Skip navigation

makemylogic

This website has been shifted to www.makemylogic.com

T-Mobile and Google have announced the first-ever handset with Google’s new Android operating system. Called the T-Mobile G1, it has both full touch-screen functionality, a QWERTY keyboard, a trackball for one-handed navigation, plus access to mobile web applications like Google Maps Street View, Gmail, YouTube and more. The G1 will be available from October 22 in the US, from early November in the UK, and will roll out across Europe in early 2009.

FULL SPECIFICATIONS

DIMENSIONS 117 x 55.7 x 17.1 mm Weight 158 g

DISPLAY TFT touchscreen, 65K colors

SIZE 320 x 480 pixels, 3.2 inches

RINGTONES :   Polyphonic (40 channels), MP3, WAV,  WMA , custom download

Vibration :    Yes

Phonebook :    Practically unlimited entries and fields, Photocall Call records Practically unlimited

Card slot :   micro SD (TransFlash)

DATA GPRS :     Class 10 (4+1/3+2 slots), 32 – 48 kbps

HSCSD :      No

EDGE :      Class 10, 236.8 kbps

3G :      HSDPA, 7.2 Mbps

WLAN Wi-Fi 802.11 b/g

Bluetooth :      Yes, v2.0, headset support only

Infrared port :      No

USB :      Yes, miniUSB

OS :    Android OS

Messaging :    SMS, MMS, Email,Instant Messaging

Browser :    HTML

Games :    Yes

Colors :     White, Black, Brown

BATTERY :    Standard battery, Li-Ion 1150 mAh

Stand-by :    Up to 406 h

Talk time :    Up to 5 h 20 min

FEATURES
- 192 MB RAM, 256 MB ROM
- Qualcomm MSM7201A 528 Mhz processor
- Full QWERTY keyboard
- Trackball
- Accelerometer sensor for auto-rotate
- Handwriting recognition
- Camera 3.15 MP, 248×1536 pixels
- Built-in GPS receiver
- Digital compass
- Document viewer
- Java MIDP 2.0
- Voice memo
- MP3 player
- Built-in handsfree

Heuristic Analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the wild.
Heuristic Analysis An expert based analysis. Expert determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods. MultiCriteria Analysis (MCA) is one of the means of weighing. This method differs with Statistical Analysis, which bases itself on the available data/statistics.

How it works ?

Most antivirus programs that utilize heuristic analysis perform this function by executing the programming commands of a questionable program or script within a specialized virtual machine, thereby allowing the anti-virus program to internally simulate what would happen if the suspicious file were to be executed while keeping the suspicious code isolated from the real-world machine. It then analyzes the commands as they are performed, monitoring for common viral activities such as replication, file overwrites, and attempts to hide the existence of the suspicious file. If one or more virus-like actions are detected, the suspicious file is flagged as a potential virus, and the user alerted.

Another common method of heuristic analysis is for the anti-virus program to decompile the suspicious program, then analyze the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.

Its Effectiveness

Although heuristic analysis is capable of detecting many previously-unknown viruses and new variants of current viruses, the effectiveness is fairly low regarding accuracy and the number of false negatives. This is because computer viruses, just like biological viruses, are constantly changing and evolving. Since heuristic analysis mostly operates on the basis of past experience (by comparing the suspicious file to the code and functions of known viruses), it is likely to miss new viruses that contain previously unknown code or methods of operation not found in any known viruses. Fortunately, heuristic analysis is also evolving along with the viruses. As new viruses are discovered using alternative methods of detection, information about them are added to the heuristic analysis engine, thereby providing it the means to detect any new viruses based on the previously-unknown code.

Today Many of the antivirus softwares are capable of heuristic method of analysis, like Symantec ( called Blood-Hound), Mcafee , AVG , and many more..

Internet Protocol version 6 (IPv6) is a network layer for packet-switched internetworks. It is designated as the successor of IPv4, the current version of the Internet Protocol, for general use on the Internet.

The main change brought by IPv6 is a much larger address space that allows greater flexibility in assigning addresses. The extended address length eliminates the need to use network address translation to avoid address exhaustion, and also simplifies aspects of address assignment and renumbering when changing providers.

It is common to see examples that attempt to show that the IPv6 address space is extremely large. For example, IPv6 supports 2128 (about 3.4×1038) addresses, or approximately 5×1028addresses for each of the roughly 6.5 billion (6.5×109) people alive today.[1] In a different perspective, this is 252 addresses for every star in the known universe[2] – more than ten billion billion billion times as many addresses as IPv4 supported.

The large number of addresses allows a hierarchical allocation of addresses that may make routing and renumbering simpler. With IPv4, complex CIDR techniques were developed to make the best possible use of a restricted address space. Renumbering, when changing providers, can be a major effort with IPv4, as discussed in RFC 2071 and RFC 2072. With IPv6, however, renumbering becomes largely automatic, because the host identifiers are decoupled from the network provider identifier. Separate address spaces exist for ISPs and for hosts, which are “inefficient” in address space bits but are extremely efficient for operational issues such as changing service providers.

The Windows vista is ready for IPv6. IPv6 addresses are normally written as eight groups of four hexadecimal digits, where each group is separated by a colon (:). For example, 2001:0db8:85a3:08d3:1319:8a2e:0370:7334 is a valid IPv6 address.

Today’s spotlight is on the applications that you MUST have on your Cellphone.

Here are some symbian applications that will make your life easy.

You Should have a GPRS/EDGE/3G connection on your mobile…

Compatible devices: S60 3rd Edition, Nokia N-Series, Nokia E-Series. (as per my current knowledge)

Opera Mini

It is a great software that is one of the most used and downloaded mobile apps. Opera mini is simply a phone internet browser, which is multipurpose; it is a feed reader, a browser through which you can see the webpages in their original size, because it has a zoom utility that lets you zoom you web pages, You can browse all it’sfeatures at it’s official site

Mig33

Company claims that “With mig33, you can chat and send instant messages and emails, make inexpensive international phone calls, share photos, connect with old friends and even meet new ones. Think of it as an addition to your phone’s existing service.”
Which I also agree!!, it’s a great tool; the thing in it which i like is that it supports MSN, Yahoo!, ICQ , AOL, Google Talk, SMS, to name a few.

Google Maps For Mobile

Download Google Maps for mobile to get maps, directions, and business listings, right on your mobile device. Google Maps on your phone makes it easy to:

  • Determine your current location with or without GPS
  • Get driving and transit directions
  • Get phone numbers and addresses for local businesses
 

Yahoo go !

Yahoo! Go is today’s essential solution for anyone with a mobile phone. It’s an all-in-one offering that lets you enjoy the best of the Internet on your phone—for free. Send an email, upload photos, download a map, search for answers, check stock quotes, or get breaking news—all that and much more is available through Yahoo! Go.

The long and short to this question is yes and no. Confused yet? The yes part of the answer comes from the fact that any computer can get a virus; the no part comes from the fact that it is much more difficult for Macs to contract a virus. There are many reasons for this discrepancy.

To begin with, the new Apple operating systems, like Mac OS X are built based on the UNIX kernel, which has been around the longest, and is the safest operating system available. UNIX is an operating system that was developed in the 1960s by Bell Labs, and believe it or not, was used to play a game called Space Travel after being booted off of the creator’s regular systems. A kernel is another word for operating system; it is technically the first piece to load into memory during a startup. It is usually responsible for things like managing disk drives and handling memory.

The next reason very few Apple users get viruses is basically because when compared to Windows users, there just aren’t that many of them out there. If someone is out to write a damaging computer virus, they want to write one that is going to impact the largest amount of users, and those users are not Apple users. It is estimated that somewhere around 400 million people use the Windows operating system, while Mac users are somewhere in the ballpark of 25 million. To break this down even further, of that 400 million, over 80% of them are home users, the rest use the system for businesses or other uses. On the other hand, for Mac users, nearly 90% of them use their Mac for business use. Movie producers, sound engineers, and graphic artists are some of Mac’s demographic users. Students and recreational users make up a large part of Windows’ demographics.

Along the same lines, more virus authors are familiar with the Windows operating system, enabling them to develop viruses for that system easier and more quickly. There is no need to learn a complicated new system and develop a virus around it, even if it will gain you 25 million more victims; it is just too much work. Many of the tools used and scripts written that help virus writers create their mayhem are designed specifically for Windows, so half of the work is already done for them.

It is good to note that those individuals that own a Mac and run the Windows operating system on it as a cross platform machine are vulnerable to Windows viruses, and those systems should be protected with antivirus software, even though they are not factory-genuine Windows models.

For now, Mac users are safer from viruses than Windows users are; many Mac users don’t even have antivirus protection on their computers. Who is to say that in the future they will not be just as vulnerable as Windows users, but for now, they seem to have the antivirus upper hand.

Free mp3 Downloads from Google. With this simple trick, you can get tons of mp3 download links using   just Google

Free mp3 Downloads from Google. With this simple trick, you can get tons of mp3 download links using just Google

All you have to do is search for this..

“Band or Artist name here” last modified mp3 “index of” -html -htm -php -asp

For example i want to get some Red Hot Chili Peppers  song…

“Red hot chili peppers” last modified mp3 “index of” -html -htm -php -asp

OR

just type ?intitle:index.of?mp3    and press Google search or hit enter key.

How simple is that…

Bittorrent. Not familliar with it ? Keep reading!

It ain’t really important to tell you who made Bittorrent, only telling you how this works.
That’s right! A step-by-step guide.
Don’t  expect any rocket science here. This is just going to be the basic and is just a beginning, so I plan to update this as I go along.

First of all I am stating that to copy films / files/ programs/ software without the owners permission is illegal!! Do not do it. Any information that follows is purely educational.
Downloading Torrents is NOT ILLEGAL as long as you are not infringing copyright.

With the advent of broadband technologies such as DSL and cable modems, the everyday user suddenly has a big chunk of bandwidth, not only for download, but also upload. Sharing files directly from your computer (without first sending them to a server) is now a reality. This is where p2p comes in. The acronym p2p stands for peer-to-peer, which basically means client to client. That is, you download files from people like you instead of from big servers, and in turn they download files from you. You share your files, your friends share their files, and everyone talks directly to each other.
The problem with most P2P networks is that many people just don’t like to share. They open up their program, download their files, then close the program before they can help anyone else. It’s called leeching. BitTorrent is a P2P file swarming application. This means that as soon as you have downloaded a few chunks of a file it will start uploading it to others, thereby spreading the file better. This makes it easier to get the file from many different people at once, thereby increasing the probably that you’ll get a good download speed. This means that the more you upload, the faster you’ll download.

Things you should know

  • Leecher: That’s the guys that don’t have the complete file.
  • Seeder: Those that now have the entire file, 100%, and therefore only function to upload to those      that  haven’t got the whole thing yet.
  • Peers: All users connected to the same torrent. The more peers, the greater the speeds, providing there are enough seeders.
  • Tracker: The centre when you start up the torrent. In short – it connects you to other users and is also the thing that sends you messages to your client.

How to do this ???

1 – Install a Bit Torrent Client

Before you start downloading games, movies etc, you’ll need to install a Bit torrent client. There a numerous clients available all with different features and options. Some people claim certain torrent clients provide faster download speeds, personally i’ve not noticed this between clients.
I would recommend using BitComet as it’s simple to use, looks nice and works well.
Other Bit Torrent clients you might want to try are:
•    The Original Bit Torrent Client
•    Utorrent
•    ABC
•    Bit tornado

2 – Download a Torrent

Ok so now you’ve got your torrent client installed, go to your favourite torrent site (e.g. http://www.isohunt.com). And search for the application you want to download and click on the link to download the Torrent file.

Here are some of the best and popular torrent sites :

Mininova.org is the successor to Supernova, one of the original biggest torrent databases of the Web and the Most visited torrent site on the internet . Almost anything you want can be found here.

Scrapetorrent.com is another torrent beta torrent site that searches many of the popular torrent sites listed here , its fast , clean (spare the pop-up) and definitely my favorite .

Demonoid The most popular private torrent site . You need to be registered and registration is by invitation only Note: User Registration is also open some times on Fridays GMT. (PS: This site is BACK , up and running )

PizzaTorrent Searches torrents in real time. A New site thats really catching popularity.

Torrentscan.com can search many torrent sites with this one. Voted as the best torrent site of the year by About.com

Torrentz.com
really good site for torrents. Searches many sites for torrents. Another favorite of mine.

The Pirate Bay
a very popular torrent site with a huge database. The good thing about this site is that there are lot of commenter’s that help with file installation and also warn against rip off’s .

Isohunt.com
another popular site with a huge database. Still a very popular site and a favorite to many.

BTjunkie
awesome site especially for games , has loads of torrents downloaded from demonoid .

Thebox
a torrent site dedicated to british television.

Once you’ve clicked the link your browser will ask you whether you’d like to open the torrent or save it, If your using BitComet I’d suggest choosing “open” and then choosing BitComet as the application to open the torrent with.

Once you click ok BitComet will open up and the following dialog box will appear. You can see all the files in the torrent and also the location where these files will be saved to. The default location should be fine unless you want to save the files to a different drive, this folder can be change by clicking “browse”.

3 – Open Your Files and Share
Ok once the torrent is fully downloaded you may/should seed the torrent so others can download it. You can seed by not stopping the torrent after completion of the download. BitComet will automatically seed a torrent once it’s finished downloading. If you browse to the folder where you chose to save the files you can then use them.

Well this is my first post so i thought why not write something about google  :-)
and this is because of the fact the we are totally dependant on google nowadays….
Just try to think about ur official presentations , projects , work , music , recipes , places , photograps , maps or any random thing….. does that ring a bell–yes it does , the one answer to all ur queries on internet today is google. This a positive thing and i appreciate that…but try to imagine that in the process of using google to ur needs how many personal details or yours do u people share with google and google manages a database of all this…
Thanks to Gmail, Google knows who you are e-mailing, what you are saying and it will store all your e-mails forever. Thanks to Google Talk,Google knows who you are talking to and who your closest associates are. And if Gmail and Google Talk were not enough, because of Orkut, Google knows who sits in your circle of friends. Thanks to Google Search, Google knows what you are searching for on the Web, including the news, type of images and newsgroup access. Thanks to Google Video, Google knows what kind of risqué videos you like to watch. Thanks to Google Finance, Google knows what stocks and businesses you are interested in. Thanks to Blogger, Google knows what you rant about and what rants you like reading. Thanks to Google Maps, Google knows where your house is and where you are going. Thanks to Google Calendar, Google knows who you are meeting with, where you are going, and what you are busy doing. Thanks to Picasa, Google even knows what you, your family, and your best friends look like. Best of all, thanks to Google Desktop, Google has access to all your documents, images, files, and everything else on your hard drive. And when Google displays customised adverts based on the e-mails you receive and searches you make, and you happen to click one of them, Google knows the kind of things you are interested in.

well…

what more do u expect from a well built virus to do ?
this does not mean that iam against google or google is really a virus…(i dont know the truth)
but its just a thought…
Follow

Get every new post delivered to your Inbox.