Nokia N86 8MP

Saturday, June 20, 2009
di 8:50 PM


This last part can be much Nseries try and May enough to everyday needs in the digital media and connectivity. But one thing is sure - it was a time when we have seen, the last time a camera phone so revolutionary as the Nokia N86 8MP.

Goodies on the Nokia N86 has just 8MP, including but not limited to a 2.6-inch AMOLED display, dual form factor slides, the active Kick Stand, 8 GB internal memory, a slot for microSD card, FM Transmitter , Wi - Fi and digital compass and GPS, a 3.5 mm audio jack and TV output. There is also a quad-band GSM and tri-band HSDPA, to really enter the world of voice and data services abroad.


This last part can be much Nseries try and May enough to everyday needs in the digital media and connectivity. But one thing is sure - it was a time when we have seen, the last time a camera phone so revolutionary as the Nokia N86 8MP.

Goodies on the Nokia N86 has just 8MP, including but not limited to a 2.6-inch AMOLED display, dual form factor slides, the active Kick Stand, 8 GB internal memory, a slot for microSD card, FM Transmitter , Wi - Fi and digital compass and GPS, a 3.5 mm audio jack and TV output. There is also a quad-band GSM and tri-band HSDPA, to really enter the world of voice and data services abroad.

* General: GSM 850/900/1800/1900 MHz, UMTS 900/1900/2100 MHz HSDPA 3 / 6 Mbps
* Form Factor: Dual-Slide Design
* Dimensions: 103.4 x 51.4 x 16.5 mm
* Display: 2.6 inch QVGA 16M color AMOLED display against scratches surface
* Memory: 8 GB of memory, hot-swappable microSD card slot (up to 16 GB)
* Operating system: Symbian OS 9.3 with S60 user interface 3rd Edition with FP2
* Platform: ARM 11 434 MHz, 128 MB RAM
* Camera: 8-megapixel autofocus camera with dual LED flash, 28 mm wide Carl Zeiss lens, a shutter with variable speed, mechanical shutter, geo-tags, time-lapse images @ 30fps VGA and Video
* Connectivity: Wi-Fi, Bluetooth with A2DP, Micro-standard port, audio jack 3,5 mm standard GPS with A-GPS and the map settings
* Others: acceleration sensor to rotate the screen automatically activated Kick Stand, FM Radio with RDS FM transmitter, digital compass
* Battery: 1200 mAh battery

Twitter plays key role in DoS attacks in Iran

Friday, June 19, 2009
di 3:15 PM

Computerworld - The unrest in Iran is serving as a warning on how easy it is for individuals and groups to use a social networking tool like Twitter to mobilize a cyber-army against a political or commercial target anywhere in the world.

Over the past few days, news media reports have described how Twitter is being used by ordinary Iranians to receive and broadcast real-time information on the political unrest in the country after recent elections.


But a still developing and less benign use of Twitter in Iran has been its application in denial-of-service attacks against key government officials, including those affiliated with President Mahmoud Ahmedinejad.

Initially, the tweets directed users to online locations with links that users could click on to participate in a DoS attack against a particular Iranian Web site, said Richard Stiennon, founder of IT-Harvest, a Birmingham, Mich.-based consultancy.

A Google Doc circulating on the Web, for instance, lists several URLs pointing to Iranian Web sites listed by categories such as "Governmental and HARDLINE NEWS," "Police, Ministry of Interior," "Central Bank," "Commerce Banks" and "Office of Ahmadijenad and Khameneie." When a user clicks on any of the links, it initiates a continuous stream of page refresh requests to the targeted Web site that will eventually overcome the site if enough people click on the link.

More recently, tweets have begun circulating that allows users to achieve the same result by simply clicking on the embedded URL in the message. As soon as a user hits the page, as many as 24 frames open up simultaneously and refresh continuously, causing a DoS attack against the 24 separate Web sites Stiennon said.

"Once you click on what you see in Twitter, you immediately become part of the cyber-army," in Iran, he said.

Another tool that is available via Twitter is called bandwidth raep (bwraep), which is also a sort of DoS attack. This attack works by bombarding a Web server with fake requests to serve up content-heavy images.

Tweets are also circulating that offer information on where to find malware capable of initiating so-called Ping and Syn flood attacks, which are designed to overwhelm servers with an incessant flood of useless requests, Stiennon said.
A Cyberwar guide for Iran elections reposted on BoingBoing exhorts would-be cyber warriors to be careful about using Twitter to launch such DoS attacks.

"If you don't know what you are doing, stay out of this game," the guide writes while asking volunteers to only target sites that "legitimate Iranian bloggers" pinpoint. "Be aware that these attacks can have detrimental effects to the network the protesters are relying on. Keep monitoring their traffic to note when you should turn the taps on or off."

DIY amphibious bicycle revitalizes floating experience

Sunday, June 07, 2009
di 3:37 PM


These marvelous bicycles are constructed from recycled water gallons. This recycled plastic is capable to make this fashionable bike a floatable vehicle. Made in China, this DIY amphibious bicycle was designed by Li Jin.

Being powered by biker, this dual bike is capable to both running on the ground and floating in the lake. Eight water gallons were used to make this miracle which are closed enough to prevent this sailing bike from drowning. Its driving power is provided by vane wheels which can be adjusted.



This fantastic bike can be generally used on the public road without any changing. This amphibious bike appears to be a state of the art vehicle with brigh outlook for the future. This fabulous bike was presented on May 30 in Wuhan, Hubei Province, China.

Unix turns 40: The past, present and future of a revolutionary OS

di 1:28 PM



Computerworld - Forty years ago this summer, a programmer sat down and knocked out in one month what would become one of the most important pieces of software ever created.

In August 1969, Ken Thompson, a programmer at AT&T subsidiary Bell Laboratories, saw the month-long departure of his wife and young son as an opportunity to put his ideas for a new operating system into practice. He wrote the first version of Unix in assembly language for a wimpy Digital Equipment Corp. (DEC) PDP-7 minicomputer, spending one week each on the operating system, a shell, an editor and an assembler.

Thompson and a colleague, Dennis Ritchie, had been feeling adrift since Bell Labs had withdrawn earlier in the year from a troubled project to develop a time-sharing system called Multics (Multiplexed Information and Computing Service). They had no desire to stick with any of the batch operating systems that predominated at the time, nor did they want to reinvent Multics, which they saw as grotesque and unwieldy.

After batting around some ideas for a new system, Thompson wrote the first version of Unix, which the pair would continue to develop over the next several years with the help of colleagues Doug McIlroy, Joe Ossanna and Rudd Canaday. Some of the principles of Multics were carried over into their new operating system, but the beauty of Unix then (if not now) lay in its less-is-more philosophy.

"A powerful operating system for interactive use need not be expensive either in equipment or in human effort," Ritchie and Thompson would write five years later in the Communications of the ACM (CACM), the journal of the Association for Computing Machinery. "[We hope that] users of Unix will find that the most important characteristics of the system are its simplicity, elegance, and ease of use."

Apparently they did. Unix would go on to become a cornerstone of IT, widely deployed to run servers and workstations in universities, government facilities and corporations. And its influence spread even farther than its actual deployments, as the ACM noted in 1983 when it gave Thompson and Ritchie its top prize, the A.M. Turing Award for contributions to IT: "The model of the Unix system has led a generation of software designers to new ways of thinking about programming."

Of course, Unix' success didn't happen all at once. In 1971 it was ported to the PDP-11 minicomputer, a more powerful platform than the PDP-7 for which it was originally written. Text-formatting and text-editing programs were added, and it was rolled out to a few typists in the Bell Labs Patent department, its first users outside the development team.

In 1972, Ritchie wrote the high-level C programming language (based on Thompson's earlier B language); subsequently, Thompson rewrote Unix in C, which greatly increased the OS' portability across computing environments. Along the way it picked up the name Unics (Uniplexed Information and Computing Service), a play on Multics; the spelling soon morphed into Unix.

It was time to spread the word. Ritchie and Thompson's July 1974 CACM article, "The UNIX Time-Sharing System," took the IT world by storm. Until then, Unix had been confined to a handful of users at Bell Labs. But now with the Association for Computing Machinery behind it -- an editor called it "elegant" -- Unix was at a tipping point.