Happy New Year 2013 Windows 7 Wallpapers

0 comments


A
collection of Happy New Year 2013  windows wallpaper. You decorate your home, your workplace and desktop for New Year, The changing of one year to the next can fill one with a sense of excitement and hope for the possibilities that await in the new year. Ring in the new year on your desktop with our New Year’s 2013 Wallpapers collection.
Related Posts

Note: Click on the picture to see the full-size image—these wallpapers vary in size so you may need to crop, stretch, or place them on a colored background in order to best match them to your screen’s resolution.










Announcing the 2012-2013 Facebook Fellows

0 comments
W
e began the Facebook Fellowship Program in 2010 to foster ties to the academic community and support the research of promising computer science Ph.D. students. Since then, our Fellows have shown remarkable progress in their study of computer security, compiler technology, distributed systems, machine learning, and more. Because of our past winners' great successes, we decided to more than double the number of Fellowships for the 2012-2013 program.

After considering nearly 300 applications, we are excited to announce the 2012-2013 Facebook Fellowship winners. We are confident that each of this year's Fellows will continue to solve many of the exciting and challenging problems inherent at our scale. Highlights of this year’s Fellowship research topics include data storage, mobile computing, and programming language technologies.

To facilitate their work, we have awarded each Fellow full payment for their 2012-2013 tuition, a $30,000 stipend to cover study expenses, $5,000 for conference travel, and $2,500 for a personal computer. We will also invite all Fellows to visit Facebook later this year to meet with engineers working on problems relevant to each Fellow's research.

Thank you to everyone who submitted applications this year. We received hundreds of strong applications, and after many reviews by our academics and engineering leadership, we've selected our 12 winners and 30 finalists. Meet the winners below and check out an overview of their research, as well as what inspired them to pursue it. We congratulate all our winners and finalists for their hard work and compelling ideas.


Jeremy Andrus, Columbia University
Area of Focus: Mobile Computing

When Jeremy sees many people carrying multiple smartphones, he also sees a challenge: How can we unify all those phones and their functionalities so we need to carry only one device? His goal is to revolutionize the mobile market with virtualization solutions that will allow us to use multiple virtual devices on a single physical device.

Jeremy will work to unify the mobile user experience by investigating efficient and secure ways to virtualize whole platforms like Android. His work will help facilitate the next generation of mobile virtual appliances, open up new opportunities for mobile cloud-basedapplications and services, and clear our cluttered pockets of excess devices.



Mosharaf Chowdhury, University of California, Berkeley
Area of Focus: Computer Networking and Cloud Computing

Recently, there have been calls for considering datacenters “computers” and developing operating systems for them. However, the network that connects the thousands of machines inside a datacenter is often ignored and remains an application-agnostic, best-effort service.

Mosharaf, a PhD student in the AMPLab, hopes to elevate the datacenter network to become a first-class resource in cloud computing environments. His research is introducing application-aware network primitives to make datacenter networks more efficient, predictable, and easier to share across multiple entities.



John C. Duchi, University of California, Berkeley
Area of focus: Machine Learning

John works broadly on machine learning problems. His research focuses on algorithms and techniques for scaling machine learning to the real world — problems with too much data to store on one computer.

John's goals are twofold: First, his research studies the growing size of modern datasets that necessitate new, efficient learning algorithms, such as for streaming, online, and distributed data. Secondly, he aims to develop both practical and theoretical understanding of new statistical procedures that allow computers to learn amidst previously difficult problems.



Tyler Harter, University of Wisconsin, Madison
Area of Focus: Storage Systems

Tyler believes that meeting the needs of a data-driven society requires constantly improving the storage stack. He takes a "measure then build" approach to storage-system design. Previously, he studied the file I/O behavior of various desktop applications; the resulting analysis has implications for the design of future file systems.

Now, Tyler is measuring the Hadoop File System (HDFS). Tyler plans to model HDFS scalability and create an HDFS emulator, and he hopes his work will help meet the scaling needs of growing services on the social web.



Jeff Huang, University of Washington
Area of Focus: Search

Jeff is studying scalable, non-intrusive methods for collecting richer interaction data on web pages. Going beyond page views and clicks, he is using mouse cursor movements, scrolling, and tabbed browsing to support the design of better information systems. Through this, Jeff has analyzed user activity on search engines to model searcher behavior, aiming to help search engines better understand their users.

As a PhD candidate at the University of Washington, Jeff hopes to show that search engines and interactive websites like Facebook can use user interaction data to provide the information their users want more effectively.




Hyeontaek Lim, Carnegie Mellon University
Area of Focus: Distributed systems

Hyeontaek, a PhD student at Carnegie Mellon University in Pittsburgh, will focus on developing techniques to improve the resource efficiency of distributed systems He hopes to deliver more affordable data-intensive computing, facilitating future innovations for large-scale Internet services.









Gregory Malecha, Harvard University
Area of Focus: Programming Language Technology

Gregory believes that programming language technology has the potential to radically improve both the efficiency and the trustworthiness of modern software. This year, he plans to research how extensible program logics can be used to reason about low-level, concurrent software. He believes that the right abstractions enable compositional, high-level reasoning about programs while retaining the ability to optimize them. To this end, he will work on a program logic for compilerintermediate representations that support concurrency.

Gregory is currently a PhD candidate at the Harvard School of Engineering and Applied Sciences where he has been working on program verification and topics in high-level programming languages. He became interested in compiler and programming language technology at Rice University, where he worked on multi-stage programming as an undergraduate.




Michelle Mazurek, Carnegie Mellon University
Area of Focus: Computer Security

Michelle, a PhD student at Carnegie Mellon University, is researching ways to let users share their content accurately and quickly, secure in the knowledge that only the right people will see it. Rather than setting specific permissions for each piece of content, Michelle's system will let users easily set comprehensive, human-understandable rules for controlling access to certain types of data.

By combining provable security and user-focused design, Michelle hopes to help users avoid wading through complicated and confusing privacy settings while still maintaining control over who sees their content.




Adrian Sampson, University of Washington
Areas of Focus: Computer Architecture and Programming Languages

Adrian works on making computers more energy efficient. Modern computers, from smart phones to servers, contend with power consumption limits like battery life, power and cooling bills, and chip power density constraints — all of which threaten to impede progress in the development of those computers' capabilities. Adrian's research combines new processor designs with new energy-aware programming languages to help programmers write "greener" software. Adrian, who lives and studies in Seattle, hopes to make computers everywhere more efficient.



Emily Stark, Massachusetts Institute of Technology
Area of Focus: Computer Security

Emily is a first-year graduate student at MIT. Her research focuses on building secure web applications that offer useful functionality while protecting the privacy and security of users' sensitive data.

By using ideas from applied cryptography, program analysis, and web security research, she would like to develop techniques that allow rich, functional applications to maintain the confidentiality and integrity of user data, even in the face of a compromised server or buggy application. This research will help to ensure that users' data is secure and that their trust is well-placed.



Rashmi Korlakai Vinayak, University of California, Berkeley
Area of Focus: Distributed Data Storage

Rashmi is fascinated by the sheer scale of data that the key Internet players like Facebook handle today. The challenge of storing and managing this enormous amount of data in a reliable and efficient manner, and making it available in real time, has inspired her research on distributed storage.

Rashmi is currently researching new encoding mechanisms for distributed storage systems with a goal of significantly improving their reliability and elasticity. Through her ongoing work on this, Rashmi envisions bringing a fundamental and principled approach to the multi-dimensional problem of designing distributed storage systems that will nicely complement and strengthen current heuristic-based approaches on this topic.



Jean Yang, Massachusetts Institute of Technology
Area of Focus: Programming Languages and Computer Security

As an avid Facebook user, Jean values Facebook's support for fine-grained privacy settings. As a programmer, she understands the difficulty of developing code that enforces these privacy settings. In her research, she aims to make it easier for programmers to write these privacy-aware programs.

For her Ph.D. thesis, Jean is developing Jeeves, a new programming language for automatically enforcing privacy policies. Jeeves allows the programmer to specify privacy policies at a high level, implement core functionality agnostic to the policies, and rely on the system to produce outputs adhering to the policies.

Jean is excited for a future in which good language design makes programmers' lives easier and even more productive.

Finalists:

Adam Morris, Tel Aviv University
Adrian Sampson, University of Washington
Alan Ritter, University of Washington
Annie Steele, The University of Texas at Austin
Bin Fan, Carnegie Mellon University
Bo Chen, California Institute of Technology
Brent Stephens, Rice University
Changhee Jung, Georgia Institute of Technology
Cheng-Te Li, National Taiwan University
Dan Zhang, Purdue University
Eric Sodomka, Brown University
Jason Wiese, Carnegie Mellon University
Jeehyung Lee, Carnegie Mellon University
Jeffrey Rzeszotarski, Carnegie Mellon University
Jennifer Marlow, Carnegie Mellon University
Johan Ugander, Cornell University
Julien Dubois, California Institute of Technology
Kira Radinsky, Technion, Israel
Low Yucheng, Carnegie Mellon University
Minghong Lin, California Institute of Technology
Mohammad Hajjat, Purdue University
Mohammad Saberian, University of California San Diego
Neha Kumar, UC Berkeley
Robert West, Stanford University
Sameer Singh, University of Massachusetts, Amherst
Sanjay Kairam, Stanford University
Tyler Lu, University of Toronto
Vasilis Syrgkanis, Cornell University
Wyatt Lloyd, Princeton University

Google Search Marry Chirstmas

1 comments
F
irst of all wish you a Marry Christmas. Do you notice this month's Google search view? let's have a look of Google search. You can search any thing on Google, If you are expert to Googling. When i search something on Google that time someone ask me that what are you doing my answers is "Googling". My previous post "Search like an expert with Google" about search with Google like expert.

Today, Just type "Christmas" you can see this below search results. In this image you can see line of balloons which line you can only see when you type "Christmas".


Password Hacking [Info]

0 comments


P
assword cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :



Hashing
Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

Guessing
Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

  • blank (none)
  • the word "password", "passcode", "admin" and their derivatives
  • the user's name or login name
  • the name of their significant other or another person (loved one)
  • their birthplace or date of birth
  • a pet's name
  • a dictionary word in any language
  • automobile license plate number
  • a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwerty uiop)
  • a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

Check Your Password Strength

Default Passwords
A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

Brute Force
If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

Phishing
This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

How to set new password without confirm password

1 comments
I
changed my Laptop("Sleepy Angel")'s password 48 hours ago after that i worked for 48 hours and my sleepy angel continuously wake up with me and i forgot password because that password i used first time so its happen. Now problem is that i want to set my old password without confirmation of password. I got its solution.

How to set new password without confirm password
  • Go to Run type lusrmgr.msc [Logon User Manager Microsoft Console] Hit Enter.
  • Now you will see this below window click on left side Users folder
  • Right click on user account name my account name is administrator and click on set password
  • After set password click on proceed.
  • Now set your password with out confirmation of old password


Happy Birth Day To SMS (Short Message Service)

2 comments
S
hort Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices.

The first SMS message was sent over the Vodafone GSM network in the United Kingdom on 3 December 1992, from Neil Papworth of Sema Group (now Mavenir Systems) using a personal computer to Richard Jarvis of Vodafone using an Orbitel 901 handset. The text of the message was "Merry Christmas."









In 2010, 6.1 trillion SMS text messages were sent. This translates into 193000 SMS per second. SMS has become a massive commercial industry, earning $114.6 billion globally in 2010. The global average price for an SMS message is $0.11, while mobile networks charge each other interconnect fees of at least $0.04 when connecting between different phone networks.[citation needed]

While SMS is still a growing market, traditional SMS are becoming increasingly challenged by alternative messaging services which are available on smartphones with data connections, especially in western countries where some of these services attract users.

In June 2012, facebook for kids site Everloop released EverText, the first ever SMS integration offered by a social community platform that is compliant with the Children's Online Privacy Protection Act (COPPA).

The Guardian has revealed a nice timeline, which shows how the SMS has evolved including some fun facts. The timeline is as follows:

  • 1992 First text message sent
  • 1995 T9 system invented, making texting quicker
  • 2001 Text volume passes 1bn a month in the UK
  • 2001 Text messaging is used to help organise protests that topple President Joseph Estrada in the Philippines
  • 2002 A service called Text2TV from a Devon-based company says it will let you send texts to your TV and reply via your remote. It doesn't take off
  • 2003 David Beckham sends a series of steamy text messages to his personal assistant Rebecca Loos; they are later published, and nearly end his marriage
  • 2004 Tony Blair takes part in a live text chat
  • 2005 The Eurovision song contest includes SMS votes, creating the biggest ever "televoting"
  • 2008 Nielsen reports that the average US mobile user sends and receives more texts per month than phone calls – 357 v 204
  • 2009 WhatsApp, a free text-like service that lets people send messages for free over data connections, is founded
  • 2011 Number of texts sent at Christmas falls year-on-year in Finland, Hong Kong, Spain and the Netherlands
  • 2012 Ofcom reports that text messages are the most-used method for daily communication with family and friends – 58% of UK adults do so at least once a day
  • 2012 Rebekah Brooks reveals that David Cameron sent her texts signed "LOL" because he thought it meant "lots of love"; its usual meaning is "laughing out loud"

Matti Makkonen in an interview to the BBC, conducted over SMS, said that while SMS may not survive another 20 years but "text messaging will stay forever."
 

Google+ Followers

Total Pageviews

FeedBurner

Mayur Sojitra - Find me on Bloggers.com
Follow on Bloglovin
© 2012 A World Of Possibilities . Designed by Nitin Maheta, Powered by Blogger