Thursday, June 30, 2011

[Informative] Is Your Phone being TAPPED?


After a phone tapping scandal took centre stage in Indian parliament, the Indian Govt. has again come under scanner, following the reports of Indian Finance Minister's room allegedly being "bugged". It's not surprising then, if the thought, 'Is my phone being tapped?' crosses one's mind.

While it is typically illegal to bug (listen to the conversations remotely) anyone's phone in India, it's very easy to tap a landline connection. If you ever hooked up another phone in your house, technically you have tapped your phone line. A phone line has a green and red copper wire, which form a circuit. The wire transmit sound waves as an electric current, which a telephone company sends through wires connected to the phone. It's easy to add a new load to the circuit board along this path.

This method, however, is too primitive in today's tech-savvy world. Eavesdroppers now use bugs within microphones that pick up sound waves directly. The sound runs to a radio transmitter, which transmits a signal varying with the current. Those spying on you could set up a nearby radio receiver that picks up this signal and sends it to a speaker or encodes it on a tape.


An ultrasonic or VLF bug is a technique used to convert the sound into an audio signal above range of human hearing. An RF (radio frequency) bug is the most well-known bugging device, through which a radio transmitter is placed in an area or device. An optical bug converts sound into an optical pulse or a beam of light. It is rarely used, expensive, and easy to detect.

Bugs would need a sweep to be detected, since all complicated equipment can be concealed from telephone lines. However, the radio receiver has to be within range of the transmitter - for instance, in a van parked outside a house.

Various companies also sell spy software like 'Ultimate Bluetooth mobile phone spy 2010', with which one can easily eavesdrop on anyone's calls, or even read SMSs. FlexiSpy, for instance, is a software that can be downloaded on a phone, which collects all available data and sends it to a web account for viewing. Another tool, the Spybubble Cell Phone Spying Software, can be downloaded for approx $60, allows live call interception, recording of incoming and outgoing call history, viewing text messages and transfer of recorded mobile phone activities into a remote server for storage.

It is common knowledge that every mobile subscriber's phone conversations are recorded and retained for seven days, primarily to monitor various communications channels used by terrorists. Tracking would be easier with 3G phones, since the base stations would be located close to each other.

However, there are ways to counter phone-tapping threats. A high-tech 'frequency finder bug detector', for instance, can detect phones, hidden cameras, eavesdropping devices or bugs. An RF 'telephone analyzer' can alert about a wiretrap on a telephone line. A computer controlled unit from Brickhouse Security continuously sweeps a telephone and phone line for any eavesdropping. It also sweeps a room for RF bugs (the detection frequency ranges from 70Mhz to 2Ghz).

Data encryption technology too, helps to curtail unauthorised phone-tapping to an extent. However, as encryption capabilities improve, so do wiretapping techniques. Being aware, however, can be of immense help.

Wednesday, June 29, 2011

[Gizmo Gallery] Smart way to charge up your SmartPhone

If you are a smartphone user, you might have experienced your mobile battery running out of power while surfing the internet on 3G networks, Wi-Fi or streaming content on the device. In such situations you will need a backup battery, more so if you carry a touch screen 3G device. However, you should make sure that you get one to charge multiple devices. To find out how many times a phone can be charged up with the portable charger, you would need to divide the mAh of the charger to the mAh of your phone. Here are few portable chargers that are available online as well as in the store to provide the seamless experience when you face battery woes next time.

MIFLIP  ll  Price: Rs.2,500 ($55.50)
MILI power's MiFlip is a smartphone charger, backup battery pack and viewing stand. It eliminates clutters as it combines three accessories into one lightweight and portable device. MiFlip is compatible with Apple iPhones, iPod Touch and Blackberry. It can charge your device for eight hoours of talk time, 15 hours of video or 80 hours of music streaming. If you don't get a one for you in stores, you can get it at www.MiLiPower.com

PEBBLE CHARGER  ll  Price: Rs.4,000 ($34.49)
The palm-sized Pebble Charger has a 5000mAh battery inside it. That is around four times size of your smartphone battery. The device takes little under five hours to fully charge but is worth the time since this portable charger can fill an iPhone for up to eight hours. Apart from iPhone, it is compatible with other MP3 devices, Nokia and Sony Ericsson handsets, and devices that can be recharged using a mini USB. A rubbery finish ensures that it would not slide off a smooth surface while you are on the move. A handy blue LED charge indicator makes sure that you charge your smartphone completly. Order here Veho Pebble XT portable battery pack charger - External battery pack 5000 mAh

ETO 3800  ll  Price: Starts at Rs.2,450 ($54.39)
Green Powercell Technology's Eto portable charger comes with multiple connectors to charge all brands of mobile phones, smartphones, iPods & MP3 players and portable gaming consoles, among others. It can also be used to charge digital cameras and camcorders. We are able to charge three smartphones- from zero battery to full and an iPod player with a single charge from Eto 3800. The time taken to charge the device to its full capacity is 2.5-3 hours. With a Lithium ion Battery and capacity of 3800mAh, the output voltage of the device is 5.5V/16V/19V. An LED charge indicator tells you how much the device is charged. It also comes with an auto cut-off feature and overcharging protection circuit. Eto 3800 comes with 12 months replacement gurantee and is available at Spice HotSpot stores, leading mobile outlets and can also be ordered on www.letsbuy.com



POWERSTICK ll  Price: Rs.3,000 ($30.95)
The Powerstik is a portable charger that allows it to charge a variety of devices. It looks very similar to a large USB drive. The device has a USB plug at one end and on other a connector that allows you to plug i a variety of devices for charging. The PowerStick include a micro-controlled processor, so when the device is charged, it switches off. While it may look like an extra beefy USB flash drive, this handy little device actually packs in 750mAh battery within and can provide an emergency boost to your mobile phone, BlackBerry, or portable music player. To charge powerstick, it has to be connected to any HSB port including computers and laptops and takes up to 90 minutes. You can order it on PowerStick P1V2 Universal USB Portable Charger


Wednesday, June 8, 2011

Tweak Your Internet for Good Browsing Speed and Faster Ping



After a long break, I am finally back with a tweak that may help you to increase your Internet Browsing Speed. For understanding this tweak, you have to have a basic knowledge of the words that are generally used in networking like Ping, Jitter etc. 
You also should be familiar with the Registry editing as well as you should also know using Windows Batch Files. Because this tweak is all about editing Registry & tweaking the internet using a .bat(Windows Batch File). 
So, here is a brief knowledge about the words mentioned above:

Ping: This measurement tells how long it takes a "packet" of data to travel from your computer to a server on the Internet and back. Whenever you experience delayed responses in Internet applications - this would be due to a higher than desired ping. Similar to packet loss, lower is better when it comes to ping. A result below 100 ms should be expected from any decent broadband connection.





Jitter: Once you understand ping, jitter should also make sense. Jitter is merely the variance in measuring successive ping tests. Zero jitter means the results were exactly the same every time, and anything above zero is the amount by which they varied. Like the other quality measurements, a lower jitter value is better. And while some jitter should be expected over the Internet, having it be a small fraction of the ping result is ideal.


And here are some words related to your computer:

Registry: The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low-level operating system components as well as the applications running on the platform: the kernel, device drivers, services, SAM, user interface and third party applications all make use of the registry. The registry also provides a means to access counters for profiling system performance.

Batch File: In DOS, OS/2, and Microsoft Windows, a batch file is a text file containing a series of commands intended to be executed by the command interpreter. Similar to job control language and other systems on mainframe and minicomputer systems, batch files were added to ease the work required for certain regular tasks by allowing the user to set up a batch script to automate many commands.

So now, after understanding this knowledge, I shall make you know that by tweaking Registry and applying some TCP/IP commands via Batch file, you can tweak your internet connection easily.

Tweaking the Registry and writing the long command lines are very annoying and time consuming. So, to reduce the time consumption, I have created the two files, which will automatically change the required settings. Here are the Download links for the files.
  1. Network Tweaked.bat
  2. Network.reg
After downloading these files, first run the Network.reg file. It will prompt a warning window, select "yes".
Then Right click on the file "Network Tweaked.bat" and select "Run As Administrator".
After doing this, restart your computer and see the difference.

Before applying this tweak, back up your registry to prevent any loss.

This is a knowledge based article. CyberTechBlog.tk is not responsible for any loss occurs.

Twitter Delicious Facebook Digg Stumbleupon Favorites More