Thursday, 17 April 2008

10 MOST EXPENSIVE KEYBOARDS!




--The ten most expensive keyboards in no particular order




1) Happy Hacking HP Keyboard Japan

Image

This computer keyboard has a sweet price of US $4,400 and is coated many times using a special brush made from the hairs of virgins, and then powdered with gold dust.


2) Stealth Computer Keyboard

Image

The cool looking Stealth Computer Keyboard has a price of US $2,200 and it comes enclosed in non-corrosive stainless steel with an optical isolated barrier.


3) TouchStream LP

Image
This keyboard surely looks one piece of hardware innovation and it costs only for US $,1500.


4) Executive Keyboard

Image

This keyboard by Maltron was made with made with Perspex, Stainless-Steel and Polycarbonate key-tops to give relief to your fingers, wrists and arms while typing. It costs £550.


5) Dual Handed Ergonomic 3D

Image

This is a unique 3D keyboard worth £375. The letter keys are angled inwards to match natural finger movements and the keys for the longer fingers are recessed. Getting a trackball on your crazy 3d keyboard will cost you an extra £65.


6) Professional II Datahand

Image

The $675 beauty has been designed such that it can be dynamically adjusted to fit the size and shape of a person’s hands.


7) orbiTouch Keyless ergonomic Keyboard

Image
The orbiTouch Key less ergonomic Keyboard creates a keystroke when you slide the two domes into one of their eight respective positions. It has a price of US $399


8) Comfort Keyboard

Image

As the name says this is the ultimate comfort keyboard. The Comfort Keyboard is separated into three sections, which can be adjusted easily and locked into place. It costs $349.


9) Wireless Entertainment Desktop 8000

Image

This is one keyboard made by Microsoft and with a reasonable price of $249. The media keyboard is also known as the Ultimate keyboard. An aluminum finish makes this keyboard quite attractive.


10) Optimus Keyboard



Image

This is so far a virtual or concept keyboard which has been just rendered in 3D and has no physical existence. The expected price for this keyboard is said to be very high and it is so far assumed to be a very expensive keyboard.

The [W]orld [W]ide [W]eb Security FAQ




  1. Introduction


  2. What's New?



  3. General Questions



    • Q1 What's to worry about?



    • Q2 Exactly what security risks are we talking
      about?



    • Q3 Are some Web servers and operating systems
      more secure than others?



    • Q4 Are some Web server software programs more
      secure than others?



    • Q5 Are CGI scripts insecure?




    • Q6 Are server-side includes insecure?



    • Q7 What general security precautions should
      I take?



    • Q8 Where can I learn more about network security?






  4. Client Side Security




    • Q1 How do I turn off the "You are submitting
      the contents of a form insecurely" message in Netscape? Should I worry
      about it?



    • Q2 How secure is the encryption used by
      SSL?



    • Q3 When I try to view a secure page, the
      browser complains that the site certificate doesn't match the server and
      asks me if I wish to continue. Should I?



    • Q4 When I try to view a secure page, the
      browser complains that it doesn't recognize the authority that signed its
      certificate and asks me if I want to continue. Should I?



    • Q5 How private are my requests for Web documents?




    • Q6 What's the difference between Java and
      JavaScript?



    • Q7 Are there any known security holes in
      Java?



    • Q8 Are there any known security holes in
      JavaScript?



    • Q9 What is ActiveX? Does it pose any risks?



    • Q10 Do "Cookies" Pose any Security Risks?




    • Q11 I hear there's an e-mail message making
      the rounds that can trash my hard disk when I open it. Is this true?



    • Q12 Can one Web site hijack another's content?



    • Q13 Can my web browser reveal my LAN login
      name and password?



    • Q14 Are there any known problems with Microsoft
      Internet Explorer?



    • Q15 Are there any known problems with Netscape
      Communicator?



    • Q16 Are there any known problems with Lynx
      for Unix?



    • Q17 Someone suggested I configure /bin/csh
      as a viewer for documents of type application/x-csh. Is this a good idea?




    • Q18 Is there anything else I should keep
      in mind regarding external viewers?






  5. Server Side Security




    • General

      • Q1 How do I set the file permissions of my
        server and document roots?

      • Q2 I'm running a server that provides a
        whole bunch of optional features. Are any of them security risks?

      • Q3 I heard that running the server as "root"
        is a bad idea. Is this true?


      • Q4 I want to share the same document tree
        between my ftp and Web servers. Is there any problem with this idea?

      • Q5 Can I make my site completely safe by
        running the server in a "chroot" environment?

      • Q6 My local network runs behind a firewall.
        How can I use it to increase my Web site's security?

      • Q7 My local network runs behind a firewall.
        How can I get around it to give the rest of the world access to the Web
        server?


      • Q8 How can I detect if my site's been broken
        into?





    • Windows NT Servers




      • Q9 Are there any known problems with the
        Netscape Servers?



      • Q10 Are there any known problems with the
        WebSite Server?



      • Q11 Are there any known problems with Purveyor?




      • Q12 Are there any known problems with Microsoft
        IIS?



      • Q13Are there any known security problems
        with Sun Microsystem's JavaWebServer?



      • Q14Are there any known security problems
        with the MetaInfo MetaWeb Server?





    • Unix Servers



      • Q15 Are there any known problems with NCSA
        httpd?




      • Q16 Are there any known problems with Apache
        httpd?



      • Q17 Are there any known problems with the
        Netscape Servers?



      • Q18 Are there any known problems with the
        Lotus Domino Go Server?




      • Q19 Are there any known problems with the
        WN Server?




    • Macintosh Servers




      • Q20 Are there any known problems with WebStar?



      • Q21 Are there any known problems with MacHTTP?



      • Q22 Are there any known problems with Quid
        Pro Quo?





    • Other Servers



      • Q23 Are there any known problems with Novell
        WebServer?





    • Server Logs and Privacy


      • Q24 What information do readers reveal that
        they might want to keep private?




      • Q25 Do I need to respect my readers' privacy?



      • Q26 How do I avoid collecting too much information?



      • Q27 How do I protect my readers' privacy?









  6. CGI Scripts




    • General


      • Q1 What's the problem with CGI scripts?


      • Q2 Is it better to store scripts in the
        cgi-bin directory or to identify them using the .cgi extension?



      • Q3 Are compiled languages such as C safer
        than interpreted languages like Perl and shell scripts?


      • Q4 I found a great CGI script on the Web
        and I want to install it. How can I tell if it's safe?


      • Q5 What CGI scripts are known to contain
        security holes?






    • Language Independent Issues


      • Q6 I'm developing custom CGI scripts. What
        unsafe practices should I avoid?



      • Q7 But if I avoid eval(), exec(), popen()
        and system(), how can I create an interface to my database/search engine/graphics
        package?


      • Q8 Is it safe to rely on the PATH environment
        variable to locate external programs?


      • Q9 I hear there's a package called cgiwrap
        that makes CGI scripts safe?



      • Q10 People can only use scripts if they're
        accessed from a form that lives on my local system, right?


      • Q11 Can people see or change the values in
        "hidden" form variables?


      • Q12 Is using the "POST" method for submitting
        forms more private than "GET"?



      • Q13 Where can I learn more about safe CGI
        scripting?





    • Safe Scripting in Perl



      • Q14 How do I avoid passing user variables
        through a shell when calling exec() and system()?


      • Q15 What are Perl taint checks? How do I
        turn them on?


      • Q16 OK, I turned on taint checks like you
        said. Now my script dies with the message: "Insecure path at line XX"
        every
        time I try to run it!



      • Q17 How do I "untaint" a variable?


      • Q18 I'm removing shell metacharacters from
        the variable, but Perl still thinks it's tainted!


      • Q19 Is it true that the pattern matching
        operation $foo=~/$user_variable/ is unsafe?



      • Q20 My CGI script needs more privileges than
        it's getting as user "nobody". How do I run a Perl script as suid?








  7. Protecting Confidential Documents at Your Site



    • Q1 What types of access restrictions are
      available?



    • Q2 How safe is restriction by IP address
      or domain name?



    • Q3 How safe is restriction by user name
      and password?



    • Q4 What is user verification?



    • Q5 How do I restrict access to documents
      by the IP address or domain name of the remote browser?



    • Q6 How do I add new users and passwords?




    • Q7 Isn't there a CGI script to allow users
      to change their passwords online?



    • Q8 Using .htaccess to control access
      in individual directories is so convenient, why should I use access.conf?




    • Q9 How does encryption work?



    • Q10 What are: SSL, SHTTP, Shen?



    • Q11 Are there any "freeware" secure servers?




    • Q12 Can I use Personal Certificates to Control
      Server Access?



    • Q13 How do I accept credit card orders over
      the Web?




    • Q14 What are: CyberCash, SET, Open Market?




  8. Denial of Service Attacks




    • Overview



      • Q1 What is a Denial of Service attack?



      • Q2 What is a Distributed Denial of Service
        attack?




      • Q3 How is a DDoS executed against a website?



      • Q4 Is there a quick and easy way to secure
        against a DDoS attack?




      • Q5 Can the U.S. Government make a difference?




    • Step-by-Step



      • Q6 How do I check my servers to see if they
        are active DDoS hosts?



      • Q7 What should I do if I find a DDoS host
        program on my server?



      • Q8 How can I prevent my servers from being
        used as DDoS hosts in the future?




      • Q9 How can I prevent my personal computer
        from being used as a DDoS host?



      • Q10 What is a "smurf attack" and how do I
        defend against it?

      • Q11 What is "trinoo" and how do I defend
        against it?



      • Q12 What are "Tribal Flood Network" and "TFN2K"
        and how do I defend against them?


      • Q13 What is "stacheldraht" and how do I
        defend against it?


      • Q14 How should I configure my routers,
        firewalls, and intrusion detection systems against DDoS attacks?




  9. Bibliography

Monday, 7 April 2008

Quality Wallpapers For Your Desktop #1

Here's a list of good quality wallpapers you can use to liven up your desktop !

Images will be frequently updated.


(Click on images for actual image size)




Photobucket

Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket

[SWEET RECIPE]Butter Puffs with Honey and Cinnamon




Okay this is a recipe for a sweet described in the title.

Here is an image of your result!

Image and video hosting by TinyPic

Bon appetite :)





I N G R E D I E N T S

  • * 1 c Boiling water
  • * 1 ts Baking powder
  • * 4 tb Butter or margarine
  • * 4 eggs
  • * 1/4 ts Salt
  • * Olive or other vegetable oil
  • * 1 tb Granulated sugar
  • * Honey; warmed
  • * 1/2 ts Grated orange rind
  • * Ground cinnamon
  • * 1 c All-purpose flour

M E T H O D

In a medium-sized saucepan, combine the boiling water, butter, salt, sugar, and orange rind. Bring to a boil. Meanwhile, sift together the flour and baking powder. Add the dry ingredients all at once to the hot mixture, beating hard with a wooden spoon over medium heat until the mixture forms a compact mass and leaves the sides of the pan. Remove from the heat and let cool for 1 minute. Add the eggs, one at a time, beating hard after each addition; the mixture should be smooth, glossy, and thick. Heat the oil (which should be 2-1/2 to 3 inches deep) almost to the smoking point, then drop the batter by tablespoons into the oil, without crowding, to form puffs. When the puffs surface, turn them to fry on all sides, using tongs, then lift them out, drain off excess oil on absorbent paper. Place on warm platter and keep warm. If using the syrup, boil the syrup ingedients for 5 minutes; spoon the syrup, or warm honey, over the puffs, sprinkle with cinnamon, and serve hot.

[MUST SEE]Inkjet Printer's Dirty Secret!!!

This is just something else!
I couldn't believe it when I saw it.
Check it out.








Saturday, 5 April 2008

Funny/Random Animations/Images

This is quite a long list of funny animations and random images you can enjoy watching or use them for your self wherever you want..
Click the images for their original sizes.


Hope you enjoy.



Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
hockey
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
happy
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
gun
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket

Photobucket

Photobucket
funny
Photobucket
Photobucket

Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
elmo
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
dragon
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
dance
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
Photobucket
bestfriends
Photobucket
Photobucket
batman