"Tribo-Electric" Which Converts Movement Into Power,Human Movement as well



Researchers had built a prototype device which changes movement into power, at the Georgia Institute of Technology.Scientists in the United States said Tuesday it lies within reach, thanks to a smart way to harvest energy called tribo-electricity.

A professor of materials science and engineering, Zhong Lin Wang described the invention a "breakthrough." He told AFP by email, "Our technology can be used for large-scale energy harvesting, so that the energy we have wasted for centuries will be useful."

"Tribo-electric" is a modern device with previous rules from the Greek word for "rub."The device generates electricity from friction between two things that cause a charge of electrons travel from one to the other like walking on nylon carpet with plastic-soled shoes.The device has ability to generates 1.5 watts.



In a new study published in the journal Nature Communications, Wang's team said they had overcome key hurdles to converting a haphazardly-generated electrical charge into current.

There are two circular sheets, an electron "donor" and the other an electron "receiver" moved together by rotary movement.An electrical charge isolate would use if the sheets are separated.It has one more disc with electrodes, work as a bridges the gap and allows the current to flow at a top speed of 3,000 revolutions per minute.

Wang said, "It can run on a gentle wind or tap water, or "random jerky motions," including human movement, to provide the rotation.""As long as there is mechanical action, there is power that can be generated."

Wang also said, "the prototype used copper for the rotator and gold for the electrodes in lab tests, but these could easily be substituted for low-cost synthetics."

The team of researchers is still working to harvest power from the ocean.


Thousands of Visitors to yahoo.com Hit with Malware Attack

Thousands Of Visitors To yahoo.com Hit with Malware Attack, Researchers Say:-


Two Internet security companies have reported that Yahoo's advertising servers have been spreading malware to thousands of users over the last few days.The malware works as a malicious parties who have hijacked Yahoo's advertising network for their own purposes or business activities.
A security company "Fox IT" based in the Netherlands, wrote a blog post on Friday describing the problem. "Clients visiting yahoo.com received advertisements served by ads.yahoo.com. Some of the advertisements are malicious," the firm reported. Instead of serving ordinary ads, the Yahoo's servers reportedly sends users an "exploit kit" that "exploits easily in Java and installs a host of different malware.

"Fox IT  also says Yahoo users have been containing harmed malware since 30 December. The firm says, malicious were being sent to approximately 300,000 users per hour.

The malware attacked faults in the Java programming environment is an important reminder that the software has become a security threat and its Java's security faults have become a juicy target for hackers.Security experts told that you should disable Java as an avoid danger if your browser allows it, but not JavaScript, a totally different technology.


A Security researcher "Mark Loman", has confirmed find out the malware.

A Yahoo spokeswoman said in a email to the Washington Post, "We recently discovered an ad arranged to distribute malware to our users. We dismissed it without any delay and will continue to monitor and block any ads being used for this activity."

Meet the man who builds weapons to challenge the TSA


The 31-year-old North Carolinian "Even Booth" who builds weapons to challenge the TSA.Last month Booth uploaded several videos to YouTube about weapons he made, and they immedately went viral, sparking discussions about security at airports on Russian television and British radio.“Fragguccino,” his popular video, shows how quickly he can build a bomb.With the timer counting upward, Booth moves apart lithium AA battery and puts the contents in a stainless steel travel coffee mug.As the clock comes close to the eight minute mark, he throws the coffee mug behind him. Quietly it falls to the ground with hisses sound for two seconds, then explode.The explosion is loud and small depend on batteries power.

When he was kid, Booth built almost the same explosive equipments with his older brother.He works as a security consultant but mostly as a freelance Web developer.Recently he made a musical holiday e-card for a travel company.His weapon building,"Terminal Cornucopia", is his idea of fun.
He said he does not want to criticise the TSA, but he does want people to know that airports and airplanes may be less safe than they think.Booth took the chance to study airports.He selected flights with long stay so he could take photos of the security checkpoints stores.After his 30th birthday, he declared the upcoming year a “year of creativity.”He started painting, wrote a song and stories.His friends share his interest in exposing systems.Two of them work as hackers who break into bank websites to highlight fualts in their codes.Another is a security engineer, they meet to discuss lock picking and computer hacking.Booth’s colleague Harvey Molotch said, "what they’re doing is a form of art.”Booth said he thinks the TSA and others can find the videos useful.TSA representative Ross Feinstein told that the agency is aware of Booth’s videos but would not say whether the TSA thinks them useful.

Two million passwords stolen by Pony botnet

Pony Botnet Steals 2 Million Yahoo, 

Facebook, Google Accounts Globally:-



According to researchers, clever and dishonest planners have stolen more than 2 million passwords for sites like Facebook, Google, and Yahoo, but it appears that the data was stolen via malware-infected machines rather than a hack of those companies' systems.Researchers with Trustwave's Spider Labs said they discovered the credentials while examining a server in the Netherlands that cyber criminals use to control a massive network of compromised computers known as the "Pony botnet".A Botnet using “Pony” software for attack and 2 million accounts which includes many popular social websites such as Facebook, Twitter, Google, Yahoo etc.Facebook affected the most with approximately 318,121 credentials, Yahoo came second place with 59,549 accounts stolen, Google with 54,437 accounts, Twitter had 21,708  stolen and LinkedIn with 8,490 accounts.VKontakte popular social networking site in Russia also affected with 6,867 accounts.The Botnet was also used to steal  320,000 email account except social networks.Another company ADP, is paying one in 6 workers in the US, and has moved about US$1.4 trillion in fiscal 2013.The Pony Botnet used a reverse proxy to prevent detection and continue the scam as long as possible."Passwords that use all four character types and are longer than 8 characters, considers to be excellent" Trustwave.



8,000,000 Coins for Sale, Public Event call for Authentic Swiss Bank Vault

8,000,000 coins for sale: Auction call for authentic Swiss bank vault

A Swiss bank vault filled with 15 tons of coins worth 440,000 dollars has been put on sale with a exchange price.A total of 8 million coins are being kept in 1,619 deposit boxes which is over 100 year old.The Generation Basic Income opportunity, is a group which is fighting for a minimum monthly disposable household income of $2,800.The vault was handmade from steel and brass in 1912.In October they put all 15 tons or 8 million five-cent coins on the square and open out in front of the Swiss Parliament in Bern to mark the day when some 120,000 Swiss signatories put their names to a petition, also presented  by the Basic Income Initiative.

As a result, Switzerland is now on the edge of voting on a historic referendum, which may take place as soon as next year. The selling the vault will help them raise sufficient funds to take their activities worldwide.That makes people to think about it. Think about how things work and how things could work in the future.The Generation Basic Income Initiative has support not only from Swiss citizens, but also from other European states.

                     A truck dumps five cent coins in the centre of the Federal Square

Comet ISON headed our way, Our Sun-Grazing Visitor from the Oort Cloud

Comet ISON, Our Sun-Grazing Visitor from the Oort Cloud:-


A comet that left the outer edge of the solar system more than 5.5 million years ago will pass close by the sun. There are three possibilities when this comet rounds the sun : “It could be tough enough to survive the passage of the sun, the second is that the sun’s gravity could rip the comet apart, last possibiliy is that if the comet is very weak, it could break up into a cloud of dust.Early December may bring a short experience of the much-hyped Comet ISON that helps you to understand it, which entered the inner solar system in October and moved in curve around the Sun.“It now looks like some chunk of ISON’s nucleus has indeed made it through the solar corona, and appeared again,” Karl Battams, a comet scientist for the Naval Research Laboratory, told CNN.

Heat from the sun causes ices in a comet’s body to vaporize and creating bright glowing bodies.The closer comets come to the sun, the brighter they shine, depending on how much ice they contain. “It’s sending off dust and gas, but we don’t know how long it can exist that.”To capture a glimpse of ISON, says Foothill College Astronomy Professor Andrew Fraknoi, a clear view of the eastern horizon, just before sunrise.

The evaporated material from this chunk of dirty ice should make a beautiful cloud, and that there should be a long tail.It’s coming from the deep freeze of something called the Oort Cloud, it’s falling in toward the sun and then will move around the sun and back out to the depths of space.The Oort Cloud is approximately 10,000 times far from the sun, halfway to the next star and it is a reservoir of icy surplus chunks, a couple of miles from one side to the other side, which mostly stay out there minding their own business, but occasionally a couple crash or something comes by and  one of them jump forwards with a lot of force toward the inner solar system.

Comet ISON was discovered in September of 2012 by two young Russian observers, who are looking for asteroids that are coming near the earth and might show a danger by crashing into the Earth.

Their cameras displayed this new comet for the first time.

Leaks display, NSA infected more than 50,000 computer networks with Malware

NSA used malware to infiltrate 50,000 networks worldwide:-



The American intelligence service the NSA infected more than 50,000 computer networks across the whole world with malware and collecting sensitive information, reports NRC Handelsblad.Documents provided by former NSA-employee Edward Snowden.Computer Network Exploitation (CNE) is the secret infiltration of computer systems attained by installing malware, malicious software.The British intelligence service the GCHQ also doing this kind of activities, the GCHQ has been installing this malicious software in the Belgacom network in order to record their customers’ telephone.The malware is shared by the NSA's Tailored Access Operations group (TAO).In August 2013, the Washington Post released articles about these NSA-TAO cyber operations.These articles were based on a secretive budget report of the American intelligence services.The NSA presentation shows their CNE activities in countries such as Venezuela and Brazil. The malware put into a computer in these countries can remain active for very long times without being discovered.The malware can be controlled remotely and that can be activated with a single push of a button so called sleeper cells.The NSA has been carrying out this type of operation since 1998, According to the
Washington Post.TAO is currently working on a new development of software that can identify specific voice communications and secretly send out excerpts as desired.

Retail theft or shrink and Shoplifting, cost retailers over $112 billion worldwide last year

Shoplifting cost the world $112 billion last year:-

Retail theft or cower or supplier fraud and organized retail crime, cost retailers over $112 billion worldwide last yearreported by the 2012-2013 Global Retail Theft Barometer.The study surveyed 157 companies in 16 countries covering 160,000 stores.In 2012 more than $1.5 trillion companies generated sales.The highest shrink rates were recorded in Brazil and Mexico at 1.6 percent, the U.S. and China at 1.5 percent.The lowest rates were seen in Japan and Australia at 1.0 and 1.1 percent.

Yacht Of The Week

Yacht Of The Week;The $21.5 Million 'Maghreb V':-



"Maghreb V" was designed and built by American shipbuilders Burger Boat Company in 2006.The Maghreb V has a speed of 13 knots (15 mph) and ability to reach a top speed of 18 knots (20.7 mph).
Master Bedroom

Yacht is 144-foot and has three decks, seven luxurious staterooms.The master bedroom is the largest and luxurious stateroom of the yacht.
Private Office
Guest Room

The master suite also includes a private office for extra quietness and has some extra rooms for guests.
speedy Elevator
Main Salon
sundeck
In a hurry you can take a speedy elevator to access the 3 floors.It has main salon,dinning area,swanky sky lounge,foredeck for breakfast or lunch and great place for a family dinner and sun deck.
swanky sky lounge
Foredeck

NASA Television’s Now in High Definition

NASA Television’s Public (101) and Media (103) channels are now transmitting in high definition:-

NASA Television’s Public Channel (channel 101), the "NASA TV"  carried by satellite service providers, provides coverage of NASA missions and events And more.NASA TV’s Media Channel (channel 103) provides mission coverage, news conferences and relevant video to local, national and international news organizations.HD Channel 105 is no more in service.NASA TV is work in North America, Alaska and Hawaii on AMC-18C.
Like us on Facebook
Follow us on Twitter
Recommend us on Google Plus
Subscribe me on RSS