A paper at recent security conference gets all worried about web-enabled gadgets like phones and games consoles being a haven for phishing scams. They direct people to a fake version of a site where they have a secure account, like a bank, and harvest the details they type in.
The problem is, say researchers at University of California, Davis, that cramming a browser onto a small screen means bits are chopped off. One of the first things to go is the address box that shows the URL you are visiting – the place to check if you want to know if you are being phished.
As well as not displaying full URLs, mobile web surfers are not encouraged to type out addresses in full like on a full-size computer.
That means people are more likely to select links in emails, and less likely to notice that they are not the URL they are expecting, the researchers found.
They suggest browsers should display full URLs, and that another solution would be to change the way phones use the web. Instead of surfing directly, they could go via an intermediary service that screens all the content they access.
Mobile web use is said to be growing fast as devices like the iPhone compete to make it easier – and an increase in phishing is sure to follow. The solutions suggested could certainly work, but I don’t think it will be long before mobile browsers get built-in phishing warnings like conventional browsers do.
Due to the increasing dependence on technology, there has also been created so many technology-related health problems.
Computer usage is one of the biggest health problems of modern life. Some computer related problems are Repetitive Strain Injury (RSI) due to the typing at odd angles without a break, Deep Vein Thrombosis (DVT) due to sitting for long periods without moving, backache due to bad posture, eyestrain from staring at a monitor screen for long and stress due to a combination of the above reasons and work-related pressures.
But it is not difficult to beat these problems. Just follow few simple steps.
- You must start by taking regular breaks between long hours of working or you can install such programs that blank out your screen at regular intervals to remind you to take that much needed break.
- Use a comfortable chair that suits you and is good for sitting in for long hours.
- When you use a laptop, keep moving into different position after every hour by this, by this you can prevent muscle cramps.
- Do not read more serious diseases like carpal tunnel syndrome, tendonitis and Epicondylitis which affect the nerves.
- Epicondylitis, alsocalled ‘tennis elbow’ can be due to repetitive action or rotating the forearm while typing or using the mouse. Use the right method to type and use the mouse or you can try and learn to use it with both hands.
- Long hours working can give you lower back pain and pain in the shoulders/ neck. This happens when the monitor is not at the right height. It should always be at eye level or below it.
- Eye fatigue, headache and stress can be kept away by regular medical examination and using anti-glare glasses for looking at the monitor screen.
Such kind of problems may affect your life so it is very important to keep yourself stress free, improve your working habits, and keep you healthy.
How does an Optical Mouse work?
The mechanical mouse was created in the early 1970’s. The optical mouse is a great improvement over the mechanical mouse. The Optical mouse was coined in 1999 by Agilent Technologies; the technology uses a tiny camera that takes thousands of pictures per second to determine position and speed.
The optical mouse uses a very small light emitting diode more commonly referred to as an LED which is red in color. This LED bounces light off of a mouse pad or desk surface onto a CMOS (Complimentary Metal Oxide Semiconductor).
Optical Mouse process:
First the LED produces a red light that is emitted onto a surface. Then the light is reflected off the surface back to the CMOS sensor. The CMOS sensor sends each image that is reflected back to a DSP (Digital Signal Processor) for analysis.
Using the thousands of images that the CMOS sends to the DSP for analysis, the DSP is able to detect both patterns and images and can determine if the mouse has moved, at what distance it has moved and at what speed. It is also able to determine if move mouse little bit or you click on any button of mouse, which are then sent to the computer that the mouse is hooked up to.
At that point the coordinates have been received by the computer and will show the movement of the mouse, usually by its cursor on the computer screen. When you move your mouse, your computer is updated with mouse coordinates more than hundreds of times per second, because mouse movement is so fast, the appearance of the mouse cursor on your computer screen is very smooth.
Benefits of Optical Mouse
There are many benefits to using optical mouse over manual/mechanical mouse. The mechanical mouse uses a tinny rubber ball, on the other hand, optical mouse uses LED , the main advantage of LED is that there is no way for the LED to stick or get dirty. This leads to high reliability. Many people complain that their manual mouse get dirty or it will not work properly after some time. But in Optical a mouse usually work well for years without a malfunction and there is no complain.
Today technology is too advanced and uses an LED and CMOS instead of a rubber ball to measure tracking; you can feel much better response and performance. Another great reason is that, you can use Optical mouse on lots of different surfaces, you don’t need to buy mouse-bad. Manual mice need a mouse pad made out of a special material to function optimally, optical mice do well on almost any kind of desk top or materials.
Because of their distinct advantages, optical mice are fast becoming the standard in computer stores around the world. Another benefit is that digital processing often results in smoother, more accurate performance than prior technologies. There are typically no special PC requirements for optical mice and installation is usually as simply plugging the device in to the computer.
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or it may be deleted everything in your computer. Viruses are very easily spread by attachments in e-mail messages or accessing internet. That is why it is essential that you never open e-mail attachments unless you have to check or running scanning on that file.
Viruses also spread through download on the Internet. They can be hidden in illicit software or other files or programs you might download. If you want to stop virus attack , you have to run your antivirus software regularly or run live updates of antivirus, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files.
For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared — by October, experts believed up to 50 million computers were infected. That’s pretty impressive when you consider that many viruses are incredibly simple.
How Do I Know If My PC Has a Virus?
Here are some signs that your system might be infected:
• Runs consistently more slowly than normal.
• Stops responding or locks up often.
• Crashes and restarts every few minutes.
• Restarts on its own and then fails to run normally.
• Applications don’t work properly.
• Disks or disk drives are inaccessible.
• Printing doesn’t work correctly.
• You see unusual error messages.
• You see distorted menus and dialog boxes.
In many cases, a virus resides inside your computer in an inactive state, waiting for a certain event to happen. Like having a physical virus in your body, you can have a virus in your computer system and not even know it. A virus can wait patiently in your system and attack only on a certain date. Of course, in the time between the moment you contracted the virus and the time it made itself known to you, you may have innocently spread the virus to others.
Stop Viruses Before They Attack
A computer virus can do extensive damage. It can crash your hard disk, destroy all your important data. The most usual symptom of a computer virus is erratic behavior. The destruction can happen at any time or anywhere in your computer. Viruses can spread quickly through today’s intricate cyber world. If your computer starts to act a little weird, the first thing to do is to check for a virus.
If you find a virus in your computer, you will stop viruses before they enter your computer. You can do this by purchasing a good virus protection program. Such a program will check all files for viruses. Once installed, an antivirus program can be set to work in the background. It will check all files before they enter your computer and will alert, if a virus detected by anti-virus, it will inform you immediately, and then you can remove that virus from your computer or sometimes antivirus can also remove that virus from the computer.
Keep Virus Protection Software Up-to-date
New viruses are coming everyday. It seems that there are many people in the world who have a lot of time on their hands and a slightly warped idea of how to use their intelligence. Luckily, companies like McAfee, Symantec, and Panda Software are constantly scouting for new viruses and updating their antivirus software tools. They use any of a growing arsenal of weapons to detect and fight viruses.
You must update your antivirus program on a regular basis. The company will provide you constant updates, if they find new virus. You have to update your antivirus on regular basis so that your computer is completely protected from viruses. Some newer antivirus programs automatically update your antivirus protection as well as the antivirus definitions when you log onto the Internet through a process called live update or online virus scan. They will inform you, that is new definition or new updates.
To keep you protected as much as possible, I recommend purchasing antivirus software that updates automatically. If you update your virus protection manually, please update regularly. a daily update may be a good idea in today’s virus-infested atmosphere.
Remote sensing is the science and art of obtaining information about a phenomena without being in contact with it. Remote sensing deals with the detection and measurement of phenomena with devices sensitive to electromagnetic energy
There are two kinds of remote sensing. Passive sensors detect natural energy (radiation) that is emitted or reflected by the object or surrounding area being observed. Reflected sunlight is the most common source of radiation measured by passive sensors. Examples of passive remote sensors include film photography, infra-red, charge-coupled devices and radiometers. Active collection, on the other hand, emits energy in order to scan objects and areas whereupon a passive sensor then detects and measures the radiation that is reflected or backscattered from the target and the examples are Radar.
Remote sensing makes it possible to collect data on dangerous or inaccessible areas where it is not possible to take data , photos, or nay information we want to take, that is not possible to reach there, remote sensing helps in that areas and evaluate all observations we need from that. Some examples are like the effects of climate change on glaciers and Arctic and Antarctic regions, and depth sounding of coastal and ocean depths.
There are some very useful applications of remote sensing as follows:
- It provides a unique perspective from which to observe large regions.
- Sensors can measure energy at wavelengths which are beyond the range of human vision (ultra-violet, infrared, microwave
- Global monitoring is possible from nearly any site on earth.
Generally, speaking remote sensing works on the principle of inverse evaluation. The common example of this is to verify the type of animal from it’s footprints. The quality of remote sensing data consists of its spatial, spectral, radiometric and temporal resolutions. Using these four types of data, the results taken out from remote sensing are very accurate and significant. Evaluation from size of a pixel that is recorded in a raster image – typically pixels may correspond to square areas ranging in side length from 1 to 1000 meters comes under spatial significance. The number of different frequency bands recorded comes under the spectral significance. Radiometric resolution refers to the number of different intensities of radiation the sensor is able to distinguish. The temporal resolution is simply the frequency of flyovers by the satellite or plane, and is only relevant in time-series studies or those requiring an averaged or mosaic image as in deforesting monitoring. So, by the combination of all these four types of significances we are getting out the results from remote sensing which are very helpful to us.
As we can see in the military, in the time of war, remote sensing plays a very important role which can help in many ways. Digital image processing with help of remote sensing also plays a vital role in processing of satellite images. Object-Based Image Analysis is a sub-discipline devoted to partitioning remote sensing (RS) imagery into meaningful image-objects, and assessing their characteristics through spatial, spectral and temporal scale.