Saturday, November 29, 2008

Motorola QA30 Specs Leaked

Of late we have been seeing a lot of horizontal sliding QWERTY phones. Now Motorola is about to change the trend (or be the only one) with a vertical sliding QWERTY keypad in the form of Moto QA30.

The rumored specs are CDMA support with 2.5-inch screen, thread messaging support, 2 mega pixel camera, HTML browser, Email, Bluetooth with A2DP, USB 2.0 and microSD/microSDHC card support up to 32GB.

The release is expected to be in December on U.S. Cellular.

New holographic technology

Current methods of holographic photography might turn redundant in a few years time if the researchers at a Tokyo institute manage to fine tune their latest holographic image creation technique.
Current technology warrants the use of lasers and darkrooms for the production of holographic images because it is required to shoot the subject separately with red, green and blue laser beams before all the images can be "superimposed" to give that holographic effect.

The new technology is based on integral photography. This procedure in creating the hologram includes taking pictures of the subjects in normal lighting conditions. A video camera is used for this purpose. This camera has a "fly-eye" lens composed of a number of micro lenses. The same fly-eye lens is used to display 3D images.

A computer decodes the images shot by the camera and processes them into a 3D image with separate processing units for RGB colors. Each of these units can be processed separately and then merged together again and synthesized. The result is a real-time live holographic video.

The technique is limited only to small images right now - however, it is expected that the technology will evolve over the next couple of years to display larger holographic images.

Sunday, November 23, 2008

Are Passwords Safe?

They may soon be, with other ways of authentication and identity protection making their presence felt.
The fact that passwords are not the securest of authentication techniques is well known. Most of us use passwords that are easy to remember, and therefore, easy to crack. Phishing threats and a lot of malware are focused on stealing your online identity—your usernames and passwords.

Security experts think that protecting your online identity is far easier if the ‘human’ element in remembering that identity is minimized. The time, it seems, has come for moving beyond passwords to other authentication techniques that are easier to use and provide adequate protection against identity theft.

Two initiatives here are gaining importance—the OpenID initiative and Information Cards. Some experts state that both can work in tandem, while others are of the opinion that they represent two distinct approaches to authentication.

OpenID
OpenID satisfies the condition of being easy to use. It involves creating a single ID for a user, which can be used to log on to different sites. Thus, you can use the same ID, for instance, for your email account, blog site, and social networking site. Several service providers, such as Microsoft, AOL, Yahoo, Google, IBM, MySpace and others, support OpenID logins. This means that if you use any of their services, you already have an OpenID.

OpenID works as follows. The OpenID identity provider (OP) is the entity that provides you with an OpenID, in the form of a URL. Services like AOL, Yahoo, or Google enable you to use your account details as your OpenID. Independent providers like myOpenID (http://www.myopenid.com/) and myID.net (http://www.myid.net/) also provide a similar service. Other OPs, such as VeriSign provide an OpenID along with stronger authentication than passwords, such as security tokens.

When you go to a site that supports OpenID logins (you can make that out from the OpenID logo near the login form), you can use your OpenID instead of creating a fresh username and password. However, not all sites support OpenIDs from all OPs. You may, therefore, require a set of OpenIDs, each of which works on a group of websites.

The advantage with OpenID, of course, is that it is less time-consuming than registering yourself with each site you visit, and creating a username or password each time. It also saves you the trouble of remembering so many passwords. The loophole is that if your OpenID is stolen, it would give access to that much more confidential data about you. And OpenID is as vulnerable to phishing attacks as the passwords themselves.

However, OpenID is in its nascent stages yet, and a lot of development is still going on. Further development could result in a scenario where a few trusted OPs generate OpenIDs with stronger authentication mechanisms than passwords, and websites support OpenIDs from one or more of such OPs. That stage, if it comes about, is definitely some years away.

Information Cards
Information Cards, supported by the Information Card Foundation (ICF), rely on cryptography for authentication and do away with usernames and passwords altogether. There has been a lot of conceptual development and discussion about information cards, and practical applications have now begun.

An identity provider would issue you an Information Card, which would reside on your PC as a desktop icon. To authenticate yourself to a site, you will need to click the desktop icon. This works as a digital identity for you; your authentication works by exchanging cryptographic information with the site that would need to support Information Cards. It is possible to envisage a set of Information Cards, each of which can be used for authentication on several websites.

The advantage here is that in a single stroke, authentication moves beyond usernames and passwords, thus negating any threats of password theft. You also don’t need to remember anything, so that the days of not being able to login because you’ve forgotten your password can be left behind. Since authentication is based on encryption, it is difficult to hack.

On the other hand, this system could take years to be implemented, because websites have to begin to use it instead of the current login process. Also, the process of generating encryption keys for creating Information Cards will be carried out by computers; and many computers today don’t have the requisite software to do this on a large scale.

Moreover, one issue with the Information Card is that since the information is stored on your desktop, you will not be able to authenticate yourself from any other machine. Remote logins to certain websites will not be possible, unless you store your Information Card on every machine that you use, which, again, undermines security.

Some security experts also suggest that Information Cards should be used for authentication along with OpenIDs. Since both authentication technologies are fairly new and still under development; the future of their adoption and implementation is quite fluid. In the near future, it seems, a strong, tough-to-crack password is the best bet.

Friday, November 21, 2008

Nokia Launches Bruce Lee Mobile Phones

If you are a Bruce Lee fan this is of interest to you. Nokia released the Nokia N96 Bruce Lee limited edition phone.

The specs though remain the same but this new Nokia N96 avtar will feature Bruce Lee s face, signature on the back case and is also packed with rare photos of the legendary actor. Futher, the phone comes bundled with several accessories including a Bruce Lee doll and a nunchaku.

The Bruce Lee Nokia N96 costs 8,788 Chinese yuan (approx Rs 64,000) -- which frankly is insane amount to pay for a phone that already costs a whooping Rs. 35,000!

The phone is available online through Nokia, but you need to know Chinese for that (Google translate will not come to your rescue for this one).

This market would grow further with the advent of 3G (third generation) service phones opening newer avenues of possible intellectual property theft by way of Caller Ring Back Caller Service (CRBT), Embedded tones, background music, full track downloads, mobile radio and streaming and downloading of music, which bring joy and listening pleasure to the consumers, Lazarus said.

IMI, which issues licenses through its wings Indian Phonographic Ltd (PPL) and Indian Performing Rights Society (IPRS), has tied up with all telecom operators for legitimate use of music, he said.

Licenses have been issued to radio stations, television broadcasters (including those showing some new-age music-based reality shows) and big portals allowing streaming and downloading of music on the internet, IMI General Secretary Savio D’Souza said.

IMI’s internet anti-piracy team, while closely working with International Federation of the Phonographic Industry (IFPI), has managed to close 500 sites, mostly based on servers in the USA, he said.

Google
 

KNOW ALL ABOUT PERSONAL LOANS CLICK HERE.
A 13th BOX Endeavour.