Monday, November 8, 2010

Mango battery- A project by my brother


Selection of the problem:

I became interested in this idea as we are facing power cuts in our home then and there. The information gathered from this experiment can be utilized by the juice/soup preparing factories to produce electricity for their factory purpose, utilizing the electrical energy produced by the chemical energy got from the fruits and vegetables.

Statement of the problem:

The purpose of the experiment is to find the electrical energy produced in different fruits and vegetables.

Introduction:

            Nowadays life has become impossible without electricity. For every walk of life, Electricity has become a basic necessity Right from a small hut to big factories, they (all) are in need of electricity
Though the government takes strenuous efforts to reach the huge demand for electricity, at least on our side we can take efforts to reach our demand partially
            In this project we will make a battery in which the acidity inside the fruit or vegetable acts as electrolyte, copper wire as a cathode and zinc wire as an anode. We use multi-meter to measure the quantum of voltage produced.

Formulation of hypothesis:

My hypothesis is that among the selected fruits and vegetables lemon has more electricity generating capacity.

My hypothesis is based on:

1. Salt water battery
2. Lemon battery

Related study:

i. From internet
1. Science project.com
2. High school project.com
                        3. sciencefarprojects.com
ii. From CD
                        1. CD provided by OMEAT

Sampling:

v     10 different verities of fruits and vegetables weighing approximately 50gms
v     One zinc wire as anode 
v     One copper wire as cathode
v     One multi-meter to check the quantum of voltage


Observation:

        Fruit/Vegetable
Day 1
Day 2
Day 3
Day 4
Day 5
Lemon
0.56
0.56
0.56
0.59
0.59
Ginger
0.47
0.21
0.29
0.13
0.09
Papaya
0.6
0.03
0.03
0.03
0.01
Bitter gourd
0.5
0.09
0.46
0.21
0.13
Onion
0.43
0.24
0.33
0.14
0.24
Tomato
0.1
0.07
0.14
0.09
0.01
Orange
0.5
0.02
0.01
0.01
0.01
Raw mango
0.96
0.79
0.74
0.77
0.7
Banana
0.43
0.05
0.03
0.03
0.02
Guava
0.47
0.24
0.53
0.23
0.16

Computation of data:

A fruit or vegetable at a time is selected and the voltage in volts is measured and it is repeated five times on the first day. The mean value is found and has been entered in the observation tab-column.
The process was repeated for 5day and the mean values are entered in the tab-column. The result of each and every fruit /vegetable got on a respective day is compared and a conclusion is arrived at.


Testing of hypothesis:

We reject the hypothesis as more voltage is produced in raw mango rather than lemon, orange, onion etc.

Conclusion:

The conclusion of the experiment is that among the randomly selected fruits and vegetables raw mango produced more voltage than other fruits and vegetables.




Authors comment:

It is in my opinion, the voltage produced in any fruit or vegetable will be high based on the acidity (citric acid) present in the fruits/vegetables. And also it will prolong for more days.



for
S.Luthfur Rahman

Saturday, October 2, 2010

How to Recover Hacked Email Accounts?

It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.


For Gmail:
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link


For Yahoo and Hotmail:
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

Saturday, September 11, 2010

Import of e-waste to india may ban soon!!

The government is considering banning the import of used computers and other electronic waste - coming primarily from developed nations such as US, Australia, Canada and parts of Europe - after several cases of e-waste smuggling came to light recently.
A decision is likely to be taken at the Economic Intelligence Council meeting scheduled for this month to be chaired by finance minister Pranab Mukherjee.
The matter had come up for discussion at the coordination committee meeting of various economic intelligence agencies chaired by revenue secretary Sunil Mitra in mid-July. Mitra had then asked the director general of foreign trade to frame suitable changes in the policy to ban such imports.
The e-waste issue assumed significance after the Directorate of Revenue Intelligence (DRI) seized some containers in Chennai containing large quantity of such waste. The imports were made despite a prohibitory order in this regard. The half-a-dozen seized containers were filled with outdated computers and electrical waste. On further investigation, it was found that containers carried hundreds of tonnes of e-waste sourced from Australia, Canada, Korea and Brunei in violation of norms.
E-waste is being dumped in the country by developing nations using loopholes in domestic rules which allow NGOs and educational institutions to import such gadgets freely on the pretext of donations.
Conscious of the fact that huge shipments of e-waste generated in developing countries are finding convenient burial ground in India, the government had through a public notice on May 13, 2010 prohibited educational and other institutions from importing second hand computers, laptops and computer peripherals, including printers, plotters, scanners, monitors, keyboards and storage units. The step was short of a complete ban on such imports.
However, with Customs continuing to seize such illegal shipments, it seems the prohibition order has had little impact. Though the finance ministry is in favour of a complete ban, the commerce ministry does not seem too inclined for such stringent measures.
At the July meeting chaired by the revenue secretary, DGFT had mooted the idea of raising vigilance at ports and asking the Customs department to confiscate such imports if detected, instead of a complete ban.
Till the DGFT came up with the May 13 amendment prohibiting e-waste import, second hand computers and laptops were brought into the country using this clause that allowed such imports through donations made to educational institutions, registered charitable hospitals, public library, research and development organisations and community information centers.
Disposal of e-waste often leads to emission of dangerous gases like in the process of recovery of copper from e-waste dioxins are released in the environment. Toxic cyanide is released in the process of extraction of yellow metal from electrical waste and computer components.
Environmental agencies worldwide estimate dumping of e-waste in India is likely to go up by 500% in the next 10 years. Already, environment bodies estimate India generates nearly 4 lakh tonnes of e-waste annually which is likely to double in the next few years. The country, however, lacks effective disposal mechanism.


S.A.Rahman :)

Monday, August 23, 2010

HackYard - My article for Meteruken'10 symposium magazine



How email accounts are getting hacked?
How hackers penetrate into our computers?

The first thing is hacker analysis what is our need on cyber media and provide that stuff along with the key loggers and password stealers. In fact that is the thing every one should know who uses the internet frequently. Basically Email hacking is done by using three types of attacks.

     1.      Phishing attack

     2.      Stealing attack

     3.      Key logging attack






Phishing attack
            In this type of attack hacker creates a fake login page of the trusted site and sends its link to the user. When user clicks that link and enters the user ID and password and clicks login or sign in the, the entered ID and password will be sent to the hacker immediately.

Stealing attack
            Stealer is the mind blowing and very small tool. What happens when it start running on your computer is, all the password saved on the computer such as windows admin passwords as well as the password stored in the web browser are sent to the hacker immediately.

Key logging attack
            Key logger is also a small tool. When it start running it will start listening the key stokes of the user i.e. keys pressed by user on keyboard and sends to the hackers.

What Hackers do with Key logger and Stealer is, they use to integrate the key logger or stealer with some file such as audio or video and upload that file on to internet. When the users download the file and open it means the key logger or stealer integrated to it also starts running silently at the back ground without the knowledge of the user. And all the user IDs and passwords saved to the computer are sent to the hacker.

Only because of the pirated content and un trusted sites, Accounts are getting hacked 80% of the hacks can be prevented by staying out of piracy.

Solution:
So say no to piracy so that you can be safe and secure.



ABDUR RAHMAN S
CSE ‘A’ 3rd Year

Friday, June 11, 2010

Wow amazing device from nokia!!!

Nokia launched a new cute looking QWERTY keypad mobile phone. This is Nokia’s latest and by-far the best offering in the “affordable” segment of mobile phones. It has some very attractive and trend-setting features. Every time a new Nokia phone is about to launch in India, there is some hint of excitement among the buyers. This time too, Nokia has showed that the wait is worth. The Nokia C3 includes Nokia Messaging which takes care of the access to Ovi Mail, Ovi Chat, and conversational SMS chat. It also features a two-megapixel camera.

Nokia C3 is a social networking phone, which gives the user an easy access to various social networking sites such as Facebook, Twitter and also to some video sharing web sites like Youtube. C3 is Wi-Fi enabled with a 2 MP camera. It also allows access to exclusive instant messengers like Yahoo!, Windows Live and Gtalk. The specifications of Nokia C3 are listed below.

Specifications of Nokia C3
•    Quad-band GSM network
•    Symbian Series 40 OS
•    2.4-inch display screen
•    QWERTY keypad
•    Wi-Fi Wireless LAN
•    Bluetooth 2.1 with EDR
•    2 mega pixel Camera with LED flash
•    Audio Player
•    Video Player
•    3.5mm headphone jack
•    Ovi mail,Ovi Chat
•    Opera mini client
•    Quick access to social networking via Communities client
•    microUSB
•    Expandable memory up to 8GB
•    Colours : Golden white, Slate grey ,and Pink
•    Access to various instant messengers like Yahoo!, Gtalk, Windows Live etc.

Price in India
The new Nokia C3 will cost just Rs. 7,500/ approximately - in India. Given the features, it’s surely a phone worth buying.

Monday, May 3, 2010

It's all about doing everything online

In the age of 4G some of the people in India are still using just 1G and 2G technologies, where as it has been a year after releasing the 3G in India. We step back of those technologies only because of lack of security in the cyber-world and flaws. Well one of the upcoming technology is cloud computing. Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. All you will need is a web browser to run all the applications on your computer.
Well here I am not gonna write about cloud computing here but it’s a type or example of cloud computing. Which is all about the online resources you can utilize it by your PC or laptop using a web browser. When a word “online” comes out every one thinks that it’s about only sending email and uploading and downloading some content on to the internet. But that doesn’t stops with that, there are lot more applications available on the internet which you can make use of.

AudioTag
Identify unknown pieces of music easily, upload an audio fragment and get the tag info.

Autodesk Homestyler
Online 2D and 3D designing application.

Barcoding
Create an optical machine-readable barcode image by giving barcode data, encoding type and output file format.

CALD
Online Cambridge advanced learners dictionary for free.

Codepad
Online compiler/interpreter.

CutMP3
Upload the Mp3 file and no file size limit either—a cut above the rest!

Digital Dutch Unit Converter
Convert the area, density, energy, force, length, mass, power, pressure, speed, temperature, volume, bits and bytes.

File Converter
Upload a file, choose a conversion type and download the converted file to your computer. Check here for a full list of conversion types.

File Encryptor
Encrypt or decrypt a file online upto a maximum file size of 20MB

FontStruct
Create your own True-Type online.

Google Docs
Create edit and store web-based documents, spreadsheets, and presentations.
http://docs.google.com/

Google Maps
Find local businesses, view maps and get driving directions in Google Maps

GoToMyPc
Access your PC remotely from anywhere in the world where internet is exist.

Grooveshark
Upload, search and share music, instead of videos, with others.

Ideone
a handy compiler and debugging tool in more than 40 programming languages—choose one of them, paste your source code, share it, or run it and see the results.

InstaCalc
Mixer of an calculator and a spreadsheet application.

Jaycut
An online video editing tool.

KeepVid
Download videos from youtube and other websites.

Klokoo
Online alarm application.

Meebo
Connects you to MSN, Yahoo, AOL/AIM, MySpace, Facebook, Google Talk, and many more!

Net2ftp
Upload files to your web hosting online.

Nitro PDF
Convert from PDF to Word/Excel via PDF-to-Word Converter and PDF-to-Excel Converter.

OCR
Upload an image up to 2 MB in pdf, jpg, gif, tiff or bmp format for optical character recognition and get the real text result right on your screen.

OnlineLinkScan
Scan the URL first for free before getting into it.

PaperRater
Check your document for grammar and spelling errors.

PDFHammer 
Modify and remove pages, merge PDFs, set PDF meta-data or protect PDF docs with a powerfull  password.

PDFmyURL
PDFmyURL.com is a free tool to easily create a pdf from any webpage or url.

PhotoFunia
Edit your image online and apply lot of effects you like.

Photoshop
This is like a light version of Adobe Photoshop.

Picasa Web Albums
Store and share photos with friends and family, or explore public photos.

Picnik
Picnik is the best online tool lets you edit all your photos online, from one easy place.

PlanningWiz3
Partition rooms and arrange furniture in them easily, with good example plans and allowing you to save, print or export a layout plan to an image file.

RescueTime
This will help you understand how you spend your time on the computer.

SafeWeb
Scan your ULRs before getting into it on Norton safeweb web-based application.

Screen Toaster
Online screen recording application.

Scribd
Upload and view docs of different file formats in fullscreen, make them private and accessible by a specific URL, and share them with your friends.

Skydrive
Online storage service from Microsoft where you can store files photos and documents forever for free. You get 25 GB of storage space and the size limit per file is 50 MB.

Speedtest.net
Test your internet speed online.

Spypig
This is an email tracking service that will send you a notification as soon as someone opens your email.

Stopwatch
An online stopwatch, now count down is on every where you go.

Sumo Paint
Advanced photo editing web-based application, totally free/

TypingWeb
Online typing tutor.


Way2SMS
Send Free SMS to any mobile in India.

What Is My IP Address
Locate IP address, proxy detection, email tracing, IP hiding tips, blacklist check, speed test, and forums. Find, get,

WordPress
Create or edit your blog or website.

XE - Universal Currency Converter
Free currency rates, tools, and analysis using the most accurate data.

You Get Signal
Check which ports are open into your network?

YouTube
Watch and upload videos.

Zamzar
Convert images, videos, audio and documents from one format to another.

ZipMyFiles
Zip your files online for free.

Hope you would have enjoyed this article please post comments if any of your site is missing from this list, any your ideas about this article i will be glad to see your comments.


*few above listed sites are free and few required you to be registered before you use.
**few websites listed above are commercial and they provide only trial versions you need to pay to use its full versions.

Yours technically
S A Rahman

Tuesday, April 20, 2010

Top 15 Security/Hacking Tools & Utilities

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
3. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.
11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.
12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  • Verify that your network is set up the way you intended.
  • Find locations with poor coverage in your WLAN.
  • Detect other networks that may be causing interference on your network.
  • Detect unauthorized “rogue” access points in your workplace.
  • Help aim directional antennas for long-haul WLAN links.
  • Use it recreationally for WarDriving.
15. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.