XP antivirus 2011

XP Anti-Virus 2011 or also known as Vista Anti-virus 2011 and Win 7 Anti-virus 2011 is a rogue program that will be installed on multiple operating system.

XP Antivirus

What's new in Google's Android 2.3 Gingerbread?

Part of the fun of owning an Android phone is receiving the updates -- you never know what new treats will arrive when one appears on your phone, like Santa coming down the chimney on Christmas Eve


Lenovo ThinkPad X1

Slimmer than Kate Moss after a month on the Slender diet is Lenovo’s gorgeous ThinkPad X1 laptop, details of which have just shimmied on to the InterWebs

Lenovo Thinkpad

Evolution of Cell Phone

Cell phones have evolved immensely since 1983, both in design and function

Evolution of Cell Phone

Samsung Galaxy S2 Review

The Samsung Galaxy S2 brings the Power of Love Samsung's history in the smartphone game has been pretty quiet – a few budget offerings, some false starts with Windows Mobile and the popular Galaxy S is pretty much it

Samsung Galaxy S2 Review

Wednesday, November 24, 2010

Motivation of the Day:21 years OLD CEO

Vineet Kumar, CEO, National Anti-Hacking Group

His claim to fame, however, stems from the fact that his organisation endeavours to reduce cyber crime.
He gives lectures to officers of the Indian Army and Indian corporates on how to safeguard their networks and the Internet infrastructure backbone from potential raids by malicious cyber hackers.
As a mark of appreciation, Microsoft Corporation chairman Bill Gates [Images] invited him to the launch of Biztalk servers in India in 2006.
Meet Vineet Kumar, the founder and CEO of the Global Ethical Hackers Association (GEHA) and the National Anti-hacking Group (NAG); the latter is a non-government organisation which 10,000 hackers have joined as members since its inception back in 2003).
Vineet and these NAG members belong to a category of hackers that take pride in calling themselves 'whitehat hackers' These are ethical individuals who are opposed to the abuse of computer systems by malicious hackers known as 'blackhats'.
Interestingly, despite his expertise in a field as arcane as hacking, Vineet has had no formal training in his trade. He was attracted to computers as a child and managed to get the hang of surfing the Internet and chatting online. During one such session in an online chatroom, he met his mentor, who he refuses to name.
"He was a 'greyhat' hacker," reminisces Vineet. "He was based out of Chicago and gave me hacking lessons over IRC (Internet Relay Chat)."
How does Vineet know that his mentor was somebody based out of Chicago?
"I used some of the techniques he taught me on him," chuckles Vineet, explaining that one can obtain the IP address (Internet Protocol address) of a machine without its owner knowing. "I did it for fun and to know if it actually works."
It's hardly surprising, then, to learn that this mischievous streak caused Vineet's teachers to brand him 'naughtiest kid in school' back when he attended the Army High School in Ranchi, his hometown. By his own admission, he misses those school days. Today he is pursuing a four-year course in Information Technology and Infrastructure Management Services, ITIMs, from Sikkim Manipal University.
Vineet spoke to rediff.com's Prasanna D Zore about ethical hacking, his responsibilities as CEO of GEHA and NAG and the pressure of handling such a career while he is still in his teens.
So you are an ethical hacker. What exactly does that mean and what made you pursue becoming one?
I prefer to be called a cyber/ information security advisor. Ethical hackers are hackers who work for a good cause -- in other words, they are security researchers who plug the vulnerabilities and loopholes of online networks.
I do not concern myself with the philosophy of ethics, but with the simple knowledge of right and wrong engrained in my character. I work in favour of national interest, to save my country from cyber criminals who have a personal axe to grind.
You are only 18 now and CEO of the National Anti-hacking Group, NAG. What responsibilities does the position entail?
My responsibilities include managing the team, security projects, conferences, seminars, consultancy/ advisory assignments, taking important decisions and enabling the smooth functioning of the organisation.
You mentioned that you are pursuing a four-year course in Information Technology and Infrastructure Management Services from Sikkim Manipal University. Doesn't being CEO of an organisation interfere with your academics?
Yes, at times I do feel that my job responsibility interferes with my academic success. However, my ambition to be different from others belonging to my age group gives me the strength and will to work. Nothing worth achieving comes without concentrated effort.

How did you manage to accomplish so much at such a young age?
I think, that old adage holds true -- "Where there is a will there is a way". I also believe that at 18, I am at the most creative stage in my life -- I'm young, imaginative, full of positivity and inspired by the potential that the future holds for me.
Who are the people that are benefited by the NAG initiative?
We constantly try to solve social problems that stem from online activities by creating awareness in the field of cyber/ information security. Our efforts serve to protect children, students, families, individuals, and organisations (government as well as non-government) from the unseen criminals of the wired and wireless worlds, because we genuinely believe that social conscientiousness is primary to achieving a peaceful cyber co-existence.
We also voluntarily render our security services on a regular basis to providers who cater to society and the service sectors. The target beneficiaries includes schools, colleges, universities, educational institutions, financial institutions, the government sector, national and multinational organisations.
Our social commitment is to "enable people to use information and communication technology without fear". Our issue concerns not just our country, but the world -- today, a wired or wireless existence is almost as important as the physical.
Can you narrate any incident where NAG helped protect India from a dangerous cyber attack?
We protect many organisations, both government as well as non-government, from being violated. I am, however, bound to keep quiet by my professional commitment and therefore cannot disclose any information, nor the nature of my work. My friend Yash Kadakia and I have created a special security brigade to plug the vulnerabilities and loopholes in websites and networks and to provide them with timely guidance and security advice. According to a recent survey we conducted on Indian websites, 90 percent of them are vulnerable to violation; some of them possess critical information that should not be compromised under any circumstances. I would say that cyber security is still not given a priority in India.
What's the difference between a white hat hacker and a black hat hacker?
The basic difference is not in the nature of the work but in their objectives and motives. The techniques and strategies used by both are the same. However, whitehats work in the positive interest of online security, whereas blackhats work to disrupt it. A white hat generally focuses on securing IT systems, whereas a black hat will focus on breaking into them.
You are a regular on the lecturer circuit. How did it begin? What kind of lectures do you give and how do they benefit your audiences?
It all started a couple of years ago when I was attending Ranchi's Army High School. My father is an army officer and his colleagues, my teachers and friends all recognised the hidden potential in me. That's how I began giving lectures to create awareness on cyber security.
I make the audience aware of the techniques adopted by cyber criminals and provide tips on how they can keep themselves secure. Those who fall prey to hackers are usually victims of ignorance -- my mission is to dispel the darkness of ignorance by kindling the light of knowledge.
The audience usually accepts the stark truth that both the wired and the wireless worlds are vulnerable. They exhibit interest in knowing more about security and are ready to pay a price for a secure existence. They also appreciate my social initiatives.
Can you tell us something about your childhood? Who is your inspiration and what are the respective futures of Vineet Kumar the white hat and Vineet Kumar the student?
I was always an average student, but was quite dedicated when it came to computers. Sometimes I spent all night working on my machine and would end up sleeping in the classroom! My teachers branded me naughtiest kid in the school -- I was always up to some mischief, but the strong discipline enforced by them ool helped me follow a straight path. How I miss those memorable days!
AS for my future, Vineet Kumar the white hat and Vineet Kumar the student are the same person. As a white hat I provide security to Internet users. As Vineet Kumar the student, I try to increase my knowledge. These two aspects of my life are like two sides of one coin -- one manifests work, the other stands for growth and the urge to make a success of myself.

Anti hacking tips for home based online business.

In previous articles, we've looked at protecting your online business in relation to credit card fraud and web site hacking, but another very important aspect of online security focuses on your most important tool - the computer you use to run your business.

Many of us involved in ecommerce choose to work from home - it's a comfortable environment, we can dress the way we want, save time and money in travel and be close to our loved ones. 
But if the computer you use to run your online business is the same one your children use for homework and general surfing, this is potentially a very dangerous situation.
A recent security survey reported that 20% of home PC's are infected with viruses and over 80% contained spyware and adware. Frightening figures.

The following are a few anti-hacking tips that will help in keeping your business systems secure.

Don't ignore operating system updates

Practically every day, some new security flaw is found in the most critical aspect of your business - the operating system on which all your other software runs. While it's a major pain in the butt to apply updates and patches so regularly, especially if you access the web via dialup, it's nonetheless of vital importance not to put off performing these tasks as part of regular maintenance.
Don't wait to be alerted via mainstream media of problems that have been discovered - more often than not, these notifications will be delayed. As a part of your daily routine, it's wise to visit the software vendors' site and keep abreast of any critical security updates. In the case of Microsoft, you'll need to go to the Windows Update site.

Anti-virus software used *properly*

Install anti-virus software and ensure that it's regularly updated - this is of the utmost importance. Many times I have come across people who believe that because an anti-virus program is installed, they are protected, yet the last time the virus data file was updated was months or even years ago. Even missing one update could bring down your computer and the business you have struggled so long to build.

Also remember to password protect the settings on the software so no-one else can alter protection levels. 

Firewall software

Anti-virus software isn't enough - it's also a good idea to install firewall software which will help prevent unauthorized incoming and outgoing communications from your computer while connected to the Internet. In most instances you wouldn't even be aware that these illegitimate probes and scans of your systems are occurring. Port scanning is *very* common and is carried out with a view to finding weaknesses in your system that can then be exploited. 
If you are using Windows XP, then you're in luck as there's already an effective firewall included - but it's not enabled by default.
To activate the firewall in Windows XP:
- Go to "Start"
- Go to "Settings", then "Network connections"
- Select your Internet connection
- Click on "Properties"
- Click on "Advanced"
- Check the box in the "Internet Connection Firewall" section

Email software preview windows

Some viruses, called worms, can infect your system without you clicking on attachments - they can execute in the message preview window. Many worms can cause your sensitive information and documents to be transmitted to millions of people. While the preview window is a handy feature, it's safest to turn it off.
To turn off the preview window in Outlook Express:
- Select "View" on the Menu Bar
- Select "Layout"
- Uncheck "Show Preview Pane" 
To turn off the preview window in Outlook:
- Select "View" on the Menu Bar
- Select "Preview Pane" if it's not already greyed out
- You may need to repeat this for each top level mail folder

Consider email filtering services

More and more people are turning to 3rd party solutions for filtering email of spam and viruses as their inboxes become inundated with junk. Email filtering can be very effective in dramatically reducing security risks before the mail even has a chance to be collected by your email software. It not only reduces the risk, but also the amount of time and bandwidth used in retrieving your mail. 

Regularly remove spyware

If you and your familiar do a lot of surfing and downloading of shareware software, then it's likely you'll also accumulate your fair share of spyware. Spyware is a broad term applied to software applications that monitor your actions and report them to back to a company. 
Some software companies use spyware that is incorporated into their software products to gather data about customers, which is often sold to other companies. An excellent free application for removing spyware can be downloaded from Spybot.

Not using it? - unplug it..
Disconnect your computer from the Internet when not in use. The longer you are connected to the Internet, the more opportunity you give for persons to gain unauthorized access. This is especially the case where your ISP provides you with a static IP, which usually occurs in broadband scenarios.

Audit your computer regularly

If your computer is used by others, carry out regular audits of the software on it and research any software that you discover that you haven't installed yourself. It's safest to make it a policy not to allow any software to be installed without your permission. Spybot again is a very effective tool for detecting and removing software that may be a security risk
Remember that your anti-virus software, firewalls and email filtering services should always be considered your last line of defense against software nasties - the first line of defense should be you.

Kid's *aren't* all computer whizzes

Monitor your children's computer usage carefully. They may seem to be "experts", but more often than not they will have very little idea of the ramifications of some of their actions whilst on the Internet. Close supervision is especially necessary in chat rooms as these are places where Script Kiddies and other undesirable elements of the online community are very active.

Password issues

If you must store usernames and passwords on your system, ensure they are contained in a document that is password protected. It is safest not to store any passwords on your computer. Don't let Windows "remember" passwords for you. Passwords should always be more than 8 characters long and contain a mixture of numbers and letters. Logging out
Ensure that you log out of online services properly. Failure to do so can allow others who use your computer to gain access to those services and you can be blamed for their activities.

The fight against viruses, script kiddies and other online parasites isn't getting any easier for those of us involved with ecommerce; and as the years go by, more and more of our time and money will be spent on dealing with the darker side of the web.

what is Blu-ray

Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
Blu-ray is the successor to DVD. The standard was developed collaboratively by Hitachi, LG, Matsushita (Panasonic), Pioneer, Philips, Samsung, Sharp, Sony, and Thomson. It became the default optical disk standard for HD content and optical data storage after winning a format war with HD-DVD, the format promoted by Toshiba and NEC.
The format's name comes from the fact that a blue laser reads from and writes to the disc rather than the red laser of DVD players. The blue laser has a 405 nanometer (nm) wavelength that can focus more tightly than the red lasers used for writable DVD. As a consequence, a Blu-ray disc can store much more data in the same 12 centimeter space. Like the rewritable DVD formats, Blu-ray uses phase change technology to enable repeated writing to the disc.
Blu-ray's standard storage capacity is enough to store a continuous backup copy of most people's hard drives on a single disc. Initially, the format had a 27 gigabyte (GB) single-sided capacity and 50 GB on dual-layer discs. Single-sided Blu-ray discs can store up to 13 hours of standard video data, compared to single-sided DVD's 133 minutes. In July 2008, Pioneer announced that they had found a way to increase capacity to 500 GB by creating 20-layer discs. These discs are not, however, expected to be commercially available in the near future.
Blu-ray also features data streams at 36 megabits per second (Mbps), fast enough for high quality video recording. Blu-ray discs will not play on current CD and DVD players, because those players lack the blue-violet laser required to read the discs. If the appropriate lasers are included, however, Blu-ray players can play the other two formats. Blu-ray disc players (BDPs) are available from a number of manufacturers, including Panasonic, Pioneer, Samsung and Sony. Sony's Playstation 3 also has a Blu-ray drive installed.

Tuesday, November 23, 2010

Acer Aspire G ASG7750-A64 Predator

Acer has once again upgraded its powerful gaming desktop computer known as Acer Aspire G ASG7750-A64 Predator. This monster is powered by an Intel Core i7-950 3.06GHz processor, a 6GB of DDR3 RAM, a pair of NVIDIA GeForce GTX 260 graphics cards. It comes with 1 TB hard drive and a Blu-ray drive. Other features include dual Gigabit Ethernet LAN port, four DVI-I output, two eSATA ports, two IEEE 1394, USB 2.0 and a 10-in-one multi card reader. Acer had only created limited number of predators ,exactly 100 units only, so get your ASG7750-A64 soon. This latest computer from Acer costs about $3,228.

The Google Chrome Tablet

The Chromium website has received a video from Glen Murphy, one of Google’s Chrome OS designers, revealing a tablet platform touting the Google name. If the video is any indicator, this iPad contender will be bringing some interesting features to the table(t).
For starters the interactive touchscreen keyboard has multiple layout fa├žades including split, anchored, and attached to focus. Additionally this tablet will bring a very big fighting point in its battle against the iPad.
This Google Tablet will be able to multitask. Also, it will presumably not be operating with the micro-sim sin that apple has committed. With standards like multitouch, zoom, and a 5 to 10-inch screen, this Googlet will certainly draw a little enthusiasm from the tablet crowd.

Fight Night Champion: BY EA Sports

Assassin's Creed: Brotherhood

While we've played plenty of Assassin's Creed: Brotherhood's multiplayer mode that puts you in the role of templar, honing assassin-like skills, we haven't been able to play much of the single-player portion of the game up until now. Of course, some of the things we played have been shown before--we got our shot at the siege of Monteriggioni shown at the Electronic Entertainment Expo--but we did get a good look at some brand-new levels, such as action sequences that feature Ezio's present-day relative, Desmond Miles. But the start of our play-through begins in a familiar setting, with Ezio in a secret compartment below Rome's Sistine Chapel.
If you've completed Assassin's Creed II, then you already know what happens here and what Ezio saw upon defeating Rodrigo Borgia. Brotherhood picks up shortly after that as Ezio's uncle Mario calls for him, asking if the Piece of Eden is safe. With confirmation that it's in good hands, Ezio makes his way out of the compartment with the aid of some eagle vision, and the two make their way out of the chapel to flee the Vatican. This entire sequence functions like a tutorial, or a refresher, for Ezio's acrobatic moves and combat skills. As in previous Assassin's Creed games, it's incredibly easy to climb the variety of edifices in your view, and fighting guards and other foes generally functions the same way with some minor changes that are revealed later in our play session. Once Ezio and Mario have made their way through the throngs of priests and Vatican guards, they navigate to a nearby tower where they have a brief conversation before performing the assassin's trademark swan dive into the river below.

Moments later, the two arrive at Monteriggioni--the family home of Ezio and Mario. The two ride their horses through the streets of the town (we took the opportunity to deliberately run into people on our steed, of course) and reach the base of the steps where Ezio meets with some familiar faces from Assassin's Creed II, including Caterina Sforza, who makes googly eyes at the younger of the two Auditores. But, before joining his family and guests in the Auditore residence, Ezio makes his way around town, introducing himself to the engineers of Monteriggioni's new cannon defenses as well as a woman who needs help with an easy task. All of this seemingly serves the purpose of helping you become acquainted (or reacquainted) with the general layout of the town as well as Ezio's romancing skills.
Unfortunately, Ezio's homecoming celebration and subsequent tender and private moment with a certain lady abruptly end when a cannon ball comes crashing through the roof of his room. The siege of Monteriggioni by Borgia forces thus begins. As Ezio, you must travel swiftly to the town defenses--a series of cannons aimed directly at the massive army approaching the doors. You're tasked with firing the cannons at targets until Borgia forces overwhelm them with their siege towers and storm the ramparts. It's here that Ezio gets to use a few more of his combat skills, particularly the disarm maneuver that lets him grab his opponent's weapon. But perhaps even more useful is Ezio's kick. When stronger and heavily armored soldiers appear onscreen, there's no sense in trying to attack them with standard combinations, because they can easily defend against them. Instead, you have to create an opening by giving these tough foes a good old-fashioned kick, which momentarily stuns them and gives Ezio enough time to attack. Also, you might be happy to know that when Ezio disarms enemies equipped with spears, he can throw them at his opponents to produce a particularly gruesome death.

Still, even with Ezio's skills, the town is overrun, and Ezio--as well as his family--retreats through a secret passage found in the assassin's tomb located underneath the Auditore residence. The sequence ends, and we're then brought into the present day with Desmond and his crew, who are now charged with recovering the Piece of Eden lost in the siege of Monteriggioni. The group (which is also still on the run from Abstergo) finds itself at the present-day version of the Auditore fortress, which doesn't look all that different from its past incarnation, aside from modern conveniences like electricity. Actually, one of your first tasks as Desmond is to restore electricity to the Auditore residence (so they can power the animus) by using eagle vision to find wiring that eventually leads to power boxes scattered throughout town. He finds these boxes by performing the same dexterous moves as Ezio, since it's explained that Desmond essentially unlocks all of the abilities of his ancestors as he relives more of their memories.
In fact, Desmond finds the same secret passage used by his ancestors to escape the Borgia onslaught thanks to a vision of Ezio. From a story standpoint, as Desmond and Lucy make their way through the passage, it gives glimpses of how the Auditores managed to escape and how they sprung traps on their pursuers. From a gameplay standpoint, this passage functions much like the assassin's tombs from Assassin's Creed II, where the emphasis is placed solely on platforming with some mild puzzle elements. Needless to say, it seems the present day is going to figure much more prominently into Assassin's Creed: Brotherhood than it has in any previous game.
With the exploration of the passageway complete and power restored, Desmond returns to the animus and to the memories of his ancestor Ezio. From here, we spring a little further into one of the game's later sequences. Ezio is in Rome, and he has his sights set directly on the Borgia clan. However, like in Assassin's Creed II, you can undertake any number of missions available to you--whether they're main story missions or just side jobs that aren't directly tied to the core game. At first, we decided to experiment with a few of Ezio's goodies, namely his projectile weapons. Of course, he carries the same concealed gun that he had in Assassin's Creed II, but he also has access to a crossbow--an incredibly effective weapon for taking out those pesky rooftop guards or other foes that just won't get out of your way.

Perhaps our most favorite of all the weapons is the addition of other assassins that can come to your aid with the press of a single button. Ezio will raise his arm and clench his fist to order the attack on nearby targets. Assassins seemingly fall from the sky to take out enemies in the area before disappearing to the rooftops to attack again, but there is a cooldown period, so don't expect that you can continually use this feature. You can also get different types of attacks depending on the number of assassins you've recruited, so if you gather several of them, your assassins can launch a barrage of arrows from the shadows before jumping down to take care of business. We made extensive use of this feature while attempting to raid one of the Borgia towers in Rome. These towers are massive fortifications that you can storm in order to take away Borgia influence from the area, but doing so can be difficult. The one we tried to take required killing a specific general who would flee the area at the first sign of trouble, so finding a good spot to launch the attack from makes all the difference.

The Ball Review

In 2007, Valve's Portal captured our hearts with mind-bending gameplay and one snarky AI. Now, The Ball from Teotl Studios aims to rekindle what made the Portal experience so memorable by putting a spin on physics-based puzzling. But while it's packed with clever challenges, nasty enemies, and a unique Aztec design, many of the game's finer moments are buried beneath so many layers of tedium that you might never reach them.

Originally an Unreal Tournament III mod, The Ball earned second place in the "Make Something Unreal" competition by Epic Games before being picked up by publisher Tripwire Interactive. Set in 1940's Mexico, the game drops you into an expedition gone awry deep within a volcanic mountain. You're left with no other option but to plunge into the abyss. Not long into your descent, you stumble upon a handheld Aztec cannon and the ball: a massive, metallic sphere that is both a silent friend and the key to your escape.
Using your handy cannon, you can easily manipulate the ball by either hammering it away from you or drawing it magnetically towards you. Together, you and the ball roll through a lost subterranean civilization riddled with puzzles; puzzles that start out easy and stay that way until you hit the credits. The majority of these mental exercises involve either standing on a switch, pushing the ball into a switch, or standing on a switch while guiding the ball to another switch. Naturally, this starts to feel very repetitive very quickly. With such slim variety up front, there's little motivating you to stick with The Ball through the early stages.
For the truly dedicated, however, patience is rewarded in the game's final acts. Challenges evolve from simple switches to ones that, for instance, have the ball adopting special properties. In one area, the ball projects a low-gravity field that allows for some impressive vertical movement. Another has you painting the floor with oil before lighting up a trail of fire. Why these clever ideas are hidden away so far into the game is a mystery. Such creativity would have better served the game up front.
Unlike the puzzles, combat in The Ball is starved for variety throughout. Your simpleminded foes come primarily in one of two flavors: bum rush or projectile. When you spot a pack of them barreling your way--mouths agape and eyes hungry for murder--you simply slide your rolling sphere of death in their direction and pop them like ripe tomatos (complete with screen-splattering gore). While simple and satisfying at first, the carnage quickly loses its luster after your first dozen encounters. Some tougher, late-game brutes (that you can't simply roll into oblivion) provide the only legitimately interesting challenge by forcing you to use both the ball and the environment to defeat them.

But though The Ball suffers from lack of substance, it benefits from a great sense of style. The presentation of its lost Aztec metropolis feels unique throughout as it guides you down a labyrinth of ancient ruins, emerald lakes, and molten seas of magma. It's a pity the story didn't receive this level of attention. Largely throwaway, the key plot elements are handled via static exposition at fixed intervals. Other nuggets of detail are also hidden away in the form of secret items within each stage.
Outside of the campaign, The Ball includes four Survival mode stages, which only exemplify the game's weakest element: its combat. These trap-filled areas pit you against a constantly increasing wave of enemies and might leave you feeling as if you've slipped into a vanilla version of Serious Sam. Without a fulfilling combat system to support it, Survival mode doesn't hold up past initial curiosity and serves only as a bullet point on the game's feature list.

Concept Car

“A vehicle lighter than a Formula 1 racing car… Experiencing the adrenaline rush of carving through the canyons with up to 3 friends… Not using a drop of gasoline… ”

Volvo believe they can bring you this very vehicle. During Los Angeles Auto Show a scale model of this car – Volvo Air Motion – will be on display, participating in the Design Challenge Competition.
Tipping the scales at under 1,000lbs, the Volvo Air Motion Concept is designed like a clam shell and sculpted from ultra light carbon fibre. Minimising weight and complexity, while maximising driving enjoyment, is the philosophy behind this vehicle. Thousands fewer components are employed than in a traditional car thanks to the powerful yet simple compressed air motors that replace a heavy internal combustion engine. The motors cool down under load rather than heat up, thus removing the need for heavy cooling systems. An integrated approach to designing the chassis, interior and suspension also contribute significantly.

To compress the air needed for the centrally mounted air tank, Air Replenishment Sites are used. Powered by air turbines floating 1,000ft in the air they harness the power of the wind and convert it to electricity to provide the compression.
Aimed at the driving enthusiast, by a company synonymous with safety and environmental care, the Volvo Air Motion demonstrates the beauty and purity of Scandinavian design and delivers a guilt free, raw driving experience.
A 1/4 scale model will be displayed in the display area of the concourse that connects the South and West Halls at LA Auto Show. It will be on display during all press and public days. Press days Nov. 17-18 Public Days Nov. 19-28. Volvo Air Motion has been developed at Volvo Monitoring and Concept Center (VMCC) that opened in 1986. VMCC is situated in Camarillo, California. VMCC Air Motion Team: Chris Benjamin, Dean Bakker, Steve Goodrich, Bjorn Wessman, Doug Frasher, Dean Shaw and Geza Loczi.
The LA Auto Show Design Challenge
Each year for the past seven years, a topical theme is chosen and the major Southern California automotive design studios are invited to compete in the Design Challenge. For the first time studios from Germany and Japan will join the competition adding an international dimension to the contest. The highly anticipated challenge allows studios to flex their creativity and explore new ideas in automotive design.
The theme this year addresses society’s shift toward minimizing consumption of the earth’s resources. The objective is to envision an efficient, light-weight, four passenger vehicle (not to exceed 1,000 lbs.), that is both comfortable and safe, while delivering satisfactory driving performance without sacrificing the styling consumers demand.

D Programming Language

"It seems to me that most of the "new" programming languages fall into one of two categories: Those from academia with radical new paradigms and those from large corporations with a focus on RAD and the web. Maybe it's time for a new language born out of practical experience implementing compilers." -- Michael
"Great, just what I need.. another D in programming." -- Segfault
D is a systems programming language. Its focus is on combining the power and high performance of C and C++ with the programmer productivity of modern languages like Ruby and Python. Special attention is given to the needs of quality assurance, documentation, management, portability and reliability.
The D language is statically typed and compiles directly to machine code. It's multiparadigm, supporting many programming styles: imperative, object oriented, and metaprogramming. It's a member of the C syntax family, and its appearance is very similar to that of C++. Here's a quick list of features.
It is not governed by a corporate agenda or any overarching theory of programming. The needs and contributions of the D programming community form the direction it goes.
There are two versions of the language:
  1. D version 1 which is in maintenance mode.
  2. D version 2 which is recommended for new projects.

There are currently four implementations:
  1. Digital Mars dmd for Windows 1.0 2.0, x86 Linux 1.0 2.0, Mac OS X 1.0 2.0, and x86 FreeBSD 1.0
  2. LLVM D Compiler ldc for D version 1.
  3. Gnu D compiler gdc.
  4. D.NET compiler alpha for .NET for D version 2.

A large and growing collection of D source code and projects are at dsource. More links to innumerable D wikis, libraries, tools, media articles, etc. are at dlinks.
This document is available as a pdf, as well as in Japanese and Portugese translations. A German book Programming in D: Introduction to the new Programming Language is available, as well as a Japanese book D Language Perfect Guide, and a Turkish book D Programlama Dili Dersleri.
This is an example D program illustrating some of the capabilities:
#!/usr/bin/dmd -run
/* sh style script syntax is supported */

/* Hello World in D
   To compile:
     dmd hello.d
   or to optimize:
     dmd -O -inline -release hello.d

import std.stdio;

void main(string[] args)
    writeln("Hello World, Reloaded");

    // auto type inference and built-in foreach
    foreach (argc, argv; args)
        // Object Oriented Programming
        auto cl = new CmdLin(argc, argv);
        // Improved typesafe printf
        writeln(cl.argnum, cl.suffix, " arg: ", cl.argv);
        // Automatic or explicit memory management
        delete cl;

    // Nested structs and classes
    struct specs
        // all members automatically initialized
        int count, allocated;

    // Nested functions can refer to outer
    // variables like args
    specs argspecs()
        specs* s = new specs;
        // no need for '->'
        s.count = args.length;     // get length of array with .length
        s.allocated = typeof(args).sizeof; // built-in native type properties
        foreach (argv; args)
            s.allocated += argv.length * typeof(argv[0]).sizeof;
        return *s;

    // built-in string and common string operations
    writefln("argc = %d, " ~ "allocated = %d",
 argspecs().count, argspecs().allocated);

class CmdLin
    private int _argc;
    private string _argv;

    this(int argc, string argv) // constructor
        _argc = argc;
        _argv = argv;

    int argnum()
        return _argc + 1;

    string argv()
        return _argv;

    string suffix()
        string suffix = "th";
        switch (_argc)
          case 0:
            suffix = "st";
          case 1:
            suffix = "nd";
          case 2:
            suffix = "rd";
        return suffix;

Monday, November 22, 2010

Dell Inspiron Duo : New in Tech

That's right, just as we had heard, Dell is finally putting an end to the Inspiron Duo's mysterious marketing videos and officially spinning its screen for the world to see! You won't be able to hit the order button on the totally unique 10.1-inch tablet / netbook hybrid today, but according to Dell, it should go up for pre-order sometime soon and start shipping out the first week of December. As for pricing, the base model will start at $549 (£449), and will pack a dual-core Intel Atom N550 processor, 2GB of RAM, a Broadcom Crystal HD accelerator, 250GB of storage, and Windows 7 Home Premium. Naturally, you'll be able to configure it with a larger hard drive, and adding that JBL speaker dock will bring the price up to $649 (no word on what it will cost on its own). We're guessing those are the details you've been waiting on, but undoubtedly you've got to be dying to know what we think of that crazy-looking laptop. Well, we've got you covered there too -- hit the break for our impressions and a brief hands-on video.

Go : New Programming Lanuage by Google

The Go programming language is an open source project to make programmers more productive. Go is expressive, concise, clean, and efficient. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel type system enables flexible and modular program construction. Go compiles quickly to machine code yet has the convenience of garbage collection and the power of run-time reflection. It's a fast, statically typed, compiled language that feels like a dynamically typed, interpreted language.

Chinese iPad Clone that Costs $105

It’s a tablet. It comes in a box nearly identical to the iPad and its name is different by only one letter. It’s called the iPed, and it costs only $105 — approximately five times less than Apple’s original, the iPad. And, of course, you can only buy it in China.
Although cheap and visually quite similar to the original, the iPed sports far weaker hardware. It’s based on an Intel chip, and has 128 MB of RAM and 16 GB of storage space. It runs on Android(), but from what we can see in the video below, it’s quite slow — probably hampered by the low amount of RAM it possesses.
However, given the fact that Apple’s iPad is not yet available in China (it took the iPhone years to reach China) and the attractive price, the iPed will probably find its audience — unless Apple manages to sue it out of production.

Firefox 3.6 is Out there

There's a brand new Firefox in town: Firefox 3.6. It's not a huge update, but it does offer improved performance and stability together with some interesting new features.
One of the most important changes is improved support for HTML5, the next generation of the language in which the web is written.
That enables two particularly eye-catching things: the ability to watch streaming video without installing a plug-in, and support for the HTML5 File API, which means developers can use dragging and dropping between browser and desktop.
Firefox plug-ins
PLUG-IN HELP: Firefox will now tell you if plug-ins are out of date, reducing your potential exposure to some security threats.
With video, Mozilla's timing couldn't be better: YouTube and Vimeo have both announced HTML5 video players that dispense with the need for Adobe's Flash. Unfortunately neither player currently works with Firefox 3.6.
That's because of a schism in the HTML5 world, with Mozilla plumping for the open source Ogg Theora codec and other browsers supporting H.264 encoding instead. Google's Chrome supports both, but YouTube doesn't - and that, plus widespread H.264 support elsewhere, means that H.264 already looks like the winner in this particular format war.
What else is new? There's built-in support for Personas, which enables you to choose from tens of thousands of unpleasant browser themes. That's maybe a bit unfair on Windows, where Personas look pretty nifty, but on the Mac they're consistently hideous.
CHANGE YOUR LOOK: Personas - themes - are now built in, enabling you to preview new Personas with a single click. Some are more successful than others
More usefully there's support for the WOFF web font format, which enables print-style typography online. The browser now checks whether your plug-ins are out of date and warns you accordingly, which can help reduce the risk of browser-based exploits. And if you've got a laptop or tablet computer with an accelerometer in it you control the browser by tilting your PC.
If you're paying really close attention you'll also notice that when you open a new tab it appears next to the current one, not to the right of every other open tab. It might be a little change but it makes things much less confusing when you've got tens of tabs open at once.
How does it perform?
Last but not least there's performance, and this is the fastest Firefox yet. The JavaScript engine is faster than in Firefox 3.5. But while it's not as fast as Chrome you'd expect this: Google's various applications make heavy use of JavaScript, and the search giant has tuned its browser accordingly.
It is, however, closer to Chrome's performance than ever before. In the Sunspider benchmarks Firefox did the tests in an average of 1730ms, compared to 930ms for Chrome. That's more than four times faster than IE8, which wheezed through the same benchmarks in 8436ms.
JavaScript performance isn't the only thing that's been tweaked though. Before, every tab was given equal prominence, but now the tab in focus - the one you're currently looking at - gets the lion's share of system resources, which will make it render more quickly.
The browser also supports asynchronous scripts, which means web designers can essentially say "this script isn't that important; render the rest of the page first and then come back to it." Both changes should mean speedier real-world browsing.
Overall, then, this is a worthwhile upgrade. It's not revolutionary, but it delivers a host of improvements in speed, stability and support for emerging standards. It might not be pretty, but it's pretty damn good.

Dirt 3

While Dirt 2 was another highly praised, commercially successful racing game for Codemasters, the studio received plenty of feedback from fans about how to improve it. Tackling criticism is never an easy task, but the team is up front about how it aims to appease fans. More rally driving, more cars, and more variety in stages are the main points they are aiming to address, as well as a greater level of visual and aural fidelity. We found out about the developer's aims during a recent visit to Cardiff, Wales, and spoke to legendary driver Ken Block about gymkhana's inclusion in Dirt 3--the first time the discipline has ever appeared in a racing game.

The main criticism that Codemasters faced post-Dirt 2 was that the game sacrificed rallying for other disciplines. As a result, Dirt 3's career mode will be 60 percent rallying. We got to race the Audi Sport Quattro around one of the new rally stages set in Finland and were impressed with the myriad of improvements. The physics engine is noticeably more advanced, resulting in very realistic differences between surface types. As we went around corners, the wheels touching the grass would slow down, meaning that we could use the rougher surface to tactically aid drifting. As one representative noted, the undulating dips on some of the tracks can also be used to your advantage, acting as grooves for your wheel to follow round the bend.
There are also new assists that help novice rally drivers when they're just starting out. These were turned on by default in our playtest and included stability control, corner braking, and throttle management. Once disabled, the car became more difficult to drive and more prone to spinning out, but not uncontrollably so, just adding another layer of challenge during our third and fourth run-throughs of the track. Codemasters has also chosen to keep the flashback feature of the second game, allowing you to rewind and retry any section of your run. However, the overall difficulty levels are still being tweaked at this stage, so we'll have to wait and see what levels of accessibility and simulation are catered for.
One thing's for sure--with gymkhana now included in the game, rally aficionados are going to have a serious challenge on their hands. Gymkhana is a series of stunts and jumps that are performed in quick succession, and it's a sport that has been popularised by Ken Block on YouTube. The track that we got to play on was a short section of the DC Compound, otherwise known as London's Battersea Power Station, which also appeared in Dirt 2. The compound will gradually open up as you progress through the career, but we got a short section to drive around and test our skills in.
The compound run contained six challenges that we had to try to complete as quickly as possible. Pole Dancer required us to lock the handbrake and donut around one of the pillars on the track--a tricky skill that needs a gentle finger on the accelerator and precise application of the brakes. Other drifting challenges were Trailer Thrash, Pipe Dream, and Can You Dig It, which have you balletically careering your car under trailers, through pipes, and under a digger's arm, respectively. Finally, there were Airborne and Block Buster--the former rewarding a jump with a clean landing, and the latter being about smashing all the foam blocks dotted around the track. This course took us many minutes to complete, even after numerous runs, but it's clear that gymkhana will offer hardcore players proving grounds that will separate the best from the best.

Developers at the studio have managed to clock a 36-second record--an impressive time that they admit will no doubt be smashed by players once the game is released. Bragging rights will also be improved by the fact that you can edit and upload gameplay clips to YouTube, meaning that Ken Block's real-world runs could very well be bettered by virtual ones.

From Where Windows started its journey : Windows 3.1

Installation complete in Windows 3.1

File copying in Windows 3.1

Welcome screen in Windows 3.1

Welcome splash in Windows 3.1

Command prompt in Windows 3.1 (MS-DOS Prompt)

Running applications in Windows 3.1

File manager in Windows 3.1

Application manager in Windows 3.1

Terminal in Windows 3.1 (Terminal)

Notepad in Windows 3.1 (Notepad)

Desktop with applications in Windows 3.1

Empty desktop in Windows 3.1

First run in Windows 3.1

Screenshots from Windows 3.1.
First run

Switch to view 1
Switch to view 2
First run in Windows 3.1. The screenshot has an extra border (remove).
The first illustration is in regular VGA mode, Switch to view 1 whereas the second is in 64K hi-color. Switch to view 2 The Applications group in the second illustration contains shortcuts to DOS programs found by Windows during installation (absent in the first illustration because of installation on empty HDD).

Empty desktop

Empty desktop in Windows 3.1. The screenshot has an extra border (remove).

Desktop with applications

Desktop with applications in Windows 3.1. The screenshot has an extra border (remove).

Office applications

Notepad in Windows 3.1 (Notepad)

Text editor

Text editor in Windows 3.1 (Write)
Text editor in Windows 3.1 (Write)


Calculator in Windows 3.1 (Calculator)
Calculator in Windows 3.1 (Calculator)


Calendar in Windows 3.1 (Calendar)
Calendar in Windows 3.1 (Calendar)


Clock in Windows 3.1 (Clock)
Clock in Windows 3.1 (Clock)

Address book

Address book in Windows 3.1 (Cardfile)
Address book in Windows 3.1 (Cardfile)
Multimedia applications
Media player

Media player in Windows 3.1 (Media Player)
Media player in Windows 3.1 (Media Player)

CD player
Volume level

This GUI doesn’t have these features.


Sound in Windows 3.1 (Sound Recorder)
Sound in Windows 3.1 (Sound Recorder)
Networking applications

Terminal in Windows 3.1 (Terminal)

Phone dialer

This GUI doesn’t have this feature.
Internet applications

This GUI doesn’t have these features.
Accessibility applications
Keyboard map

This GUI doesn’t have this feature.

Settings menu

Settings menu in Windows 3.1 (Control Panel)
Settings menu in Windows 3.1 (Control Panel)


This GUI doesn’t have this feature.


Switch to view 1
Switch to view 2
Appearance in Windows 3.1 (Color)
Appearance in Windows 3.1 (Color)

Appearance in Windows 3.1 (Desktop)
Appearance in Windows 3.1 (Desktop)

Desktop themes

This GUI doesn’t have this feature.


This feature is not yet documented on this site.


This GUI doesn’t have this feature.


Keyboard in Windows 3.1 (Keyboard)
Keyboard in Windows 3.1 (Keyboard)


Mouse in Windows 3.1 (Mouse)
Mouse in Windows 3.1 (Mouse)

Time and date

Time and date in Windows 3.1 (Date & Time)
Time and date in Windows 3.1 (Date & Time)


International in Windows 3.1 (International)
International in Windows 3.1 (International)

Power management

This GUI doesn’t have these features.

System managers
Application manager

Switch to view 1
Switch to view 2
Application manager in Windows 3.1

File manager

File manager in Windows 3.1

Running applications

Running applications in Windows 3.1

Task manager

Task manager in Windows 3.1 (Task List)
Task manager in Windows 3.1 (Task List)
System features

Help in Windows 3.1 (Program Manager Help)
Help in Windows 3.1 (Program Manager Help)


Search in Windows 3.1
Search in Windows 3.1

Trash can

This GUI doesn’t have this feature.


Run in Windows 3.1 (Run)
Run in Windows 3.1 (Run)
System utilities
Command prompt

Command prompt in Windows 3.1 (MS-DOS Prompt)

Startup and shutdown
Welcome splash

Welcome splash in Windows 3.1. The screenshot has an extra border (remove).

Login screen
Logout screen

This GUI doesn’t have these features.

Shutdown window

Shutdown window in Windows 3.1 (Exit Windows)
Shutdown window in Windows 3.1 (Exit Windows)

Shutting down
Shutdown complete

This GUI doesn’t have these features.

Welcome screen

Welcome screen in Windows 3.1. The screenshot has an extra border (remove).


This GUI doesn’t have this feature.

File copying

Switch to view 1
Switch to view 2
Switch to view 3
File copying in Windows 3.1. The screenshot has an extra border (remove).

Installation complete

Installation complete in Windows 3.1. The screenshot has an extra border (remove).

About GUI

About GUI in Windows 3.1 (About Program Manager)
About GUI in Windows 3.1 (About Program Manager)

About application

About application in Windows 3.1
About application in Windows 3.1

Font selection

Font selection in Windows 3.1
Font selection in Windows 3.1

Open file

Open file in Windows 3.1 (Open)
Open file in Windows 3.1 (Open)

Colour selector

Colour selector in Windows 3.1
Colour selector in Windows 3.1