Thursday, October 1, 2009

World Wide Telecom Web (WWTM) aka Spoken Web

Web changed the way we use to connect with each other, share information. On internet, u can find any information within a sec. Wait a second, I said "You". What type of people included in "You". Its interesting. Yeah,"You" includes only literate people, student, teachers, business-man, doctors ....bla bla. Don't you think that its kinda of biasing, Information is that everyone wan teither its literate or illiterate. People living in developing countries or rural areas facing problem of getting right information at the right time. Illiterate people don't have IT knowledge, so finding information on web is impossible for them. Moreover, devices that communicate with web are expensive.

But again Web comes to solve this problem.Its not WWW, its WWTM (World Wide Telecom) aka Spoken Web. WWTM is analogous to WWW.
Its concept lies in VoiceSites, Voicelinks, HSTP, and T-Browser. Voicesites contain user information in voice format. A person aware of Mobile can create its voicesites by just interacting with automated system. e.g Gaurav Garg ( don't mind :D)a villager, got some electric problem. He is a very guy :P. He don't have much time to go at electrician house to call him. Now here WWTM comes in picture, electrician will create a voice sites, carrying basic information like his work timings, rates etc. Gaurav has nothing to do now, just call at his no (VoiNumbers) , find out information, if he likes, he fixes an appointment and done.
VoiceSite similiar to Websites, containing information . VoiceLinks, like Hyperlinks, connecting different VoiceSites to each other. HSTP Hypersearch Transfer Protocol analogous to HTTP, makes possible to navigate across the voicesites. T-Browser to browse VoiceSites.

Find more in this video .....


Maemo 5

Maemo 5 from Nokia, User Interface that all together changes user experience. Bringing whole computer on mobile device. I would it beats all its rival. Maemo 5 is based on open source Linux, uses Mozilla engine in its browser. It can handle multitasking like any other computer. What else you want??


Nokia Maemo 5 official Site

New Wave on Internet (Google Wave)

Google wave, is open collaborative social-software. Like a Wave, it will hit every type users. Its better to listen wat its creator say.

Hidden 7th Kingdom of our World!!

I'm writing after a very long time or u can say I'm compiling, It doesn't matter at all :P. I don't write like true bloggers used to do.

Until now, U are aware of only 6 six kingdoms (Animalia, Plantae, Fungi, Protista, Archaea, Bacteria) on earth ( Biology guys must be aware of that). kevin Kelly introduced the 7th hidden kingdom. This kingdom evolve just like others. But, no one ever noticed that.

Knowledge of this kingdom is passed from generation to generation. Like other kingdoms, species were wiped out, but for only good. New species came and will come over the time, only for better future. Now, you must be wondering what i'm talking about. You must be relating with some concept of computer science or biology. But its not true, its much bigger than that. Its a superset of all.

Its called "Technology". Yeah, U heard rite. Technology is the the 7th Hidden Kingdom of our universe. Tech evolve like other kingdom. Species i.e techs, born, live and dead. Take any example, war weapons like from arrows to nuclear weapons , communication devices , transportation medium like bullock cart to jets, ferrari's (My fav F1 Team :D). Kevin Kelly , futurist, thinker, biologist, proposed this.

If you want further information, Just watch Kevin's video on TED

Monday, February 23, 2009

Man-in-the-middle attack sidesteps SSL

Most websites use an encrypted connection to transfer sensitive information, including usernames, passwords, and credit-card numbers, over the Internet. In a presentation given this week at Black Hat DC, a computer-security conference in Washington, DC, an independent security researcher named Moxie Marlinspike unveiled a tool that can hijack secure connections and trick users into sending sensitive information in the clear.

The attack relies on the fact that most communication over the Internet takes place insecurely. Connections become secure when needed, using the Secure Socket Layer (SSL) protocol. The beginning of the URL shown in a Web browser's address bar reveals what kind of connection has been established. If the address starts with "http," the connection is standard and unencrypted. If it starts with "https," then the connection between the user and the website is encrypted.

But most users do not bother to type in "https" to establish a secure link. Instead, they rely on a website redirecting them to a secure connection when needed. "People only tend to access the secure protocols through the insecure protocols," Marlinspike says.

Marlinspike has developed a software tool called sslstrip that interferes with a website's attempt to direct the user toward that secure communications channel. Sslstrip can be used once an attacker has infiltrated a network to watch passing traffic for anything that might redirect the user to a secure connection--for example, a login button that links to an "https" URL. When the tool sees that information, it strips out the link to the secure page and replaces it with an insecure one. The tool then sits between the user and the website's server, passing information back and forth. But before passing on information to the server, it encrypts it, so that the Web server has no idea that anything is wrong.