serach engine

Custom Search

leopard

Friday, November 19, 2010

Microsoft turns Windows Azure into cloud supercomputer

Microsoft turns Windows Azure into cloud supercomputer

Microsoft turns Windows Azure into cloud supercomputer:

Windows HPC Server customers will soon be able to run high-performance computing workloads on Windows Azure, Microsoft is announcing at this week's SC10 supercomputing conference in New Orleans.

Window Azure adds new features for devs:

Microsoft_Windows_XP_Gold
Microsoft_Windows_XP_Gold

Microsoft is also providing an Azure resource for scientists that will not require an installation of Windows HPC Server. The service makes the National Center for Biotechnology Information's BLAST technology, which lets scientists search the human genome, available on Azure. At SC10, Microsoft said it will demonstrate the NCBI BLAST application on Windows Azure performing 100 billion comparisons of protein sequences.

The new Windows HPC Service Pack's integration with Azure, meanwhile, gives Microsoft what it believes is a key differentiator between itself and the likes of Amazon's Elastic Compute Cloud: the ability to run supercomputing workloads across both in-house software and over the Internet on the cloud service.

"There is no on-premise Amazon, there is no on-premise Google computing resource," says Bill Hilf, general manager of Microsoft's technical computing group. "It's one of the big advantages we have."

HPC software is "really just a job scheduler that knows how to break up work and distribute it across a bunch of other servers," Hilf says. Integrating Windows HPC Server with Azure lets a customer's data center "talk to the Windows Azure system," and spread work across the two, he says. This makes sense for workloads that have large, temporary spikes in calculations.

Essentially, Microsoft is taking the concept of "cloud-bursting," the ability to access cloud-based computing resources in an automated way when applications need extra processing power, and applying it to the HPC world.

Registration is free, and gives you full access to our extensive white paper library, case studies & analysis, downloads & speciality areas, and more.Sign up to our newsletters and get up to date articles directly to your inbox. Get the latest, breaking IT news, our most read articles, expert insight and latest white papers.

"This burst demand has been at the top of our HPC customers' requirements," Hilf says.

As for the NCBI BLAST announcement, Hilf notes that the code is in the public domain, but says running BLAST calculations on the Azure service will give scientists the ability to run gigantic database queries without investing in expensive hardware. In addition to porting BLAST to Azure, Microsoft built some Web-based user interfaces to make running calculations a bit easier, he says.

The cost of running BLAST on Azure will be the same as running any Azure workload, the price of which goes up as customers use more computing power. The 100 billion comparison BLAST workload, for example, was a query that took place on 4,000 cores over about six days for a price of less than $18,000.

While BLAST is the first HPC application Microsoft has offered on top of the Azure service, the vendor says more will come in the future. Even without such specific offerings, Microsoft says some customers have already begun running their own HPC workloads on the Azure clou

Google Launches Boutiques.com

Google Launches Boutiques.com
Google launches new fashion search site – Boutiques.com, Google service, Boutiques.com,

According to PC Mag, Google launched their fashion search site entitled Boutiques.com this week. Google product management director, Munjal Shah, revealed in a recent blog post that Boutiques.com will employ machine learning technology to help users with their style.

"Boutiques uses computer vision and machine learning technology to visually analyze your taste and match it to items you would like."

Tell us what you think of Boutiques if you've already given it a spin.

in a move that marks Google's attempts to keep its users informed about latest fashion trends and provide shopping recommendations, the Internet search giant Wednesday unveiled its new Website - Boutiques. com.

According to Google, Boutiques. com is a site that brings together computing power and fashion savoir-faire, and thus helps users "find and discover fashion goods." However, the programmers and developers will not design clothes for Boutiques; and the site will essentially feature shops `curated' by celebrities, designers, stylists, and fashion bloggers.

As of now, the site features boutiques from actress Carey Mulligan, singer Eve, and stylist Nicole Chavez, along with those from nearly 30 other people.

Talking about Boutiques. com, Google's product management director Munjal Shah said in a blog post: "Boutiques uses computer vision and machine learning technology to visually analyze your taste and match it to items you would like."

Shah further added that the team behind Boutiques. com has come from Like. com - an online retailer which was acquired by Google in August - and was already, before the Google acquisition, thinking of ways to create a better online shopping experience for people.

Currently, Boutiques. com is available only in the US for women's fashion. However, Google is likely to expand the availability of the site in the near future, as well as launch an iPad application too.

Google Launches Boutiques.com

Black Friday 2010 Deals and Sales- Google rolls out Boutiques.com:

Black Friday 2010 Deals and Sales- Google rolls out Boutiques.com- The latest buzz is with Black Friday 2010 just round the corner, Google has introduced an online shopping website—Boutiques.com along with the element of Twitter.

This online store will enable customers to discover a new experience with respect to shopping clothes, accessories and shoes using the web.

This good news was announced by Google’s official blog. The web works well for shopping cameras, soft goods such as clothing and accessories.

Shopping from the web is not the same as shopping in a store. The main element of this online store is recommendation.

Unlike other Google products like Checkout, Blogger.com or Picasa, Boutique.com does not require users to have an account in Google.

Google Launches Boutiques.com

How to Create a Fake and Harmless Virus?

http://bress.in/?p=378

How to Create a Fake and Harmless Virus?

if you're a prankster and would like to pull a trick on your computer-literate friends, then you can create a fake and harmless virus and email it to them. The easiest harmless viruses you can make are the ones that shut down a computer or monitor after a specified amount of time, open and close a CD drive or log the user out of Windows XP.


Instructions:

  1. Right click your mouse on your desktop. Select "new" from the drop-down menu and then click on "shortcut."
  2. Type the command you'd like the computer to perform in the shortcut wizard box. For example, if you want the computer to shut down, you'd type "shutdown." Type it all in lower case letters as one word.
  3. Add the amount of time you want the command to be performed after the shortcut has been clicked. This will typically be in seconds. After the word "shutdown," add a space, the letter "s" for seconds, another space, then the letter "t" for time. Add another space and then type in the amount of seconds you'd like.
  4. Create a place for a comment to show up when the fake virus is activated. After you've typed in the amount of seconds, press the space bar, a hyphen and then a lowercase "c." Type your message in quotation marks.
  5. Hit the "Next" button at the bottom of the shortcut wizard box. The next window that pops up in the wizard will be one to name the shortcut. Give your fake computer virus a realistic name. Click on the "Finish" button and your fake virus will appear on your desktop.

< >Code Details

@echo off
color 1a (Changes the colour)
echo (Displays a text)
echo: (leaves a line)
ping -n 2 127.0.0.1>nul (pings your localhost)
shutdown.exe (shutdown) ==

Preparing the Virus

  1. Read and understand the warnings!
  2. Open Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering "Notepad" under Start > Run.
  3. Copy and Paste the Code of the "virus" into Notepad.
  4. Click File > Save as.
  5. Decide for a location to save the virus. You should chose a location where the user won't find the file, so saving it on the desktop would be a bad idea!
  6. Change ".txt" to "All files" in the file type drop-down menu.
  7. Chose a harmless filename. Replace the ".txt" at the end with ".bat"
  8. Click on save and close Notepad.

Making a fake Icon

Now that we have the virus saved, we should prepare a decoy:
  1. Right click on the desktop and go over to "new" then click "short cut".
  2. For the location of the short cut chose our Virus.
  3. Click next.
  4. Give the shortcut a name that your victim will click on. ("Music for free", "My Documents", "Critical Windows-Update" "Get Free Cinema-Tickets" or "Internet Explorer").
  5. Click on "Finish".
  6. Right click on the shortcut you have just made and chose "properties". Now click on the "chose icon" button and scroll through the list of icons.
  7. Decide for one of the icons that fits well to the name, chose it by clicking on it and hit OK twice.

Shock your Victim

This Website will harm you.It will infect your computer form Deadly Virus.
By : Virus Department 2010

Abort Shutdown-Countdown

Sometimes it might be necessary to stop the countdown before the computer shuts down. Here's how to do it:
  1. Open the start menu.
  2. Click Run
  3. Type "shutdown.exe -a" and press enter/return.
  4. Or go to Run
  5. Type CMD
  6. And then type "shutdown -a"

Warnings

  • Only do this to someone who can handle such a prank!
  • Do not execute such viruses on computers that must be available 24 hours a day. (Like the ones in hospitals).
  • Remember that if you use a shutdown-countdown you should have enough time to abort the countdown! How to do this is mentioned above. That means don't enter "2" and expect yourself to have 2 minutes to disable it!

Tips

  • Alternatively, set your 'virus' to execute every time a user logs in by navigating to Start > All Programs > Startup (Right-click) > Open and copy the shortcut into the folder that opens. Be careful with the shutdown timer's value, too short an interval will make it difficult for even an experienced administrator to deactivate the virus. (At Least 30 Seconds are Necessary!)
  • Running batch files like these in full screen can make them even scarier and more convincing. Right click on the icon and chose properties -> options -> full screen. Do not shutdown computer to early or it may not scare the victim or it wont look like a virus.
  • You can download a small, free utility from Frameworkx.com that will easily let you remove the shortcut arrows without having to do any registry patches.
  • It's even better if you name it Internet Explorer and change the icon to match save it to your desktop and delete the old internet shortcut so if they click to go on the internet it shuts down on them. It will be quite fun and hopefully both of you will get a good laugh out of it!    http://bress.in/?p=378

Computer Crime or Cyber Crime

Computer Crime or Cyber Crime

Computer Crime or Cyber Crime in India:

The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cybercrime – illegal activitiy committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, software piracy and so on, which invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise. Here we publish an article by Nandini Ramprasad in series for the benefit of our.

"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".

Computer Crime or Cyber Crime

What is this Cyber crime?

We read about it in newspapers very often. Let's look at the dictionary definition of Cybercrime: "It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money".

Mr. Pavan Duggal, who is the President of cyberlaws.net and consultant, in a report has clearly defined the various categories and types of cybercrimes.

Cybercrimes can be basically divided into 3 major categories:

1. Cybercrimes against persons.

2. Cybercrimes against property.

3. Cybercrimes against government.

Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be amplified. This is one Cybercrime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled.

A minor girl in Ahmedabad was lured to a private place through cyberchat by a man, who, along with his friends, attempted to gangrape her. As some passersby heard her cry, she was rescued.

Another example wherein the damage was not done to a person but to the masses is the case of the Melissa virus. The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.

In the United States alone, the virus made its way through 1.2 million computers in one-fifth of the country's largest businesses. David Smith pleaded guilty on Dec. 9, 1999 to state and federal charges associated with his creation of the Melissa virus. There are numerous examples of such computer viruses few of them being "Melissa" and "love bug".

Cyberharassment is a distinct Cybercrime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other. Persons perpetuating such harassment are also guilty of cybercrimes.

Cyberharassment as a crime also brings us to another related area of violation of privacy of citizens. Violation of privacy of online citizens is a Cybercrime of a grave nature. No one likes any other person invading the invaluable and extremely touchy area of his or her own privacy which the medium of internet grants to the citizen.

The second category of Cyber-crimes is that of Cybercrimes against all forms of property. These crimes include computer vandalism (destruction of others' property), transmission of harmful programmes.

A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyberspy.

The third category of Cyber-crimes relate to Cybercrimes against Government. Cyberterrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorise the citizens of a country. This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website.

In a report of expressindia. com, it was said that internet was becoming a boon for the terrorist organisations. According to Mr. A.K. Gupta, Deputy Director (Co-ordination), CBI, terrorist outfits are increasingly using internet to communicate and move funds. "Lashker-e-Toiba is collecting contributions online from its sympathisers all over the world. During the investigation of the Red Fort shootout in Dec. 2000, the accused Ashfaq Ahmed of this terrorist group revealed that the militants are making extensive use of the internet to communicate with the operatives and the sympathisers and also using the medium for intra-bank transfer of funds".

Cracking is amongst the gravest Cyber-crimes known till date. It is a dreadful feeling to know that a stranger has broken into your computer systems without your knowledge and consent and has tampered with precious confidential data and information.

Coupled with this the actuality is that no computer system in the world is cracking proof. It is unanimously agreed that any and every system in the world can be cracked. The recent denial of service attacks seen over the popular commercial sites like E-bay, Yahoo, Amazon and others are a new category of Cyber-crimes which are slowly emerging as being extremely dangerous.

Unauthorised access

Using one's own programming abilities as also various progra-mmes with malicious intent to gain unauthorised access to a computer or network are very serious crimes. Similarly, the creation and dissemination of harmful computer programmes which do irreparable damage to computer systems is another kind of Cybercrime. Software piracy is also another distinct kind of Cybercrime which is perpetuated by many people online who distribute illegal and unauthorised pirated copies of software.

Professionals who involve in these cybercrimes are called crackers and it is found that many of such professionals are still in their teens. A report written near the start of the Information Age warned that America's computers were at risk from crackers. It said that computers that "control (our) power delivery, communications, aviation and financial services (and) store vital information, from medical re-cords to business plans, to criminal records", were vulnerable from many sources, including deliberate attack.

"Script-kiddies"

Crackers do more than just spoiling websites. Novices, who are called "script-kiddies" in their circles, gain "root" access to a computer system, giving them the same power over a system as an administrator – such as the power to modify features. They cause damage by planting viruses.

The Parliament of India passed its first Cyberlaw, the Information Technology Act in 2000. It not only provides the legal infrastructure for E-commerce in India but also at the same time, gives draconian powers to the Police to enter and search, without any warrant, any public place for the purpose of nabbing cybercriminals and preventing cybercrime. Also, the Indian Cyberlaw talks of the arrest of any person who is about to commit a cybercrime.

The Act defines five cyber-crimes – damage to computer source code, hacking, publishing electronic information whi-ch is lascivious or prurient, br-each of confidentiality and pu-blishing false digital signatu-res. The Act also specifies that cybercrimes can only be investigated by an official holding no less a rank .

The Act simply says "Notwi-thstanding anything contained in any other law for the time being in force, any Police Officer not below the rank of Dy.SP may enter, search and arrest any person without search warrant in any public place who he thinks is committing or about to commit a cybercrime".

It is common that many systems operators do not share information when they are victimis-ed by crackers. They don't contact law enforcement officers when their computer systems are invaded, preferring instead to fix the damage and take action to keep crackers from gaining access again with as little public attention as possible.

According to Sundari Nanda, SP, CBI, "most of the times the victims do not complain, may be because they are aware of the extent of the crime committed against them, or as in the case of business houses, they don't want to confess their system is not secure".

As the research shows, computer crime poses a real threat. Those who believe otherwise simply have not been awakened by the massive losses and setbacks experienced by companies worldwide. Money and intellectual property have been stolen, corporate operations impeded, and jobs lost as a result of computer crime.

Similarly, information systems in government and business alike have been compromised. The economic impact of computer crime is staggering.

Computer Crime or Cyber Crime