You are on page 1of 70

ACACIA 2010

JANUARY, 2010
FIRST EDITION

SPREAD YOUR WINGS OF MIND

SECTION OF THE MONTH

THE SIXTH SENSE TECHNOLOGY TECHONLINE.BIZ.LY


TECH ONLINE GROUP
1/1/2010
PREFACE

We are a group of students. This is our first try to publish an online web magazine from
our website WWW.TECHONLINE.BIZ.LY . We with some of our college friends have
tried hard to publish ACACIA. It has been made by focusing on computer funda,
robotics, ethical hacking, latest gadgets, some unsolved mysteries etc. We are tech freaks
and always want to be updated with latest technology. We want to express and share our
views with each other. We believe that sharing is caring and it is the best way to increase
our knowledge. So it is our try to gather & share technical information through
ACACIA.

ACACIA will be published monthly. Besides of


technical post of different students there are some regular sections like TECH-VISION,
TRICKS & TIPS, TECH-CHECK, ROBOTIX and ETHICAL HACKING. We also have
a special topic for every month, which will be specially highlighted.

We are pleased to thank all of our respected


moderators joydeep roy, tanuj gyan, rahul kumar and also TECHNICHE’ group to
support us. Thanks to all who have contributed their posts & writings for this magazine .
We expect your support in future also to continue our journey. The first edition of this
magazine is contributed to all of our friends and colleagues who have encouraged us to
start our journey. Most of all we thank God for His inspiration, guidance, and strength
throughout this seemingly impossible task..

In conclusion, it is our humble request to all the readers to send their remarks on this
magazine, so that we can overcome our mistakes & improve this magazine

EDITORS

ANIK CHAKRABORTY

MAYUKH CHAKRABORTY

WE ARE “TECHONLINE GROUP”

VISIT US AT - TECHONLINE.BIZ.LY

2|Page
Contents
TOPICS PAGE
• 3G ON THE MOVE SHENAZ REHMAN 06
• BHANGARH-the most
Haunted place in india TANUJ GYAN 07
• BIONICS DIPANKAR SINGH 08
• BOMB DEBANKO BASU 10
• COMBINED PROPULSION
SYSTEM AYAN BHATTACHARIYA 11
• 2015 IS NEW MAGIC DATE MOUMITA SENGUPTA 14
• FROM THE WEB TO GRID Siddhartha Sekhar Bose 15
• HAFNIUM BOMB-the next
Super weapon SOUVIK DUTTA 17
• THE HIGHWAY SKY SOMDATTA DEY 18
• IPTV PRASENJIT NAYAK 21
• LAPTOP PROTECTION SOURAV HALDER 22
• LIFE AFTER DEATH-(A
Parapsychological research) SHAONTY BANARJI 23
• CROME OS MAYUKH CHAKRABORTY 27
• GETTING GEOGRAPHICAL
INFORMATION USING AN
IP ADDRESS JOYDEEP ROY 29
• THE LOST WORLD OF
ATLANTIS AVIK KHARA 37

REGULAR SECTIONS
• TECH VISION

3|Page
• EL CHUPACABRA TECHONLINE 39
• NANO TECHNOLOGY SHENAZ REHMAN 40
• LOCH NESS MONSTER ANIK CHAKRABORTY 42
• THE QUANTUM VACUUM TANUJ GYAN 43
• MOBILE BUG SOURAV HALDER 44

• TRICKS & TIPS ANIK CHAKRABORTY

(MODERATOR)

• NOTEPAD “WORLD TRADE 45


CENTRE TRICK”
• DISABILING DISPLAY IN 45
MY COMPUTER
• HOW TO HIDE IMPORTANT
INFO IN AN IMAGE FILE 46

• TECH-CHECK
(
RAHUL KUMAR MODERATOR )

• ULTRA SMALL AGENT HP


VIDEO RECORDER CAMERA 47
• CHARIST SKATES 49
• THE GOOGLE PHONE 50

4|Page
• ROBOTIX
MAYUKH CHAKRABORTY & ANIK CHAKRABORTY

(MODERATORS)

INTRODUCTION TO ROBOTICS 51

• ETHICAL HACKING
JOYDEEP ROY (MODERATOR)

CHAPTER: 1 SETTING THE STAGE 61

• SECTION OF THE MONTH


THE SIXTH SENSE TECHNOLOGY 65
PRANAV MISTRY, FLUID INTERFACE GROUP, MIT MEDIA LAB

TECH ONLINE VIEW ANIK CHAKRABORTY 68

5|Page
3G on the Move

SHENAZ REHMAN

What is 3G?
3G (third generation) is an industry term for a collection of international standards and
technologies targeted at increasing efficiency and improving the performance of mobile
wireless networks. 3G is really a reference to high-speed wireless data.

What does 3G offer?


Greater data speed, increased capacity for both voice and data. Packet data network,
versus today’s circuit switched networks. Opportunity to introduce new and robust
wireless applications for both consumer and business markets.

3G Standards
The International Telecommunications Union (ITU) has developed a series of technical
recommendations, or standards, that define the key characteristics of IMT - 2000 radio
systems. The standards are intended to minimize the number of different radio
interfaces, maximize their commonality, and provide a transition path to 3G.
• Leading 3G standards are based on CDMA technology (however, other
standards are based on FDMA/TDMA-SC).
• One CDMA-based 3G standard is CDMA-2000.
• Another CDMA-based 3G standard is WCDMA, or wideband CDMA.
• The cost of adopting WCDMA is considerably greater than the cost to migrate to
CDMA-2000.
CDMA Direct Spread interface is called the Universal Terrestrial Radio Access (UTRA)
Frequency Division Duplex (FDD) or WCDMA. CDMA Multi-Carrier radio interface also is
called cdma2000 and operates in FDD. CDMA TDD radio interface employs a direct-
sequence CDMA radio access scheme. There are two versions: UTRA Time Division
Duplex (TDD) and TD-SCDMA. TDMA Single-Carrier radio interface also is called
Universal Wireless Communication-136 (UWC-136) and is an FDD system.
FDMA/TDMA radio interface also is called Digital Enhanced Cordless
Telecommunications (DECT) and is defined by a set of European Technical Standards
Institute (ETSI) standards.

Key Benefits of 3G
Ultimately, it means faster, richer applications and more opportunities for customers to
fulfill their information, entertainment, messaging and transaction needs their mobile
devices when it’s most convenient for them.

Benefits of CDMA
• Voice Clarity and Call Quality.
• Fewer Dropped Calls.
• Reduced Background Noise and Interference.
• Improved Security and Privacy.
• Greater Capacity.
• Greatest Coverage for Lower Cost.

6|Page
BHANGARH-the most haunted place in
India

Tanuj gyan

Bhangarh in Rajasthan (a place on way from Jaipur to Alwar city in) which is the most
haunted Place in India as per Archeological Survey of India. “STAYING HERE AFTER
SUNSET IS STRICTLY PROHIBITED” is written on the board at city entrance…………
There are several stories explaining this menace
In the first half of the 17th century, Madho Singh of Amber built his capital here with
the sanction of an ascetic Baba Balanath, who meditated there, but not without his dire
prescription: “Look my dear chap! The moment the shadows of your palaces touch me,
you are undone. The city shall be no more!” In ignorance, Ajab Singh, one of the later
descendants in the dynasty, raised the palace to such a height that the shadow reached
the forbidden place hence the devastation.
A second legend tells of a tantric battle waged between the lovely queen Ratnavali and
that wicked sorcerer Singha Sevra, whose chhatri can be seen on the top of the hill.
Desperately, he tried to trap her in his magical web, and failed every time, as the queen
herself was a past-mistress in the tantric art.
The last battle took place on the day when the queen losing eventually her temper,
transformed a glass bottle containing the massaging oil into a big rock and flung it
towards the hill-top, where sat the devil. In vain he tried to stall this glass missile. It was
too late. Sensing his imminent death, concentrating all his powers, he spat his dying
curse: “I die! But thou too, thou Ratnavali shall not live here anymore. Neither thou, nor
thine kin, nor these walls of the city. None shall see the morning sun!” I suspect, it was

7|Page
after all, the demon that had the last laugh! The night was spent in hastily trying to
transfer the palace treasures to the new site of Ajabgarh. In the morning came the
tempest leveling everything to the ground.

People say that nobody returned from there that stayed there after dark. The irony of the
situation is that as per Govt. of India rules, there has to be an office of Archaeology Survey of
India (ASI) beside every historical structure in India. But even Government authorities couldn't
dare to open an office there and they opened their office about one kilometer away from the
ruins of Bhangarh. People who visit this place out of tourist interest say that there is a strange
feeling in the atmosphere of Bhangarh, which causes sort of anxiety and restlessness.

BIONICS
Dipankar singh
The term bionics is the application of biological methods and systems found
in nature to the study and design of engineering systems and modern technology. The term
coined in the year 1958 by Jack E. Steele, it actually signifies the flow of concepts from
biology to engineering and vice versa.
May sound like a new term, in fact a little complicated, but the deeper one gets, the more
interesting it becomes. The transfer of technology between life forms and manufactures is the
key principle of operation of bionic engineering. A classical example is the development of dirt-
and water-repellent paint (coating) from the observation that the surface of the lotus flower plant
that is practically nonsticky thus giving the “lotus effect”. in fact sonar, radar, and
medical ultrasound imaging imitating were inspired from the echolocation of bats. In fact there are
several such interesting examples that follow:

• Cat's eye reflectors were invented after studying the mechanism of cat eyes that had a
system of reflecting cells, known as tapetum lucidum, which was capable of reflecting the
tiniest bit of light.

8|Page
• Leonardo da Vinci's flying machines and ships are early examples of drawing from nature
in engineering.

• Resilin is a replacement for rubber that has been created by studying the material also
found in arthropods.

• Pinecones respond to higher humidity by opening their scales (to disperse their seeds).
The "smart" fabric does the same thing, opening up when the wearer is warm and
sweating, and shutting tight when cold. Another good analogy of bionic invention.

• "Morphing aircraft wings" that change shape according to the speed and duration of flight
were designed in 2004 by biomimetic scientists from Penn State University. The
morphing wings were inspired by different bird species that have differently shaped wings
according to the speed at which they fly.

There are numerous such instances of bionics. If we throw some light on the use of biometics in
the field of medicine we shall see how this revolutionizing technology has replaced or enhanced
of organs or other body parts by mechanical versions. The artificial heart invented in 2004
functions efficiently as a neat replacement for the biological heart.

Another, more recent meaning of the term bionics refers to merging organism and machine. This
approach results in a hybrid system combining biological and engineering parts, which can also
be referred as a cybernetic organism (cyborg).

In a more specific meaning, it is a creativity technique that tries to use biological prototypes to get
ideas for engineering solutions. This approach is motivated by the fact that biological organisms
and their organs have been well optimized by evolution

Bionics is a huge term with enormous meanings and undoubtedly a new pathway for modern
technology. Here in this piece only a brief introduction to this ever increasing invention is given. A
new technology no doubt, but it is also a fast growing one with contributions to modern science in
innumerable ways.

9|Page
BOMB
Debanko Basu
In military science, the term "aerial bomb" or "bomb" denotes a container dropped from an
aircraft and designed to cause destruction by the detonation of a high-explosive bursting
charge or incendiary or other material. Bombs differ from artillery shells, missiles, and
torpedoes in that the latter are all propelled through the air or water by a man-made agency,
while bombs travel to their targets through the force of gravity alone. A major distinction must
also be made between conventional bombs and atomic and thermonuclear bombs, which have
a far greater destructive capacity.

The typical conventional bomb is a streamlined cylinder that consists of five major parts: an
outer casing, the inner explosive material, devices such as fins to stabilize the bomb in flight,
one or more fuzes to ignite the bomb's main charge, and a mechanism for arming the fuze or
preparing it to explode. Bombs can be classified according to their use and the explosive
material they contain. Among the most common types are blast, fragmentation, general
purpose, antiarmour, and incendiary bombs. All of these were used in World War II. Newer
types include cluster and fuel-air explosive (FAE) bombs.

Aiming bombs has always been the most challenging part of aerial bombing, since the bomber
must choose a point at which to release the bomb from a moving aircraft so that its trajectory
intersects a target on the ground. The paths traversed by the plane and the bomb can be
calculated mathematically, but the person who releases the bomb must act within seconds.

Smart, or homing, bombs can be guided to their targets with an even higher degree of
accuracy. Such bombs are fitted with small wings and adjustable fins that give the bomb
some in-flight manoeuvrability by means of gliding. The bomb's nose is fitted with a small
laser or TV-camera guidance system which provides data on the target's location to a
computer, which then sends signals to actuators that adjust the bomb's wing and fin surfaces
as needed to keep the bomb on track to the target. In the laser system, a beam of laser light
is directed at the target from an aircraft, and the bomb's laser sensors pick up the reflected
beam and follow it down to the target. A TV-guidance unit fitted onto a bomb is locked onto
the target by an aircraft and then transmits continuous pictures of the target either to a
computer in the bomb or to the aircraft crew, either of whom can guide the bomb directly
onto its target.

Several types of fuzes are used in bombs. Impact fuzes, historically the most common type,
are set in the bomb's nose and detonate upon impact, setting off the main charge.
Most bomb fuzes are armed at the moment of the bomb's release from the aircraft, or just
before, so that fused bombs cannot explode while being loaded or while being transported to
their target.

Bombs first assumed military importance with the rapid development of zeppelins and aircraft
in World War I, but the tonnages dropped in that conflict were insignificant, largely because
the carrying capacity of the aircraft was so small. World War II saw the use of larger bombs in
much greater numbers; more than 1.5 million tons of bombs were dropped by the Allies on
Germany alone. Similar tonnages of bombs were used by the United States in the Korean and
Vietnam wars, but by the time of the Persian Gulf War (1990), tonnages had dropped owing to
the increased use of highly accurate smart bombs.

10 | P a g e
Combined Propulsion Systems
Ayan bhattachariya

CODOG
Combined diesel or gas (CODOG) is a type of propulsion system for ships that need a maximum
speed that is considerably faster than their cruise speed, particularly warships like modern
frigates or corvettes.

For every propeller shaft there is one diesel engine for cruising speed and one geared gas
turbine for high speed dashes. Both are connected to the shaft with clutches, only one system is
driving the ship in contrast to CODAG-systems, which can use the combined power output of
both. The advantage of CODOG is a simpler gearing compared to CODAG but it needs more
powerful (or more) gas turbines for the same power output and also the fuel consumption at
high speed is even worse compared to CODAG.

CODOG vessels
Brandenburg class frigates and f the German Navy
Anzac class frigates of the Royal Australian Navy (RAN) and Royal New Zealand Navy
Peder Skram class frigate of the Royal Danish Navy
Visby class corvette of the Swedish Navy

11 | P a g e
CODAG

Combined diesel and gas (CODAG) is a type of propulsion system for ships which need a
maximum speed that is considerably faster than their cruise speed, particularly warships like
modern frigates or corvettes.

It consists of diesel engines for cruising and gas turbines that can be switched on for high-speed
transits. In most cases the difference of power output from diesel engines alone to diesel and
turbine power combined is too large for controllable pitch propellers to limit the rotations so
that the diesels can continue to operate without changing the gear ratios of their transmissions.
Because of that, special multi-speed gearboxes are needed. This contrasts to CODOG systems,
which couple the diesels with a simple, fixed ratio gearbox to the shaft and disengage them,
when the turbine is switched on.
Typical cruising speed of CODAG warships on diesel-power is 20 knots and typical maximal
speed with switched on turbine is 30 knots.
.

CODAD
Combined diesel and diesel (CODAD) is a propulsion system for ships using two diesel engines to
power a single propeller shaft. A gearbox and clutches enable either of the engines or both of
them together to drive the shaft.

12 | P a g e
COSAG
Combined steam and gas (COSAG) is a propulsion system for ships that uses a combination of
steam turbines and gas turbines to power the shafts. A gearbox and clutches enable either of
the engines or both of them together to drive the shaft. It has the advantage of the cruising
efficiency and reliability of steam and the rapid acceleration and start-up time of gas. This
system was mainly used on first-generation gas-turbine ships such as the Royal Navy's County
class destroyer and Tribal class frigate .

COGAG
Combined gas turbine and gas turbine (COGAG) is a type of propulsion system for ships using
two gas turbines connected to a single propeller shaft. A gearbox and clutches allow either of
the turbines to drive the shaft or both of them combined.
Using one or two gas turbines has the advantage of having two different power settings. Since
the fuel efficiency of a gas turbine is best near its maximum power level, a small gas turbine
running at its full speed is more efficient compared to a twice as powerful turbine running at
half speed, allowing more economic transit at cruise speeds.
Compared to Combined diesel and gas (CODAG) or Combined diesel or gas (CODOG), COGAG
systems have a smaller footprint but a much lower fuel efficiency at cruise speed and for CODAG
systems its also somewhat lower for high speed dashes.

13 | P a g e
2015 is New Magic Date for Fuel Cell Vehicles
Moumita sengupta

Wishing upon a star or throwing a coin in a well might make dreams come true, but when
it comes to fuel cell vehicles, auto industry executives are hoping that chanting in unison
will turn hopes into reality. The mantra from execs: “Fuel cell cars for sale by 2015.”

Honda FCX Clarity

In the past few weeks, Ford, Toyota and Daimler have expressed and reiterated their
commitment to bringing hydrogen-powered fuel cell vehicles to market in six years, with
Honda pushing its target date to 2018.

The US Department of Energy announced that it will be pulling the plug on fuel cell
research and development—and California is threatening to slash its spending on
building a hydrogen refueling infrastructure—but automakers are holding firm to their
new timeline for hydrogen.

14 | P a g e
• Daimler CEO Dieter Zetsche told Speigel Magazine in March that annual
production of fuel cell cars will need to reach 100,000 units to be considered
commercially viable, and that vehicle prices could be comparable to “premium”
gasoline cars by around 2015.
• Toyota.s spokesperson John Hanson said in June, “Toyota is planning to go ahead
with its program in certain world markets by 2015, if not sooner.”
• Speaking in June at the Edison Electric Institute conference, Ford CEO Alan
Mulally saw 2015 as the date that fuel cell cars would go on sale. Mulally hedged
when reminded of the US government.s cut in fuel cell research funding. “That
pushes out the timeframe for commercialization,” he said.
• At a recent fuel cell conference, GM.s Larry Burns also agreed with the 2015
dates, commenting: “General Motors is committed to developing a hydrogen fuel
cell car despite its bankruptcy and a huge cut in (federal) research dollars for the
zero-emission (hydrogen) vehicle.” Dave Barthmuss, GM's West Coast regional
PR manager, said last week, “We don't need any more breakthroughs to bring the
[fuel cell] cars into the commercial market by 2015."
• Honda.s Steve Ellis, manager of fuel cell vehicle sales and marketing, told an
audience at a National Hydrogen Association webinar in June that Honda is
looking at 2018 as its magic date, but is already producing the FCX Clarity on a
regular production line.

From the Web to the Grid


Siddhartha Sekhar Bose
• Evolution or Revolution?

Fundamental science can change our daily lives in unexpected ways for example it may be
difficult for may be teenagers today to imagine a world without the World Wide Web.

15 | P a g e
But when they were born this technology was just in its infancy being developed at CERN
(European Organization for Nuclear Research, Geneva) for use by high energy physicists. Today a
similar sort of technology is emerging from the efforts to build the Large Hadron Collider (LHC).

It is called the GRID.

What is the Grid?


The grid is a service for sharing computer power and data storage capacity in a geographically
distributed way.

Scientists are facing increasingly complicated problems which require more and more
computing power and data storage capacities. The grid tries to tackle these problems by taking
the computers all over the world and making them act as a single, huge, powerful computer.

How does it WORK?


Although the Grid depends on the underlying hardware of the Internet- computers and
communications network- it is novel software that enables users to access computers
distributed over the network. The software called middleware (because it is conceptually
between operating system software of the computer and applications software that solves a
particular problem) and it is tasked with the organization and integration of disaparate
computational resources of the Grid into a coherent whole.

The first major users of The Grid will probably be scientists with challenging applications, who
need large computing power or who deal with vast amounts of data. Biologists want to simulate

16 | P a g e
thousands of molecular drug candidates to see how they would interact with specific proteins.
to unlock the secrets of human genome massive amounts of data have to be analysed.

Earth Scientist may also use it to keep track of atmospheric ozone with satellite observation
downloading 100 gigabytes of raw images per day.

The Grid is a ‘work in progress, with the underlying technology being developed by hundreds of
engineers and software developers around the world. Although its future is still uncertain it has
potentially revolutionary implications for Information Technology.

HAFNIUM BOMBS- THE NEXT

SUPER WEAPON……

Souvik dutta

In the latter half of 1998, a small clutch of researchers and students at the
University of Texas embarked upon a groundbreaking experiment. Within a large
outbuilding marked with a slapdash sign reading

“Center for Quantum Electronics”, the team powered up a makeshift x-ray


emitter and directed its radiation beam at an overturned disposable coffee cup.
Atop the improvised Styrofoam platform was a tiny smear of one of the most
17 | P a g e
expensive materials on Earth: a variation of the chemical element
hafnium known as Hf-178-m2.
The researchers’ contraption– cobbled together from a scavenged dental x-ray
machine and an audio amplifier– bombarded the sample with radiation for
several days as monitoring equipment quietly collected data. When the
experiment ended and the measurements were scrutinized, the project leader Dr.
Carl B. Collins declared unambiguous success. If his conclusions are accurate,
Collins and his colleagues may have found the key to developing fist-sized bombs
which can deliver destruction equivalent to a dozen tons of conventional
explosives.
Hafnium-178-m2 is a nuclear isomer– an atomic state where the particles of the
nucleus are “excited” by higher than normal amounts of energy. Most such
isomers are unstable and extremely short-lived, instantly ejecting their excess
energy as gamma radiation in order to return to the ground state. But a handful
of varieties such as hafnium-178-m2 have a constitution which prevents this
release from occurring immediately, which places them in the category of nearly-
stable.
This interesting property causes nearly-stable isomers to act as “energy sponges”,
allowing them to absorb a massive amount of energy which bleeds out very
slowly. Hafnium-178-m2 has a half-life of thirty-one years, meaning that it takes
a little over three decades for half of the isomer’s stored energy to be emitted as
gamma rays. Hafnium is also notable for having the highest excitation energy
among the nearly-stable isomers; half a teaspoon of pure Hf-178-m2 contains
about the same amount of potential energy as one ton of TNT.
A working hafnium device would tend to deluge its target area with absurd
amounts of penetrating gamma radiation during the explosion, liquefying the
flesh of any persons nearby– even those protected by bunkers. But the most
appealing aspect of isomer triggering was its potential to shoehorn yet more
death and destruction into convenient “fun size” packages.
Even under the best of circumstances, the coveted isomers would cost
approximately $1 million per gram assuming a minimum $30 billion investment
in production facilities. The investigations also underscored the fact that
radioactive hafnium would not be totally consumed even by a successful
triggering– so any such bomb would produce a profoundly “dirty” detonation by
scattering radioactive material over the blast area.

THE HIGHWAY SKY


Somdatta dey

Have you ever dreamt about the day when you could buzz around in your very own flying
machine? Shocked? Well, that day may be sooner than you think.

18 | P a g e
The folks at NASA have built something called “The Highway in the Sky.” It's a computer system
designed to let millions of people fly whenever they please, and take off and land from
wherever they please, in their very own vehicles.
And here’s the good news -- a lot of people are building machines that will be consumer friendly
enough to let a lot of people buy it.

A lot of inventors have tried to cash in on personal flying machines. One, built in 1956, was
known as Molt Taylor’s aero car. One could detach the wings and haul them behind. But they
failed to catch on because it was too expensive and hard to fly in bad weather. And now finally
NASA has come up with a plan to make personal flying machines a reality.

19 | P a g e
Bruce Holmes is one of NASA’s chief strategists has worked on the future of aviation. He
demonstrated a flight simulator, a new computer system that could be put into any new
airborne vehicle thus making flying easy, and managing the traffic up there.

It’s called “The Highway in the Sky,” and here’s how it works: The plane is kept inside the box,
away from other vehicles, and the plane’s computers automatically guide them towards their
destination. They can even follow the highway down to the ground. It's a $130-million program
that can also help pilots fly in bad weather. Even if it’s dark and stormy, pilots can use the screen
to see what’s outside. It’s a technological breakthrough that will ultimately allow more people
to fly than ever before

The Sky car is the latest attempt to build a real flying car. Invented by Paul Moller, It has been
described as a cross between a Ferrari and a Batmobile. When its four sets of rotary engines tilt
up, the car can blast off up into the sky giving the magic carpet feel of Arabian nights. Moller
thinks it will be able to save people from burning buildings -- as demonstrated in his
promotional video, which shows the Skycar bypassing traffic jams, extending a built-in catwalk,
and ultimately saving the day.

Then we again have yet another wave of magic wand. It’s called the CarterCopter, and it has a
large top rotor and small wings which double as fuel tanks. Propulsion is generated from the tiny
secondary propeller at the rear of the plane. It can take off and land vertically like a helicopter,
but can fly as fast as an airplane. The speedy CarterCopter will let one fly from a helipad in
downtown New York to a helipad in downtown Los Angeles, skipping that time-consuming drive
from the airport to home.

Thus with the advent of modern future technology, revolutionising the world it will not be long
when today’s planes and jets will ultimately become relics – and that “The Highway in the Sky”
will be filled with flying machines that we can’t even begin to imagine. All that can be assured
presently is that, "The good stuff is coming. The really good stuff is coming."

20 | P a g e
IPTV
PRASENJIT NAYAK
Many attempts have been made to devise a killer application for the broadband
network. Over the last decade, the growth in the popularity of satellite service, the
growth in digital cable and the emergence of HDTV have all left their marks on the TV
scenario, but none considered adequate enough to fit the bill of killer application. A
value added application with high average revenue per user seemed to be the necessity
of the hour, based on Internet Protocol (IP) to give user full control and entertainment
value.

Then came the advent and answer to all these questionable needs-IPTV. IPTV is a
Broadband connection that uses Internet protocols to telecast TV programs. Since it is
digital format all analog TV requires set top box (STB). IPTV clubbed with other services
like video-on –demand (VOD), Voice over IP (VOIP), Web access, this collectivity called
triple-play. Triple play means Internet, TV, telephone over a single Broadband
connection.

Although IPTV is on Internet protocol, it is a service on TV; hence it does not require
computer or Internet bandwidth. It runs through a telephone wire & set top box (STB).
When a user changes a channel on STB, The box does not tune a channel like cable
system. It switches channels by using the IP group membership protocol. When the local
office receives this request, it checks to make sure that the user is authorized to view
the new channel, then direct the routers in the local office to add that particular user to
channels distribution index. In this way, only signals that are currently being watched
are sent from local office to digital subscriber.

IPTV gives viewers freedom from time bound TV schedule. Viewers can now go to back
watch any live broadcast they may have missed. Indeed very good news for busy sports
fans. Again it also offers video on demand, which enables viewer to choice any video
from a vast library. Also In a country like India, Internet uses still very low. The fact that
IPTV allows broadcast channels and Internet on one platform is a sure way of boosting
Internet uses on the country.

21 | P a g e
IPTV is a technology of the future and gradually making its mark in India. The IPTV forum
has set target of 1 million subscribers by 2012 which does not seem a distant dream if
its present demand among consumers is concerned.

LAPTOP PROTECTOR
Sourav halder

Laptops are very easy to nick and since they are valuable in terms of money as well as
data so it becomes difficult to compensate the loss. Here we present a miniature alarm
generator that can help you protect your laptop against theft. It is fixed inside a laptop
case and when someone tries to take the laptop, this highly sensitive circuit activates
the alarm through tilting of laptop case.

The circuit uses readily available components that can be easily assembled on Vero
board or a general purpose PCB. It is powered by a 12V miniature battery used in
remote controlled devices.

22 | P a g e
IC TL 071: this is used as a voltage comparator with a potential divider comprising R2
and R3 providing half supply voltage at non-inverting input (pin 3). The inverting input
receives higher voltage through a water activated tilt switch only when probes in the tilt
switch makes contact with water.

IC CD4538: This is a monostable multivibrator with timing elements R5 and C1. CD4538
is a precision monostable multivibrator free from false triggering and more reliable than
IC 5555 timer. Its output becomes high when power is switched ON and it becomes low
when trigger input gets a low to high transition pulse.

The unit is fixed in the laptop in horizontal position. In this position, the water inside tilt
switch effectively shorts the contact so that the output of IC1 remains low. The alarm
generator remains silent in standby mode as the trigger pin of IC2 is low. When
someone tries to take the laptop case the tilt switch breaks the electrical contact
between the probes as the unit takes a vertical position. Immediately the output of IC1
becomes high and monostable IC2 becomes triggers the PNP transistor (T1) and buzzer
starts beeping.

“LIFE AFTER DEATH- (A


PARAPSYCHOLOGICAL RESEARCH)”

Shaonty banarji

Mankind all through its history has left traces or records evincing that it believed
that life did not end at death. A phenomenon strictly disapproved by modern

23 | P a g e
scientists yet has left convergent arguments to show that personal survival
does exist after death. However now that psychology's own principles have been
shaken after recent discoveries in genetics the idea that consciousness is merely
an effect of brain-activity is being questioned again. In fact there is numerous
such phenomenon of similar genre to proof what I mean.

Man’s psychic powers


Almost everyone is aware of the phenomenon of sixth sense or
the power of reading ones thoughts yet science claims it has no
physical basis. Numerous events like awareness of an object or
event at a distance not through the normal senses or foreseeing
an event in future can only be explained as psychic powers.
Out-of-the-body experiences

Another phenomenon that indicates that the mind can operate


independent of the body is during Out-Of-the-Body experiences occurring
during sleep, narcosis or other circumstances; people have actually felt
leaving their bodies. From a point in space they saw themselves lying in
bed.

Near-Death-Experiences (NDE's)
Thanks to progress in medical science, more and more patients are
resuscitated from clinical death. Some of them report experiences which
bear great similarity, such as passing through a tunnel, being received by
deceased members of the family, or a radiant figure, before entering in a
heavenly sphere in a state of great euphoria. It is noteworthy that these
patients saw only relatives and friends who had died. In exceptional cases
they even saw people who they surmised still being alive, but whose death
announcement had not reached them as yet.

24 | P a g e
Deathbed visions
Patients, whose last hour has struck, have been reported seeing visions of
near relatives appearing at their bedside.

Cases suggestive of reincarnation


numerous cases have been reported of young children remembering a
previous incarnation, showing even birth marks of supposed injuries in a
previous life. This further enforces the existence of the soul which still
remains an intangible riddle.

None of the above arguments in itself is sufficient proof for personal


survival after death. Yet, taken together, the above phenomenons constitute
a solid body of testimony in favour of the belief. Sixth sense, telepathy,
clairvoyance and similar such phenomenon have always made man to
believe that a parapsychology does exist however strongly detested by
medical science. Near death experiences have pushed the limits of medical
ideas about the range of human consciousness and the mind-brain
relationship. Let us not forget that mankind all through its history has left
traces or records evincing that it believed that life did not end at death. In
the oldest graves objects have been found for the deceased to carry to his
new abode. This phenomenon unexplained and sometimes opposed by
modern science however continues to induce its enigmatic charm on the
human mind and will remain to do so until an explainable solution to these
mysteries is unveiled.

25 | P a g e
ASSOCIATE WITH TECHONLINE
GROUP

VISIT US 

26 | P a g e
CHROME OS
Mayukh chakraborty
Google higher-ups have officially confirmed their Google Chrome operating system (OS). It’s set
for a release in the second half of 2010. It’s been designed for net savvy peoples. Google
Chrome OS will run on both x86 as well as ARM chips. The software architecture is simple —
Google Chrome running within a new windowing system on top of a Linux kernel. For
application developers, the web is the platform. All web-based applications will automatically
work and new applications can be written using your favourite web technologies. And of course,
these apps will run not only on Google Chrome OS, but on any standards-based browser on
Windows, Mac and Linux hereby giving developers the largest user base of any platform.

Sundar Pichai said that, Google Chrome OS is an open source,


lightweight operating system that will initially be targeted at netbooks. Later this year we will
open-source its code, and netbooks running Google “Chrome OS will be available for consumers
in the second half of 2010”.
Google Chrome OS is a new project, separate from Android. Android was designed from the
beginning to work across a variety of devices from phones to set-top boxes to netbooks. While
there are areas where Google Chrome OS and Android overlap, we believe choice will drive
innovation for the benefit of everyone, including Google.
The most coolest features of it are:-
• It takes only 7 seconds to boot.
• Like chrome browser, it uses tabs. At the top left hand side it has app menu for
launching applications.

27 | P a g e
Chrome os media browser

• Switching between chrome windows.

• Cloud Storage - Everything you save inside Chrome OS is put on the cloud like this
notepad application which will sync with Google Docs.

I like that despite it being a web-based OS, it also works offline. I


wonder how soon after release it will be available for desktops and it will be especially interesting
to see how widely & quickly third-party PC accessory and software makers will be supporting it.
For example, I’d also want to be able to hook up a controller to play games via Steam on it.

28 | P a g e
Getting geographical Information using an IP Address
_____________________________________________________________________
_____
Joydeep roy

Getting the Internet Protocol or the IP Address of a remote system is said to the most
important step in hacking of a
system. Sometimes, however we get an IP in order to get more information on
someone or some host. But, how can
an IP Address be used to get more information on the location etc of a system? Well,
this manual is aimed at
answering just this question.
Actually, the IP address (Actually the entire TCP/IP Protocol) is structured or
designed such that one cannot tell as to
in which country a system having the given IP is situated, by simply looking at it. An
IP Address has no fields, which
tell you the country in which the computer using it resides in. So, all myths like ‘The
Second or the third field of an
IP stands for the country in which the system using it resides’ are definitely false and
untrue.
However, yes sometimes one can guess or deduce as to in which country and even in
which city the system using an
IP resides in, by simply looking at the first three fields of the IP. Let us take an
example to understand what I mean to
say by this. Now, before I move on the example, let us understand how exactly IP
Addresses are awarded to you.
Firstly, your ISP registers at the central authority and gets a particular range of IP
addresses between which the
various customers (people who dial into their servers) can be awarded IP addresses.
Most ISP’s are given a Class C
network Address. A class C Network address contains a 24-bit Network Prefix (the
first three fields) and an 8-bit
Host number (the last field). It is referred to as "24's" and is commonly used by most
ISP's.
******************
HACKING TRUTH: For the benefit of beginners, I have included below a snippet
from one of my earlier manuals,
which explains IP Addresses better: (Even if you are not a newbie, I do suggest you
read the below snippet, as it
might just be helpful.)
Like in the real world, everyone has got an individual Home Address or telephone
number so that, that particular

29 | P a g e
individual can be contacted on that number or address, similarly all computers
connected to the
Internet are given a unique Internet Protocol or IP address which can be used to
contact that particular computer. In
geek language an IP address would be a decimal notation that divides the 32- bit
Internet addresses (IP) into four 8-
bit fields.
Does the IP address give me some information or do the numbers stand for anything?
Let take the example of the following IP address: 202.144.49.110 Now the first part,
the numbers before the first
decimal i.e. 209 is the Network number or the Network Prefix.. This means that it
identifies the number of the
network in which the host is. The second part i.e. 144 is the Host Number that is it
identifies the number of the host
within the Network. This means that in the same Network, the network number is
same. In order to provide
flexibility in the size of the Network, here are different classes of IP addresses:
Address Class Dotted Decimal Notation Ranges
Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx
Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx
Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx
The various classes will be clearer after reading the next few lines.
Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit
host number. They are
considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an
8-bit Network prefix.
In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit
Host number. It is referred to as
"16's".
A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number.
It is referred to as
"24's" and is commonly used by most ISP's.
Due to the growing size of the Internet the Network Administrators faced many
problems. The Internet routing tables
were beginning to grow and now the administrators had to request another network
number from the Internet before a
new network could be installed at their site. This is where sub-netting came in.
Now if your ISP is a big one and if it provides you with dynamic IP addresses then
you will most probably see that
whenever you log on to the net, your IP address will have the same first 24 bits and
only the last 8 bits will keep
changing. This is due to the fact that when sub-netting comes in then the IP Addresses
structure becomes:
xxx.xxx.zzz.yyy

30 | P a g e
where the first 2 parts are Network Prefix numbers and the zzz is the Subnet number
and the yyy is the host number.
So you are always connected to the same Subnet within the same Network. As a result
the first 3 parts will remain
the same and only the last part i.e. yyy is variable.
***********************
For Example, if say an ISP xyz is given the IP: 203.98.12.xx Network address then
you can be awarded any IP,
whose first three fields are 203.98.12. Get it?
So, basically this means that each ISP has a particular range in which to allocate all its
subscribers. Or in other words,
all subscribers or all people connected to the internet using the same ISP, will have to
be in this range. This in effect
would mean that all people using the same ISP are likely to have the same first three
fields of their IP Addresses.
This means that if you have done a lot of (By this I really mean a lot) of research, then
you could figure out which
ISP a person is using by simply looking at his IP. The ISP name could then be used to
figure out the city and the
country of the person. Right? Let me take an example to stress as to how cumbersome
but easy (once the research is
done) the above method can be.
In my country, say there are three main ISP’s:
ISP Name Network Address Allotted
ISP I 203.94.47.xx
ISP II 202.92.12.xx
ISP III 203.91.35.xx
Now, if I get to know the IP of an e-pal of mine, and it reads: 203.91.35.12, then I can
pretty easily figure out that he
uses ISP III to connect to the internet. Right? You might say that any idiot would be
able to do this. Well, yes and no.
You see, the above method of finding out the ISP of a person was successful only
because we already had the ISP
and Network Address Allotted list with us. So, what my point is, that the above
method can be successful only after a
lot of research and experimentation. And, I do think such research can be helpful
sometimes.
Also, this would not work, if you take it all on in larger scale. What if the IP that you
have belongs to someone living
in a remote igloo in the North Pole? You could not possibly get the Network
Addresses of all the ISP’s in the world,
could you?
NOTE: In the above case, you also get to know the city of the system using the given
IP, as most ISP’s use different
network addresses in different cities. Also, some ISP’s are operational in a single city.
31 | P a g e
So, is there a better method of getting the location of an IP? Yes, Reverse DNS
lookups hold the key.
Just as DNS lookup converts the hostname into IP address, a Reverse DNS Lookup
converts the IP address of a host
to the hostname. By hostname, what I mean to say is that it given us the name of the
remote system in alphabets and
numbers and periods. For Example, mail2.bol.net.in would be a hostname, while
203.45.67.98 would not be a
hostname.
The popular and wonderful Unix utility ‘nslookup’ can be used for performing
Reverse DNS lookups.
So, if you using a *nix box or if you have access to a shell account, then the first this
to do is to locate where the
nslookup command is hidden by issuing the following command:
' whereis nslookup '.
Once you locate where the utility is hidden, you could easily use it to perform both
normal and reverse DNS lookups.
As this is not a manual on using the ‘nslookup’ command, I will simply giving a basic
relevant outline. In order to
get a more detailed description of how this works or how to use it, read the *nix man
pages or the documentation.
We can use ‘nslookup’ to perform a reverse DNS lookup by mentioning the IP of the
host at the prompt.
For Example,
$>nslookup IP Address
Note: The below IP’s and corresponding hostnames have been made up. They may
not actually exist.
Let us say, that above, instead of IP Address, we type 203.94.12.01 (which would be
the IP I want to trace.).
$>nslookup 203.94.12.01
Then, you would receive a response similar to: mail2.bol.net.in
Now, if you carefully look at the hostname that the Reverse DNS lookup, gave us,
then the last part reveals the
country in which system resides in. You see, the ‘.in’ part signifies that the system is
located in India. All countries
have been allotted country codes, which more often than not are the last part of the
hostnames of the systems located
in that country. This method can also be used to figure out as to which country a
person lives in, if you know his
email address. For Example, if a person has an email address ending in .ph then he
probably lives in Philippines and
if it ends in .il then he lives in Israel and so on. Some common country codes are:
Country Code
Australia .au
Indonesia .id
32 | P a g e
India .in
Japan .jp
Israel .il
Britain .uk
For a complete list of country codes, visit:
http://www.alldomains.com/
http://www.iana.org/domain-names.html
*****************
General Extra Tip: To get the complete list of US State Abbreviation codes, visit:
http://www.usps.gov/ncsc/lookups/abbr_state.txt
****************
Windows users can perform Reverse DNS queries by downloading an utility called
Samspade from: http://www.
samspade.com/
Another method of getting the exact geographical location of a system on the globe is
by making use of the WHOIS
database. The WHOIS database is basically the main database, which contains a
variety of information like contact
details, name etc on the person who owns a particular domain name. So, basically
what one does in a WHOIS query,
is supply the WHOIS service with the hostname on which he wants more information.
The WHOIS service then
replies with the information stored in its database.
This method can be used to get some pretty accurate information on a particular IP or
hostname; however, it is
probably of no use if you are trying to point out the exact location of a dynamic IP.
But, again this can be used to get
atleast the city in which the ISP used by the victim is situated.
You can carry out WHOIS queries at: http://www.alldomains.com/
You could also directly enter the following in the location bar of your Browser and
perform a WHOIS enquiry.
Enter the following in the location bar of your browser:
http://205.177.25.9/cgi-bin/whois?abc.com
Note: Replace abc.com with the domain name on which you want to perform a
WHOIS query.
This method cannot be used to get the contact address of a person, if the IP that you
use to trace him, belongs to his
ISP. So, either you need to know the domain name (which is registered on his name)
or have to remain satisfied
knowing only the city (and ISP) used by the person.
Say, the victim has registered a domain name and you want to use it to find out the
city in which he resides. Now,
one thing to remember in this case is that, if the victim has registered the domain
name using any of the various free .

33 | P a g e
com registration services like Namezero.com etc, then the domain name would
probably be registered on the company’s name and not the victim’s name. So, a
WHOIS query will give information on the ISP and not the victim.
*****************
NEWBIE NOTE: The WHOIS service by default runs on Port 43 of a system. Try
performing a WHOIS query by
telnetting to Port 43 and manually typing out the query. I have never tried it, however,
it might be fun.
***************
Yet another and probably the second most efficient method (after Reverse DNS
queries) of tracing an IP to its exact
geographical location, is to carry out a ‘traceroute’ on it. The ‘tracert’ or ‘traceroute’
commands give you the names
or IP’s of the routers through which it passes, before reaching the destination.
Windows users can perform a trace of
an IP, by typing the following at the command line prompt:
C:\windows>tracert IP or Hostname
For more information about the usage and syntax of this command, type: ‘tracert’ at
the command prompt.
Anyway, now let us see what is the result, when I do a tracert on my IP. Remember I
live in New Delhi which is a
city in India. Watch the names of the hostnames closely, as you will find that they
reveal the cities through which the
packet passes.
C:\windows>tracert 203.94.12.54
Tracing route to 203.94.12.54 over a maximum of 30 hops
1 abc.netzero.com (232.61.41.251) 2 ms 1 ms 1 ms
2 xyz.Netzero.com (232.61.41.0) 5 ms 5 ms 5 ms
3 232.61.41.10 (232.61.41.251) 9 ms 11 ms 13 ms
4 we21.spectranet.com (196.01.83.12) 535 ms 549 ms 513 ms
5 isp.net.ny (196.23.0.0) 562 ms 596 ms 600 ms
6 196.23.0.25 (196.23.0.25) 1195 ms1204 ms
7 backbone.isp.ny (198.87.12.11) 1208 ms1216 ms1233 ms
8 asianet.com (202.12.32.10) 1210 ms1239 ms1211 ms
9 south.asinet.com (202.10.10.10) 1069 ms1087 ms1122 ms
10 backbone.vsnl.net.in (203.98.46.01) 1064 ms1109 ms1061 ms
11 newdelhi-01.backbone.vsnl.net.in (203.102.46.01) 1185 ms1146 ms1203 ms
12 newdelhi-00.backbone.vsnl.net.in (203.102.46.02) ms1159 ms1073 ms
13 mtnl.net.in (203.194.56.00) 1052 ms 642 ms 658 ms
So, the above shows us that the route taken by a data to reach the supplied IP is
somewhat like this:
Netzero (ISP from which the data is sent) --- Spectranet (A Backbone Provider) --
--- New York ISP ---New
York Backbone - Asia -- South Asia - India Backbone -- New Delhi
Backbone -- Another router in New
34 | P a g e
Delhi Backbone --- New Delhi ISP.
So, basically this tracert does reveal my real location, which is: New Delhi, India,
South Asia. Get it?

Sometimes, doing a ‘tracert’ on an IP, does not give useful information. You see in
the above example, the
hostnames returned revealed the city or country in which the system is located.
Although, more often than not, you
will get such helpful hostnames, sometimes the hostnames returned are very vague
and unhelpful.
So what do you do then? Well, fret not. Simply do the below procedure.
Let us say that the trace ends at the hostname abc.com. This is very vague and gives
absolutely no clue as to where
the system is located. However, what you could do is, launch your browser and visit:
http://www.abc.com/ Now, abc.
com is probably an ISP and an ISP, will definitely give its location and the cities in
which it operates. So, you could
still have a good chance of learning the definite city of the victim.
A very interesting utility is the VisualRoute utility, (http://www.visualroute.com/)
which traces a hostname or IP and
shows the path taken by the packet to reach the destination on a world map. It is very
useful and reveals some
excellent information. However, it sometimes does tend to be inaccurate.
**********************
HACKING TRUTH: Say you have found out the ISP of a person and simply want to
learn as to in which country the
person resides in. However, visiting the ISP website doesn’t help. Nor does the
hostname help. So, what do you do?
Well, one thing that you could do is, try connecting to Port 13 of the ISP. This is the
port, which simply displays the
system time. It will tell you how many hours ahead or behind the system is from
GMT time.
**********************
Well, this basically brings us to the end of this manual. Before I sign off, I would like
to make it clear that it
extremely difficult and surprising if someone is able to get the exact contact address
of a person by simply knowing
his IP. (Without taking help or breaking into the person’s ISP)

35 | P a g e
SEND YOUR ARTICLES TO PUBLISH…

TECHONLINE.BIZ.LY

WE ARE TECHONLINE GROUP

36 | P a g e
THE LOST WORLD OF ATLANTIS THAT
DROWNED IN THE DARKNESS
AVIK KHARA
Some claim it to be true while some say fiction. Whatever the case may be, stories of this land
continue to astonish people worldwide even today. The city here is none other than the majestic
Atlantis.

A vast island beautified by fresh orchards, breathtaking landscapes, enriched with precious
metals and alloys and inhabited by majestic elephants was described by Plato as paradise on
Earth. The city was arranged in five zones and was built in perfect concentric circles. The ports
were served with canals. It also had a great palace and a temple, covered with silver and gold.
The interior of the temple was ivory and walls, pillars and floors were coated with orchil. A
statue of the God was built with gold. This God, standing on a chariot with six winged horses has
been described as the God of the sea and Shaker of the Earth. He was worshipped by all
inhabitants

However as time passed by and as civilizations grew this pure land gradually became
diluted with malicious and greedy power and slowly defeated all its neighboring lands so
much so that no super power excepting Athens could stand against it.

37 | P a g e
However with time even Athens was defeated. It was said that God was disturbed by this
and Plato describes, “Afterwards there occurred violent earthquakes and floods; and in a
single day and night of misfortune… the island of Atlantis disappeared into the depths of
the sea as a punishment for their greed.”
It was 3500 years ago. The evening passed away. Night came. And with time the pleasant,
peaceful atmosphere changed into a turbulent, violent one. The sea changed its color. From
within the earth came muffling voices. The islanders grew worried. They thought that 5000 ft.
high volcano was about to erupt. They thought that the God controlling the violent forces of the
earth had awakened from the ling slumber. They did not know that those were just signs of a
great cataclysm. And that happened. Their whole civilization was destroyed.

First a dark smoke engulfed the entire island. Then a blitzkrieg of pumice stones
occurred. This was followed by ash which poured down heavily. A big bang occurred.
The great volcano erupted forming a crater of 37 miles. Into this gap rushed the sea water
and the great civilization finished, leaving behind no trace. That marked the end of
existence of a refined civilization and an even more refined nature’s gift to earth.
But end of Atlantis marked a new beginning of stories and histories behind this ever
inquisitive land. Some say it was a myth and claim this land as fiction but there are
evidences enough to prove that Atlantis did exist.
Plato’s story of Atlantis passed from generation to generation. The main source of Plato’s
story was his nephew Critias. And Critias claimed that he heard the story from his
grandfather – Dropides and the latter heard it from Solan, who was famous for his
truthfulness and was considered to be one of the wisest law givers and the seven sages of
Greece. Solan lived from 640 B.C. to 558 B.C. Plato wrote the story two centuries later.
Solan himself claimed that the story was not original. He heard it from a priest in Egypt.
Solan was so impressed with the story that he translated it into a poem in Greek. From
this account, it appears that the Egyptians knew about the Atlantis or perhaps trade
existed between them.
According to the oceanographers, of 20th century the 36 million sq. miles Atlantic shows
no evidence that a cataclysm ever took place and that there existed a continent. Although
12,500 miles long mountain range runs from north to south in the Atlantic Ocean, this in
no way could be remains of that Atlantis, as it is rinsing up at the place where Atlantis
should have subsided.
In 1912, the controversy again flared up. An article appeared in the newspaper – New
York American. The title of the article was how I found the lost Atlantis, the source of all
civilizations and the author was Dr. Paul Schliemann, grandson of the discoverer of Troy.

38 | P a g e
Dr. Paul claimed that he possessed some valuable documents and articles passed on by
his grandfather. Dr. Paul showed the bronze vase which was unearthed at Troy and which
bore the inscription: “This was the gift of Cronos, king of Atlantis”. Dr. Paul tried
earnestly to prove his evidence but nobody believed him.
Whatever be the case the myth or the history of Atlantis is still as enchanting as a fairy
tale and continues to create a charm of its enigma for all people interested in this long lost
earthly heaven.

REGULAR SECTIONS

TECH-VISION
El Chupacabra
El Chupacabra (Goat Sucker) is mostly associated with Latin American communities in
the USA, Mexico, and Puerto Rico (where it was first reported). It is supposedly a heavy
creature, the size of a small bear, with a row of spines reaching from the neck to the
base of the tail and it takes its name from the fact that it is supposed to attack animals
and drink their blood – especially goats.
While the legend began around 1987, there are many similarities to the Vampire of

39 | P a g e
Moca, the name given to an unknown creature to killed animals all over the small town
of Moca in the 1970s. The vampire of Moca left the animals completely devoid of blood
which had apparently been removed by a series of small circu
circular cuts.
The most common description of Chupacabra is a lizardlizard-like
like being, appearing to have
leathery or scaly greenish-gray
gray skin and sharp spines or quills running down its back.
This form stands approximately 3 to 4 feet (1 to 1.2 m) high, and stands an andd hops in a
similar fashion to a kangaroo. In at least one sighting, the creature hopped 20 feet (6 m).
This variety is said to have a dog or panther
panther-like
like nose and face, a forked tongue
protruding from it, large fangs, and to hiss and screech when alarmed, as well as leave a
sulfuric stench behind. When it screeches, some reports note that the chupacabra’s
eyes glow an unusual red, then give the witnesses nausea. For some witnesses, it was
seen with bat-like wings.

Nanotechnology: The Technology for De


Device
vice Size
Miniaturization

The consumer markets have always been attracted to high performance electronic
devices in smaller size and as a result of this, the manufacturing of common electronic
equipment such as computer, mobile phone and audioaudio-visual units
its has been

40 | P a g e
experiencing phenomenal growth with rapidly increasing performance and size
miniaturization. Nanotechnology is the technology which makes materials very much
smaller than they are at present.

The term ‘nano’ came into frequent use in the early 1990s in scientific and industrial
research. Until then the more general terms ‘submicron’ and ‘ultra fine’ were used to
define the smaller particles. One nanometer is one billionth of a meter i.e. 10-9 m.
Nanoparticles are materials possessing micro-structural dimensions less than 100 nm.
The increased importance of nanomaterials is a result of the unique properties that can
be obtained and the applications that result from such nanostructuring. Scientists and
engineers at various universities, national labs and industries invented new types of
electronic devices, circuits and magnetic storage media that have dimensions of the
order of nanometers. The small size of nanoparticles, which is responsible for different
properties (optical, magnetic, structural, electrical and electronic), with respect to the
bulk materials makes them suitable for new applications. These materials manifest
fascinating and useful properties which can be exploited for a variety of applications in
electronic device fabrication (sensors, light emitting diodes, compact discs, and next
generation computer chips).

Since the discovery of carbon nanotubes in 1991, numerous nanofabrication techniques


have been reported for the production of nanowires, nanorods and nanofibers. The
physical and chemical properties of nanomaterials are different from the bulk materials
of the same molecular structure. One of the basic concepts of the science of solids is the
insight that most properties of solids depend on the microstructure i.e. chemical
composition, the arrangement of atoms and the size of the solid. If there is change in
one or any of these parameters, the properties of the solid vary. Nanoparticles can be
considered as a state of matter in the transition region between bulk solids and
molecular structures. The physical and chemical properties gradually change from
molecular to bulk with increasing particle size.

There are a few limitations associated with this nanotechnology. Most of the materials
and devices produced are in the small scale laboratory environment. One of the main
challenges is the bulk (industrial scale) production of these materials. Special
measurement techniques and high resolution instruments are required to characterize
these materials. Even if these major hurdles are overcome in many countries, the
benefits of the technology would have to outweigh the expenses in making changes in
the current manufacturing process.

Nanotechnology thus holds tremendous potential to improve our quality of life in the near
future by offering high performance devices in small dimension.

Shenaz rehman

41 | P a g e
Loch Ness Monster

The Loch Ness Monster is a legendary animal that supposedly resides in the

depths of Loch Ness, a long narrow lake situated in


rural Scotland. Stories concerning the monster date back to the 6th century
A.D. The region was in complete isolation until a road was built alongside the
lake in 1933. Then large numbers of people travelled through the region for the
very first time. Over the years thousands have reported seeing something in the
lake. Most reports depict a long neck surging from the water with a small head
of a unknown creature. Pictures have even been taken of this "creature", but
most scientists however, refuse to believe any creature of this kind lives in the
Loch Ness. They claim that most reported cases are simply products of
overactive imaginations, and as for the pictures, scientists say they are not lucid
enough to distinguish items clearly, and some pictures are dubbed as "fake". A
large number of non- scientists believe however, that the Loch Ness is the site
of a breeding colony of large unknown aquatic animals, due to the fact that
Loch Ness was once an arm of the sea. Yearly summer investigations have
been conducted since 1963 in attempt to unravel the mystery. Investigators
have obtained films that indicate that there just might be some unknown animal
in the depths of the Loch Ness. Evidence however, is inconclusive, and the
controversy continues.
ANIK CHAKRABORTY

42 | P a g e
The quantum vacuum —the next technology
revolution.

It turns out that the quantum vacuum may produce usable energy. In a perfect
vacuum, virtual particles are constantly being created and destroyed. Now
some quantum physicists believe it may be possible to harness the energy of
these virtual particles, without violating the Second Law of Thermodynamics.
So we are on the verge of a new technological revolution that will unify energy
production, computation and communications in a single quantum-based
technology.

The Second Law of Thermodynamics says that you have to return any energy
you borrow from the universe -- it's not possible to get a "net positive energy
gain." But what if there is an infinite amount of energy in the universe, rather
than a finite quantity? A stealth venture has begun that is seeking to build a
device that can tap this so-called "zero point energy" based on these ideas.
What's interesting about all this is the potential for a "Grand Unified
Technology" -- a single technology for generating energy, computing, and
communication. Energy is created using the zero point fields; computing takes
place via quantum computing; communication takes places using quantum
encryption and/or non-local quantum correlations (EPR). Propulsion could
also be enabled by the same quantum level technology. This would give us
infinite amounts of energy at near perfect efficiency, combined with the
capability to do infinite computations in finite time, and the ability to conduct
perfectly secure light-speed or even faster-than-light communications.
Companies such as MagiQ are already rolling out commercial quantum
communications networks (albeit light-speed, but it's a good start!). Several
projects, including MagiQ, are also working on quantum computing and
commercial devices are expected to be available in 30 years or less. As for ZPE
energy production from the quantum vacuum, we are on the verge of it. The
commercial devices will be launched in next 15 years or even less.

Tanuj gyan

43 | P a g e
MOBILE BUG
These days the mobile phones are being used by the anti-social elements for all cunning
purposes such as cheating in examination hall, or to record the conversation of a
confidential meeting; it is even being used as a spy tool and for unauthorized video
transmission etc.

So here we present pocket sized handy mobile phone detector that can sense the
presence of a mobile phone from a distance of one and half meters. The circuit can
detect both incoming and outgoing calls, SMS and even video transmission if mobile
phone is kept in silent mode.

Here the capacitor (C3) acts as a small gigahertz loop antenna to collect RF signals from
the mobile phone (the lead length of capacitor has to be fixed as 18mm along with a
spacing of 8mm between the leads to get the desired frequency.)

44 | P a g e
TRICKS & TIPS

• NOTEPAD "world trade centre trick"..

Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.

• Disabling Display Of Drives In My Computer

Have you ever thought, if you click on MY COMPUTER and none of your local and
networked drives are visible? Where is your data; where did all the files go?? Game
Over!!

Well I will say that the game is still not over; this is a simple trick based on editing of
registry that one of your friends may have played on you. If you want to play same
prank on some of your pals……….

FIRST APPROACH:

Go to start->run-> regedit

45 | P a g e
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer

Now in the right pane create new DWORD item and name in NoDrives. Now modify its
value and set it to 3FFFFFF (Hexadecimal). Now press F5 to refresh. When you click on
My Computer, no drives will be displayed. To enable the display of drives again, simply
delete this DWORD item. Just restart your computer in case the trick does not work.

SECOND APPROACH:

The easiest way with Win XP is to use the TweakUI power toy from Mcft. Go to
Start/Run and type in "tweakui" (without the quotes).

Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click


"Apply" or "OK" when finished.

If you have XP but not Tweak UI you can download it here...

http://www.Mcft.com/windowsxp/downloads/powertoys/xppowertoys.mspx

• How to hide important information in an image


file?

1. First of all, you need to save your information in a text file and then prepare an image
(either jpeg or bitmap format). In this example, i will user secret.txt as my text file and
photo.jpg as my image file.

46 | P a g e
2. Put the text document and image together. Here, i put them in my C: drive.

3. Go to Run, the type cmd. This will bring you to the command prompt.

4. Now, type cd\ to go to the root. In this case, the root is C:. You can proceed to the
next step if you save your image and text file in C: drive. But, if you save them in other
folder, such as c:\testing, you need to type cd\testing to go into the folder.

5. Now, you reach the most important part. Type copy photo.jpg/B+secret.txt/B
output.jpg. The image file need to come first. If you put your text file before image file,
the output image file maybe cannot open properly. Beside this, the input image and
output image must be same format (either both in jpeg or both in bitmap).

6. Now, try to open the output.jpg using any image viewer. Looks no different with
photo.jpg right?

7. Now, try to open output.jpg using notepad, you will found the secret.txt contents
inside.

ANIK CHAKRABORTY (MODERATOR)

TECH-CHECK

Ultra small Agent HD Video Recording


Camera

47 | P a g e
Ultra small, unique and delicately designed -
this way we can characterize this gadget. Agent Cam HD Video Recording camera is
a usefulgadget in many situation when is necessary to have some memories
recorded. Any records could be made and saved. Time with family, business
meetings, sport events, outdoor activity, evidence collector, securityaim - only are
few useful clues where Agent Cam HD will be useful. This small high resolution DVR
cam allows to record up to 6 hours of video.

Micro Mini DVR cam is a universal miniaturized piece to carry it anywhere. Reliable
construction made from metal and glass, with USB port and Led indicator. Plug and
play option for Windows or later editions. Micro Mini Cam is compatible with Windows
98SE / ME / 2000 / Vista / XP. Gadget dimension: 50mm x 50mm x 15mm (LxWxD).

Specification:

- Model name: HS-WDVR01 Watch DVR


- Memory: 2 GB MicroSD in included
- Format: AVI (640*480), 15ÀÇÑ
- MIC: built-in
- Power source: integrated battery that is recharged directly via USB port or
withcharger.
- Display mode: Analog 12 hours (hour, minute, second)

This Micro Mini DVR cam is a universal miniaturized piece to carry it anywhere.
Reliable construction made from metal and glass, with USB port and Led indicator.
Comes with all necessary set of functions to record video.

48 | P a g e
Chariot Skates: Carbon Fiber Bicycle Wheels
That Attach To Your Feet

Oh brother. When Rollerblades hit in the 90s it was as if the Roller Skate had never been
invented until the day of their release. I was just a tween at the time but Rollerblades (the
brand not the product) showed up in my home town with a mini van full of the skates and let
folks try them out for free. It worked, because I ended up buying a few pairs.
While I don’t think the Chariot Skates will ever catch on with the same fervor, the carbon fiber
constructed skates appear to be a more practical mode of transportation due to the relatively
large wheels which should provide greater speeds, inertia and less pushing. Of course, to get
them moving it might take a bit more energy than the average Rollerblade wheel.
Right now the Chariot Skates are in preproduction testing and due out any day now. Check the
video after the ‘leap’ for their test videos.

49 | P a g e
The Google Phone May Be Coming Soon

Now here’s an exciting picture for you, folks–what you’re seeing right there is a shot of the
Google Phone, the Nexus One. Pics of this thing have been leaking like a sieve to the web at
large and initial reports are conflicting at best.
Google employees, of course, are operating under STRICT agreements not to talk specs–if they
actually say anything even related to specs their firstborn children vanish in a puff of smoke,
and if they don’t have any children, well, something ELSE vanishes instead. Okay, that’s just a
joke, but still–the Google crew may be contractually forbidden from saying word one, but that
didn’t stop the blogosphere! In fact, a San Francisco blogger named Cory O’ Brien got one of
these fellas and clames that it’s basically an iPhone but with a slightly larger screen and a
scroll wheel. PC World, however, was underwhelmed.
And naturally, the whole thing runs on Google’s own OS, Android. Admittedly that was pretty
much a given, but still. Look for this one to launch possibly in 2010, and keep it here for all
the latest details on the Nexus One!

RAHUL KUMAR (moderator)

50 | P a g e
ROBOTIX

introduction:
introduction:

Components:
Motor:
The basic thing behind manual robotics is the direction of
rotation of motor. If the motor rotates clockwise for the
current flowing from left to right, then the direction of it’s
rotation will be opposite for opposite direction of flow of
current. We use dc motor here. It is of different rpm’s, such as
10rpm,15rpm,30rpm, 200rpm, even 500 rpm(The rpm, will be in the
ratio of the applied voltage, e.g. a 200 rpm,12volt DC motor will rotate in
400rpm when applied to24 volt DC).it is better to use within limiting
voltage. A motor with less rpm, will produce much torque, and
the higher rpm motor will produce less torque.
There are 2 types of motor generally : 1>Stepper Motor
and 2> Geared Motor. We normally use geared Motor for our
purpose.

51 | P a g e
A dc motor

Catcher Plug:
It is a 6-pin plug, which is used to change the orientation of
movement of motor by a single movement.Dpdt (Double Pole Double
Throw)is also of this type and the functioning is also the same.
Functionaning:
The middle pins 3 & 4 are connected to the two terminals of
battery as shown. While one set of the other pins [either (1 & 2)
or (5 & 6)] are connected to two terminals of motor.
Say, (1 & 2) are connected to the two terminals of motor.
Functioning of catcher plug is such that, at a time either pins (1 &
2) are connected to (3 & 4) or pins (5 & 6) are connected to (3 & 4).
By the help of cross connection of wires as shown, the
orientation of movement of motor gets reversed by switching the
plug.

52 | P a g e
The dpdts available in the market are of two types on-off dpdt
(having 2 position + and -)and on-off-on dpdt(having 3 positions +,
neutral and -) . If we use on-off-on dpdt , then we does not need any
Push Button associated with it ever. If we are using it for such a
purpose where we need to pause then only the neutral position is
required, otherwise it is not required.

53 | P a g e
54 | P a g e
Sliding
Dpdt
Different catcher plug and dpdts

Push Button: It is a 2 pin switch, with a button. It is


connected in series in between any connecting wire. When we
push the button, the connecting wires attached to its pin gets
connected, hence the circuit gets completed.

Push button

In case of push button associated with catcher plug, the circuit


will be like the following diagram, otherwise it will be simply
connected with the 2 terminals of motor.

55 | P a g e
Multi-
Multi-chord wire:
This type of wire will be helpful if you are using a wired remote
control. Each wire on the array is of different color and it
helps to identify the source and destination of the wire.

Gear Box and track belt:

56 | P a g e
Gear boxes are used to increase/decrease rpm of motor
and to control the torque applied. They are also useful when we
need to drive two wheels at exactly same angular velocity and in
the same plane.

gear box track belt


Propeller:
If the bot goes in water, Then we need propellers for it’s
movement. Vcd fans can serve as good propellers, but they are
not reliable in long run.

57 | P a g e
Off-
Off-road wheels:
For the movement of robot in land, available in different
suitable size in the market. It will be connected with the shaft of
the motor and rotate with the rotation of that motor.

Small robot wheels ball caster

(servo wheels) (used as a free wheel)

58 | P a g e
Main Concept behind a
simple robot capable
for moving in 2-
2-
Dimension:

Say, when wheels rotate in clockwise direction, the bot


will move in the forward direction. So, when both the wheels
move in clockwise direction, the bot will move in the backward
direction.
To turn the bot in right direction, we rotate the right
wheels in anti-clockwise direction, while left wheels rotate in
clockwise direction. This generates a torque to the bot forcing
it to turn in right direction.
In this mechanism, the bot turns fast, it is called HARD TURN.
There is also another way for rotating in right direction, when
only the left motor(s) of the bot rotate clockwise, then it takes
more time(compared to HARD TURN) to rotate, it is called SIMPLE
TURN.it will proceed a small distance forward also in this
rotation.

To turn the bot in left direction, we rotate the left wheels


in anti-clockwise direction, while right wheels rotate in
clockwise direction. This generates a torque to the bot forcing
it to turn in left direction.

In this mechanism, the bot turns fast, it is called HARD TURN.


There is also another way for rotation in left direction, when
only the right motor(s) of the bot rotate clockwise, then it takes
more time(compared to HARD TURN) to rotate, it is called SIMPLE
TURN.it will proceed a small distance forward also in this
rotation.

Design of circuit for


simple 2d movement:
The connection will be as per the following diagram.

There will be 2 different catcher plugs for two different side


(i.e. for the motor(s) of left side, there will be 1 catcher plug and
for the motor(s), there will be another catcher plug).

59 | P a g e
If there are multiple motors on each side, then the connection
of all the motors of same side will be similar.

To make the bot forward/backward moving (or in case of HARD


TURN), we have to use both the catcher plug. In case of simple
turn, we have to use one catcher plug depending on the side of
rotation. Similar biasing of catcher plugs will leads to
forward/backward movement, whereas opposite biasing will
leads to rotation.
TO BE CONTINUED…..
MAYUKH CHAKRABORTY (MODERATOR)

ANIK CHAKRABORTY (MODERATOR)

60 | P a g e
ETHICAL HACKING
Chapter 1: Setting the stage.
Before you can start to hack systems you need a platform to work from. This platform must be stable and
not easily traceable. How does one become anonymous on the Internet? It's is not that easy. Let us look at
the
- 5 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost] different options
(BTW if this chapter does not seem relevant you might want to skip it):

Permanent connection (leased line, cable, fiber)


The problem with these connections is that it needs to be installed by your local Telecom at a premise where
you are physically located. Most ISPs wants you to sign a contract when you install a permanent line, and
ask for identification papers. So, unless you can produce false identification papers, company papers etc.,
and have access to a building that cannot be directly tied to your name, this is not a good idea.

Dial-up
Many ISPs provides "free dial-up" accounts. The problem is that logs are kept either at the ISP, or at
Telecom of calls that were made. At the ISP side this is normally done using RADIUS or TACACS. The
RADIUS server will record the time that you dialed in, the connection speed, the reason for disconnecting,
the time that you disconnected and the userID that you used. Armed with his information the Telecom can
usually provide the source number of the call (YOUR number). For the Telecom to pinpoint the source of the
call they need the destination number (the number you called), the time the call was placed and the duration
of the call. In many cases, the Telecom need not be involved at all, as the ISP records the source number
themselves via Caller Line Identification (CLI).
Let us assume that we find the DNS name "c1-pta-25.dial-up.net" in our logs and we want to trace the
attacker. We also assume that the ISP does not support caller line identification, and the attacker was using
a compromised account. We contact the ISP to find out what the destination number would be with a DNS
name like that. The ISP provides the number - e.g. +27 12 664 5555. It's a hunting line - meaning that there
is one number with many phone lines connected to it. We also tell the ISP the time and date the attack took
place (from our logs files). Let us assume the attack took place 2000/8/2 at 17h17. The RADIUS server tells
us what userID was used, as well as the time it was connected: (these are the typical logs)
6774138 2000-08-02 17:05:00.0 2000-08-02 17:25:00.0 demo1 icon.co.za 168.209.4.61 2 Async 196.34.158.25
52000 1248 00010 B6B 87369 617378 null 11
These logs tell us that user "demo1" was connected from 17h05 to 17h25 on the date the attack took place.
It was dialing in at a speed of 52kbps, it send 87369 bytes, and received 617378 bytes. We now have the
start time of the call, the destination number and the duration of the call (20 minutes). Telecom will supply us
with source number as well as account details - e.g. physical location. As you can see, phoning from your
house to an ISP (even using a compromised or free ID) is not making any sense.

Mobile (GSM) dial-up


Maybe using a GSM mobile phone will help? What can the GSM mobile service providers extract from their
logs? What is logged? A lot it seems. GSM switches send raw logging information to systems that crunch
the data into what is called Call Data Records (CDRs). More systems crush CDRs in SCDRs (Simple CDR).
The SCDRs is sent to the various providers for billing. How does a CDR look like? Hereby an example of a
broken down CDR:
99042300000123000004018927000000005216003
27834486997
9903220753571830
834544204
000001MOBILE000
0000001000000000000000000

61 | P a g e
- 6 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost] AIRTIME1:24
20377
UON0000T11L
MTL420121414652470
This tells us that date and time the call was placed (1st string), the source number (+27 83 448 6997), the
destination number (834544204), that it was made from a mobile phone, the duration of the call (1 minute 24
seconds), the cellID (20377), the three letter code for the service provider (MTL = Mtel in this case), and the
unique mobile device number (IMEI number) 420121414652470. Another database can quickly identify the
location (long/lat) of the cell. This database typically looks like this:
20377
25731
-26.043059
28.011393
120
32
103
"Didata Oval uCell","Sandton"
From this database we can see that the exact longitude and latitude of the cell (in this case in the middle of
Sandton, Johannesburg) and the description of the cell. The call was thus placed from the Dimension Data
Oval in Sandton. Other databases provide the account information for the specific source number. It is
important to note that the IMEI number is also logged - using your phone to phone your mother, switching
SIM cards, moving to a different location and hacking the NSA is not a good idea using the same device is
not bright - the IMEI number stays the same, and links you to all other calls that you have made. Building a
profile is very easy and you'll be nailed in no time.
Using time advances and additional tracking cells, it is theoretically possible to track you up to a resolution of
100 meters, but as the switches only keep these logs for 24 hours, it is usually done in real time with other
tracking devices - and only in extreme situations. Bottom line - even if you use a GSM mobile phone as
modem device, the GSM service providers knows a lot more about you than you might suspect.

How to
So how do we use dial in accounts? It seems that having a compromised dial in account does not help at all,
but common sense goes a long way. Suppose you used a landline, and they track you down to someone
that does not even owns a computer? Or to the PABX of a business? Or to a payphone? Keeping all of
above in mind - hereby a list of notes: (all kinda common sense)
Landlines:
1. Tag your notebook computer, modem and croc-clips along to a DP (distribution point). These are
found all around - it is not discussed in detail here as it differs from country to country. Choose a
random line and phone.
2. In many cases one can walk into a large corporation with a notebook and a suit with no questions
asked. Find any empty office, sit down, plug in and dial.
3. etc...use your imagination

GSM:
1. Remember that the device number (IMEI) is logged (and it can be blocked). Keep this in mind! The
ultimate would be to use a single device only once. - never use the device in a location that is
linked to you (e.g. a microcell inside your office)

- 7 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost]
2. Try to use either a very densely populated cell (shopping malls) or a location where there is only one
tracking cell (like close to the highway) as it makes it very hard to do spot positioning. Moving
around while you are online also makes it much harder to track you down.
3. Use prepaid cards! For obvious reasons you do not want the source number to point directly to you.
Prepaid cards are readily available without any form of identification. (note: some prepaid cards
does not have data facilities, so find out first)
4. GSM has data limitations - currently the maximum data rate is 9600bps.

62 | P a g e
Using the 'net
All of this seems like a lot of trouble. Is there not an easier way of becoming anonymous on the Internet?
Indeed there are many ways to skin a cat. It really depends on what type of connectivity you need. Lets
assume all you want to do is sending anonymous email (I look at email specifically because many of the
techniques involved can be used for other services such as HTTP, FTP etc.). How difficult could it be?
For many individuals it seems that registering a fake Hotmail, Yahoo etc. account and popping a flame email
to a unsuspected recipient is the way to go. Doing this could land you in a lot of trouble. Lets look at a
header of email that originating from Yahoo:
Return-Path: <r_h@yahoo.com>
Received: from web111.yahoomail.com (web111.yahoomail.com [205.180.60.81])
by wips.sensepost.com (8.9.3/1.0.0) with SMTP id MAA04124
for <roelof@sensepost.com>; Sat, 15 Jul 2000 12:35:55 +0200 (SAST)
(envelope-from r_h@yahoo.com)
Received: (qmail 636 invoked by uid 60001); 15 Jul 2000 10:37:15 -0000
Message-ID: <20000715103715.635.qmail@web111.yahoomail.com>
Received: from [196.34.250.7] by web111.yahoomail.com; Sat,
15 Jul 2000 03:37:15 PDT
Date: Sat, 15 Jul 2000 03:37:15 -0700 (PDT)
From: RH <r_h@yahoo.com>
Subject: Hello
To: roelof@sensepost.com
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
The mail header tells us that our mailserver (wips.sensepost.com) received email via SMTP from the web-
enabled mailserver (web111.yahoomail.com). It also tells us that the web-enabled mailserver received the
mail via HTTP (the web) from the IP number 196.34.250.7. It is thus possible to trace the email to the
originator. Given the fact that we have the time the webserver received the mail (over the web) and the
source IP, we can use techniques explained earlier to find the person who was sending the email. Most free
web enabled email services includes the client source IP (list of free email providers at www.fepg.net).
How to overcome this? There are some people that think that one should be allowed to surf the Internet
totally anonymous. An example of these people is Anonymizer.com (www.anonymizer.com).
Anonymizer.com allows you to enter a URL into a text box. It then proxy all connections to the specified
destination. Anonymizer claims that they only keep hashes (one way encryption, cannot be reversed) of
logs. According to documentation on the Anonymizer website there is no way that even they can determine
your source IP. Surfing to Hotmail via Anonymizer thus change the IP address in the mail header.
But beware. Many ISPs make use of technology called transparent proxy servers. These servers is normally
located between the ISP's clients and their main feed to the Internet. These servers pick up on HTTP
requests, change the source IP to their own IP and does the reverse upon receiving the return packet. All of
this is totally transparent to the end user - therefor
- 8 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost] the name. And the
servers keep logs. Typically the servers cannot keep logs forever, but the ISP could be backing up logs for
analyses. Would I be tasked to find a person that sent mail via Hotmail and Anonymizer I would ask for the
transparent proxy logs for the time the user was connected to the web-enabled mailserver, and search for
connections to Anonymizer. With any luck it would be the only connections to the Anonymizer in that time
frame. Although I won't be able to prove it, I would find the source IP involved.
Another way of tackling the problem is anonymous remailers. These mailservers will change your source IP,
your <from> field and might relay the mail with a random delay. In many cases these remailers are daisy
chained together in a random pattern. The problem with remailers is that many of them do keep logs of
incoming connections. Choosing the initial remailer can be become an art. Remailers usually have to
provide logfiles at the request of the local government. The country of origin of the remailer is thus very
important as cyberlaw differs from country to country. A good summary of remailers (complete with listings
of remailers can be found at www.cs.berkeley.edu/~raph/remailer-list.html).
Yet another way is to make use of servers that provide free Unix shell accounts. You can telnet directly to
these servers (some provide SSH (encrypted shells) access as well). Most of the free shell providers also
provide email facilities, but limit shell capabilities -e.g. you can't telnet from the free shell server to another
server. In 99% of the cases connections are logged, and logs are kept in backup. A website that list most

63 | P a g e
free shell providers are to be found at www.leftfoot.com/freeshells.html. Some freeshell servers provider
more shell functionality than others - consult the list for detailed descriptions.
How do we combine all of the above to send email anonymously? Consider this - I SSH to a freeshell server.
I therefor bypass the transparent proxies, and my communication to the server is encrypted and thus
invisible to people that might be sniffing my network (locally or anywhere). I use lynx (a text based web
browser) to connect to an Anonymizer service. From the Anonymizer I connect to a free email service. I
might also consider a remailer located somewhere in Finland. 100% safe?
Even when using all of above measures I cannot be 100% sure that I cannot be traced. In most cases logs
are kept of every move you make. Daisy chaining and hopping between sites and servers does make it hard
to be traced, but not impossible.

Other techniques
1. The cybercafe is your friend! Although cybercafes are stepping up their security measures it is still
relatively easy to walk into a cybercafe without any form of identification. Sit down, and surf to
hotmail.com - no one would notice as everyone else is doing exactly the same thing. Compose
your email and walk out. Do not become a regular! Never visit the scene of the crime again. When
indulging in other activities such as telnetting to servers or doing a full blast hack cybercafes should
be avoided as your activity can raise suspicion with the administrators.
2. Search for proxy like services. Here I am referring to things like WinGate servers. WinGate server
runs on a Microsoft platform and is used as a proxy server for a small network (read SOHO
environment with a dial-up link). In many cases these servers are not configured correctly and will
allow anyone to proxy/relay via them. These servers do not keep any logs by default. Hoping via
WinGate servers is so popular that lists of active WinGates are published
(www.cyberarmy.com/lists/wingate/).
3. With some experience you can hop via open routers. Finding open routers are very easy - many
routers on the Internet is configured with default passwords (list of default passwords to be found at

- 9 - Breaking into computer networks from the Internet [Roelof Temmingh & SensePost]
www.nerdnet.com/security/index.php )Doing a host scan with port 23 (later more on this) in a "router
subnet" would quickly reveal valid candidates. In most of the cases these routers are not configured
to log incoming connections, and provides excellent stepping-stones to freeshell servers. You might
also consider daisy chaining them together for maximum protection.
4. Change the communication medium. Connect to a X.25 pad via a XXX service. Find the DTE of a
dial-out X.25 PAD. Dial back to your local service provider. Your telephone call now originates from
e.g. Sweden. Confused? See the section on X.25 hacking later in the document. The exact same
principle can be applied using open routers (see point 3) Some open routers listens on high ports
(typically 2001,3001,X001) and drops you directly into the AT command set of a dial-out modems.
Get creative.

The best way to stay anonymous and untraceable on the Internet would be a creative mix of all of the
above-mentioned techniques. There is no easy way to be 100% sure all of the time that you are not
traceable. The nature of the "hack" should determine how many "stealth" techniques should be used. Doing
a simple portscan to a university in Mexico should not dictate that you use 15 hops and 5 different mediums.

TO BE CONTINUED[.
JOYDEEP ROY (MODERATOR)

64 | P a g e
SECTION OF THE MONTH

THE SIXTH SENSE TECHNOLOGY


Pranav Mistry
Fluid Interfaces Group | MIT Media Lab

DRAWING ON A WALL ?? WATHING LIVE NEWS ON NEWSPAPER??

EVERYTHING AT YOUR FINGER TIPS

65 | P a g e
S
' ixth Sense' is a wearable gestural interface that augments the physical world around us
with digital information and lets us use natural hand gestures to interact with that
information.

We've evolved over millions of years to sense the world around us. When we encounter
something, someone or some place, we use our five natural senses to perceive
information about it; that information helps us make decisions and chose the right actions
to take. But arguably the most useful information that can help us make the right decision
is not naturally perceivable with our five senses, namely the data, information and
knowledge that mankind has accumulated about everything and which is increasingly all
available online. Although the miniaturization of computing devices allows us to carry
computers in our pockets, keeping us continually connected to the digital world, there is
no link between our digital devices and our interactions with the physical world.
Information is confined traditionally on paper or digitally on a screen. SixthSense bridges
this gap, bringing intangible, digital information out into the tangible world, and allowing
us to interact with this information via natural hand gestures. ‘SixthSense’ frees
information from its confines by seamlessly integrating it with reality, and thus making
the entire world your computer.

The SixthSense prototype is comprised of a pocket projector, a mirror and a camera. The
hardware components are coupled in a pendant like mobile wearable device. Both the
projector and the camera are connected to the mobile computing device in the user’s

66 | P a g e
pocket. The projector projects visual information enabling surfaces, walls and physical
objects around us to be used as interfaces; while the camera recognizes and tracks user's
hand gestures and physical objects using computer-vision based techniques. The software
program processes the video stream data captured by the camera and tracks the locations
of the colored markers (visual tracking fiducials) at the tip of the user’s fingers using
simple computer-vision techniques. The movements and arrangements of these fiducials
are interpreted into gestures that act as interaction instructions for the projected
application interfaces. The maximum number of tracked fingers is only constrained by
the number of unique fiducials, thus SixthSense also supports multi-touch and multi-user
interaction.

The SixthSense prototype implements several applications that demonstrate the


usefulness, viability and flexibility of the system. The map application lets the user
navigate a map displayed on a nearby surface using hand gestures, similar to gestures
supported by Multi-Touch based systems, letting the user zoom in, zoom out or pan using
intuitive hand movements. The drawing application lets the user draw on any surface by
tracking the fingertip movements of the user’s index finger. SixthSense also recognizes
user’s freehand gestures (postures). For example, the SixthSense system implements a
gestural camera that takes photos of the scene the user is looking at by detecting the
‘framing’ gesture. The user can stop by any surface or wall and flick through the photos
he/she has taken. SixthSense also lets the user draw icons or symbols in the air using the
movement of the index finger and recognizes those symbols as interaction instructions.
For example, drawing a magnifying glass symbol takes the user to the map application or
drawing an ‘@’ symbol lets the user check his mail. The SixthSense system also
augments physical objects the user is interacting with by projecting more information
about these objects projected on them. For example, a newspaper can show live video
news or dynamic information can be provided on a regular piece of paper. The gesture of
drawing a circle on the user’s wrist projects an analog watch.

The current prototype system costs approximate $350 to build.

67 | P a g e
TECHONLINE VIEW

Sixth Sense Technology May Change How


We Look at the World Forever

Basically, Sixth Sense is a mini-projector coupled with a camera and a cellphone—


which acts as the computer and your connection to the Cloud, all the information stored
on the web. Sixth Sense can also obey hand gestures, like in the infamous Minority
Report.

However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth
Sense can do its magic—and a lot more—everywhere, even while you are jumping
hysteric over Oprah's sofa.

The camera recognizes objects around you instantly, with the micro-projector overlaying
the information on any surface, including the object itself or your hand. Then, you can
access or manipulate the information using your fingers. Need to make a call? Extend
your hand on front of the projector and numbers will appear for you to click. Need to
know the time? Draw a circle on your wrist and a watch will appear. Want to take a
photo? Just make a square with your fingers, highlighting what you want to frame, and
the system will make the photo—which you can later organize with the others using your
own hands over the air.

But those are just novelty applications. The true power of Sixth Sense lies on its potential
to connect the real world with the Internet, and overlaying the information on the world
itself. Imagine you are at the supermarket, thinking about what brand of soap is better. Or
maybe what wine you should get for tonight's dinner. Just look at objects, hold them on
your hands, and Sixth Sense will show you if it's good or bad, or if it fits your preferences
or not.

Now take this to every aspect of your everyday life. You can be in a taxi going to the
airport, and just by taking out your boarding pass, Sixth Sense will grab real time
information about your flight and display it over the ticket. You won't need to do any
action. Just hold it in front of your and it will work.

68 | P a g e
The key here is that Sixth Sense recognizes the objects around you, displaying
information automatically and letting you access it in any way you want, in the simplest
way possible.

Clearly, this has the potential of becoming the ultimate "transparent" user interface for
accessing information about everything around us. If they can get rid of the colored finger
caps and it ever goes beyond the initial development phase, that is. But as it is now, it
may change the way we interact with the real world and truly give everyone complete
awareness of the environment around us.

ANIK CHAKRABORTY

TECHONLINE.BIZ.LY

69 | P a g e
THANK YOU

70 | P a g e

You might also like