Thursday, August 11, 2011

Anti-matter around Earth discovered-Earth's magnetic field could trap

 Planetary scientists claim to have for the first time spotted a thin band of anti-matter particles, called anti-protons, enveloping the Earth. The find, published in the "Astrophysical Journal Letters", confirms theoretical work that predicted the Earth's magnetic field could trap
antimatter, according to a team led by the University of Bari.

The astronomers say that a small number of anti-protons lie between the Van Allen belts of trapped "normal" matter.

The anti-protons were spotted by the Pamela satellite launched in 2006 to study the nature of high-energy particles from the Sun and from beyond our Solar System - so-called cosmic rays, the 'BBC' reported.

These cosmic ray particles can slam into molecules that make up the Earth's atmosphere, creating showers of particles. Many of the cosmic ray particles or these "daughter" particles they create are caught in Van Allen belts, doughnut-shaped regions where the Earth's magnetic field traps them. The new analysis shows that when Pamela passes through a region called the South Atlantic Anomaly, it sees thousands of times more anti-protons than are expected to come from normal particle decays, or from elsewhere in the cosmos.

 The astronomers say this is evidence that bands of anti -protons, analogous to Van Allen belts, hold anti-protons in place -- at least until they encounter the normal matter of atmosphere, when they "annihiliate" in a flash of light.

The band is "the most abundant source of anti-protons near the Earth", said Alessandro Bruno, team member.

"Trapped anti-protons can be lost in the interactions with atmospheric constituents, especially at low altitudes where the annihilation becomes the main loss mechanism. Above altitudes of several hundred kilometres, the loss rate is lower," he added.

Monday, August 8, 2011

7 Ways to battle with mobile malwares

Smartphone malware is considered as the biggest internet security threat of 2011. Although protecting PC with antivirus software has turned into a traditional rule in user's life, the same behavioral change has not been noticed often among them the smartphone users. However it is very important to understand the importance of being aware of such malwares and also the ways to prohibit such malwares entering your smartphones.


Mobile malware is a growing fraud category which involves infecting mobile devices with viruses and Trojan horses that may force a mobile phone to do unauthorized activities, like making phone calls and deleting or stealing information.

Here are some of the ways to of preventing such malwares.
1. Opt for well known apps only:Always go for apps which are well known in the market. Make sure you adjust the operating system?s application settings to stop the installation of non-market apps. It is an outmost necessity to review other users' comments on the marketplace to assist in determining if an app is safe. During the installation of any apps, always check that the access permissions being requested for installation. If they seem excessive for what the application is designed to do, it would be wise to not install the application. Regardless of whether an app is free or paid, any given download is a potential threat to your phone's security. Take the time to scrutinize each app's market listing carefully before downloading it to your device.
2.Installing ring tones from the Web:Ringtones also have become of the potential threat of malwares hence be careful of installing ring tones from the web as these kinds of file types are ableto hold mobile malware.
3. Never turn off your firewall:A firewall puts a protective barrier between your smartphone and the Internet. Turning it off for even a minute increases the risk that your smartphone may be
infected with malware.
4. Beware Strange Texts and EmailsLike emails, text messages have been an ultimate weapon to spread malwares, phishing scams and other threats. Hence Smartphone users should be just as cautious of phishing scams as the PC users, and resist opening any links from unknown or dubious sources.
5. Use Mobile Security SoftwareThere are innumerable vendors offering to prevent such malwares, go and make your smartphone safe by availing to anyone of them. They can help detect and protect against mobile malware, and it is increasingly wise to use one.
6. Update software regularly:Cybercriminals are continuously tiring out innovative techniques to get into your smartphone in some way or the other. That is why you should regularly install updates for all your software antivirus and antispyware programs. You can subscribe to automatic software updates whenever they are offered.
7. Strong passwordLast but not the least make sure you have a strong password. A strong password should include at least 14 characters long and include a combination of letters, numbers, and symbols and most importantly don't share your passwords with anyone. Further do not use the same password on all sites as in case it is stolen, all the information it protects is at risk.

Saturday, August 6, 2011

Google+ pulls 25 million visitors in a month!

According to a data released by Comscore, Google+ attracted 25 million users in a month, which makes it the fastest website to reach that huge audience size. Though Google made a late entry into the social networking, but its new site, Google+, is giving a tough competition to Facebook, Myspace and Twitter.

Google+ was launched in late June, and by 24th July it managed to attract 25 million visitors and the number is growing to one million visitors a day. Whereas Facebook took about three years to attract 25 million visitors and Twitter took just over 30 months. Though Google+ kicked off by almost breaking all the records in the social networking, but it still has time to be counted among the long-term success projects. MySpace is one such site which pulled 25 million visitors in less than two years, but it couldn't keep up to its pace n lost a lot visitors in last two years. Therefore, it is too early to draw a conclusion regarding Google+ in the long run.

While United States had more than 6 million visitors, India record more than 3.6 million visits. Canada and U.K. had 1 million visitors each, Germany had over 920,000 and Brazil over 780,000. France and Taiwan had 500,000 visitors each.

Friday, August 5, 2011

Facebook pictures can reveal your secrets - advanced hacking technique

If you are an active Facebook user and if you have the habit of uploading all your photos, then beware as you will be terrified to know that behind your photos, there might be hidden kilobytes of data which are totally invisible, a list of all your passwords and even your credit card number. With the most advanced hacking techniques today, it is completely possible!! Stegobot", a proof-of-concept botnet, is designed by researchers from the University of Illinois at Urbana-Champaign and the Indraprastha Institute of Information Technology in New Delhi, India. It attaches to Facebook profiles, and more certainly, steals users' confidential information, such as online banking and email passwords, through their Facebook pictures.

Stegobot is developed by the researchers with an intention to show how easy it is for a hacker to use Facebook photos to surreptitiously spread large-scale online attacks.
New Scientist explained that Stegobot uses the technique of stenography to hide the data in picture files without changing the picture's appearance.

It is possible if Stegobot got its hands on it that the 720x720 pixel image could be sheltering 50 kilobytes of data - plenty of space to hide and "transmit any passwords or credit card numbers that Stegobot might find on your hard drive," New Scientist wrote. After the botnet hides your personal information in a photo and a friend views your Facebook page, their computer automatically becomes infected. They do not even have to click on the corrupted photo for Stegobot to work. The masses of stolen data makes their way back to the botnet operator from there, who can extract the payload from each picture and can use it in whatever devious manner he wishes. But what brings a relief is that Stegobot only exists in a lab, for now.

Thursday, August 4, 2011

Sugar Doesn't Melt -- It Decomposes, Scientists Demonstrate

Flying in the face of years of scientific belief, University of Illinois researchers have demonstrated that sugar doesn't melt, it decomposes.This discovery is important to food scientists and candy lovers because it will give them yummier caramel flavors and more tantalizing textures. It even gives the pharmaceutical industry a way to improve excipients, the proverbial spoonful of sugar that helps your medicine go down," said Shelly J. Schmidt, a University of Illinois professor of food chemistry.

In a presentation to the Institute of Food Technologists about the importance of the new discovery, Schmidt told the food scientists they could use the new findings to manipulate sugars and improve their products' flavor and consistency.

"Certain flavor compounds give you a nice caramel flavor, whereas others give you a burnt or bitter taste. Food scientists will now be able to make more of the desirable flavors because they won't have to heat to a 'melting' temperature but can instead hold sugar over a low temperature for a longer period of time," she said.

Candy makers will be able to use a predictable time-temperature relationship, as the dairy industry does in milk pasteurization, to achieve better results, she said.

Schmidt and graduate student Joo Won Lee didn't intend to turn an established rule of food science on its head. But they began to suspect that something was amiss when they couldn't get a constant melting point for sucrose in the work that they were doing.

"In the literature, the melting point for sucrose varies widely, but scientists have always blamed these differences on impurities and instrumentation differences. However, there are certain things you'd expect to see if those factors were causing the variations, and we weren't seeing them," Schmidt said.

The scientists determined that the melting point of sugar was heating-rate dependent.

"We saw different results depending on how quickly we heated the sucrose. That led us to believe that molecules were beginning to break down as part of a kinetic process," she said.

Schmidt said a true or thermodynamic melting material, which melts at a consistent, repeatable temperature, retains its chemical identity when transitioning from the solid to the liquid state. She and Lee used high-performance liquid chromatography to see if sucrose was sucrose both before and after "melting." It wasn't.

"As soon as we detected melting, decomposition components of sucrose started showing up," she said.

To distinguish "melting" caused by decomposition from thermodynamic melting, the researchers have coined a new name -- "apparent melting." Schmidt and her colleagues have shown that glucose and fructose are also apparent melting materials.

Another of Schmidt's doctoral students is investigating which other food and pharmaceutical materials are apparent melters. She says the list is growing every day.

Having disposed of one food science mystery, Schmidt plans to devote time to others. For instance, staling intrigues her. "We could ship a lot more food around the world if we could stabilize it, keep it from getting stale," she said.

Or there's hydrate formation, which can make drink mixes clumpy if they're open for a while. "We've observed the results -- clumping under conditions of low relative humidity -- but we really don't know why it happens," she noted.Schmidt said that new instruments are making it possible to probe some of the processes scientists have taken for granted in a way they couldn't do before.

Four studies describing Schmidt's research have been published in recent issues of the Journal of Agricultural and Food Chemistry. Co-authors of the first, third, and fourth articles are Joo Won Lee of the U of I and Leonard C. Thomas of DSC Solutions. Joo Won Lee, John Jerrell, Hao Feng, and Keith Cadwallader, all of the U of I, and Leonard C. Thomas of DSC Solutions co-authored the second article.

Wednesday, August 3, 2011

Google Chrome is third most popular browser: Report

Google Chrome is now the world’s third most popular web browser with one in five users preferring it.

Google Chrome has also emerged as Britain’s second most popular web browser, edging Mozilla’s Firefox and nibbling at Microsoft’s Internet Explorer, the current leader.

Chrome accounted for 22 percent of the British web market, compared to 45 percent of users preferring Internet Explorer. Apple’s Safari stood at the fourth place with nine percent share.

But experts pointed out that Internet Explorer’s market share was falling despite the programme already pre—installed on almost every computer sold in Britain, The Telegraph reports.

Google said its surge in popularity could be explained by its speed of delivery results, its security and a new ad campaign.

Lars Bak, the Google engineer responsible for Chrome, based in the Danish countryside, said the company’s aim was speed. He said users should “never be happy” with the existing speed.

Monday, August 1, 2011

IEEE publishes White Space standard

The technology is designed to provide broadband wireless access to up to 100 km range New JERSEY, USA: IEEE publishes the IEEE 802.22 standard, a new standard for Wireless Regional Area Networks (WRANs), which takes advantage of VHF and UHF TV bands to provide broadband wireless access over a large area up to 100 km from the transmitter.

Each WRAN will deliver up to 22 Mbps per channel without interfering with reception of existing TV broadcast stations, using the so-called white spaces between the occupied TV channels. This technology is especially useful for serving less densely populated areas, such as rural areas, and developing countries where most vacant TV channels can be found.

IEEE 802.22 incorporates advanced cognitive radio capabilities including dynamic spectrum access, incumbent database access, accurate geolocation techniques, spectrum sensing, regulatory domain dependent policies, spectrum etiquette, and coexistence for optimal use of the available spectrum. BANGALORE, INDIA: Jim Anderson, senior VP,  Networking Components Division, LSI Corporation, says: “Indian market is an important market for us especially because of the new network build-out that is happening in the wireless infrastructure space. The company has been growing its presence in India pretty rapidly over the past few years and will continue to do so.”

The company recently divested its storage systems arm Engenio to NAS provider NetApp, so that it can increase its focus on semiconductor space.