www.bigoo.wswww.bigoo.wswww.bigoo.wswww.bigoo.wswww.bigoo.wswww.bigoo.wswww.bigoo.ws

TECHO GALAXI INVITES YOU ALL

OBJECTIVES :
*INTERESTING TOPICS
*INFORMATIVE IDEAS
NOW LOOK THE CONTENTS AND CHOOSE
THE TOPIC BELOW


Professionals connect here

LABELS


Powered By:Blogger Widgets
Showing posts with label MOBILE PHONES. Show all posts
Showing posts with label MOBILE PHONES. Show all posts

Thursday, June 11, 2009

PHOTOSHOP

 
PLEASE COPY AND PASTE THIS URL

INTO YOUR
BROWSER'S ADDRESS BOX:


http://www.adobe.com/web/tips/glvvtco/main.html
Adobe GoLve Tutorials
 
http://www.geocities.com/Athens/Delphi/6470/tech_courses.htm
Technology Tutorials
 
http://www.engr.colostate.edu/~dga/software.html
Tutorial Links
 
The Free FrontPage Training in this file has been

replaced by this HTML Page:
 
http://www.intelinfo.com/newly_researched_free_training/Free_FrontPage_Training_and_Tutorials.html

The Free Photoshop Training in this file has been

replaced by this HTML Page:
 
http://www.intelinfo.com/newly_researched_free_training/Free_Photoshop_Training_and_Tutorials.html

Friday, May 1, 2009

BIOSECURITY(BIO-INFORMATICS)


BIOMETRIC THE BEST SAFE-GUARD:

· Biometrics is technology that automatically authenticates, identify, or verify an individual based on physiological or behavioural characteristics.

· This process is accomplished by using computer technology in a non-invasive way to match patterns of live individuals in real time against enrolled records.

Example: products that recognize faces, hands, fingers, signatures, irises or irides, voices, and fingerprints.

PART OF BIOMETRICS IN VARIOUS FIELDS AND APPLICATIONS:

· Biometrics are most commonly used to enhance computer network security, protect financial transactions, safeguard international borders, control access to secured work sites, verify time and attendance, and prevent benefits fraud.

· Biometrics work well as stand-alone safeguards in many applications and complement other means of security in other applications.

· To verify e-commerce transactions, protect network security, and authenticate online access, biometric technologies are particularly well suited to work in conjunction with other technologies to create a multi-layered security infrastructure

BIOMETRICS:

· The word biometrics comes from the Greek words bio and metric, meaning ``life measurement''.

· By measuring something unique about an individual and using that to identify them, we can achieve a dramatic improvement in security of the key store.

· Newer biometric measurements include DNA from tissue samples, voice pattern, face pattern or even the arrangement of blood vessels in the retina or pattern of coloration in the cornea of the eye.

· The oldest and most widely accepted biometric is the fingerprint.

· The tip of every finger has a characteristic called ``friction ridges''.

· While generally similar, no two friction ridges are exactly the same.

· By imaging the ridges of the fingertips, we get the fingerprint.

SECURITY LEVEL:

· Integrating smart cards, biometrics and public key cryptography provides a solid foundation for developing secure applications and communications.

The highest level of security uses three-factor authentication:

1. Something you know (password or PIN)

2. Something you have (smart card, magnetic stripe card or a physical key)

3. Something you are (your fingerprint, retina scan or voice pattern)

AUTHENTICATION PATTERNS:

· An individual gains three-factor authentication by combining a smart card, biometric and PIN.

· If the user loses the smart card, the card is inoperable without the biometric.

· Forged fingerprints are weeded out with use of the PIN.

· In a smart-card-secure world, you are not locked into one form of authentication, such as a password or key.

BIOMETRIC SYSTEMS:

Biometric systems are :

· Automated.

· Mostly computerized systems.

· Used in Physio-biological measurements.

· Designed for detection of human body.(UNIQUE INDICATOR)


Saturday, April 25, 2009

MOBILE SOFTWARES

Installation Instructions for Mobile Softwares
 
Contents:
1. System Requirements
2. Installing on a Java enabled Phone (Nokia,Motorola,Sony,Samsung)
3. Installing on a Pocket PC
4. Installing on Palm OS (Treo, Lifedrive, Tungsten etc)
5. Installing on Blackberry OS 3.8+
 
 
1. System Requirements:
 
A Java-enabled phone that supports:
·        MIDP 2.0
·        JAR (Java Archive) files of size 800 KB or more.
·        120 KB of FREE RAM
·        Screen width of 128 pixels or more (135 pixels recommended)
 
 
2. Installing on a Java enabled phone.
   - There are SPECIAL Instructions for Motorola, Sony Ericsson and Samsung phones. Please read below!
   - If installing for a Motorola Phone, please refer to the instructions given below for Motorola Phones
   - Unzip the ZIP file on your PC desktop. Use WinZip (http://www.winzip.com) to unzip the file.
   - Ensure you have a Data-Cable or Bluetooth or Infra-red (along with its software) for transferring the file from your PC to your Mobile
   - Choose the right CLDC version (there should be a CLDC 1.0 and a 1.1 directory). Your phone will work with only one of the two. Try CLDC 1.0 first, if that doesn't work, try 1.1.
  - Browse into a chosen CLDC directory and transfer the .JAR file from the directory on your PC to your Mobile (e.g. transfer CLDC1.0\PrayerTimes.jar to your mobile). For this step, you will need a data cable that came with your phone, a cradle or bluetooth. Please consult your phone's manual for further details on how to transfer files from your PC to your mobile.
  - Once the file has been transferred to your mobile (you can transfer it to a storage card or main memory), open the transferred file from your mobile to begin installation
  - In some Nokia models (e.g. E61), your mobile may complain that it is unable to install the software as it's not 'Signed'. You can remove this warning by going into "Tools->Application Manager->Options->Settings" and change the 'Software Installation' option to 'All'.
 
·        Installing on a Motorola Phone
* Some Motorolas Only install Over The Air, so you will need to use WAP (http://wap.guidedways.com) to install, you may try the following as well.
*You will need a memory card installed in your phone
*Insert storage memory in the phone (if it is not already in.)
*Using USB cable, connect phone to PC.
*Double click on My Computer and open the newly mounted mobile drive
*You will see a "mobile" directory. Open it and there you will see a "kjava" folder.
*Copy jar file into the mobile's "kjava" folder
*After copying successfully, disconnect the mobile from PC.
*In the phone select Games & Apps from menu.
*Scroll down to the bottom and select "Memory Card"
*Select option [Install New] on the memory card screen
*Select PrayerTimes from list and install it.
 
 
·        Installing on a Sony Ericsson (Especially a P910i/P990i)
1. Obtain the latest copies of the softwares from the website
2. Install the PC Suite that comes with P910i (you can download it for free from the sony ericsson website)
3. Connect mobile with PC using Cradle
4. Use the "Install Software" option from Start->Programs->Sony Ericsson->P910i
5. It will ask for a *.SIS, *.JAD and *.JAR file. 
Eg: QuranReaderArabicMK.jar file and clicked Next
6. It will copy the file successfully and then install it successfully.
 
·        Installing on a Samsung Phones
*Note that not all Samsung phones support these softwares. Some have internal JAR limit. Moreover, most Samsungs will ONLY install softwares over WAP. You can download it via WAP from (http://wap.GuidedWays.com)
*For D500 and E730 especially, the method given is here. Please follow ALL steps mentioned there to by pass WAP restriction on Samsungs and install via BlueTooth/USB Cable: http://315.fiberworld.nl/d500
 
 
3.Installing on a Pocket PC
* Pocket PCs normally come with a "MIDlet Manager". Please check if you have a "MIDlet Manager" installed under 'Programs' on your Pocket PC. If you don't, you will need to dowload it and install it before copying the JAR files to your device. A MIDlet Manager is what enables Java programs on Pocket PCs. Click on the link below to download the zipped MIDlet Manager: http://www.guidedways.com/mobile/JMM.CAB.zip
*Installation Procedure: Simply unzip the above file, copy the CAB file to your Pocket PC and tap it from there. This will install the MIDlet Manager on your device.
*Reset your device
* Now copy the JAR files from your PC to your Pocket PC and tap the files from there. This should start the installation procedure. If it doesn't, then your mobile unfortunately does not support Prayer Times.
 
 
4. Installing on Palm OS
- Make sure you have the (FREE) IBM Webshpere JVM installed on your Palm before hand. Check it out at http://www.palm.com/us/support/jvm
- Open the Palm Desktop software on your PC and connect your Palm device to the PC using a USB cable
- Select "Quick Install" from Palm Desktop and drag the PRC files to the quick install window
- Press the HotSync button on your Palm USB cable
 
 
5. Installing on Blackberry OS 3.8+
- Unzip the ZIP file on your PC desktop. Use WinZip (http://www.winzip.com) to unzip the file.
- Open BlackBerry Desktop Manager and use a USB cable to load the .ALX file using the Desktop Manager


Friday, April 24, 2009

MOB USERS


SPY PHONE (TARGET AND SOURCE MOBILES-HACKING)TIPS

1. What is an IMEI number?

This is the 15 digit identification number specific to your handset. Every mobile phone has a different unique IMEI number. By pressing *#06# on the phone’s keypad will display the IMEI number or alternatively take a look behind the battery compartment where the IMEI number printed.

2. How do I find out my Firmware Version?

Press *#0000# on your phone's keypad to find out your firmware version. This is only a requirement we would need for technical issues.

3. What is a Pre-defined number and is it possible to change the number?

The pre-defined number must be a mobile number where all the information from the target phone is forwarded to. The spy software allows you to change the predefined number remotely at any time without any indication to the target phone.

4. When the spy mode is in operation, what are the coverage area/range restrictions?

The coverage area will be the same as any other standard GSM mobile phone, it depends on the coverage provided by the network provider. As for the range while using the spy mode - you can call it from anywhere in the world.

5. When in spy mode, how sensitive is the microphone and how far from the phone can people hear?

The microphone is that used to make a normal conversation located in the mouth piece of the phone. Though the microphone is very sensitive there is no way to know how far can you hear, the general rule is that you can hear the same as if someone 'forgot' to press the END button on the keypad.

6. Can people call from the spy phone to any other cell phone and listen to anyone's conversation?

No, if this is your understanding we suggest that you read our spy software description again. This is technically impossible.

7. Can the target phone be used for everyday use as a normal mobile phone?

Yes absolutely! spy software operates in its own environment and does not conflict in any way with the normal workings of the phone. You can make and receive calls and texts as normal, it will ring normally and perform according to the original manufacturer specifications. There is no way to tell by holding or using the spyphone that it is packed with 'Extra' superb features.

8. Can hackers install the software on other phones?
No. We generate the software file based on the unique IMEI (serial) number of your cell phone, therefore, the software will not work on other mobile phone.

9.Who pays for the forwarded texts?
The target phone SIM card will be charged by the network provider for any forwarded texts sent to the pre-defined number. If the network offers free text bundles(booster cards) then no charge will applys.


Thursday, April 23, 2009

RISK OF MOBILES


CELL PHONES AND POSSIBLE ADVERSE EFFECTS


READ PATIENTLY ITS MUST TO KNOW THIS ,SINCE ALL ARE USING MOBILE PHONES FREQUENTLY AND MANY PEOPLE EVEN SAY THAT THEIR BEST PARTNER IS HIS/HER OWN MOBILES.

The North American Brain Tumor Coalition (NABTC) has for a number of years carefully monitored the research related to the potential adverse effects associated with cell phone use. The NABTC urges these precautions in absence of definitive studies regarding the risks of cell phones.

· The Coalition urges the most expeditious possible completion of research studies, including one sponsored by the World Health Organization (WHO), to provide consumers better information about the risks created by their use of cell phones.

· In the absence of conclusive studies, we urge that individuals take simple precautions to limit their cell phone use and that they impose restrictions on the use of cell phones by children.

Background

It is estimated that almost 220 million Americans and nearly 2 billion people worldwide regularly use cell phones. If cell phones are convenient tools that have become an accepted way of life in the United States, they are the only reliable means of telephone communication in many parts of the world. Cell phone usage is expected to continue to grow worldwide.

Those who use cell phones are exposed to the radiofrequency (RF) energy, a non-ionizing form of radiation, emitted by the phones. Because of the widespread use of this relatively new technology, there is understandable concern about the health implications of use. When the WHO published a fact sheet on cell phones in 2000, it stated, “Given the immense numbers of mobile phones, even small adverse effects on health could have major public health implications.”

Research on Risks Associated with Cell Phone Use

Studies have been undertaken to determine whether RF exposure may increase the risk of cancer. To date, many of the studies have focused on whether RF energy can cause malignant or benign brain tumors.

A “Cell Phone Facts,” document for consumers developed by the Food and Drug Administration (FDA) and Federal Communications Commission (FCC) reviews the research on cell phones that has been completed to date. The document states:

· However, many of the studies that showed increased tumor development used animals that had been genetically engineered or treated with cancer-causing chemicals so as to be pre-disposed to develop cancer in the presence of RF exposure

· There is association between the use of wireless phones and primary brain cancer, glioma, meningioma, or acoustic neuroma, tumors of the brain or salivary gland, leukemia, or other cancers.

Recommended Precautions for Use

Many of the health agencies that have issued warnings note that the evidence does not necessarily support limitations on use but that the uncertainty regarding safety of cell phones and their widespread use support action.

In its 2000 Fact Sheet on cell phones, WHO stated:

Present scientific information does not indicate the need for any special precautions for use of mobile phones. If individuals are concerned, they might choose to limit their own or their children’s RF exposure by limiting the length of calls, or using “hands-free” devices to keep mobile phones away from the head and body”.

The United Kingdom in 2000 urged that cell phone use among children be limited and undertook a leafleting campaign to distribute information about limiting use by children.

In 2006, the Canadian government urged adults to moderate their cell phone use and the cell phone use of their children until the science regarding the risks of cell phones is clear.

The FCC and FDA in the United States say:

“If you must conduct extended conversations by wireless phone every day, you could place more distance between your body and the source of the RF, since the exposure level drops off dramatically with distance. For example, you could use a headset and carry the wireless phone away from your body or use a wireless phone connected to a remote antenna”.

The US agencies state that the precautions that are employed by adults may also be adopted by children.

Dr. Herberman said that release of the ten “prudent and simple precautions” to reduce exposure was based on the recommendations of an international panel of experts convened by the University of Pittsburgh. Those experts stated that, “…electromagnetic fields emitted by cell phones should be considered a potential human health risk.”

SO PLEASE BE CAUTIOUS ABOUT THIS ISSUE OF MOBILES.