Saturday, February 9, 2008

INFORMATION……

I think, Many of us don't know the following facts....

1. Chewing on gum while cutting onions can help a person from stop producing tears.
Try it next time you chop onions.



2. Until babies are six months old, they can breathe and swallow at the same time. Indeed convenient!



3. Offered a new pen to write with, 97% of all people will write their own name.



4. Male mosquitoes are vegetarians. Only females bite.


5. The average person's field of vision encompasses a 200-degree wide angle.


6. To find out if a watermelon is ripe, knock it, and if it sounds hollow then it is ripe.



7. Canadians can send letters with personalized postage stamps showing their own photos on each stamp.


8. Babies' eyes do not produce tears until the baby is approximately six to eight weeks old.


9. It snowed in the Sahara Desert in February of 1979.


10. Plants watered with warm water grow larger and more quickly than plants watered with cold water.


11. Wearing headphones for just an hour will increase the bacteria in your ear by 700 times.

12. Grapes explode when you put them in the microwave.


13. Those stars and colours you see when you rub your eyes are called phosphenes.



14. Our eyes are always the same size from birth, but our nose and ears never stop growing.





15. Everyone's tongue print is different, like fingerprints.



16. Contrary to popular belief, a swallowed chewing gum doesn't stay in the gut. It will pass through the system and be excreted.



17. At 40 Centigrade a person loses about 14.4 calories per hour by breathing.



18. There is a hotel in Sweden built entirely out of ice; it is rebuilt every year.



19. Cats, camels and giraffes are the only animals in the world that walk right foot, right foot, left foot, left foot, rather than right foot, left foot.





20. Onions help reduce cholesterol if eaten after a fatty meal.



21. The sound you hear when you crack your knuckles is actually the sound of nitrogen gas bubbles bursting.

Friday, February 8, 2008

Look at the following two pictures of the calendars carefully!!!!







Have u ever seen the calendar for September 1752???

If you are working in Unix, try this out.


At $ prompt, type: cal 9 1752
Surprised??? ?
not only in unix, u can also search it in google
See the explanation for what you see.

Isn't the output queer?

A month with whole of eleven days missing.

This was the time England shifted from Roman Julian Calendar to the Gregorian Calendar, and the king of England ordered those 11 days to be wiped off the face of the month of September of 1752. (What couldn't a King do in those days?!) And yes, the workers worked for 11 days less, but got paid for the entire 30 days.

And that's how "Paid Leave" was born.Hail the King!!!

Just try this....

1. Open a blank Notepad file
2. Write .LOG as the first line of the file, followed by a enter. Save the file and close it.
3. Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the line after.
4. Type your notes and then save and close the file.and see the fun.

If you share your Windows XP.Professional system with many other users, you have no doubt experienced how pressing Ctrl+Alt+Del results in the name of the last user logged on to be displayed automatically in the username portion of the logon box. While this is great if you were the last one to log on, it can be frustrating if you weren’t. More often than not, users won’t even bother looking at the username portion of the box and just type their password, resulting in a failed logon.

To address this issue, you may want to consider disabling the automatic display of the last user’s name in the logon dialog box. This is accomplished via a Registry edit. To ensure that the user portion of the logon box remains unpopulated, follow these steps:

1. Click Start > Run. Type Regedit.exe in the Open text box and click OK.
2. Browse to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. Right click in the right-hand side of the screen and select New > DWORD value. Name the value DontDisplayLastUserName.
4. Double-click DontDisplayLastUserName and set its value to 1.


You can subsequently re-enable the setting by changing its value to 0 if need be. Close the Registry Editor and reboot to check your new logon settings.

Wednesday, January 30, 2008

Power of Innovation!! !

Radical new tire design by Michelin. The next generation of tires.




These tires are airless and are scheduled to be out on the market very soon!!!

The bad news for law enforcement is that spike strips will not work on these tires. This is what great R&D will do, and just think of the impact on existing technology:


no more air valves
no more air compressors at Petrol Pumps
no more flat tires in the middle of long drives


These are actual pictures taken in the South Carolina plant of Michelin. It will be awhile before they are available to the automotive industry.










Great power of Innovation.........

Tuesday, January 29, 2008

I was collecting information on Natural language processing.
This is when I met ELIZA.
It is a nice program which you would definitely love.
It speaks with you!!!



ELIZA is a computer program by Joseph Weizenbaum, designed in 1966, which parodied a Rogerian therapist, largely by rephrasing many of the patient's statements as questions and posing them to the patient. Thus, for example, the response to "My head hurts" might be "Why do you say your head hurts?" The response to "My mother hates me" might be "Who else in your family hates you?" ELIZA was named after Eliza Doolittle, a working-class character in George Bernard Shaw's play Pygmalion, who is taught to speak with an upper class accent.

Want to chat with ELIZA?????

Click here to meet ELIZA

ELIZA - a friend you could never have before

Eliza: Hello. I am ELIZA. How can I help you?



This is how the page will look!!!!
But dont try the questions here...
It wont work!!!

Sunday, January 27, 2008

Last week I had my department function(virtuoso).It was really cool and I worked for 2 events in the function.One was best manager and the other was Project presentation.Project presentation was my favourite and it was rocking.One of the project presented there was steganography.This term was relatively new to me.But my senior informed me that it was a very common project and it was used by Osama Bin Laden!!!This kindled interest in me to find more on this subject.This post contains some nice information on steganography such that,even a novice could understand!!!

Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet -- a change so subtle that no one who isn't actively looking for it is likely to notice it.


Image of a tree.
By removing all but the last 2 bits of
each color component, an almost
completely black image results. Making
the resulting image 85 times brighter
results in the image below.


Image extracted from above image.

Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents.
The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in countries where encryption is illegal.Often, steganography and cryptography are used together to ensure security of the covert message.

Steganography used in electronic communication include steganographic coding inside of a transport layer, such as an MP3 file, or a protocol, such as UDP.

Monday, January 21, 2008

#include stdio.h
#include conio.h
int main(void)

{
float A,Bb,D,G,F;
A = 440;
G = 780;
Bb = 461;
D = 586;
F = 687;

sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();

sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();

//end 2

sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();


//end 3

sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound(); return 0;

}

This source code is not mine but probably the best that you could ever see....
It plays the airtel music!!!

Wednesday, January 16, 2008



For all those who wondered what was special about this photo,
here it is: This is a digitally altered image which shows the same person in different forms.. and u thought all chinese looked alike!!

Monday, January 14, 2008



These shortcuts are mentioned in IE itself!!!!
I discovered that today only.
And made a post out of it!!

Keyboard shortcuts

Open links in a new tab in the background CTRL+click
Open links in a new tab in the foreground CTRL+SHIFT+click
Open a new tab in the foreground CTRL+T
Open a new tab from the Address bar ALT+ENTER
Open a new tab from the search box ALT+ENTER
Open Quick Tabs (thumbnail view) CTRL+Q
Switch between tabs CTRL+TAB/CTRL+SHIFT+TAB
Switch to a specific tab number CTRL+n (n can be 1-8)
Switch to the last tab CTRL+9
Close current tab CTRL+W
Close all tabs ALT+F4
Close other tabs CTRL+ALT+F4

Mouse shortcuts

Open a link in a background tab Click the middle mouse button on a link
Open a new tab Double-click the empty space to the right of the last tab
Close a tab Click the middle mouse button on the tab

Most of you would have known this already!
But people who did not know this,would have found it very useful!!!
For those who are still using IE6, Click here to download IE7.

Saturday, January 12, 2008

Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown dramatically since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well. e-commerce is buying things from the internet but many people are unsure about its reliabilty as there are many unreputable vendors.

A small percentage of electronic commerce is conducted entirely electronically for "virtual" items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is known as e-tail. E-commerce or electronic commerce is generally considered to be the sales aspect of e-business.

Ashop commerce is helping a great deal in the field of ecommerce with it's ecommerce software (the shopping cart software)as I have already said in one of my previous posts.AshopCommerce shopping carts are integrated with all major banks, gateways and third party processors including PayPal (full functionality integration). This helps the users since all will not have their accounts in the same bank.

Friday, January 11, 2008

I find these ads are unteresting....
How about you???








How to make Hot Ice?
The idea sounds crazy??
But it is possible indeed....
The video shows how to do it..
It is a small video so all can check it out and feel the power of science which I felt!!!



Read these FAQ's after seeing the video

Q: can you drink it
A: yes but i strongly recomend you dont! it could even be dangerous
Q: does it explode?
A: no thats just a rumour. its a metal
Q: is it in hand warmers?
A: yes.
Q: is it hot or cold
A: hot, its 50-60 degrees
Q: what if you kept your finger in?
A: the water would freeze and you would have a block of hot ice on your finger.
Q: does your skin burn?
A: you can easyly bath in 50-60 degrees warm water so of course your skin wohnt burn
Q: put it in a drink?
A: it would be a kinda deadly joke. but i dont think its actually possible comparing freeze temperatures the drink would never get cold enough... alcohol is warm and would heat the chemicals at any degrees before its freezing state. its only possible with water i think.
Q: is it a dick?
A: no, its hot ice

Reception of Bill Gates' office at Microsoft



Car of Bill Gates




Whoa!!!!
Thatz amazing indeed....

Thursday, January 10, 2008

A team of organized criminals are installing equipment on legitimate bank ATM's in at least 2 regions to steal both the ATM card number and the PIN. The team sits nearby in a car receiving the information transmitted wirelessly over weekends and evenings from equipment they install on the front of the ATM (see photos). If you see an attachment like this, do not use the ATM and report it immediately to the bank using the phone on the front of the ATM.
The equipment used to capture your ATM card number and PIN are cleverly disguised to look like normal ATM equipment. A "skimmer" is mounted to the front of the normal ATM card slot that reads the ATM card number and transmits it to the criminals sitting in a nearby car.
At the same time, a wireless camera is disguised to look like a leaflet holder and is mounted in a position to view ATM PIN entries.

The thieves copy the cards and use the PIN numbers to withdraw thousands from many accounts in a very short time directly from the bank ATM.




Equipment being installed on front of existing bank card slot.





The equipment as it appears installed over the normal ATM bank slot.




The PIN reading camera being installed on the ATM is housed in an innocent looking leaflet enclosure.



The camera shown installed and ready to capture PIN's by looking down on the keypad as you enter your PIN !


Be aware!!

Make others aware of this information.

Monday, January 7, 2008

Is it possible to bite your nose?
OMG!!!This man proved it!!!

















Sunday, January 6, 2008

Dear readers,
I am addressing this post to all my readers.
I am very glad with my site rank!
It is now 8 lakh 79 thousand and odd.
I started this blog with an aim of taking it to the top 10 lakh sites.
And I have reached it only because of you!
Thanks a million readers.

The first week after the new year has not been exactly as happy as I wanted the new year to be.
I had some problems in my college.Then India lost the match which was due to Australians cheating us.And when I was thinking all was lost,my site rank has come in as a well needed tonic to my mind.


On the test match,the Indians,right from the word go, they were up against a stiff Australian side but when they took the field, they had other opponents to face as well. On Day 1, Australia were 50 odd for 2 when Ponting was given not out by umpire Mark Benson. The Indians overcame that and had the Australians reeling at 134 for 6. Some time later, Symonds was adjudged not out by umpire Steve Bucknor, again a clear edge which only Bucknor was unaware of. Some more time later, the third umpire joined the party, a stumping appeal was turned down against Symonds with his foot on the line. He went onto score his career best score and with another decision going in favour of him, a stumping appeal not even referred to the third umpire by Bucknor. Then comes the Indian innings, Jaffer was bowled off a no ball but it went unnoticed. Then came the Aussie second innings, Hussey was caught behind but given not out. He was out lbw some time later but given not out. Then came the final innings. Rahul Dravid was given out caught behind when the ball was nowhere close to the bat, Ganguly was given out despite Clarke having grassed the catch twice and Dhoni and RP Singh were at the wrong end of marginal decisions. It might seem like a case of sour grapes but had so many decisons not gone against them then perhaps India would have ended up with a 200 run first innings lead. Decisions go wrong as to err is human but the consistency, obviousness and timing of the decisions was so much against India, that they cannot stop themselves from feeling unlucky. Australia retain the Border-Gavaskar Trophy as they cannot lose this series anymore and they had won the last edition. All India can do is take this match as an inspiration for them to come back hard at Australia in the forthcoming games.

Same inspiration applies to me as well.




This MouseFone is yet another entry to the mouse-phone combo family, and it looks pretty ergonomic complete with a rather dynamic color scheme. I just hope the white plastic on its exterior won't fade to an ugly shade of stained yellow in due time - a problem that plagues many a lightly-colored device. Features from the mouse point of view includes the standard 800 DPI optical sensor, while as a VoIP handset, it comes with an integrated microphone and speaker, volume control, a dot-matrix called ID, an OLED display and a keypad. The MouseFone is smart enough to know when it is supposed to run as a mouse and function as a phone, but should all else fail (you can never be too sure with technology) there is always a manual switch.

Thursday, January 3, 2008

I liked these two adverticements very much.
Just the perfect way to market a product.
Hope you like it too...