Lg tricks

9:26 AM Reporter: bali 0 Responses
To check LG mobile or cellphones IMEI (International Mobile Equipment Identity)
On the main screen type *#06#

Information you get from the IMEI (International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP

TAC = Type approval code of your LG Mobile
FAC = Final assembly code of your cellphone
SNR = Serial number of your LG Phone
SP = Spare
Other secret tricks for LG mobile or cellphone
LG all models test mode:
Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*

LG-U81XX SPECIAL CODES
Code to read phone version :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM

- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'

Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*

Change closed caller group (settings >security settings>user groups) to 00000 and your phone will sound the message tone when you are near a radar speed trap.
Setting it to 500 will cause your phone 2 set off security alarms at shop exits.
Try this secret trick if you can handle the unexpected.
Note: This secret trick wont work with all phones Models.
THE DETECTIVE TRICK (Mobile Spying)
Now you can spy on anyone using your cellphone. Just do the following.
  1. Activate the "Automatic Answer" in the headset profile of your cellphone and set the ringing volume to "Mute"
  2. Short-circuit the left middle and right pins on the bottom of the mobile phone with all connections touching each other this will activate profile "Headset".
    If you cant do this just keep your earphone connected to mobile.
  3. Now place it under a table in a room and call it. Now you can use your phone for checking out what people are talking about in a room. Just call on your phone.
  4. The phone receives the call without ringing and you can listen to what people are saying.

    View all Tip & Tricks about LG Nokia Samsung Motorola Sony Ericsson BenQ-Siemens Bluejacking GSM Secrets
Our Free Newsletter
Enter your Email address:
Select your interests :
Mobile:
Windows:
Internet:
Webhosting:
Traffic Building:
SEO:
Earn Online:
Fun Zone:
Hosting by YMLP.com


Read more...

Make your cell phone spy free of cost

8:59 AM Reporter: bali 0 Responses
You can use ur cell phone as dectector (amazing spy trick for all cell phone)
  1. Activate the "Automatic Answer" in the headset profile of your cell phone and set the ringing volume to "Mute"
  2. Short-circuit the left middle and right pins on the bottom of the mobile phone with all connections touching each other this will activate profile "Headset".
    If you cant do this just keep your earphone connected to mobile.
  3. Now place it under a table in a room and call it. Now you can use your phone for checking out what people are talking about in a room. Just call on your phone.
  4. The phone receives the call without ringing and you can listen to what people are saying.

Refrance:http://en.wikipedia.org

Read more...

Nokia N97

1:00 AM Reporter: bali 0 Responses
The Nokia N97 is a touch screen combined phone and "mobile computer" in the Nseries of smartphones by Nokia, with a fold-out QWERTY keyboard.
Announced on 2 December 2008, the N97 is Nokia's second touchscreen phone (after the Nokia 5800 XpressMusic) that is based on the Nokia S60 platform.
The Nokia N97 was released in US flagship stores on 9 June 2009and soon after was released worldwide. In September 2009 it was reported that two million N97 handsets had been sold in three months following its release.
Many users have reported the camera lens cover of the N97 to cause scratches on the lens. Nokia has acknowledged that for some devices the cover is mounted too closely to the lens such that dust and debris causes straight lined scratches.
N97's come shipped with Quick Office, Adobe reader, Ovi Maps, Boingo, JoikuSpot Premium & the Ovi store. All but the Ovi store, Quick Office and Ovi Maps are trial versions.
Operating times
Informal tests have shown that the battery can last nearly two days despite regular use of the phone's various features.. Nokia quote the following claimed operating times
Talk time: Up to 6.0 hours (3G), 9.5 hours (GSM)
Standby time: Up to 17 days (3G), 18 days (GSM)
Video playback: Up to 4.5 hours (offline mode)
Video recording: Up to 3.6 hours (offline mode)
Music playback: Up to 40 hours (offline mode)

Price: NokiaN97Rs. 49,000




Refrance:http://en.wikipedia.org

Read more...

Nokia E90

12:46 AM Reporter: bali 0 Responses
Nokia E90 Communicator is a 3G smartphone made by Nokia and the latest model of the Communicator series. It was announced in February 2007 at the 3GSM show in Barcelona.
The first Nokia E90 unit was sold in an auction in Jakarta, Indonesia on May 17, 2007 for Rp. 45,000,000 (5,000 US$). Indonesia being one of the largest market share for Nokia's communicator series is cited as a reason for the unit's first launch location.
E90 starts the fifth generation of Nokia's communicators, and also introduces a new platform to Nokia's communicator line, Series 60 v3. Previous communicators have been based on either GeOS or Series 80. E90 is also the first Nokia communicator to have UMTS/HSDPA connectivity and integrated GPS. It features OSGi and eRCP, Eclipse RCP for embedded systems.
Early user-feedback and reviews highlighted a defect in the microphone of Nokia E90. Nokia initially denied the existence of the defect, but it was later acknowledged by Nokia Europe, and addressed in the Q3 earnings report released on October 18, 2007, stating that the issue has now been fully resolved. Early phones sold in Belgium offered a choice of English, Dutch or Romanian but not French language.
Firmware version 7.40.1.2, released in late October 2007, added support for A-GPS, intended to enhance GPS performance in poor signal conditions, such as in city streets overshadowed by buildings. This version also upgraded the Maps application. As of June 2009[update] the most recent firmware version is 400.34.93.
With new firmware, some users experience Bluetooth, wlan and radio problems. Some users report that, after installing new firmware, Bluetooth cannot be turned on, wlan can not find access points and radio reboots device whenever turned on. Nokia does not accept this problem. The devices under warranty coverage are replaced by Nokia, but others have no solution and can not be repaired. For reference please google "E90 Bluetooth problem"




Read more...

Iphone

12:16 AM Reporter: bali 0 Responses

The iPhone is an Internet and multimedia enabled smartphone designed and marketed by Apple Inc. Because its minimal hardware interface lacks a physical keyboard, the multi-touch screen renders a virtual keyboard when necessary. The iPhone functions as a camera phone (also including text messaging and visual voicemail), a portable media player (equivalent to a video iPod), and an Internet client (with email, web browsing, and Wi-Fi connectivity). The first-generation phone hardware was quad-band GSM with EDGE; the second generation added UMTS with 3.6 Mbps HSDPA; the third generation adds support for 7.2 Mbps HSDPA downloading but remains limited to 384 Kbps uploading as Apple had not implemented the HSPA protocol.
Apple announced the iPhone on January 9, 2007,after months of rumors and speculation. The original iPhone was introduced in the United States on June 29, 2007 before being marketed worldwide. Time magazine named it the Invention of the Year in 2007. Released July 11, 2008, the iPhone 3G supports faster 3G data speeds and assisted GPS. On March 17, 2009, Apple announced version 3.0 of the iPhone OS operating system for the iPhone (and iPod Touch), released on June 17, 2009. The iPhone 3GS was announced on June 8, 2009, and has improved performance, a camera with more megapixels and video capability, and voice control. It was released in the U.S., Canada and 6 European countries on June 19, 2009, in Australia and Japan on June 26, and saw international release in July and August, 2009.


Refrance:


Read more...

Communication Technology

12:47 AM Reporter: bali 0 Responses


Communication Technology

Communication technology provides access to information and markets. It connects people to various educational opportunities. Thus, communicat

ion technologies help in bringing about transformation in economies. The computer-mediated communication technology includes conferencing technologies and messaging systems. This technology also facilitates group work.

Communication technology helps to:

  • Develop thinking skills
  • Decreases the need for memorization of the facts
  • Evaluates current information
  • Develops accessing skills

Communication technologies also help in traini

ng the students. It promotes better understanding and coordination. The popular communication technologies are:

  • Telephone
  • E-mail
  • Fax
  • Internet
  • Video conferencing

Video-conferencing enables face to face interaction between the employees and their boss. It enables effective communication of ideas. Video-conferencing motivates employees. Students and teachers may also communicate through face to face interaction. Video-conferencing increases intimacy and promotes interaction.

Computer Technology

Computer technology promotes independence and self-assessment. It stimulates the interest of the students. The various programs in the system helps students in self-assessment. Word processor programs help students in organizing letters. Interactive computers also help students with their pronunciation. Computer technology assists people in learning languages. Teachers may re-evaluate their teaching methods with the help of computers. Teachers may also effectively use computer technology to enhance their teaching skills. Computer technology assists people with learning disabilities. The disabled people may use graphics software and word processor to express themselves. Computers help students to improve their spellings. Computer technologies also benefit people with speech disability. Students may film clips of their speech and replay them. Computer technology assists them in practicing their speech skills.

Management Technology

Management technology protects the sensitive corporate information. Management technologies offer solutions to many IT problems. It also reduces IT costs. An effective management technology should provide the following benefits:

  • Trouble shooting and recovery: It increases the efficiency of IT staff.
  • Non volatile storage: It survives system rebuilds.
  • Proactive alerting: It decreases downtime.
  • Tamper resistant agents: It prevents users from disturbing the software.

An effective management technology helps technicians in obtaining accurate inventory information. This technology improves asset management and reduces desk-side visits.


Read more...

Internet

10:27 PM Reporter: bali 0 Responses



Jump to: navigation, search

This article is about the public worldwide computer network system. For other uses, see Internet (disambiguation).

This article is semi-protected due to vandalism.

Visualization of the various routes through a portion of the Internet

The Internet is a global system of interconnected computer networks that use the standardized Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless connections, and other technologies. The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. In addition it supports popular services such as online chat, file transfer and file sharing, gaming, commerce, social networking, publishing, video on demand, and teleconferencing and telecommunications. Voice over Internet Protocol (VoIP) applications allow person-to-person communication via voice and video.

The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.

Terminology

See also: Internet capitalization conventions

The terms Internet and World Wide Web are often used in everyday speech without much distinction. However, the Internet and the World Wide Web are not one and the same. The Internet is a global data communications system. It is a hardware and software infrastructure that provides connectivity between computers. In contrast, the Web is one of the services communicated via the Internet. It is a collection of interconnected documents and other resources, linked by hyperlinks and URLs.[1] The term the Internet, when referring to the Internet, has traditionally been treated as a proper noun and written with an initial capital letter. There is a trend to regard it as a generic term or common noun and thus write it as "the internet", without the capital.

History

Main article: History of the Internet

The USSR's launch of Sputnik spurred the United States to create the Advanced Research Projects Agency, known as ARPA, in February 1958 to regain a technological lead.[2][3] ARPA created the Information Processing Technology Office (IPTO) to further the research of the Semi Automatic Ground Environment (SAGE) program, which had networked country-wide radar systems together for the first time. J. C. R. Licklider was selected to head the IPTO. Licklider moved from the Psycho-Acoustic Laboratory at Harvard University to MIT in 1950, after becoming interested in information technology. At MIT, he served on a committee that established Lincoln Laboratory and worked on the SAGE project. In 1957 he became a Vice President at BBN, where he bought the first production PDP-1 computer and conducted the first public demonstration of time-sharing.

Professor Leonard Kleinrock with one of the first ARPANET Interface Message Processors at UCLA

At the IPTO, Licklider got Lawrence Roberts to start a project to make a network, and Roberts based the technology on the work of Paul Baran,[4] who had written an exhaustive study for the United States Air Force that recommended packet switching (opposed to circuit switching) to achieve better network robustness and disaster survivability. UCLA professor Leonard Kleinrock had provided the theoretical foundations for packet networks in 1962, and later, in the 1970s, for hierarchical routing, concepts which have been the underpinning of the development towards today's Internet.

After much work, the first two nodes of what would become the ARPANET were interconnected between UCLA's School of Engineering and Applied Science and SRI International (SRI) in Menlo Park, California, on October 29, 1969. The ARPANET was one of the "eve" networks of today's Internet. Following on from the demonstration that packet switching worked on the ARPANET, the British Post Office, Telenet, DATAPAC and TRANSPAC collaborated to create the first international packet-switched network service. In the UK, this was referred to as the International Packet Switched Service (IPSS), in 1978. The collection of X.25-based networks grew from Europe and the US to cover Canada, Hong Kong and Australia by 1981. The X.25 packet switching standard was developed in the CCITT (now called ITU-T) around 1976.

A plaque commemorating the birth of the Internet at Stanford University

X.25 was independent of the TCP/IP protocols that arose from the experimental work of DARPA on the ARPANET, Packet Radio Net and Packet Satellite Net during the same time period. Vinton Cerf and Robert Kahn developed the first description of the TCP protocols during 1973 and published a paper on the subject in May 1974. Use of the term "Internet" to describe a single global TCP/IP network originated in December 1974 with the publication of RFC 675, the first full specification of TCP that was written by Vinton Cerf, Yogen Dalal and Carl Sunshine, then at Stanford University. During the next nine years, work proceeded to refine the protocols and to implement them on a wide range of operating systems. The first TCP/IP-based wide-area network was operational by January 1, 1983 when all hosts on the ARPANET were switched over from the older NCP protocols. In 1985, the United States' National Science Foundation (NSF) commissioned the construction of the NSFNET, a university 56 kilobit/second network backbone using computers called "fuzzballs" by their inventor, David L. Mills. The following year, NSF sponsored the conversion to a higher-speed 1.5 megabit/second network. A key decision to use the DARPA TCP/IP protocols was made by Dennis Jennings, then in charge of the Supercomputer program at NSF.

The opening of the network to commercial interests began in 1988. The US Federal Networking Council approved the interconnection of the NSFNET to the commercial MCI Mail system in that year and the link was made in the summer of 1989. Other commercial electronic e-mail services were soon connected, including OnTyme, Telemail and Compuserve. In that same year, three commercial Internet service providers (ISPs) were created: UUNET, PSINet and CERFNET. Important, separate networks that offered gateways into, then later merged with, the Internet include Usenet and BITNET. Various other commercial and educational networks, such as Telenet, Tymnet, Compuserve and JANET were interconnected with the growing Internet. Telenet (later called Sprintnet) was a large privately funded national computer network with free dial-up access in cities throughout the U.S. that had been in operation since the 1970s. This network was eventually interconnected with the others in the 1980s as the TCP/IP protocol became increasingly popular. The ability of TCP/IP to work over virtually any pre-existing communication networks allowed for a great ease of growth, although the rapid growth of the Internet was due primarily to the availability of an array of standardized commercial routers from many companies, the availability of commercial Ethernet equipment for local-area networking, and the widespread implementation and rigorous standardization of TCP/IP on UNIX and virtually every other common operating system.

This NeXT Computer was used by Berners-Lee at CERN and became the world's first Web server.

Although the basic applications and guidelines that make the Internet possible had existed for almost two decades, the network did not gain a public face until the 1990s. On 6 August 1991, CERN, a pan European organisation for particle research, publicized the new World Wide Web project. The Web was invented by English scientist Tim Berners-Lee in 1989. An early popular web browser was ViolaWWW, patterned after HyperCard and built using the X Window System. It was eventually replaced in popularity by the Mosaic web browser. In 1993, the National Center for Supercomputing Applications at the University of Illinois released version 1.0 of Mosaic, and by late 1994 there was growing public interest in the previously academic, technical Internet. By 1996 usage of the word Internet had become commonplace, and consequently, so had its use as a synecdoche in reference to the World Wide Web.

Meanwhile, over the course of the decade, the Internet successfully accommodated the majority of previously existing public computer networks (although some networks, such as FidoNet, have remained separate). During the 1990s, it was estimated that the Internet grew by 100 percent per year, with a brief period of explosive growth in 1996 and 1997.[5] This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary open nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network. [6] Using various statistics, Advanced Micro Devices estimated the population of Internet users to be 1.5 billion as of January 2009.[7]

Technology

Protocols

Main article: Internet Protocol Suite

The complex communications infrastructure of the Internet consists of its hardware components and a system of software layers that control various aspects of the architecture. While the hardware can often be used to support other software systems, it is the design and the rigorous standardization process of the software architecture that characterizes the Internet and provides the foundation for its scalability and success. The responsibility for the architectural design of the Internet software systems has been delegated to the Internet Engineering Task Force (IETF).[8] The IETF conducts standard-setting work groups, open to any individual, about the various aspects of Internet architecture. Resulting discussions and final standards are published in a series of publications, called Request for Comments (RFCs), freely available on the IETF web site. The principal methods of networking that enable the Internet are contained in specially designated RFCs that constitute the Internet Standards.

These standards describe a framework known as the Internet Protocol Suite. This is a model architecture that divides methods into a layered system of protocols (RFC 1122, RFC 1123). The layers correspond to the environment or scope in which their services operate. At the top is the Application Layer, the space for the application-specific networking methods used in software applications, e.g., a web browser program. Below this top layer, the Transport Layer connects applications on different hosts via the network (e.g., client-server model) with appropriate data exchange methods. Underlying these layers are the core networking technologies, consisting of two layers. The Internet Layer enables computers to identify and locate each other via Internet Protocol (IP) addresses, and allows them to connect to one-another via intermediate (transit) networks. Lastly, at the bottom of the architecture, is a software layer, the Link Layer, that provides connectivity between hosts on the same local network link, such as a local area network (LAN) or a dial-up connection. The model, also known as TCP/IP, is designed to be independent of the underlying hardware which the model therefore does not concern itself with in any detail. Other models have been developed, such as the Open Systems Interconnection (OSI) model, but they are not compatible in the details of description, nor implementation, but many similarities exist and the TCP/IP protocols are usually included in the discussion of OSI networking.

The most prominent component of the Internet model is the Internet Protocol (IP) which provides addressing systems (IP addresses) for computers on the Internet. IP enables internetworking and essentially establishes the Internet itself. IP Version 4 (IPv4) is the initial version used on the first generation of the today's Internet and is still in dominant use. It was designed to address up to ~4.3 billion (109) Internet hosts. However, the explosive growth of the Internet has led to IPv4 address exhaustion which is estimated to enter its final stage in approximately 2011.[9] A new protocol version, IPv6, was developed in the mid 1990s which provides vastly larger addressing capabilities and more efficient routing of Internet traffic. IPv6 is currently in commercial deployment phase around the world and Internet address registries (RIRs) have begun to urge all resource managers to plan rapid adoption and conversion.[10]

IPv6 is not interoperable with IPv4. It essentially establishes a "parallel" version of the Internet not directly accessible with IPv4 software. This means software upgrades or translator facilities are necessary for every networking device that needs to communicate on the IPv6 Internet. Most modern computer operating systems are already converted to operate with both versions of the Internet Protocol. Network infrastructures, however, are still lagging in this development. Aside from the complex physical connections that make up its infrastructure, the Internet is facilitated by bi- or multi-lateral commercial contracts (e.g., peering agreements), and by technical specifications or protocols that describe how to exchange data over the network. Indeed, the Internet is defined by its interconnections and routing policies.

Structure

The Internet structure and its usage characteristics have been studied extensively. It has been determined that both the Internet IP routing structure and hypertext links of the World Wide Web are examples of scale-free networks. Similar to the way the commercial Internet providers connect via Internet exchange points, research networks tend to interconnect into large subnetworks such as GEANT, GLORIAD, Internet2 (successor of the Abilene Network), and the UK's national research and education network JANET. These in turn are built around smaller networks (see also the list of academic computer network organizations).

Many computer scientists describe the Internet as a "prime example of a large-scale, highly engineered, yet highly complex system".[11] The Internet is extremely heterogeneous; for instance, data transfer rates and physical characteristics of connections vary widely. The Internet exhibits "emergent phenomena" that depend on its large-scale organization. For example, data transfer rates exhibit temporal self-similarity. The principles of the routing and addressing methods for traffic in the Internet reach back to their origins the 1960s when the eventual scale and popularity of the network could not be anticipated. Thus, the possibility of developing alternative structures is investigated.[12]

Governance

Main article: Internet governance

ICANN headquarters in Marina Del Rey, California, United States

The Internet is a globally distributed network comprising many voluntarily interconnected autonomous networks. It operates without a central governing body. However, to maintain interoperability, all technical and policy aspects of the underlying core infrastructure and the principal name spaces are administered by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered in Marina del Rey, California. ICANN is the authority that coordinates the assignment of unique identifiers for use on the Internet, including domain names, Internet Protocol (IP) addresses, application port numbers in the transport protocols, and many other parameters. Globally unified name spaces, in which names and numbers are uniquely assigned, are essential for the global reach of the Internet. ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. The US government continues to have the primary role in approving changes to the DNS root zone that lies at the heart of the domain name system. ICANN's role in coordinating the assignment of unique identifiers distinguishes it as perhaps the only central coordinating body on the global Internet. On November 16, 2005, the World Summit on the Information Society, held in Tunis, established the Internet Governance Forum (IGF) to discuss Internet-related issues.

Modern uses

The Internet is allowing greater flexibility in working hours and location, especially with the spread of unmetered high-speed connections and web applications.

The Internet can now be accessed almost anywhere by numerous means, especially through mobile Internet devices. Mobile phones, datacards, handheld game consoles and cellular routers allow users to connect to the Internet from anywhere there is a wireless network supporting that device's technology. Within the limitations imposed by small screens and other limited facilities of such pocket-sized devices, services of the Internet, including email and the web, may be available. Service providers may restrict the services offered and wireless data transmission charges may be significantly higher than other access methods.

The Internet has also become a large market for companies; some of the biggest companies today have grown by taking advantage of the efficient nature of low-cost advertising and commerce through the Internet, also known as e-commerce. It is the fastest way to spread information to a vast number of people simultaneously. The Internet has also subsequently revolutionized shopping—for example; a person can order a CD online and receive it in the mail within a couple of days, or download it directly in some cases. The Internet has also greatly facilitated personalized marketing which allows a company to market a product to a specific person or a specific group of people more so than any other advertising medium. Examples of personalized marketing include online communities such as MySpace, Friendster, Orkut, Facebook and others which thousands of Internet users join to advertise themselves and make friends online. Many of these users are young teens and adolescents ranging from 13 to 25 years old. In turn, when they advertise themselves they advertise interests and hobbies, which online marketing companies can use as information as to what those users will purchase online, and advertise their own companies' products to those users.

The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has made collaborative work dramatically easier, with the help of collaborative software. Not only can a group cheaply communicate and share ideas, but the wide reach of the Internet allows such groups to easily form in the first place. An example of this is the free software movement, which has produced, among other programs, Linux, Mozilla Firefox, and OpenOffice.org. Internet "chat", whether in the form of IRC chat rooms or channels, or via instant messaging systems, allow colleagues to stay in touch in a very convenient way when working at their computers during the day. Messages can be exchanged even more quickly and conveniently than via e-mail. Extensions to these systems may allow files to be exchanged, "whiteboard" drawings to be shared or voice and video contact between team members.

Version control systems allow collaborating teams to work on shared sets of documents without either accidentally overwriting each other's work or having members wait until they get "sent" documents to be able to make their contributions. Business and project teams can share calendars as well as documents and other information. Such collaboration occurs in a wide variety of areas including scientific research, software development, conference planning, political activism and creative writing. Social and political collaboration is also becoming more widespread as both Internet access and computer literacy grow. From the flash mob 'events' of the early 2000s to the use of social networking in the 2009 Iranian election protests, the Internet allows people to work together more effectively and in many more ways than was possible without it.

The Internet allows computer users to remotely access other computers and information stores easily, wherever they may be across the world. They may do this with or without the use of security, authentication and encryption technologies, depending on the requirements. This is encouraging new ways of working from home, collaboration and information sharing in many industries. An accountant sitting at home can audit the books of a company based in another country, on a server situated in a third country that is remotely maintained by IT specialists in a fourth. These accounts could have been created by home-working bookkeepers, in other remote locations, based on information e-mailed to them from offices all over the world. Some of these things were possible before the widespread use of the Internet, but the cost of private leased lines would have made many of them infeasible in practice. An office worker away from their desk, perhaps on the other side of the world on a business trip or a holiday, can open a remote desktop session into his normal office PC using a secure Virtual Private Network (VPN) connection via the Internet. This gives the worker complete access to all of his or her normal files and data, including e-mail and other applications, while away from the office. This concept is also referred to by some network security people as the Virtual Private Nightmare, because it extends the secure perimeter of a corporate network into its employees' homes.

Services

Information

Many people use the terms Internet and World Wide Web (or just the Web) interchangeably, but, as discussed earlier, the two terms are not synonymous. The World Wide Web is a global set of documents, images and other resources, referenced and interconnected by Uniform Resource Locators (URLs) and hyperlinks. These URLs allow users to address the web servers and other devices that store these resources and access them as required using the Hypertext Transfer Protocol (HTTP). HTTP is only one of the communication protocols used on the Internet. Web services may also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.

Software products that can access the resources of the Web are often called user agents. In normal use, web browsers, such as Internet Explorer, Firefox, Opera, Apple Safari, and Google Chrome, let users navigate from one web page to another via hyperlinks. Documents on the web may contain any combination of computer data, including graphics, sounds, text, video, multimedia and interactive content including games, office applications and scientific demonstrations. Through keyword-driven Internet research using search engines like Yahoo! and Google, users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed encyclopedias and traditional libraries, the World Wide Web has enabled a sudden and extreme decentralization of information and data.

Using the Web, it is also easier than ever before for individuals and organizations to publish ideas and information to a potentially large audience. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available. Publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition, however. Many individuals and some companies and groups use web logs or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result. One example of this practice is Microsoft, whose product developers publish their personal blogs in order to pique the public's interest in their work. Collections of personal web pages published by large service providers remain popular, and have become increasingly sophisticated. Whereas operations such as Angelfire and GeoCities have existed since the early days of the Web, newer offerings from, for example, Facebook and MySpace currently have large followings. These operations often brand themselves as social network services rather than simply as web page hosts.

Advertising on popular web pages can be lucrative, and e-commerce or the sale of products and services directly via the Web continues to grow. In the early days, web pages were usually created as sets of complete and isolated HTML text files stored on a web server. More recently, websites are more often created using content management or wiki software with, initially, very little content. Contributors to these systems, who may be paid staff, members of a club or other organization or members of the public, fill underlying databases with content using editing pages designed for that purpose, while casual visitors view and read this content in its final HTML form. There may or may not be editorial, approval and security systems built into the process of taking newly entered content and making it available to the target visitors.

Communication

E-mail is an important communications service available on the Internet. The concept of sending electronic text messages between parties in a way analogous to mailing letters or memos predates the creation of the Internet. Today it can be important to distinguish between internet and internal e-mail systems. Internet e-mail may travel and be stored unencrypted on many other networks and machines out of both the sender's and the recipient's control. During this time it is quite possible for the content to be read and even tampered with by third parties, if anyone considers it important enough. Purely internal or intranet mail systems, where the information never leaves the corporate or organization's network, are much more secure, although in any organization there will be IT and other personnel whose job may involve monitoring, and occasionally accessing, the e-mail of other employees not addressed to them. Pictures, documents and other files can be sent as e-mail attachments. E-mails can be cc-ed to multiple e-mail addresses.

Internet telephony is another common communications service made possible by the creation of the Internet. VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all Internet communication. The idea began in the early 1990s with walkie-talkie-like voice applications for personal computers. In recent years many VoIP systems have become as easy to use and as convenient as a normal telephone. The benefit is that, as the Internet carries the voice traffic, VoIP can be free or cost much less than a traditional telephone call, especially over long distances and especially for those with always-on Internet connections such as cable or ADSL. VoIP is maturing into a competitive alternative to traditional telephone service. Interoperability between different providers has improved and the ability to call or receive a call from a traditional telephone is available. Simple, inexpensive VoIP network adapters are available that eliminate the need for a personal computer.

Voice quality can still vary from call to call but is often equal to and can even exceed that of traditional calls. Remaining problems for VoIP include emergency telephone number dialling and reliability. Currently, a few VoIP providers provide an emergency service, but it is not universally available. Traditional phones are line-powered and operate during a power failure; VoIP does not do so without a backup power source for the phone equipment and the Internet access devices. VoIP has also become increasingly popular for gaming applications, as a form of communication between players. Popular VoIP clients for gaming include Ventrilo and Teamspeak. Wii, PlayStation 3, and Xbox 360 also offer VoIP chat features.

Data transfer

File sharing is an example of transferring large amounts of data across the Internet. A computer file can be e-mailed to customers, colleagues and friends as an attachment. It can be uploaded to a website or FTP server for easy download by others. It can be put into a "shared location" or onto a file server for instant use by colleagues. The load of bulk downloads to many users can be eased by the use of "mirror" servers or peer-to-peer networks. In any of these cases, access to the file may be controlled by user authentication, the transit of the file over the Internet may be obscured by encryption, and money may change hands for access to the file. The price can be paid by the remote charging of funds from, for example, a credit card whose details are also passed—usually fully encrypted—across the Internet. The origin and authenticity of the file received may be checked by digital signatures or by MD5 or other message digests. These simple features of the Internet, over a worldwide basis, are changing the production, sale, and distribution of anything that can be reduced to a computer file for transmission. This includes all manner of print publications, software products, news, music, film, video, photography, graphics and the other arts. This in turn has caused seismic shifts in each of the existing industries that previously controlled the production and distribution of these products.

Streaming media refers to the act that many existing radio and television broadcasters promote Internet "feeds" of their live audio and video streams (for example, the BBC). They may also allow time-shift viewing or listening such as Preview, Classic Clips and Listen Again features. These providers have been joined by a range of pure Internet "broadcasters" who never had on-air licenses. This means that an Internet-connected device, such as a computer or something more specific, can be used to access on-line media in much the same way as was previously possible only with a television or radio receiver. The range of material is much wider, from pornography to highly specialized, technical webcasts. Podcasting is a variation on this theme, where—usually audio—material is downloaded and played back on a computer or shifted to a portable media player to be listened to on the move. These techniques using simple equipment allow anybody, with little censorship or licensing control, to broadcast audio-visual material worldwide.

Webcams can be seen as an even lower-budget extension of this phenomenon. While some webcams can give full-frame-rate video, the picture is usually either small or updates slowly. Internet users can watch animals around an African waterhole, ships in the Panama Canal, traffic at a local roundabout or monitor their own premises, live and in real time. Video chat rooms and video conferencing are also popular with many uses being found for personal webcams, with and without two-way sound. YouTube was founded on 15 February 2005 and is now the leading website for free streaming video with a vast number of users. It uses a flash-based web player to stream and show video files. Registered users may upload an unlimited amount of video and build their own personal profile. YouTube claims that its users watch hundreds of millions, and upload hundreds of thousands, of videos daily.[13]

Accessibility

See also: Internet access worldwide, List of countries by number of Internet users, English on the Internet, Global Internet usage, and Unicode

The prevalent language for communication on the Internet is English. This may be a result of the origin of the Internet, as well as English's role as a lingua franca. It may also be related to the poor capability of early computers, largely originating in the United States, to handle characters other than those in the English variant of the Latin alphabet. After English (29% of Web visitors) the most requested languages on the World Wide Web are Chinese (22%), Spanish (8%), Japanese (6%), French (5%), Portuguese and German (4% each), Arabic (3%) and Russian and Korean (2% each).[14] By region, 42% of the world's Internet users are based in Asia, 24% in Europe, 15% in North America, 11% in Latin America and the Caribbean taken together, 4% in Africa, 3% in the Middle East and 1% in Australia/Oceania.[15] The Internet's technologies have developed enough in recent years, especially in the use of Unicode, that good facilities are available for development and communication in most widely used languages. However, some glitches such as mojibake (incorrect display of foreign language characters, also known as kryakozyabry) still remain.

Common methods of Internet access in homes include dial-up, landline broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite and 3G technology cell phones. Public places to use the Internet include libraries and Internet cafes, where computers with Internet connections are available. There are also Internet access points in many public places such as airport halls and coffee shops, in some cases just for brief use while standing. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels now also have public terminals, though these are usually fee-based. These terminals are widely accessed for various usage like ticket booking, bank deposit, online payment etc. Wi-Fi provides wireless access to computer networks, and therefore can do so to the Internet itself. Hotspots providing such access include Wi-Fi cafes, where would-be users need to bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services covering large city areas are in place in London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be accessed from such places as a park bench.[16] Apart from Wi-Fi, there have been experiments with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular phone networks, and fixed wireless services. High-end mobile phones such as smartphones generally come with Internet access through the phone network. Web browsers such as Opera are available on these advanced handsets, which can also run a wide variety of other Internet software. More mobile phones have Internet access than PCs, though this is not as widely used. An Internet access provider and protocol matrix differentiates the methods used to get online.

Social impact

Main article: Sociology of the Internet

The Internet has made possible entirely new forms of social interaction, activities and organizing, thanks to its basic features such as widespread usability and access. Social networking websites such as Facebook and MySpace have created a new form of socialization and interaction. Users of these sites are able to add a wide variety of items to their personal pages, to indicate common interests, and to connect with others. It is also possible to find a large circle of existing acquaintances, especially if a site allows users to utilize their real names, and to allow communication among large existing groups of people. Sites like meetup.com exist to allow wider announcement of groups which may exist mainly for face-to-face meetings, but which may have a variety of minor interactions over their group's site at meetup.org, or other similar sites.

The first generation is now being raised with widespread availability of Internet connectivity, with consequences for privacy, identity, and copyright concerns. These "Digital natives" face a variety of concerns that were not present for prior generations.

In democratic societies, the Internet has achieved new relevance as a political tool, leading to Internet censorship by some states. The presidential campaign of Howard Dean in 2004 in the United States became famous for its ability to generate donations via the Internet. Many political groups use the Internet to achieve a whole new method of organizing, in order to carry out Internet activism. Some governments, such as those of Iran, North Korea, Myanmar, the People's Republic of China, and Saudi Arabia, restrict what people in their countries can access on the Internet, especially political and religious content. This is accomplished through software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention.

In Norway, Denmark, Finland[17] and Sweden, major Internet service providers have voluntarily (possibly to avoid such an arrangement being turned into law) agreed to restrict access to sites listed by police. While this list of forbidden URLs is only supposed to contain addresses of known child pornography sites, the content of the list is secret. Many countries, including the United States, have enacted laws making the possession or distribution of certain material, such as child pornography, illegal, but do not use filtering software. There are many free and commercially available software programs, called content-control software, with which a user can choose to block offensive websites on individual computers or networks, such as to limit a child's access to pornography or violence.

The Internet has been a major source of leisure since before the World Wide Web, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much of the main traffic. Today, many Internet forums have sections devoted to games and funny videos; short cartoons in the form of Flash movies are also popular. Over 6 million people use blogs or message boards as a means of communication and for the sharing of ideas. The pornography and gambling industries have both taken full advantage of the World Wide Web, and often provide a significant source of advertising revenue for other websites. Although many governments have attempted to put restrictions on both industries' use of the Internet, this has generally failed to stop their widespread popularity.

One main area of leisure on the Internet is multiplayer gaming. This form of leisure creates communities, bringing people of all ages and origins to enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing games to online gambling. This has revolutionized the way many people interact and spend their free time on the Internet. While online gaming has been around since the 1970s, modern modes of online gaming began with services such as GameSpy and MPlayer, to which players of games would typically subscribe. Non-subscribers were limited to certain types of game play or certain games. Many use the Internet to access and download music, movies and other works for their enjoyment and relaxation. As discussed above, there are paid and unpaid sources for all of these, using centralized servers and distributed peer-to-peer technologies. Some of these sources take more care over the original artists' rights and over copyright laws than others.

Many use the World Wide Web to access news, weather and sports reports, to plan and book holidays and to find out more about their random ideas and casual interests. People use chat, messaging and e-mail to make and stay in touch with friends worldwide, sometimes in the same way as some previously had pen pals. Social networking websites like MySpace, Facebook and many others like them also put and keep people in contact for their enjoyment. The Internet has seen a growing number of Web desktops, where users can access their files, folders, and settings via the Internet. Cyberslacking can become a serious drain on corporate resources; the average UK employee spent 57 minutes a day surfing the Web while at work, according to a 2003 study by Peninsula Business Services.



From Wikipedia, the free encyclopedia


Read more...

Coming Back From China? Throw Your Phone Out

5:32 AM Reporter: bali 0 Responses


According to the

government, if you're coming back from China you probably want to ditch your phone. You know, just in case. More »


http://gizmodo.com

Read more...

Wireless Infrared Home Security System From LoveToKnow Safety

5:25 AM Reporter: bali 0 Responses

To help protect your home and family, consider installing a wireless infrared home security system. While no one likes to think about their home being broken into, the fact is a burglar can strike any of us—at any time. Even if you live in a low crime neighborhood, that doesn’t stop thieves from targeting your home. No security system is perfect, but having no security system makes your home easier to break into than a home with a system.

Wireless Security System















http://safety.lovetoknow.com

Read more...

Sponcer ad

3:31 AM Reporter: bali 0 Responses

Read more...

Sony Handycam TG5V With GPS

7:31 AM Reporter: bali 0 Responses

Sony Handycam TG5V With GPS

The new TG5V (or TG7 in Europe) is a successor to the Sony Handycam TG1. Weighing at 230 grams and measuring 30mm x 117mm x 62mm, the camcorder is now lighter and smaller than its predecessor. The video camera offers 16GB of Internal memory (or 6hours of video recoding), a 30mm wide angle, a new BIONZ and Exemor image processor for low light recording, and new coating for the Camera body to prevent scratches. An integrated GPS antenna and NAVTEQ maps can be used to automatically geo-tag videos or images to keep a record of the exact shooting location. The Sony Handycam TG5V will be available in Japan from April 20 onward.





http://www.techfresh.net/

Read more...

Cellular Phone/GPS "Burs t" Tracking Device Jammer

12:00 AM Reporter: bali 1 Response


Cellular Phone/GPS "Burs

t" Tracking Device Jammer


Developed for GBPPR's Directorate of Operations case officers operating out in the field, this device uses a neat little trick to j

am most of the common cellular modem (CDPD or analog AMPS) controlled GPS tracking devices.

First, a custom cut Fox 225.06 MHz clock oscillator is filtered with a 1575 MHz GPS bandpass filter isolating its 1575.42 MHz 7th harmonic. This harmonic is further amplified and sent to a small, low cost, surface mount antenna. This produces a limited range continous wave (CW) jammer centered on the GPS L1 frequency.

This jammer only has an effective range of a few meters and only jams the lower-cost standard positioning service (SPS) GPS receivers.

Second, a common 45 MHz clock oscillator drives the local oscillator port on a Mini-Circuits mixer. The RF & IF ports and connected to two small, low cost, surface mount 800 MHz antennas. Here's the trick, any cellular phone that attempts to call out is "jammed" by its own signal! This works because the phone's transmit and receive frequency are always separated by 45 MHz.

Example: your phone transmits on 837 MHz and receives at 882 MHz. If you were to mix the 837 MHz transmitted signal with a 45 MHz signal, the new mixer output frequency would be 882 MHz - and the phone would essentially jam itself.

This is very useful against "burst" tracking devices which may record your movements for a week or so at a time, then wait until 3 A.M. when your sleeping to burst out a quick phone call to KGB headquarters to upload the tracking data. It also prevents any computer record of phone calls or RF direction finding of the phone's signal from revealing your location.

This jammer also only has an effective range of a few meters (if that) and only jams analog AMPS cellular phones or CDPD modems.

This jammer should also work on the General Motors' (GM) OnStar Navigation System. The unit I saw utilized an old Motorola AMPS phone for communication.

Schematic

Device for Detecting GPS Receivers

Here is an example of using an old AM radio to detect GPS receivers.

Simple 800 MHz Cellular Phone Jammer

Passive cellular phone jammer.











Read more...

Science Info © 2008 Template by:
SkinCorner