BREAKING NEWS

Monday, December 14, 2015

The ruins and restoring data over any device .


tamil technologyA software system to help restore damaged data .This is a Portable software so don't install the local system . Easy USB can bring in .

Highlights :

  • this is support to all hard drives (ATA, SATA, SCSI, USB, IEEE1394.)
  • to help recover data from iPod .
  • USB, digital cameras, MP3 player allows you to retrieve data from the account .
  • Use lighter texture 
  • .You can restore data in a single click .
  • use to FAT12, FAT16, VFAT, FAT32, NTFS/NTFS5, EXT2 & EXT3 
Size:9.5 Mb
Download : source1 

Playing 3-D video games can boost memory formation

UCI professor of neurobiology & behavior Craig Stark, here holding a 3-D-printed model of his own hippocampus, says that "video games may be a nice, viable route" to maintaining cognitive health.
Don't put that controller down just yet. Playing three-dimensional video games -- besides being lots of fun -- can boost the formation of memories, according to University of California, Irvine neurobiologists.
Along with adding to the trove of research that shows these games can improve eye-hand coordination and reaction time, this finding shows the potential for novel virtual approaches to helping people who lose memory as they age or suffer from dementia. Study results appear Dec. 9 in The Journal of Neuroscience.
For their research, Craig Stark and Dane Clemenson of UCI's Center for the Neurobiology of Learning & Memory recruited non-gamer college students to play either a video game with a passive, two-dimensional environment ("Angry Birds") or one with an intricate, 3-D setting ("Super Mario 3D World") for 30 minutes per day over two weeks.
Before and after the two-week period, the students took memory tests that engaged the brain's hippocampus, the region associated with complex learning and memory. They were given a series of pictures of everyday objects to study. Then they were shown images of the same objects, new ones and others that differed slightly from the original items and asked to categorize them. Recognition of the slightly altered images requires the hippocampus, Stark said, and his earlier research had demonstrated that the ability to do this clearly declines with age. This is a large part of why it's so difficult to learn new names or remember where you put your keys as you get older.
Students playing the 3-D video game improved their scores on the memory test, while the 2-D gamers did not. The boost was not small either. Memory performance increased by about 12 percent, the same amount it normally decreases between the ages of 45 and 70.
In previous studies on rodents, postdoctoral scholar Clemenson and others showed that exploring the environment resulted in the growth of new neurons that became entrenched in the hippocampus' memory circuit and increased neuronal signaling networks. Stark noted some commonalities between the 3-D game the humans played and the environment the rodents explored -- qualities lacking in the 2-D game.
"First, the 3-D games have a few things the 2-D ones do not," he said. "They've got a lot more spatial information in there to explore. Second, they're much more complex, with a lot more information to learn. Either way, we know this kind of learning and memory not only stimulates but requires the hippocampus."
Stark added that it's unclear whether the overall amount of information and complexity in the 3-D game or the spatial relationships and exploration is stimulating the hippocampus. "This is one question we're following up on," he said.
Unlike typical brain training programs, the professor of neurobiology & behavior pointed out, video games are not created with specific cognitive processes in mind but rather are designed to immerse users in the characters and adventure. They draw on many cognitive processes, including visual, spatial, emotional, motivational, attentional, critical thinking, problem-solving and working memory.
"It's quite possible that by explicitly avoiding a narrow focus on a single ... cognitive domain and by more closely paralleling natural experience, immersive video games may be better suited to provide enriching experiences that translate into functional gains," Stark said.
The next step for him and his colleagues is to determine if environmental enrichment -- either through 3-D video games or real-world exploration experiences -- can reverse the hippocampal-dependent cognitive deficits present in older populations. This effort is funded by a $300,000 Dana Foundation grant.
"Can we use this video game approach to help improve hippocampus functioning?" Stark asked. "It's often suggested that an active, engaged lifestyle can be a real factor in stemming cognitive aging. While we can't all travel the world on vacation, we can do many other things to keep us cognitively engaged and active. Video games may be a nice, viable route."
A video about the research can be found here:https://www.youtube.com/watch?v=t1YfgMVhhdA&feature=youtu.be
Reference: Journal of Neuroscience, Dec 9, 2015, in press: 10.1523/JNEUROSCI.2580-15.2015

Lie-detecting software uses real court case

What does lying look like?
By studying videos from high-stakes court cases, University of Michigan researchers are building unique lie-detecting software based on real-world data.
Their prototype considers both the speaker's words and gestures, and unlike a polygraph, it doesn't need to touch the subject in order to work. In experiments, it was up to 75 percent accurate in identifying who was being deceptive (as defined by trial outcomes), compared with humans' scores of just above 50 percent.
With the software, the researchers say they've identified several tells. Lying individuals moved their hands more. They tried to sound more certain. And, somewhat counterintuitively, they looked their questioners in the eye a bit more often than those presumed to be telling the truth, among other behaviors.
The system might one day be a helpful tool for security agents, juries and even mental health professionals, the researchers say.
To develop the software, the team used machine-learning techniques to train it on a set of 120 video clips from media coverage of actual trials. They got some of their clips from the website of The Innocence Project, a national organization that works to exonerate the wrongfully convicted.
The "real world" aspect of the work is one of the main ways it's different.
"In laboratory experiments, it's difficult to create a setting that motivates people to truly lie. The stakes are not high enough," said Rada Mihalcea, professor of computer science and engineering who leads the project with Mihai Burzo, assistant professor of mechanical engineering at UM-Flint. "We can offer a reward if people can lie well--pay them to convince another person that something false is true. But in the real world there is true motivation to deceive."
The videos include testimony from both defendants and witnesses. In half of the clips, the subject is deemed to be lying. To determine who was telling the truth, the researchers compared their testimony with trial verdicts.
To conduct the study, the team transcribed the audio, including vocal fill such as "um, ah, and uh." They then analyzed how often subjects used various words or categories of words. They also counted the gestures in the videos using a standard coding scheme for interpersonal interactions that scores nine different motions of the head, eyes, brow, mouth and hands.
The researchers fed the data into their system and let it sort the videos. When it used input from both the speaker's words and gestures, it was 75 percent accurate in identifying who was lying. That's much better than humans, who did just better than a coin-flip.
"People are poor lie detectors," Mihalcea said. "This isn't the kind of task we're naturally good at. There are clues that humans give naturally when they are being deceptive, but we're not paying close enough attention to pick them up. We're not counting how many times a person says 'I' or looks up. We're focusing on a higher level of communication."
In the clips of people lying, the researchers found common behaviors:
  • Scowling or grimacing of the whole face. This was in 30 percent of lying videos vs. 10 percent of truthful ones.
  • Looking directly at the questioner--in 70 percent of deceptive clips vs. 60 percent of truthful.
  • Gesturing with both hands--in 40 percent of lying clips, compared with 25 percent of the truthful.
  • Speaking with more vocal fill such as "um." This was more common during deception.
  • Distancing themselves from the action with words such as "he" or "she," rather than "I" or "we," and using phrases that reflected certainty.
This effort is one piece of a larger project.
"We are integrating physiological parameters such as heart rate, respiration rate and body temperature fluctuations, all gathered with non-invasive thermal imaging," Burzo said.
The researchers are also exploring the role of cultural influence.
"Deception detection is a very difficult problem," Burzo said. "We are getting at it from several different angles."
For this work, the researchers themselves classified the gestures, rather than having the computer do it. They're in the process of training the computer to do that.
The research team also includes research fellows Veronica Perez-Rosas and Mohamed Abouelenien. A paper on the findings titled "Deception Detection using Real-life Trial Data" was presented at the International Conference on Multimodal Interaction and is published in the 2015 conference proceedings. The work was funded by the National Science Foundation, John Templeton Foundation and Defense Advanced Research Projects Agency.

Students build electric-powered personal flying machine

Snowstorm -- personal flying machine by NUS students.
A team of eight engineering students from the National University of Singapore (NUS) have successfully built Singapore's first personal flying machine, dubbed Snowstorm. Comprising an intricate design of motors, propellers and inflated landing gear set within a hexagonal frame, Snowstorm is an electric-powered aircraft capable of vertical take-off and landing that can be controlled by a single person seated within it. The NUS team envisions this as a clean and simple way to realise our dreams of flying.
The personal flying machine was built over a one-year period, under the auspices of FrogWorks, a collaboration between NUS Faculty of Engineering's Design-Centric Programme (DCP) and the University Scholars Programme (USP). FrogWorks engages students in the study, design and construction of clean leisure craft, a rapidly growing segment of green technology. Previous FrogWorks projects include the conversion of a sport motorcycle and a yacht from petrol to electric propulsion.
Personal flight -- from fantasy to reality
In its current prototype, the personal flying machine can bear the load of a single person up to 70kg for a flight time of about 5 minutes. Rather than a mode of transportation, the team envisions this more as an electric aircraft for personal recreational use in a large indoor space, to satisfy one's desire to fly freely.
"A common trope in popular science fiction is the projection of humans flying on our own -- think the Jetsons, or even Back to the Future. NUS' Snowstorm shows that a personal flying machine is a very real possibility, primarily as a means to fulfil our dreams of flying within a recreational setting," said Dr Joerg Weigl, one of two supervisors of the project, who is from the Design-Centric Programme at the NUS Faculty of Engineering.
Snowstorm's features and capabilities
The NUS team spent two semesters designing and building the flying machine, combining their skills and expertise across different fields of engineering such as computer engineering, electrical engineering and mechanical engineering. Aside from the construction of the physical frame, the students also designed and implemented the craft's electronic control and stabilisation system, a pilot safety system as well as an electric energy management and supply system where the three batteries that power the craft can function independently in the event any of the batteries malfunction.
The electric flying machine sports 24 motors, each driving a propeller of 76cm diameter with 2.2kW of power. Its hexagonal frame is made up of anodised aluminium beams, carbon fibre plates and tubes with Kevlar ropes. The pilot seat is positioned at the centre of the machine, its weight supported by six landing gear legs, the bottom of which is an inflated ball that adsorbs shock when landing. Three independent rechargeable lithium batteries sets provide a total power of 52.8kW.
To ensure pilot safety, the seat is installed with a five-point harness that secures the pilot to the centre of the machine. The flight control system allows the pilot to adjust thrust, pitch, roll and yaw of the craft. In addition, Snowstorm provides a variety of automated flight modes familiar to operators of Unmanned Aerial Vehicles (UAVs), including altitude hold, loiter and position modes. For safety, the team has also worked in a separate switch that can be controlled from the ground to end the flight and bring the machine to a landing, should the pilot lose control of the machine.
"Designing and building Snowstorm was a great learning opportunity for us. The toughest part of this engineering challenge was ensuring a good thrust to weight ratio to allow the craft to lift a person into the air. At every stage of our design, we constantly had to balance and consider trade-offs between the types of materials, their characteristics and weight. In some instances, we even 3D-printed parts, such as our landing gear mount, just so we can have a customised and optimal fit," said Mr Shawn Sim, a third year NUS Engineering student.
The team first tested their design on a smaller 1/6 scale prototype, before proceeding with the massive task of building the current prototype. Using fasteners and non-permanent connections for the beams, the NUS team also designed the flying machine such that it can be dismantled, transported and reassembled easily.
"Recent advances in motors and battery technology has made it possible for us to literally take to the skies," said Associate Professor Martin Henz of the University Scholars Programme and the School of Computing at NUS, who also supervised the project. "The NUS team will continue to fine-tune Snowstorm, working on mechanical safety measures, propeller and motor configurations, and control software and hardware to achieve the high levels of safety, simplicity and performance required for recreational use by the general public," he added. The NUS team hopes the improvements in the coming year will bring Snowstorm closer to commercialisation.

NOTE:   Following materials are ONLY for EDUCATIONAL PURPOSES ! Technology explore is not responsible for any outcome of misuse this facility !



Some famous Websites like google,Facebook,Twitter, and some others make a SMS verification to register their site. This is because of limit the one account for one person and also to stop the spammers to enter their network.
But some times you don’t want to be expose your mobile number, or some time you just want to login their website to do a security research or To maintain your privateness. So in this article we are going to see how to bypass the SMS Verification.
Method 
There are a lot of free SMS obtain providers obtainable on-line. A few of them are given under
  • http://receivesmsonline.in
  • http://hs3x.com
  • http://sms-receive.net
  • http://www.receive-sms-now.com
  • http://www.receivesmsonline.net
  • http://receive-sms-online.com
  • http://receive-sms.com
  • http://receivesmsonline.com
  • http://receivefreesms.net
  1. Now select any one of these websites
  2. Select the nation quantity you wish to use and replica the quantity.
  3. Go to web site that require verification and paste the quantity from final step and click on on Confirm/Submit.
  4. Go to website you chosen in first step and click on on SMS you acquired from service that wants verification.
  5. Copy the code and confirm your account.
Thats it. Simple . Now enjoy the online stuffs without giving your mobile number 

Hack WiFi from android

WPS connect
Sometime we got some WiFi in our mobile phones but we can’t able to connect it because it is password protected. anyone experience this situation ? if yes your are the one in 90% of the world. So here i am going to tell how to hack WiFi through your android mobile phone
This is called War Driving, That means when a hacker travels to any vicinity to hack a WiFi network . Some years back this is limited because to get the signals you must carry your laptop and go to that place. But now you could make a War Driving with your android smart phone.
This tutorial just to educate you what happen if you have a week security network connection. Because once a hacker comes in to your network then he could able to perform all sort of internal attacks such as MITM , ARP Poisoning , DNS Poisoning , SSL Strip and what not . Therefore it is advisable to use strong encryption to secure the Wifi Networks .
To perform this hack you must have a rooted android phone. Because the application that plays an important roll in our hack wants a rooted privilege.
Steps
  • Download WPS Connect from PLAYSTORE 
  • Now open WPS connect in your mobile phone. and it will ask the root permission, Grant it.
  • Now click on the refresh button in the top bar of WPS Connect.
  • It shows the available WiFi networks, Click on the WiFi you wanted to hack and give a pin. and wait for some times
That is it :) The WiFi is hacked.
Note:This wouldn’t hack 100% the WiFi you want. Though many will be hacked .

Let us Hack WiFi : Terms and Technologies




Hi my dear hackers, Many of our readers ask us How to hack WiFi. So we are planed to start a series of Hacking WiFi, starting from the terms and technology and ends with the advances hacks.
Hack WiFiEvery one wants to open the laptop and type something and hack but that is impossible, To be a master hacker first you must clearly understand about the basics. Because always foundation is important.
After the basic guides will cover wardriving, DOS attacks, password hacking (WEP, WPA, WPA2, WPS, and WPA-enterprise), rogue APs, evil twins, Wi-Fi MitM, and Wi-Fi snooping. Lastly, we’ll examine how to hack Bluetooth (yes, I know, technically it’s not Wi-Fi, but I think you’ll find it interesting).
So come on, let us hack hack WiFi
Step 1 : Terminology
To do something we must know about the basic terms and technologies, So let us address some terminologies .
To begin, the access point that sends out the radio frequency (RF) signal is known as the AP. These APs are capable of sending out signals (between 2.4 and 5 Ghz) that comply with a number of different standards. These standards are known as 802.11a, 802.11b, 802.11g, and 802.11n. In the very near future, we’ll see a new standard that’s tentatively named 802.11ac.
The following table shows the key features of the WiFi standards
Wi-Fi standards.
Wi-Fi standards.
These standards are generally backwardly compatible, so that a wireless and adapter will also be able to pick up g and b signals. We will focus upon the most widely used of these standards— b, g, and n.
Step 2 : Security Technologies From the view of the hacker, wireless security technologies are among the most important aspect. Multiple security technologies have been deployed in Wi-Fi to make an inherently insecure technology secure. Our attack approach will depend upon which of these security technologies is being deployed.
So let us look a quick view of that
WEP
WEP, which is also called as wired equivalent privacy, was the first wireless security scheme employed. As it name implies, it was designed to provide security to the end-user that was essentially equivalent to the privacy that was enjoyed in a wired environment. Unfortunately, it failed miserably.
For many reasons, WEP is extraordinarily easy to crack because of a flawed implementation of the RC4 encryption algorithm. It’s not unusual to be able to crack WEP in less than 5 minutes.
This is because WEP used a very small (24-bit) initialization vector (IV) that could be captured in the datastream, and this IV could then be used to discover the password using statistical techniques.
But i found that this security system is still used in homes, Small offices. ðŸ˜›
WAP
WPA was the response by the industry to the revealed weaknesses of WEP. It’s often referred to as WPA1 to distinguish it from WPA2.
WPA used Temporal Key Integrity Protocol (TKIP) to improve the security of WEP without requiring new hardware. It still uses WEP for encryption, but it makes the statistical attacks used to crack WEP much more difficult and time-consuming.
WAP2-PSK
WPA2-PSK is the implementation of WPA2 for the home or small business user. As the name implies, it’s the WPA2 implementation that uses a pre-shared key (PSK). It’s this security standard that is used by most houses today, and although it’s far more secure, it’s still vulnerable to various attacks.
A feature that was added in 2007 called Wi-Fi Protected Setup, or WPS, allows us to bypass the security in WP2-PSK. We’ll look at a few attacks on WPA2-PSK in coming weeks.WAP2-AESWPA2-AES is the enterprise implementation of WPA2. It uses the Advanced Encryption Standard or AES to encrypt data and is the most secure. It’s often coupled with a RADIUS server that is dedicated for authentication.By comparing to other security encryption cracking this is little difficult.
Step 3 : Channels
Everyone knows about the radio channels, like radio channels WiFi also have multiple channels so that various communication streams don’t interfere with each other. The 802.11 standard allows for channels ranging from 1 through 14.
wifi channels
wifi channels
Each channel has a width of 22 Mhz around its central frequency. To avoid interference, an AP can use any of these channels, but to avoid any overlap, channels 1, 6, and 11 are most often utilized in the U.S. The other channels can be used, but because you need five channels between the working channels to not overlap signals, with three or more channels, only 1, 6, and 11 will work.
Step 4 : Datagrams and Frames 
An understanding of the structure of wireless datagrams is critical for successful wireless hacking, but is beyond the scope of this introduction. I will introduce some of this information when necessary in future tutorials, but you may want to take some time to study wireless frames and datagrams from other sources.
Step 5 : Signal strength
The strength of the wireless access point’s signal. Most access points have this limit built-in, but we can change and override this limitation, if the access point is capable of a stronger signal. This may be useful for the hacker in setting up evil twins and rogue access points where strength of signal is critical, among other techniques.
Step 6 : Aircrack-Ng
For nearly all of our Wi-Fi hacking, we will be using aircrack-ng which is included in kali. Even in those hacks where we use other tools such cowpatty or reaver, we will use the aircrack-ng suite of tools for some part of the hack, so we need to become familiar with it.
I will write a article in it very soon.
Step 7 : WiFi adapters 
One of the crucial needs to becoming an effective Wi-Fi hacker is the Wi-Fi adapter. Generally, the Wi-Fi adapter on your laptop or desktop is insufficient for our purposes. The key capability we need is the ability to inject packets into the access point and most run-of-the-mill wireless adapters are incapable of packet injection. Aircrack-ng has a list of Wi-Fi adapters that can work with their suite of tools.
wifi adapters
wifi adapters
That having been said, I highly recommend Alfa AWUS036NH USB wireless adapter. This is what I use. It’s available from several locations for between $30 to $50.
It does everything I need, is fast, has an external antenna, is recognized by kali, and automatically loads its drivers. In addition, it come in 1000mw and 2000mw versions. That can be critical in rogue access point hacks.
That’s It…next step .. 
So, this begins our exciting journey into Wi-Fi hacking. Very soon, you will be able to hack nearly anyone’s wireless internet, so keep coming back to expand your knowledge and skills in Wi-Fi hacking.

Hack windows 7/8/10 user passwords


Did you ever try to login your friends computer ? and failed ? After this you can do it :)The OS can be Windows 7 or 8 or it can be the latest windows 10. You could break and login the password protected user accounts.
This exploit takes advantage of the ease of access tool on the login page by ‘tricking’ windows into launching a fully privileged command prompt by selecting ‘on the screen keyboard’ this is done by renaming the on the screen keyboard exe to something random, and renaming the cmd.exe to on the screens previous name. It will all make since later.
What you want :
  • Any Linux Live CD/DVD/USB with Live option (ex. Ubuntu Live, Linux Live, Kali, etc.).
  • Ability to use said Linux CD/DVD/USB.
  • Basic understanding of Windows file structure. i.e. can navigate.
  • Physical access to said Windows box.
  • Ability to use command line and basic understanding of net user commands.

  • Boot Live Linux
    Insert CD/DVD into drive and reboot the machine. Start your Live DVD. You may need to go into the BIOS screen and change the boot-up order to CD/DVD drive first, HDD second.
  • Navigate to sys32Use the file browser in your Linux environment, navigate to %windir%/system32/. You may have to right-click and mount the Windows partition/drive first or use the NTFS-3G command.
  • RenamingFind and rename magnifier.exe (Magnifier file) to magnify.old.
  • Rename cmd.exeFind and rename cmd.exe to magnify.exe.
  • Shutdown Linux & reboot windowsLogout, remove DVD/USB, and reboot into Windows.
  •  Get CMD Prompt Modify AccountsWhen Windows reboots, click on the ease of access button in the bottom left corner.
    Click magnify and hit apply.Then You have a system level command prompt. At this point is where we will only change the Admin password and not any of the 1000 other things that could be done at this point!
Tip: You can right-click on cmd.exe and click run as administrator inside of Windows for escalated privileges. To edit files, it would never be allowed at basic admin level (caution).
Your options at here. 
Change Password:
net user username new_password
When you do so, the password changes without prompting you again.
Add an account:
net user username password /add
Tip: If your username has a space, like sivarathan sivarajah, use quotes like “sivarathan sivarajah”.
Admin that:
net localgroup administrators username /add
Delete that:
net user username /delete
Remote Desktop Users Group: (just in case)
net localgroup Remote Desktop Users UserLoginName /add
Net User Syntax Reference:
net user commands
Domain i.e. Servers:
net user for domain
That is it now you could login in to any windows password protected ones.

Gamevice, Lightning-equipped Gamepad for iPhone 6 and 6S

Gamevice, Lightning-equipped Gamepad for iPhone 6 and 6S series
Gamevice, Lightning-equipped Gamepad for iPhone 6 and 6S series
If you are hardcore gamer and own an iPhone, you must already have a gamepad. While majority of the gamepads available in the market pairs with the phone via Bluetooth which enables bakcward and forward compatibility, here comes a new one but this time the gamepad is equipped with Lightning and available for purchase at Apple’s online and physical stores.
Other than the connectivity features, the gamepad called Gamevice is a lot similar to conventional gamepad available for iDevices. When it comes to control layout, the gamepad offers  a joystick on each side, a D-Pad on the left, four buttons on the right, as well as trigger and bumper buttons on both sides.
The Gamevice has a collapsible design which you should find perfect on the go and also offers a 400mAh battery, four LED battery level indicators, a microUSB port for charging purposes, and a 3.5mm headphone jack.
The Gamevice gamepad is compatible with the 4.7-inch iPhone 6 and 6S as well as iPhone 6 Plus and iPhone 6S Plus. The device is priced at $99.95, that is a bit expensive compared to typical game controller for iPhone but you get a beautiful and easy-to-carry gamepad on the go for that price.
The company also offers similar controller for the iPad mini and iPad Air model is expected to hit the market in the coming month.
Gamevice, Lightning-equipped Gamepad for iPhone 6 and 6SGamevice, Lightning-equipped Gamepad for iPhone 6 and 6SGamevice, Lightning-equipped Gamepad for iPhone 6 and 6SGamevice, Lightning-equipped Gamepad for iPhone 6 and 6S series

Sunday, December 13, 2015

Noise can't hide weak signals from this new receiver

FULL STORY

Schematic of single-event noise discrimination using the spectral cloning receiver.
Credit: Photonics Systems Group at UC San Diego
Electrical engineers at the University of California, San Diego developed a receiver that can detect a weak, fast, randomly occurring signal. The study, published in the Dec. 11 issue of Science, lays the groundwork for a new class of highly sensitive communication receivers and scientific instruments that can extract faint, non-repetitive signals from noise. The advance has applications in secure communication, electronic warfare, signal intelligence, remote sensing, astronomy and spectroscopy.
The research is motivated by a long-standing need to capture random, singly-occurring phenomena in nature and in communications. An example of these includes the spontaneous decay of a molecule, an event that emits a single noisy signal and therefore eludes detection by conventional methods. Because a standard detector must repeat measurements of the event multiple times to confirm its existence, it prevents, in principle, the capture of a random, non-repetitive event. Another limitation is that the capture of a fast event requires an equally fast detector.
To overcome the limitations of conventional detection methods, UC San Diego researchers developed a spectral-cloning receiver that works by replicating the received noisy signal to generate multiple spectral (colored) copies, and then combines these copies to reveal the existence of the signal within the noise.
"With the new receiver, it is now possible, at least in principle, to capture an ephemeral, non-repeating signal and observe fast, sparsely occurring natural or artificial phenomena--that would otherwise be invisible to us--over a long period of time, using a slow detector," said Stojan Radic, an electrical engineering professor in the Jacobs School of Engineering at UC San Diego and senior author of the study
In the Science paper, researchers report that the spectral-cloning receiver they developed "can potentially intercept communication signals that are presently considered secure." These signals are based on singly-occurring bursts, which disappear before another measurement can be taken to separate noise.
Radic also noted that the receiver could enable communication at a longer distance and with higher security. For example, it would be possible to bury the communication channel in noise and still detect it using the new receiver, while being well below the sensitivity threshold of conventional detectors.
The new receiver physics can be compared to a "temporal microscope": it can see a very fast, faint signal while observing over a much larger time interval. However, while an ordinary microscope cannot eliminate surrounding image noise, the new receiver can differentiate between the noise and the signal fields.
In their experiments, the team used a new class of tunable optical frequency combs--developed in Radic's Photonics Systems Group at UC San Diego--to simultaneously create multiple spectral clones of a fast pulse. Researchers combined these clones to extract the signal from the noise and were able to reconstruct its timing and shape. They found that a higher spectral clone count resulted in higher sensitivity of signal detection by the spectral-cloning receiver.
"We were surprised that this concept could be scaled up to a high number of spectral copies. We are now able to construct a receiver that operates on hundreds of freely tunable copies," said Radic. "This work is a result of long-standing research on tunable frequency combs at UC San Diego. The new class of combs are nearly noise-free and, in contrast to conventional frequency combs, can be freely tuned over a wide spectral range."

First puppies born by in vitro fertilization

FULL STORY

Credit: Cornell University
For the first time, a litter of puppies was born by in vitro fertilization, thanks to work by Cornell University researchers.
The breakthrough, described in a study to be published online Dec. 9 in the journal Public Library of Science ONE, opens the door for conserving endangered canid species, using gene-editing technologies to eradicate heritable diseases in dogs and for study of genetic diseases. Canines share more than 350 similar heritable disorders and traits with humans, almost twice the number as any other species.
Nineteen embryos were transferred to the host female dog, who gave birth to seven healthy puppies, two from a beagle mother and a cocker spaniel father, and five from two pairings of beagle fathers and mothers.
"Since the mid-1970s, people have been trying to do this in a dog and have been unsuccessful," said Alex Travis, associate professor of reproductive biology in the Baker Institute for Animal Health in Cornell's College of Veterinary Medicine.
Jennifer Nagashima, a graduate student in Travis' lab and the first to enroll in the Joint Graduate Training Program between the Smithsonian Conservation Biology Institute and Cornell's Atkinson Center for a Sustainable Future, is the paper's first author.
For successful in vitro fertilization, researchers must fertilize a mature egg with a sperm in a lab, to produce an embryo. They must then return the embryo into a host female at the right time in her reproductive cycle.
The first challenge was to collect mature eggs from the female oviduct. The researchers first tried to use eggs that were in the same stage of cell maturation as other animals, but since dogs' reproductive cycles differ from other mammals, those eggs failed to fertilize. Through experimentation, Nagashima and colleagues found if they left the egg in the oviduct one more day, the eggs reached a stage where fertilization was greatly improved.
The second challenge was that the female tract prepares sperm for fertilization, requiring researchers to simulate those conditions in the lab. Nagashima and Skylar Sylveste, found that by adding magnesium to the cell culture, it properly prepared the sperm.
"We made those two changes, and now we achieve success in fertilization rates at 80 to 90 percent," Travis said.
The final challenge for the researchers was freezing the embryos. Travis and colleagues delivered Klondike, the first puppy born from a frozen embryo in the Western Hemisphere in 2013. Freezing the embryos allowed the researchers to insert them into the recipient's oviducts (called Fallopian tubes in humans) at the right time in her reproductive cycle, which occurs only once or twice a year.
The findings have wide implications for wildlife conservation because, Travis said, "We can freeze and bank sperm, and use it for artificial insemination. We can also freeze oocytes, but in the absence of in vitro fertilization, we couldn't use them. Now we can use this technique to conserve the genetics of endangered species."
In vitro fertilization allows conservationists to store semen and eggs and bring their genes back into the gene pool in captive populations. In addition to endangered species, this can also be used to preserve rare breeds of show and working dogs.
With new genome editing techniques, researchers may one day remove genetic diseases and traits in an embryo, ridding dogs of heritable diseases. While selecting for desired traits, inbreeding has also led to detrimental genetic baggage. Different breeds are predisposed to different diseases; Golden retrievers are likely to develop lymphoma, while Dalmatians carry a gene that predisposes them to blockage with urinary stones.
"With a combination of gene editing techniques and IVF, we can potentially prevent genetic disease before it starts," Travis said.
Finally, since dogs and humans share so many diseases, dogs now offer a "powerful tool for understanding the genetic basis of diseases," Travis said.
Co-authors include Nucharin Songsasen, a research scientist at the Smithsonian Conservation Biology Institute, National Zoological Park.
The study was funded by the National Institutes of Health, the Baker Institute for Animal Health, Cornell's Atkinson Center for a Sustainable Future and the Smithsonian Institution.

Ways to crack Facebook passwords

This is the easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying to hack.
  • The first step would be to get your friend’s Facebook email login. If you don’t  know it, try looking on their Facebook page in the contact info section.
  • Next, click on Forgotten your password? and type in the victim’s email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim’s emails. This doesn’t help, so press no longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn’t linked to any other Facebook account.
  • It will now ask you a question. If you’re close friends with the victim, that’s great. If you don’t know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don’t figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
  • Crack Facebook passwordIt will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.
  • trusted contracts
    How to protect yourself
    • Use an email address specifically for your Facebook and don’t put that email address on your profile.
    • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher’s names. It’s as easy as looking through a yearbook.
    • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.
    Method 2 : Use a Key logger :
    Software Key Logger :
    A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim’s computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.
  • CNET has Free Key logger, which as the title suggests, is free. If this isn’t what you’re looking for, you can search for other free key loggers or pay for one.

 
Back To Top
Copyright © 2014 Technology Expolre. Designed by OddThemes