Friday, December 30, 2011

What Were the Biggest "Flops" of the Year?

In movie terminology, a "flop" is a film that loses money -- usually a lot of it. I offer this somewhat obvious clarification because I often see people on the twitter using "flop" to describe a film generally accepted as terrible. And while we can all agree that Transformers 2 (and 3) (and probably 1) are all terrible films, they've each made a bajillion dollars. That's an actual figure. But thanks to The Hollywood Reporter, we can now point to about 15 flicks that fared pretty poorly at the box office.

As THR semi-explains, it's not nearly enough for a film's alleged budget to match its reported box office haul. When you consider the profit share with the exhibitors, the back-end deals, and the outrageous costs of "prints," advertising, and marketing, a film needs to "make" about 2.5 times its budget to break even. Yeah, it's a tough business. We'll save some of the surprises for the THR piece (it was their idea first), but here are a few relative surprises:


Green Lantern
-- There were four big superhero movies last summer, and one was obviously bound to finish "last." THR puts the Green Lantern budget at $200 million, but that seems a rather low estimate, and the film has barely grossed $220 million worldwide. Here's hoping the sequel turns out a little less messy (I didn't hate this movie) and we focus a little less on the budget.

Cowboys & Aliens
-- There are always a few big-big-budget casualties each summer, and unfortunately this one seemed semi-doomed from the start. Sci-fi westerns might work well for Joss Whedon, but they rarely (if ever) translate into big box office. Tonally askew and not all that much fun as a whole, C&A didn't earn much in the "word of mouth" department, and ended up with about $180 million worldwide on a budget slightly lower (?) than that.

The Year in Film: 2011's Biggest Surprises


Just as quickly as it began, 2011 is rapidly drawing to a close. I think we can say, without fear of contradiction, that this has been quite a bizarre year for movies, movie news, and movie stars. Despite our best efforts to expect the unexpected, predicated upon the increasingly erratic nature of Hollywood and celebrity over the last several years, there were still plenty of moments that genuinely surprised us. In fact, there were so many moments of astonishment that it was difficult to whittle the list down to the top 20.

Below is our attempt to do just that. Hopefully, these were the same moments that most left you scratching your head and pondering the unpredictability of the movie industry.

King's Speech Wins Oscar (Gets PG-13 Re-release?)
Now don’t misunderstand us, The King’s Speech is a terrific film. What was so shocking about it’s taking best picture during the Oscars in February is that it was up against several films that could have easily bested it: The Social Network, Black Swan, Inception, heck even Toy Story 3 seemed more likely to take home the statue.

But even more surprising than The King’s Speech winning the Oscar was its subsequent theatrical PG-13 re-release. Given that this is a film about a political leader struggling valiantly against his own speech impediment—which included frustrated, almost compulsive, swearing—the removal of all the naughty words seemed a bit antithetical to its emotional core. 

We Miss Getting Cabin in the Woods...Again
I guess we really should have expected another delay in this beleaguered horror film from director Drew Goddard and co-writer Joss Whedon.

What is a Media Player?

A media player is a software program designed to play multimedia content as it streams in from a network like the Internet, or from local storage on a hard drive or other resource. A media player might be expected to understand and translate several audio and video codecs, covering many digital music and video formats.

A few media players commonly known and widely used include Apple®’s QuickTime®, Miscrosoft®’s Media Player (from which the general term followed), now known as Windows® Media Player (WMP), and RealNetworks® RealPlayer®. In earlier days one needed the QuickTime media player to watch Apple content, and Media Player to watch Windows content. RealPlayer was a program that would play both types of content and its own proprietary format. RealPlayer was an Internet favorite for a short time in the late 90s, but fell out of favor due to widely publicized privacy concerns about spyware-like behavior and bloat.

Patrons of Apple products like the iPod® and iPhone® will have iTunes® installed, a versatile media player that, like Microsoft’s WMP, has many advanced features. These large, comprehensive programs not only act as players but as multimedia libraries, rippers and burners.

'The Amazing Spider-Man' Update: New Look at The Lizard; Playset Reveals Additional Villains

As has happened in the past, when you have a big property you're looking to do some serious merchandise business off of, then you should expect a lot of character and story leaks to come from these toys since they're developed long before the film hits theaters. We've already seen a couple images of Spider-Man's latest nemesis, The Lizard, that way, and now another strong, live-action look at The Lizard's face close-up has been revealed thanks to images of some kind of remote control. We caution that these may only be test pieces and not fully finished products ready for shelves, so this version of The Lizard may be slightly different from the one we see on screen. More over at Idle Hands.

Additionally, another Amazing Spider-Man toy looks to have revealed a pretty big spoiler from the film's climactic action sequence.


Spoilers Ahead

The playset (seen below) is a recreation of the film's big Oscorp Tower FX Battle, and the characters featured include Spidey, Lizard and SWAT Lizard, the latter of which confirming a previous rumor that Dr. Connors (played by Rhys Ifans) is able to transform an entire SWAT team into Lizards as well, providing our hero with one heckuva difficult fight. Chances are this is a reveal they'll show us in trailers as we inch closer to the film's July 3rd release, but now that there are several of these toy images out there hopefully the studio will decide to release an official Lizard shot soon.

What is Malware?

Malware is an abbreviated term used to describe a "malicious software" program. Malware includes things like spyware or adware programs, such as tracking cookies, which are used to monitor your surfing habits. It also includes more sinister items, such as keyloggers, Trojan horses, worms, and viruses.

A keylogger is just what it sounds like. It is a program that logs every keystroke you make and then sends that information, including things like passwords, bank account numbers, and credit card numbers, to whomever is spying on you. A Trojan horse may damage your system, and it may also install a "backdoor" through which to send your personal information to another computer. These forms of malware are commonly used for perpetrating identity theft.

A virus or a worm replicates itself and may hijack your system. These types of malware may then be used to send out spam or to accomplish a variety of other unsavory activities, and you may not even know it. Viruses usually attach to other programs, while worms are self-contained. Both can cause severe damage by eating up essential system resources, which may lead to your computer freezing or crashing. Viruses and worms commonly use shared files and items like email address books to spread to other computers.

What is a WAV File?

type of sound file. Microsoft and IBM introduced the wav file in 1991 for use on the Microsoft Windows 3.1 operation system (OS). Long before digital audio became a staple, computer users were exposed to the wav file as an embedded sound file that played a chime-like sound at boot up of the Windows operating system.

The wav format is based on the Resource Interchange File Format (RIFF), which stores audio files in indexed “chunks” and “sub-chunks.” RIFF is in turn based on the earlier Interchange File Format (IFF), established by Electronic Arts in 1985 for use in electronic gaming. Apple’s version, known as Audio Interchange File Format (AIFF), was released in 1988 for Macintosh computers. Due to the common roots of these various audio formats, however, the audio files will play on any computer system, IBM or Apple.

The wav file had two very big things going for it when introduced. Firstly, it could digitize sounds 100% faithful to the original source because it is a lossless format. “Lossless” means that the wav file format does not compromise audio quality even when it holds compressed data. Secondly, the wav file is very easy to edit and manipulate with software. Luckily for audiophiles, free wav file editing software has been available nearly as long as wav files themselves.

While the wav file format was ideal for sound effects, it had a drawback when it came to music files.

What is a CPU?

If you’re in the market for a new computer, it’s necessary to understand the function of a CPU. Also known as the Central Processing Unit or processor, the CPU is essentially the “brains” of your computer. Without the CPU, you wouldn’t be able to play games, type research papers, or surf the Internet. Your computer would basically be a very expensive paperweight.

Sometimes people mistakenly believe the case or chassis of a computer is the CPU. However, a CPU is an internal component of the computer. You can’t see it from the outside of the system; you’d have to peek inside and remove both the CPU heatsink and fan to get a good look.

The first CPUs were used in the early 1960s. They were custom designed as part of a larger computer, making them prohibitively expensive. Once engineers figured out how to mass produce the CPU, personal computers became more affordable for the average American. With the introduction of the integrated circuit in the late 1970s, it became possible for smaller CPUs to be manufactured as well. This helped transform computers from large, bulky devices that took up entire rooms to more manageable desktop and laptop models.

What Is the Difference Between WiFi® and Wireless Internet?

Wireless Internet is just one of the services that WiFi® optionally supports. WiFi® is a wireless communication standard used between computer devices to share files and resources. The WiFi® signal cannot travel long distances without loss of integrity, and it is therefore used for Local Area Networks (LANs). In the home, a wireless LAN might include a personal desktop system and laptop, while in the workplace, a wireless network commonly connects numerous computers within a commercial building. The WiFi® signal might also cover a small region within a city, creating hot spots or places where the WiFi® signal allows connectivity to the public through wireless access points (WAPs).

A WiFi® network is very easy to set up. The main computer acts as a server with a wireless network interface card (NIC). The wireless NIC features a small antenna that broadcasts and receives WiFi® signals. A router and switch direct traffic on the WiFi® network and are commonly built into a high-speed modem to integrate wireless Internet into the WiFi® LAN. Each computer connected to the network, referred to as a client, also requires a WiFi® NIC.

Personal digital assistants, cell phones, and other handheld electronics commonly have WiFi® ability built-in. This allows them to connect wirelessly to a WiFi®-enabled network to transfer files, access data, or surf the Internet.

Pop-Up Window (java-tutorial)




<a href="#" onClick="MyWindow=window.open('window.html','MyWindow','toolbar=no,location=no,directories=no,status=yes,menubar=no,scrollbars=yes,resizable=no,width=400,height=300,left=200,top=100'); return false;">Click for Pop-Up</a>
Here is an example: Click for Pop-Up.

This is what the different variables of the code mean, and how you can customize them:
window.html the URL of the page you wish to pop up.
MyWindow the name you'd like to give to the pop-up window.
toolbar=no set to 'yes' if you'd like the window to have a toolbar.
location=no set to 'yes' if you'd like the window to have a location box.
directories=no set to 'yes' if you'd like the window to have a toolbar.
status=yes set to 'no' if you'd like the window to have no status bar.
menubar=no set to 'yes' if you'd like the window to have a menubar.
scrollbars=yes set to 'no' if you'd like the window to have no scrollbars.
resizable=no set to 'yes' if you'd like the window to be resizable.
width=400 the width in pixels of the window.
height=300 the height in pixels of the window.
left=200 the distance of the window from the left of the screen.
top=100 the distance of the window from the top of the screen.

You can have as many pop-up window links as you like on the same page, just be sure to give every one a different name.
To have a "Close Window" link as in the example above, use the following code:

The Navigator Object (java-tutorial)



<html>
<body>
<div id="example"></div>
<script type="text/javascript">
txt = "<p>Browser CodeName: " 
+ navigator.appCodeName + "</p>";
txt+= "<p>Browser Name: " 
+ navigator.appName + "</p>";
txt+= "<p>Browser Version: " 
+ navigator.appVersion + "</p>";
txt+= "<p>Cookies Enabled: "
+ navigator.cookieEnabled + "</p>";
txt+= "<p>Platform: " + navigator.platform
+ "</p>";
txt+= "<p>User-agent header: " 
+ navigator.userAgent + "</p>";
document.getElementById("example").innerHTML=txt;
</script>
</body>
</html
 
sample output:

Text alert for enter and exit (java-tutorial)




<html>
<head>
<script language="javascript" type="text/javascript">
alert("Welcome to my weblog")
</script>
</head>
<body>
<h1>
<script language="javascript" type="text/javascript">
document.write("IranJavaScript")
//end hiding script from old browsers -->
</script>
</h1>
</body>
</html>

<!--   DESCRIPTION:  This will cause an elert message before your visitor leaves (OR reloads) your page.
-->

<BODY onUnload="window.alert(' Good Bye ')">
</BODY>
<!--   DESCRIPTION:  This will cause an elert message before your visitor leaves (OR reloads) your page.
-->
<BODY onUnload="window.alert(' Good Bye ')">
</BODY>

E-mail Validation (java-tutorial)



The function below checks if the content has the general syntax of an email.
This means that the input data must contain an @ sign and at least one dot (.). Also, the @ must not be the first character of the email address, and the last dot must be present after the @ sign, and minimum 2 characters before the end:

<html>
<head>
<script type="text/javascript">
function validateForm()
{
var x=document.forms["myForm"]["email"].value;
var atpos=x.indexOf("@");
var dotpos=x.lastIndexOf(".");
if (atpos<1 || dotpos<atpos+2 || dotpos+2>=x.length)
  {
  alert("Not a valid e-mail address");
  return false;
  }
}
</script>


Create and Store a Cookie (java-tutorial)



In this example we will create a cookie that stores the name of a visitor. The first time a visitor arrives to the web page, he or she will be asked to  fill in her/his name. The name is then stored in a cookie. The next time the visitor arrives at the same page, he or she will get welcome message.

<html>
<head>
<script type="text/javascript">
function getCookie(c_name)
{
var i,x,y,ARRcookies=document.cookie.split(";");
for (i=0;i<ARRcookies.length;i++)
  {
  x=ARRcookies[i].substr(0,ARRcookies[i].indexOf("="));
  y=ARRcookies[i].substr(ARRcookies[i].indexOf("=")+1);
  x=x.replace(/^\s+|\s+$/g,"");
  if (x==c_name)
    {
    return unescape(y);
    }

Close the browser with a button (java-tutorial)

s



<!-- Start of Close Browser Script -->
<!-- When the "Close Window" button is clicked, this script
    will close the browser window that the webpage is in.
-->
<script language="JavaScript">
<!--

function closeIt() {
  close();
}

// -->
</script>
<center>
<form>
<input type=button value="Close Window" onClick="closeIt()">
</form>
</center>

Add search button on your blog (java-tutorial)



<!-- Search Google -->
<center>
<FORM method=GET action="http://www.google.com/search">
<TABLE bgcolor="#FFFFFF"><tr><td>
<A HREF="http://www.google.com/">
<IMG SRC="http://www.google.com/logos/Logo_40wht.gif"
<br></A>
<INPUT TYPE=text name=q size=31 maxlength=255 value="">
<INPUT TYPE=hidden name=hl value="en">
<INPUT type=submit name=btnG VALUE="Google Search">
</td></tr></TABLE>
</FORM>
</center>
<!-- Search Google -->

Thursday, December 29, 2011

How Do I Choose the Best Gaming Video Card?

One of the easiest ways to choose the best gaming video card is to simply look for the card with the highest numbers regarding graphics processing unit (GPU) speed and the memory on the card. By comparing multiple cards to find the highest values of those numbers, you can usually find the most cutting edge and state of the art card on the market. You may also want to consult some technology websites for reviews on the latest graphics cards hitting the market, and to find benchmark numbers when such cards have been tested. It is also a good idea to know what kinds of connectors and power supply you have available in your computer, so you choose a gaming video card that you can actually use.

A gaming video card is typically a device that processes graphics, especially modern three-dimensional (3D) graphics, and displays the images on a monitor or similar display device. Video cards generally have a few important aspects that should be understood when choosing a card. The GPU on the video card is the actual processor that provides dedicated processing for graphical images generated by a personal computer (PC) game. A gaming video card with higher GPU speeds can usually take more stress off of the central processing unit (CPU) in your computer.

This allows the CPU to focus on properly running the game, while the GPU deals with rendering the graphics.

What is a Graphics Card?

A graphics card (also video card) is a piece of hardware installed in a computer that is responsible for rendering the image on the computer’s monitor or display screen. Graphics cards come in many varieties with varying features that allow for a price range that extends from about $20 US Dollars (USD) to $2,400 USD or more.
The first consideration when buying a graphics card is to be sure it is capable of displaying the best resolution the monitor can support. For Liquid Crystal Display (LCD) monitors this means supporting the native resolution. Cathode Ray Tube (CRT) monitors do not have a native resolution. In this case, ensure the graphics card is capable of supporting the highest resolution, even if the CRT monitor will be frequently used at lower resolutions.
The second consideration is on-board memory. A graphics card must work very hard to render images to the screen. Unlike text files, graphics images are much larger files consisting of great amounts of data that must be processed by the graphics or video card. A faster graphics card has its own resident memory chips to perform this function so as not to impinge upon the system’s random access memory (RAM). Less robust graphics cards have less resident memory and require sharing system RAM to process images. 

This doesn’t necessarily mean that a graphics card with shared memory will be unsatisfactory, but much depends on the primary purpose of the computer and on the amount of system RAM present. More system RAM is better if it will be shared, but for gaming and multimedia enthusiasts, a graphics card with resident memory is a better choice.

What Is a Video Card Driver?

A video card driver is a piece of computer software that allows a central computer to work with a video card. Almost every type of external computer hardware requires a driver of some kind to translate between the main computing system and the external device. A video card and video card driver allow a computer to run advanced graphics and increase the performance of a system. 

Most store-bought computers come with basic video card driver software. This software may be specific to the original operating system, and may not work correctly if installed and run on a different operating system. Manufacturers typically offer frequent updates that can be downloaded and installed, allowing the video card driver to stay current with new video card features and capabilities. If a computer cannot run a new game or program with advanced graphics, try checking to see if a video card driver update is available to help facilitate new technology and graphics advances.

Certain signs can signal that a video card driver update is a good idea. If graphics load slowly, appear fragmented, or cause a program to freeze, the video card driver is often to blame. Some computer experts recommend checking for updates every few months in order to maximize performance and prevent system slow-downs from occurring. 
Most video card drivers are not compatible with video cards made by different manufacturers.

What is Instant Messaging?

Also known as IM, instant messaging consists of sending real-time messages to another Internet user, much like text messaging on a cell phone; most popular among younger generations, IM is also commonly used in the workforce as a quick way for employees to communicate with each other. IM is comparable to chatting in a private chat room, but instead of anyone being able to join the conversation, IM includes only people whom the user has invited. Users can create a list to keep track of welcome guests, and IM sends an alert that pops up on the computer screen when a new message is received. To use instant messaging, it is necessary to open an account with an IM program, most of which are free; many programs require users to create a screen name so that the user can be identified by others. There are some risks affiliated with IM such as a computer catching a virus, personal information being stolen, or sex predators seeking victims; however, these risks can be reduced or avoided entirely when the proper precautions are followed.

How to IM In order to send and receive instant messages, a user must sign-up for an IM account. There are several web-based programs online that offer free IM accounts. When choosing a program, keep in mind that some are compatible with each other, while others are not; this is important as users will want to choose programs that are compatible with those whom they will be communicating. Most, if not all, programs require users to create a user name that will be an identification tag for sending and receiving messages, and additional personal information can be added if the user so wishes. Once the account is established, users should tell friends, family, and coworkers their new screen name so that the IM can begin.

Benefits of IM Instant messaging is more private than a typical chat room, because the user must invite others to join, as opposed to chat rooms where anyone is welcome to join the conversation. IM is a much faster and simpler way to communicate than using email because message is sent immediately and the receive does not have to log in to read it. Since instant messaging allows users to communicate in real-time, users can respond quickly to questions or comments. Instant messaging is a great way to stay in touch with family members and friends while saving money on long distance phone bills.
 

Risks of IM As with any online activity, caution should be exercised with messaging. It is not a good idea to add people to the invite list unless the user knows something about them. Children should be supervised carefully when instant messaging and should never add someone to their list or agree to be added to anyone else's list without approval from their legal guardian. Predators have been known to use instant messaging as well as chat rooms to seek out victims, so while IM may seem safer, it is not without risks.

It is also possible to obtain viruses, worms, and Trojan horses through messaging, so care should be taken when accepting any files. Also, don't type anything that shouldn't be shared with others, since instant messages can be captured and the text can be saved and passed on. Even though messaging sessions seem private, they are really not any more secure than the average email; identity thefts can still get a hold of personal information through instant messages. Instant messaging can be a convenient way to communicate, but like anything else, it should be used with care.

Is it Stealing to Use Someone Else's Wireless Internet Service?

Using someone else's wireless service is indeed stealing, as it involves using a resource which someone else has paid for without paying for it. However, using someone else's wireless service may not always be totally unethical, especially if you talk about it with the person, and in some communities, anonymous strangers may actively promote the use of their wireless by leaving the network unprotected and inviting people to use it.
When someone orders wireless service, he or she must invest in a router and be prepared to pay monthly fees for access. Using someone else's wireless service may be free for the user, but not for the person who owns the account. And, while it can be tempting to take advantage of an unsecured network to save money, there are some disadvantages to using someone else's wireless service, both for the owner of the service and the user.

For owners, the clear disadvantage is that when people piggyback on their networks, it eats up bandwidth. This can make Internet service slow for the people who are actually paying for the network, which can be frustrating. In addition, if the service provider has a bandwidth cap or allowance, the service may be cut off if the allowance is exceeded, or an additional sum may be tacked onto the bill. Furthermore, people using the network could potentially access other computers on the network, if their users have set their computers to share data, and this could compromise the integrity of the computers themselves, as well as the data stored on them.

What is Information Security?

Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing.
Many businesses are solely based on information stored in computers. Personal staff details, client lists, salaries, bank account details, marketing and sales information may all be stored on a database. Without this information, it would often be very hard for a business to operate. Information security systems need to be implemented to protect this information.
Effective information security systems incorporate a range of policies, security products, technologies and procedures. Software applications which provide firewall information security and virus scanners are not enough on their own to protect information. A set of procedures and systems needs to be applied to effectively deter access to information.
There are people who make a living from hacking or breaking through information security systems. They use their technological skills to break into computer systems and access private information. Firewalls, which are designed to prevent access to a computer's network, can be bypassed by a hacker with the right hardware. This could result in the loss of vital information, or a virus could be planted and erase all information. A computer hacker can gain access to a network if a firewall is shut down for only a minute.

What is a Hard Refresh?

If you visit a website frequently, your web browser stores elements of the web page in a cache so that they do not have to be downloaded again each time you visit, making your browsing faster. These elements might include photographs, pages you have already viewed, or style sheets. In some cases, when the website is changed, you may not be able to view the changes because you are actually viewing the cache. There are two ways to solve this problem: a hard refresh, which bypasses the cache and loads the actual page as it is stored on the server, and clearing your cache, which is something you should do periodically anyway.

To refresh a website normally, you hit the “refresh” button, or the F5 key, or press the command key for your operating system, such as the Apple key or the Control key, and the letter R. To hard refresh, the command or control key is held down while clicking on the refresh button or pressing F5. Alternatively, the user can hold down the shift key, the command/control key, and the letter R. A hard refresh will bypass any cached files and display the web page as it currently appears on the server.

If you are viewing a web page that looks odd or has glitches, a hard refresh may be necessary. This is common with websites that are constantly being updated, like e-mail and news sites. Occasionally, the rapid updates confuse the browser, which reverts to a cached version of the page. If a site looks funny to you, performing a hard refresh may help to clear up the problem.

What Is Email?

Email, also sometimes written as e-mail, is simply the shortened form of electronic mail, a protocol for receiving, sending, and storing electronic messages. Email has gained popularity with the spread of the Internet. In many cases, email has become the preferred method of communication.

Though there is some degree of uncertainty as to when email was invented, the father of the modern version is generally regarded to be American Ray Tomlinson. Before Tomlinson, messages could be sent between users, but only when they were connected to the same computer. Even once computers were networked, messages could not be targeted to a particular individual. Tomlinson devised a way to address email to certain users, and thus was credited for one of the most important communication inventions in the 20th century.
Tomlinson's idea was to identify the name of the user and the computer at which he or she was located. As a result, the basic formula for addressing an email was username@usercomputer. This standard has not changed much over the years, other than the user computer now commonly being replaced by the name of an email provider. In some cases, this is the same as the user's Internet service provider.

The influence of email cannot be overstated. The United States Postal Service, for example, notes that it handles 212 billion pieces of mail per year. Many sources have nearly that many emails being sent back and forth every single day.

Apple makes Siri 'friendlier' to hackers

Apple Inc. may have made it easier for hackers to legally bring its voice-activated assistant Siri to iOS devices other than the iPhone 4S, a hacker said.

 

In a Twitter post, iPhone Development Team member Musclenerd said the file system is "wide open" and the file system keys are obtainable.

 

"Huh...today's 4S 5.0.1 bump (9A406) has wide open main (file system)," Musclenerd said.

Musclenerd added this was the update for iOS 5.01 (build 9A406) allows one to "get Siri files and such without piracy."

 A separate article on PC WOrld said the update makes it possible to explore the device's filesystem unhindered using a Mac or PC.

With this, it said a hacker could more easily extract and copy the iPhone 4S's Siri files without resorting to piracy.

 

"Basically, Apple locked the door to the filesystem but left the keys hanging in the door handle. Previously, to get at the iOS filesystem, hackers had to use a series of decryption tools to get past Apple's software protections. It's not clear if Apple has changed its policies or plans to lock things down again with another update," PC World said.

Report: Websites vulnerable to 'hashDOS' attack

A vulnerability in most web application frameworks may allow attackers to mount a denial-of-service attack on a computer system, researchers demonstrated at a security conference in Germany.

 

Computer security firm Sophos said Alexander “alech” Klink and Julian “zeri” Wälde delivered a demonstration and lecture at the 28th Chaos Communication Congress.

 

"During the talk they performed a denial of service attack against an Apache Tomcat server, which is a commonly used java servlet container for hosting web pages. They sent the server some pre-computed hash collisions and showed how it used 100% of their processor for the entire talk," Sophos said in a blog post.

 

Sophos said the hashing used by PHP, Java, Python and JavaScript in this attack is not a cryptographic hash but a simple mathematical hash used to speed up storing a retrieving data posted to web pages.

 

Collisions in these hashes are expected and managed by the programming framework in a reliable way - when not being abused.

 

"It is known that an attacker who understands the values used in your hashing algorithm could pre-compute a set of values that result in all hashes being the same. Comparing these hashes becomes a quadratic function which can create a very heavy load on the web server," Sophos said.

Monday, December 26, 2011

Incredible First Teaser for Ridley Scott's 'Prometheus' Shows its 'Alien' DNA

If you're a trailer junkie, you've no doubt been intrigued by Fox's cocky build up to Prometheus, Ridley Scott's first science fiction film since Blade Runner. Sure, there's nothing wrong with trying to build awareness that your trailer is about to hit, but Fox has been releasing 30 second teasers hyping this teaser for the past three days. And if you're asking people to watch a 90-second pitch for them to watch a trailer that itself is only 60-seconds long, it better be a damned good trailer.
Well, now that the final teaser is up on Apple, turns out the wait and hype was worth it. Sure, it doesn't tell us a lick about what the film is actually about (you'll have to rely on the official synopsis below for that), but it does accomplish two very important things very quickly. The first is that it once and for all removes any doubt that this is an Alien prequel. No, we don't glimpse any traditional xenomorphs in it, but that title font over those visuals will give any Alien fan heart palpitations. Secondly, it also confirms that the Ridley Scott that could pull off masterworks like Alien and Blade Runner hasn't disappeared, he's just been in cold storage. But now he's back and it looks like he's just getting warmed up.

First Look at the New Hulk; Complete 'Avengers' Team Posters Revealed

You'd think that The Avengers, the most ambitious comic book movie to date, would have a huge presence at this year's Comic-Con.  That's not the case, though.  Marvel will instead be no doubt unveiling plenty of superhero goodies at this year's D23, the expo put on my parent company Disney.  But, just because we've got to perhaps wait a few weeks to see The Avengers assembled together on a stage again, doesn't mean we have to wait that long to get a new look at least some of team's members.
Marvel has released some rather impressive, hand-drawn character posters for Hawkeye (Jeremy Renner) and Black Widow (Scarlett Johansson), and if you happen to be at SDCC, you can stop by the Marvel booth to get a hold of one (I'm going to go out on a limb and predict there will be a significantly smaller supply of Black Widow available).

1998 'Godzilla' Writer: 'If You're Gonna Fail, Fail Big'

When a film fails in Hollywood, everyone involved is usually quick to pass the buck – and with good reason. Films that fail costs studios money, and when studios lose money, there’s usually at least one sacrificial scapegoat offered up to the movie gods to keep everyone happy. Usually, that sacrifice is a studio exec, but directors, actors, and writers can all take the blame for a bad movie as well. With careers potentially on the line, it’s not a surprise that everyone involved points their finger at someone else when things go bad.
 
It’s refreshing when it doesn’t happen, which was the case when Bloody-Disgusting caught up with screenwriter Dean Devlin at this year’s Saturn Awards ceremony. Devlin was the guy who wrote the script for the dreadful 1998 version of Godzilla.

Devlin was asked about the Gareth Evans-helmed reboot, which made him introspective about his take on the giant green lizard. Surprisingly, he’s all in favor of the reboot and took a lot of the blame for the 1998 film’s failings onto his own shoulders.

Listen, I think there's a lot of wonderful stuff in that movie, I really do," he said in the film's defense. "[But] I think the problem with that movie was the script I wrote. I think Roland did an amazing job directing it, I think the actors are great, I think when people look back now on the Blu-ray and see the visual effects, it's a lot better than what people said at the time. The problem was the script! I made some big errors in that script. I wish I hadn't, I wish I had a chance to fix it. But in another way, it's allowed me to be a better writer since, because I made the mistakes on one, and I realized I'm never gonna make those mistakes again!

Cruise Takes Quiet Christmas With $26.5M 'Mission'

LOS ANGELES – Tom Cruise's latest mission has won a holiday weekend that's shaping up with some silent nights at movie theaters as business continues to lag.

Studio estimates Sunday placed Cruise's "Mission: Impossible -- Ghost Protocol" a solid No. 1 with $26.5 million domestically over its first weekend in full release. The movie raised its total to $59 million since it started a week earlier in huge-screen cinemas and expanded nationwide last Wednesday, and distributor Paramount estimated that revenues will reach $72.7 million by Monday.

Cruise's fourth "Mission" flick was a bright spot over a Christmas weekend filled with so-so tidings for
Hollywood, whose usually busy holiday stretch since Thanksgiving has been a bust.

Generally well-reviewed movies from Steven Spielberg ("The Adventures of Tintin"), David Fincher ("The Girl with the Dragon Tattoo") and Cameron Crowe ("We Bought a Zoo") -- with casts that include Matt Damon, Scarlett Johansson and Daniel Craig -- opened with modest to weak results.

Despite predictions from studio executives that 2011 could be a record-setter that would finish with a bang, domestic revenues remained stuck at a sluggish pace that has lingered all year.

Sunday, December 25, 2011

AMD Regains Single-GPU Performance Crown From NVIDIA, For Now

It was less than a year ago that Advanced Micro Devices, Inc. (AMD) launched the Radeon HD 6000 series (January 4, 2011, to be precise). The 6000 series didn't revolutionize the world of performance gaming and didn't top the single-card performance charts, but it did allow AMD to stay competitive with rival NVIDIA Corp. (NVDA) on the basis of price, if not performance.

I. Why the Radeon HD 7970 is a Huge Launch for AMD

In other words, the Radeon HD 6000 series was all about surival in the face of
the dominant GeForce 500 series -- conceding performance, but still winning on the merits of a low price.

The 7000 series launch is a very different kind of lauch. AMD is unleashing a new architecture -- "Graphics Core Next" (GCN) -- on the world. And it has aggressively targetted the performance crown, and largely succeeded. That launch begins today with the release of the Radeon HD 7970 Tahiti.


A couple of quick notes --

This is a soft launch. Actual hardware will likely ship in January, though preorders are beginning shortly.

NVIDIA will be launching sometime in calendar Q1 2012 (fiscal Q1 2013) the GeForce 600 series. Our sources point to a January launch, though that's probably a soft launch. Expect NVIDIA to ship product sometime in the Feb.-March window, barring a surprise.

AMD Radeon HD 7970


AMD Radeon HD 7970
@ AnandTech
@ Hardware Canucks
@ Hardware Heaven
@ HardOCP
@ Hardware Secrets
@ HotHardware
@ KitGuru
@ Legit Reviews
@ Neoseeker
@ Tom's Hardware
@ Vortez
@ VR-Zone


Case
Antec P280 Case @ LanOC
BitFenix Merc Case @ PureOverclock
NZXT Phantom Black Case @ LanOC
Xigmatek Elysium Case @ OCC


Cooler
Corsair A50 CPU Cooler @ CircuitREMIX


Memory
Corsair Vengeance LP DDR3-1600 16GB Kit @ Benchmark Reviews
Mushkin Redline PC3-17000 16GB Kit @ Tweaktown


Peripherals
Arctic K481 Wireless Keyboard @ Hi Tech Legion
CM Storm Sentinel Z3RO-G Mouse @ Technic3D
Xebec Tech X-Line Keyboard @ eTeknix


PSU
Super Flower Golden King 550W PSU @ XSReviews


Storage
Kingston HyperX 120GB SSD @ Rbmods


Video Cards
EVGA GTX 560 Ti @ HardwareOverclock

Saturday, December 24, 2011

IBM Scientists Reveal 5 Life-Changing Innovations


The gap between science fiction and science fact is narrowing daily. Here’s a look at five emerging technologies and market and society trends that scientists at IBM’s research lab think have the potential to change the way people work, live and interact during the next five years.

Power from the people
Anything that moves or produces heat has the potential to create energy that can be captured, Big Blue's scientists said in their sixth annual "IBM 5 in 5" look at what's in store for mankind in the near term. Walking, jogging, bicycling. The heat from your computer or the water flowing through plumbing.

Scientists believe that advances in renewable energy technology will allow individuals to collect this kinetic energy, which now goes to waste, and use it to help power homes, offices and cities.

On a personal level, while you're riding your bicycle to work, devices on the spokes of your wheels could be recharging batteries you could later use to power some of the lights in your home. On a larger scale, IBM researchers in Ireland are looking at ways to understand and minimize the environmental impact of converting ocean wave energy into electricity.

How to extend your smartphone’s battery life

No matter what type of smartphone you have, the device can serve as your MP3 player, digital camera, gaming system, and even your TV while you're out and about — as long as you have battery power. If it seems like smarter phones are getting less life out of their batteries... you're absolutely right. Smartphones can help you get a lot done while traveling, but if you're doing a lot on one in a day, you're apt to see your screen go dark long before the sun goes down.

Watching out for a few small things during your day, however, can help extend battery life on your trusty device and make sure you've got enough juice to make it all day and well into the night.

Mixed signals

It takes extra juice for your smartphone to search for a data connection. If you're somewhere where you won't get a signal, like an airplane or subway, putting your phone in airplane mode or turning it off altogether will prevent it from draining your battery. Turning your phone on does require a bit of extra power, so it's best to save shutting it off for times when you plan to leave it off for a while, rather than something like a 20-minute subway ride to work in the morning. Thinking of it as car mode or subway mode instead of airplane mode might just be the mental trick you need!

Thursday, December 22, 2011

What Is a Quad Core Processor?

A quad core processor is a single unit made up of four independent cores that process fixed-length or variable-length data. Each of the four cores works independently to read and execute computer program instructions, which might include data and memory functions. The multi-processor allocates different processes to individual cores using a method known as multitasking. This method can help a supported operating system (OS) run more efficiently, especially when allocating processing power to multiple resource intensive applications at the same time.

While a quad core processor supports multitasking, it is the OS that determines how well a computer system will handle running multiple applications at once. Multitasking depends upon frequent context switching of tasks to produce the illusion of parallel running applications. Since it has more cores, a quad core processor is in theory able to handle tasks more quickly than single or dual core processors. In practice, however, there are multiple reasons that quad core processors may not actually be any faster.

Despite the perception that more cores should equal faster processing, the quad core processor's improvement in performance over its predecessors depends on application use and implementation. Quad core processors in computer systems are generally marketed toward users who run resource intensive applications such as video games, video editing software, and graphic editors. Many video games are written so that they make optimal use of multi-processors.

What is SATA 6Gbs?

As of 2009, SATA 6Gb/s is the newest generation architecture for platter-based hard drives. The "6Gb/s" refers to the data transfer rate of 6 gigabits per second, twice the speed of the previous generation SATA. The Serial ATA International Organization (SATA-IO) that designs SATA standards has requested that this third-generation SATA be referred to as SATA 6Gb/s to avoid adding potential confusion to SATA nomenclature already bumbled by confusing second-generation names.

SATA technology changed the landscape of hard drive technology by switching from wide, inconvenient parallel ATA (PATA) data cables and connectors, to narrow serial cables and connectors. The switch to full duplex serial communication opened the door to faster speeds than parallel technology could handle, and also opened up the interior of computer cases allowing for greater air flow, vital to faster computer processor units (CPUs) and higher capacity disk drives.

Original SATA, also known as SATA 150 or SATA/150, had a maximum data transfer rate of 1.5 Gb/s or 150 Megabytes per second (MB/s). The fastest PATA drives could compete with original SATA, but PATA was maxing out its clunkier architecture while SATA was just getting started.

How Much Electricity Does a Computer Use?

If you’re trying to save money on your utility bills, you may find yourself wondering how much electricity a computer uses. However, finding the answer to this question can be a somewhat complicated task. The amount of electricity a computer uses depends upon what type of equipment you have and what applications you are running.

Typically, the amount of electricity a computer uses is between 65 watts and 250 watts. The monitor often needs between 35 watts and 80 watts of electricity as well. Most desktop computers have a label that lists how much electricity they need, but this is generally the theoretical maximum and not an average representation.

As you might expect, desktop computers with faster processors use more electricity than computers with slower processors. LCD monitors only use about half the electricity of similarly sized CRT monitors, however. Accessories and peripherals such as cable modems, routers, or webcams contribute to a slight increase in how much electricity a computer uses as well.

Regardless of what type of computer you own, the type of work you do on your computer makes a difference in electrical consumption. Using your computer to edit digital pictures, design a website, or play a video game uses more electricity than reading email or completing simple word processing tasks. In addition, the amount of electricity a computer uses significantly increases when it is connected to the Internet.

Tuesday, December 20, 2011

Does Adding RAM Improve Computer Speed?

Computer speed is one of the most sought after features of both desktops and laptops. Whether gaming, surfing the Web, executing code, running financial reports or updating databases, a computer can never be too fast. Will adding more random access memory (RAM) increase computer speed? In some cases it will, but not in all.

If RAM is the only bottleneck in an otherwise fast system, adding RAM will improve computer speed, possibly dramatically. If there are other problems aside from a shortage of RAM, however, adding memory might help, but the other factors will need to be addressed to get the best possible performance boost. In some cases a computer might simply be too old to run newer applications efficiently, if at all.

In Windows™ systems you can check RAM usage several ways. One method is to hold down the keys, Ctrl + Alt + Del to bring up the Task Manager. Click the Performance tab to see a graph of RAM resources. Third party freeware memory managers will also check memory usage for you. Some even monitor memory to free up RAM when necessary, though this is a stopgap measure.
 

If your system is low on RAM or routinely requires freeing RAM, installing more memory should improve computer speed. Check your motherboard before heading to your favorite retailer, however. The board might be maxed out in terms of the amount of RAM it will support. It can also happen that existing memory might need to be replaced if all ports are occupied by 1-gigabyte sticks, for example, on a motherboard that will support greater sticks.

What Is eSATA?

External Serial Advanced Technology Attachment or eSATA is an external interface for SATA technologies. It competes with FireWire 400 and universal serial bus (USB) 2.0 to provide fast data transfer speeds for external storage devices.

SATA replaced ATA legacy technology as the next generation internal bus interface for hard drives. The SATA interface is more streamlined than ATA and provides serial architecture for greater speed than the older parallel technology. eSATA cables are narrow and can be up to 6.56 feet (2 meters) in length, whereas parallel cables are much wider and limited to a length of 18 inches (45.7 cm). With eSATA, the speed of SATA expands to encompass exterior storage solutions.

While eSATA reaches transfer rates of at least triple those of USB 2.0 and FireWire 400, it does have one drawback. eSATA requires its own power connector, unlike the aforementioned interfaces. It is still an excellent choice for external disk storage, however. Unlike USB and FireWire interfaces, eSATA does not have to translate data between the interface and the computer. This enhances data transfer speeds, while saving computer processor resources and eliminating the need for an extra off-load chip.

What Is WiFi?

Wi-Fi, is a wireless networking technology used across the globe. Wi-Fi refers to any system that uses the 802.11 standard, which was developed by the Institute of Electrical and Electronics Engineers (IEEE) and released in 1997. The term Wi-Fi, which is alternatively spelled WiFi, Wi-fi, Wifi, or wifi, was pushed by the Wi-Fi Alliance, a trade group that pioneered commercialization of the technology.

In a Wi-Fi network, computers with WiFi network cards connect wirelessly to a wireless router. The router is connected to the Internet by means of a modem, typically a cable or DSL modem. Any user within 200 feet or so (about 61 meters) of the access point can then connect to the Internet, though for good transfer rates, distances of 100 feet (30.5 meters) or less are more common. Retailers also sell wireless signal boosters that extend the range of a wireless network.

WiFi networks can either be "open", such that anyone can use them, or "closed", in which case a password is needed. An area blanketed in wireless access is often called a wireless hotspot. There are efforts underway to turn entire cities, such as San Francisco, Portland, and Philadelphia, into big wireless hotspots. Many of these plans will offer free, ad-supported service or ad-free service for a small fee. San Francisco recently chose Google to supply it with a wireless network.

What is a Dual Core Processor?

A dual core processor is a CPU with two separate cores on the same die, each with its own cache. It's the equivalent of getting two microprocessors in one.
In a single-core or traditional processor the CPU is fed strings of instructions it must order, execute, then selectively store in its cache for quick retrieval. When data outside the cache is required, it is retrieved through the system bus from random access memory (RAM) or from storage devices. Accessing these slows down performance to the maximum speed the bus, RAM or storage device will allow, which is far slower than the speed of the CPU. The situation is compounded when multi-tasking. In this case the processor must switch back and forth between two or more sets of data streams and programs. CPU resources are depleted and performance suffers.
In a dual core processor each core handles incoming data strings simultaneously to improve efficiency. Just as two heads are better than one, so are two hands. Now when one is executing the other can be accessing the system bus or executing its own code. Adding to this favorable scenario, both AMD and Intel's dual-core flagships are 64-bit.
To utilize a dual core processor, the operating system must be able to recognize multi-threading and the software must have simultaneous multi-threading technology (SMT) written into its code. SMT enables parallel multi-threading wherein the cores are served multi-threaded instructions in parallel. Without SMT the software will only recognize one core. Adobe® Photoshop® is an example of SMT-aware software. SMT is also used with multi-processor systems common to servers.

What is Pay as You Go Broadband?

Pay as you go broadband offers mobile broadband services on a pay-as-you-go basis. A subscriber might pay for a single day of use, for a week, or for a month of online access. Pay as you go broadband provides temporary connectivity to people who do not require or desire a contract for ongoing high-speed Internet access. It can also be used as an adjunct to a contractual service, used only when standard service or wireless hotspots are unavailable.
Pay as you go broadband offers instant access to the Internet from almost anywhere using cellular towers. It’s more expensive than many broadband plans, but highly convenient. With pay as you go broadband, you can get high-speed Internet access in the back of a Taxi, on a train, in a park, or anywhere that has cellular service.

To access pay as you go broadband, a user must first purchase a proprietary Universal Serial Bus (USB) dongle or PC Card that handles the connection protocols between your computer and the mobile broadband provider. Some laptops come with an integrated mobile broadband card, intended for a specific cellular provider. If you choose a different provider, you’ll require a dongle or PC Card branded for that service. Once the device is popped into the USB port or PC Card slot, just enter your credentials and advance payment for the desired block of time. Typically the smallest block allowable is 24 hours, which runs about $15 US Dollars (USD), with prices varying internationally. 

What Is Peer-To-Peer Downloading?

Peer-to-peer downloading is a type of computer networking that allows users to share certain information with one another. This information can include processing power, network bandwidth, disk storage, printing capabilities, and other forms of information. The use of peer-to-peer downloading makes it possible for networks to function without the use of a special server.

Peer-to-peer downloading is extremely popular when it comes to sharing software. Applications such as WinMX, Overnet, and Kazaa are all based on a peer-to-peer system. In addition, peer-to-peer downloading can be found in homes or offices where a larger dedicated server computer is not a possibility.

Some programs, such as Microsoft Windows XP, also include peer-to-peer options. These programs allow users to share information securely without relying upon one dedicated server. While sharing computer files inside a home or office is relatively secure, there is some concern that sharing computer files with the general public is not at all secure.

Allowing the public random access to all files located on a computer can be risky. Those that do wish to share private information with the public should do so using an effective firewall. A firewall will keep private files out of the public eye, though this method of peer-to-peer downloading protection is not always efficient.

What is BitTorrent?

BitTorrent is an open source peer-to-peer protocol for downloading files on the internet. Open source means the code is available for anyone to modify and redistribute at will. Consequently there are several free BitTorrent programs available to the public, each with differing features. The original source code was written by Bram Cohen.

The idea behind BitTorrent is to allow massive distribution of popular files without penalizing the source by soaring bandwidth costs and possible crashes due to demand that exceeds the capability of the server. In this way, anyone who creates a popular program, music file or other product can make it available to the public regardless of assets, even if the file becomes highly popular.

To understand how BitTorrent functions, first consider how normal downloading works. Personal computers connected to the Internet are known as clients while the websites visited reside on Internet servers. Servers "serve up information" to clients. If you surf to a site and click on a link to download a program, you create a one-on-one connection to that server that uses whatever bandwidth is necessary to serve you the file. When you have received the entire file, the connection is released so the server can utilize that stream of bandwidth for handling other connections.

What Is FrostWire Used For?


FrostWire is a BitTorrent client --- a program you install on your hard drive that allows you to download and upload files like MP3s, photos, movies and software applications. Although similar to basic BitTorrent clients like uTorrent, Frostwire has a few more features and is more user-friendly.

Definition

FrostWire is a Java-based file-sharing program used with the Gnutella and BitTorrent protocols. It is a branch of LimeWire, which is another Gnutella client that offers both free and paid versions. FrostWire, on the other hand, is a completely free program released under the GNU General Public License. FrostWire is also ad free, and does not contain download restrictions like the free version of LimeWire.

 

System Requirements
FrostWire requires a minimum of 128 MB of RAM, but 256 MB is recommended. It can be installed on Mac OS X 10.4 and later, Windows 2000 and later, and any version of Linux. It also requires Java 1.5 or later. Faster Internet connections, like cable or DSL, allow you to download files much faster in FrostWire than slower dial-up connections.
 

Monday, December 19, 2011

A Few Interesting Facts About The Internet

We use Internet in our day-to-day life activities and it has become a vital part in everyone’s life and has made life easy for its users. Internet enables the users to view and share information. It helps users in performing many important tasks like online shopping, electronic mail, online chat, file transfer, news, booking tickets, sharing information etc. We can download or upload important information such as videos, songs, movies, files, animation, images, software, games etc. But how much do we know about the Internet? Read on below for more information on Internet.

We all know that it is a global system of interconnected computer networks that use the standard Transmission Control and Internet Protocol suite to transmit data to users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by extensive electronic, wireless and optical networking technologies. The Internet runs a huge chain of information resources and services like the documents linked via hypertext of the World Wide Web (WWW) and the infrastructure to support email.

//