process generates revenue for the ISPs.
The Berkeley team has identified 165 search terms, from "apple" and "dell" to "safeway" and "bloomingdales", that are passed to marketing companies and then redirected to the appropriate retail website. The marketing companies include organisations like Commission Junction, a Santa Barbara, California, a firm that retailers pay to supply traffic to their websites.
Organisations that provide Commission Junction with traffic, which may include Paxfire and the ISPs the Berkeley team monitored, receive a cut of any purchase their users make. The cut is typically around 3 per cent. Commission Junction said that it was investigating the behaviour identified by the Berkeley researchers.

Homemade drone to help phone and Wi-Fi hackers

Invisible to radar, a drone flies over a city, while a hacker uses it to attack the cellphone network, spy on the ground and monitor Wi-Fi networks. But this is no stolen military vehicle. It is a homemade drone built for just a few thousand dollars using parts legally bought on the internet.
This is the future of network hacking, as envisioned by security consultants Mike Tassey and Richard Perkins. They have now built such a drone to prove how easy it is.
Using commercially available parts, they built a plane called WASP that can be a moving base station for cellphone networks, a flying camera and a Wi-Fi "packet sniffer" – all at the same time. Everything was bought legally and building it did not require much engineering know-how, they say.
The drone's frame was bought for less than $300 on the internet. A GSM radio turned it into a mobile version of a cellphone tower, a video camera to monitor the ground, while internet connectivity came from a USB dongle that can be bought in any electronics shop. The total cost of their drone was about $3800, says Tassey. The pair presented their work at the Black Hat Conference in Las Vegas last week.

Microsoft turns the table on hackers by offering $250,000 reward for anyone who can protect Windows from cyber-attacks

Bosses at Microsoft are hoping to turn poachers into gamekeepers by offering computer hackers $250,000 to develop new security defences for their software.
The firm's BlueHat Prize, which is open to programmers everywhere, will pay $200,000 to the person who comes up with what they judge to be the best new way of preventing cyber-attacks.
Two runners up will split a $50,000 second prize and each receive a MSDN Universal subscription, allowing them to develop their own software for the company, worth $10,000.
In IT terminology, the prizes are being offered for the best 'novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities.'
Katie Moussouris, senior security strategist for the Microsoft Security Response Center said: 'This is the first and largest incentive prize ever offered by Microsoft, and possibly ever in the industry.
'We're looking to make life more costly for criminals. The value of the prize will go beyond dollars, however.

ANDROID COULD ALLOW MOBILE AD OR PHISHING POP-UPS

LAS VEGAS--Researchers have discovered what they say is a design flaw in Android that could be used by criminals to steal data via phishing or by advertisers to bring annoying pop-up ads to phones.
Developers can create apps that appear to be innocuous but which can display a fake bank app log-in page, for instance, when the user is using the legitimate bank app, Nicholas Percoco, senior vice president and head of SpiderLabs at Trustwave, said ahead of his presentation on the research at the DefCon hacker conference today.
Currently, apps that want to communicate with the user while a different app is being viewed just push an alert to the notification bar on the top of the screen. But there is an application programming interface in Android's Software Development Kit that can be used to push a particular app to the foreground, he said.
"Android allows you to override the standard for (hitting) the back buttons," said Sean Schulte, SSL (Secure Sockets Layer) developer at Trustwave.
"Because of that, the app is able to steal the focus and you're not able to hit the back button to exit out," Percoco said, adding that they've named the issue the Focus Stealing Vulnerability.
The researchers have created a proof-of-concept tool that is a game but also triggers fake displays for Facebook, Amazon, Google Voice, and the Google e-mail client. The tool installs itself as part of a payload inside a legitimate app and registers as a service so it comes back up after the phone reboots, Percoco said.
In a demo showing a user opening up the app and seeing the log-in screen for Facebook, the only indication that something odd has happened is a screen blip so quick many users wouldn't notice. The fake screen completely replaces the legitimate one, so a user wouldn't be able to tell that anything is out of place.
With this design flaw, game or app developers can create targeted pop-up ads, Percoco said. The ads could be merely annoying, like most pop-ups are, but they could also be targeted to pop up an ad when a competitor's app is being used, he added.
"So the whole world of ads fighting with each other on the screen is possible now," said Percoco, who demonstrated an Android rootkit at DefCon last year.
The functionality would not raise any red flags in the permissions displayed when the user downloads the app because it is a legitimate function for apps to check the phone state in what is called the Activity Service, according to Schulte.
Percoco said the researchers spoke to someone at Google about their findings a few weeks ago and that the individual acknowledged that there was an issue and said the company was trying to figure out how to address it without breaking any functionality of legitimate apps that may be using it.
When contacted for comment, a Google representative said he would look into the matter.
Update August 8, 2011 at 3:50 p.m. PT A Google spokesman provided this statement: "Switching between applications is a desired capability used by many applications to encourage rich interaction between applications. We haven't seen any apps maliciously using this technique on Android Market and we will remove any apps that do."
The Google spokesman also directed CNET to Visidon's AppLock as an example of how that functionality is used. The app uses facial recognition technology to prevent unauthorized access to parts of your phone, such as your Gmail app. The legitimate use of the functionality described in the vulnerability in this example would slide AppLock's password-requesting interface over Gmail's when you tap it. Since AppLock uses your face as its password, it would slide on, allow your face to be recognized as the approved password, and then slide away.
Update August 8, 2011 at 7:40 p.m. PT Percoco's response to the Google statement: "Application switching is not the issue. The real issue is ability for other apps to identify which app is in the foreground and then decide to jump in front of that running app without the user giving it permission to do so. We also don't see how they could determine the difference between a malicious app or a legitimate one since they would both look almost identical until a user reports it to them as malicious. The 'wait until an app is reported bad before removing' stance is dangerous and will likely prove out to be a fruitless effort as attackers could post apps much faster than Google could identify and remove them from the Market."


Read more: http://news.cnet.com/8301-27080_3-20089123-245/android-could-allow-mobile-ad-or-phishing-pop-ups/#ixzz1UOx7sm3Q

6TH AUGUST WAS 20TH BIRTHDAY OF WORLDWIDE WEB

Happy birthday, Web!
On August 6, 1991--20 years ago--Tim Berners-Lee posted a summary of a project for organizing information on a computer network using a "web" of hyperlinks: the "WorldWideWeb," or W3. At the same time, the W3 made its debut as a publicly available service on the Internet. Now, as the Web turns 20, those of us here at CNET and sister site CBS News.com are giving it a big thank you for revolutionizing the world as we know it.

There have been some definite downsides to the Web, such as online predation and a reduction in privacy, but the good has far outweighed the bad. Web companies have created millions of jobs across the globe, opened people up to different cultures and ideas, and created a level of transparency in politics that's never quite been achieved before.
Through social, economic, and political actions online, the world has become entirely different than it was two decades ago. News travels faster than ever; every single person with access to the Internet has a voice to vent frustration or foster a following; and social interactions have become more varied and far-reaching.
The Web has changed the way people think and revolutionized the world as we know it in a remarkably short period of time. From clunky modems to smartphones, Web-based technology has come a long way. The only question is how far will it continue to evolve in the next 20 years?
Here's a slideshow of our favorite things to come out of the "W3."


Read more: http://news.cnet.com/8301-10797_3-20089085-235/happy-20th-birthday-world-wide-web/#ixzz1UOyq2cTr