Saturday, July 15, 2006
Wednesday, May 24, 2006
As a webmaster or blogger, you would love to chat with your website or weblog visitors.
Having a professional live support system on your website gives more credibility to it. Your website visitors trust you and your website when they can talk to you live. A good live support is something that a professional website needs.
Bloggers spend lots of time on their weblogs to be in touch with internet surfers. They also love to have live chat with their weblog visitors. You can not find any free live chat service applicable for weblogs. Also as most bloggers don't make any money through their weblogs, they don't want to spend money to buy live support service for it.
We spent lots of time to create the best and most professional live chat system for webmasters and bloggers. It is free BUT none of the paid live support services can be compared with it.
SirLook Live Support is free to sign up and use. Unlimited websites and weblogs, operators and departments, chat icons and ... is only some of the features of SirLook Live Support.
As many websites, weblogs, eBay auction pages and ... as you have, you can chat with their visitors and receive their offline messages through one single account and from one single page without getting confused. Unbelievable?! Yes, SirLook Live Support is a miracle. Try and use it. It is absolutely free.
SirLook Live Support can connect you to the visitors of all your web pages and even the articles you post on article directories. It is fully customizable and its offline message form prevents spammers to find your email address and helps you to collect necessary information from your website visitors. They can also contact your website(s) operators directly. You will not lose any of the chat requests or offline messages.
You can also initiate chat with your website/weblog visitors. Even the best firewalls and blockers can not prevent SirLook Live Support.
Why SirLook Live Support is free?
First of all it is free because we love to serve webmasters and bloggers who suffer from expensive products and services. We are a team of young programmers, internet marketers and project managers who love to show their abilities and improve their online presence. We will have many paid products and services on our website and also more free services and products. A good business and specially a good online business should offer free services and products along with paid ones. This is what we try to do.
There are loads of free services, softwares, scripts and ... over the web but professional webmasters don't like to use any of them because they look like toys and don't deserves working on a good website and/or are full of ads. We want to change this rule and offer free services suitable for good websites and better than paid similar services. We could achieve this by creating SirLook Live Support and will keep on our good work.
SirLook Live Support has tens of features and functions that can not be found in other similar systems OR, if found, you have to pay for each of them. For example, you can not have unlimited websites, departments, operators, chat icons, canned responses, IP banning and ... for free but you will have them in SirLook Live Support with the best technical quality and for free.
Please visit SirLook Live Support features list and sign up for it at http://www.sirlook.com/live
Please email us at firstname.lastname@example.org if you have any question.
Click on the link below to have access to the newsletter archive:
You have received this email because you or someone else have signed up for SirLook Newsletter. If you don't like to receive our newsletter, please click on the link below and remove your email from our list:
Monday, May 01, 2006
Friday, April 28, 2006
1) Orkut Buyukkokten(the creator of Orkut) gets $12 when every person registers to this website.
2) He also gets $10 when you add somebody as a friend.
3) He gets $8 when your friend’s friend adds you as a friend & gets $6 if anybody adds you as a friend in the resulting chain.
4) He gets $5 when you scrap somebody & $4 when somebody scraps you.
5) He also gets $200 for each photograph you upload on Orkut.
6) He gets $2.5 when you add your friend in the crush-list or in the hot-list.
7) He gets $2 when you become somebody’s fan.
8) He gets $1.5 when somebody else becomes your fan.
9) He even gets $1 every time you logout of Orkut.
10) He gets $0.5 every time you just change your profile-photograph.
11) He also gets $0.5 every time you read your friend’s scrap-book & $0.5 every time you view your friend’s friend-list.
12) Many Global Financial Consultants think this person might become the richest-person in the world by the end of 2009.
13) Finally, this is the best fact. This person has 13 assistants to monitor his scrapbook & 8 assistants to monitor his friends-list. He gets around 20,000 friend-requests a day & about 85,000 scraps a day.
Visit http://www.orkut.com/Profile.aspx?uid=325082930226142255 for more details about this great person.
Sunday, March 12, 2006
In any wireless networking setup, security is a concern. Devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals aren't intercepted. Bluetooth technology is no different -- it's wireless and therefore susceptible to spying and remote access, just like WiFi is susceptible if the network isn't secure. With Bluetooth, though, the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data without your permission.
Bluetooth offers several security modes, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget. In almost all cases, Bluetooth users can establish "trusted devices" that can exchange data without asking permission. When any other device tries to establish a connection to the user's gadget, the user has to decide to allow it. Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods include authorization and identification procedures that limit the use of Bluetooth services to the registered user and require that users make a conscious decision to open a file or accept a data transfer. As long as these measures are enabled on the user's phone or other device, unauthorized access is unlikely. A user can also simply switch his Bluetooth mode to "non-discoverable" and avoid connecting with other Bluetooth devices entirely. If a user makes use of the Bluetooth network primarily for synching devices at home, this might be a good way to avoid any chance of a security breach while in public.
Still, early cell-phone virus writers have taken advantage of Bluetooth's automated connection process to send out infected files. However, since most cell phones use a secure Bluetooth connection that requires authorization and authentication before accepting data from an unknown device, the infected file typically doesn't get very far. When the virus arrives in the user's cell phone, the user has to agree to open it and then agree to install it. This has, so far, stopped most cell-phone viruses from doing much damage. See How Cell-phone Viruses Work to learn more.
Other problems like "bluejacking," "bluebugging" and "Car Whisperer" have turned up as Bluetooth-specific security issues. Bluejacking involves Bluetooth users sending a business card (just a text message, really) to other Bluetooth users within a 10-meter (32-foot) radius. If the user doesn't realize what the message is, he might allow the contact to be added to his address book, and the contact can send him messages that might be automatically opened because they're coming from a known contact. Bluebugging is more of a problem, because it allows hackers to remotely access a user's phone and use its features, including placing calls and sending text messages, and the user doesn't realize it's happening. The Car Whisperer is a piece of software that allows hackers to send audio to and receive audio from a Bluetooth-enabled car stereo. Like a computer security hole, these vulnerabilities are an inevitable result of technological innovation, and device manufacturers are releasing firmware upgrades that address new problems as they arise.
To learn more about Bluetooth security issues and solutions, see Bluetooth.com: Wireless Security.
For more information on Bluetooth and related topics, including full Bluetooth specifications, check out the links on the next page.
Sunday, March 05, 2006
World's most famous hackers
Richard Stallman Stallman joined the Artificial Intelligence Laboratory at MIT in 1971. He received the 250K McArthur Genius award for developing software. He ultimately founded the Free Software Foundation, creating hundreds of freely distributable utilities and programs for use on the UNIX platform. He worked on some archaic machines, including the DEC PDP-10 (to which he probably still has access somewhere). He is a brilliant programmer.
Dennis Ritchie, Ken Thompson, and Brian Kernighan Ritchie, Thompson, and Kernighan are programmers at Bell Labs, and all were instrumental in the development of the UNIX operating system and the C programming language. Take these three individuals out of the picture, and there would likely be no Internet (or if there were, it would be a lot less functional). They still hack today. (For example, Ritchie is busy working on Plan 9 from Bell Labs, a new operating system that will probably supplant UNIX as the industry-standard super-networking operating system.)
Paul Baran, Rand Corporation Baran is probably the greatest hacker of them all for one fundamental reason: He was hacking the Internet before the Internet even existed. He hacked the concept, and his efforts provided a rough navigational tool that served to inspire those who followed him.
Eugene Spafford Spafford is a professor of computer science, celebrated for his work at Purdue University and elsewhere. He was instrumental in creating the Computer Oracle Password and Security System (COPS), a semi-automated system of securing your network. Spafford has turned out some very prominent students over the years and his name is intensely respected in the field.
Dan Farmer Farmer worked with Spafford on COPS (Release 1991) while at Carnegie Mellon University with the Computer Emergency Response Team (CERT). For real details, see Purdue University Technical Report CSD-TR-993, written by Eugene Spafford and Daniel Farmer. (Yes, Dan, the byline says Daniel Farmer.) Farmer later gained national notoriety for releasing the System Administrator Tool for Analyzing Networks (SATAN), a powerful tool for analyzing remote networks for security vulnerabilities.
Wietse Venema Venema hails from the Eindhoven University of Technology in the Netherlands. He is an exceptionally gifted programmer who has a long history of writing industry-standard security tools. He co-authored SATAN with Farmer and wrote TCP Wrapper, one of the commonly used security programs in the world. (This program provides close control and monitoring of information packets coming from the void.)
Linus Torvalds A most extraordinary individual, Torvalds enrolled in classes on UNIX and the C programming language in the early 1990s. One year later, he began writing a UNIX-like operating system. Within a year, he released this system to the Internet (it was called Linux). Today, Linux has a cult following and has the distinction of being the only operating system ever developed by software programmers all over the world, many of whom will never meet one another. Linux is free from copyright restrictions and is available free to anyone with Internet access.
Bill Gates and Paul Allen From their high school days, these men from Washington were hacking software. Both are skilled programmers. Starting in 1980, they built the largest and most successful software empire on Earth. Their commercial successes include MS-DOS, Microsoft Windows, Windows 95, and Windows NT.
Kevin Mitnik Mitnik, also known as Condor, is probably the world's best-known cracker. Mitnik began his career as a phone phreak. Since those early years, Mitnik has successfully cracked every manner of secure site you can imagine, including but not limited to military sites, financial corporations, software firms, and other technology companies. (When he was still a teen, Mitnik cracked the North American Aerospace Defense Command.) At the time of this writing, he is awaiting trial on federal charges stemming from attacks committed in 1994-1995.
Kevin Poulsen Having followed a path quite similar to Mitnik, Poulsen is best known for his uncanny ability to seize control of the Pacific Bell telephone system. (Poulsen once used this talent to win a radio contest where the prize was a Porsche. He manipulated the telephone lines so that his call would be the wining one.) Poulsen has also broken nearly every type of site, but has a special penchant for sites containing defense data. This greatly complicated his last period of incarceration, which lasted five years. (This is the longest period ever served by a hacker in the United States.) Poulsen was released in 1996 and has apparently reformed.
Justin Tanner Peterson Known as Agent Steal, Peterson is probably most celebrated for cracking a prominent consumer credit agency. Peterson appeared to be motivated by money instead of curiosity. This lack of personal philosophy led to his downfall and the downfall of others. For example, once caught, Peterson ratted out his friends, including Kevin Poulsen. Peterson then obtained a deal with the FBI to work undercover. This secured his release and he subsequently absconded, going on a crime spree that ended with a failed attempt to secure a six-figure fraudulent wire transfer
Saturday, February 18, 2006
Saturday, February 04, 2006
Saturday, January 28, 2006
Friday, January 27, 2006
Sunday, January 08, 2006
Blessy's second directorial venture Thanmathra hit the screens without much ado, but is quietly stealing its way into the hearts of cine-goers. The film is an adaptation of ace director Padamarajan's short story 'Orma'. It tells the story of Remeshan Nair (Mohanlal), a state Govt. employee who leads a simple and happy life with his wife Lekha (Meera Vasudevan), son Manu (Arjun) a +2 student and daughter Manju (Niranjana) a primary school student. Remeshan is afflicted by Alzheimer's disease and suffers from gradual memory loss. How this affects the family forms the gist of the story. The way Remeshan becomes aware of the malady that is affecting him is brought out through minute instances - the way he forgets to switch on the scooter, the way he uses his son's brush to brush his own teeth, the way he forgets an official file inside the freezer of the fridge at home, the way he forgets his way to home, the way he thinks he is at home while actually in office. The film does not make one sad or angry, but leaves one thinking what it would be if one were afflicted by the same illness. That's where Blessy's success lies. The story is poignant and gripping and well told by the director. Mohanlal's restrained acting does more than justice to the role. The same can be said of most of the others who act in the film including Nedumudi Venu who plays the role of Remeshan's father Krishnan Nair. Special mention should however be made of new find Arjun, a native of Chalakudy who lives with his parents in Dubai. He is a natural. He must be flooded with offers after his performance in the film. With just two films under his belt, director Blessy shows all the markings of a top flight story teller. Already noted directors like Fazil, Sathyan Anthikaad and Priyadarshan have come forward in praise of Blessy's work.Camera work by Sethu Sriram is superb. Music by Mohan Sitara is just about average. Despite its low-key release, Thanmathra is one of the best movies released in recent months, and a must-see for any serious film buff.