Monday, October 26, 2009

Indian Currency full proof safty feature.


The safty features which are built now on Indian currency notes are not permanent tney could be still forged, but i have an idea to make it full proof!
The digital copy of any thing is nerly equal to the original or sometime better.
Anything which could be printed could be copied and counterfited.

The idea is to weave it like cloth with nylon fibers having RBI and India marked on the fibers and also embeded bar code on the fibers. Then embed a SIM card of microscopic size which reads out and prints its value in screen and when in a bundel it comples a circuit while counting it with a counting machine and itts authentication is registered, if a counterfit note is present the circut is not complete and a alarm is activated and the counting is stoped and the fake note is removed and a the counting continues and after that the value is displayed and a original note is replaced by the fake and the fake is collected in a box and if this is done all around and in each and every Bank of India, the fake notes will be removed and a complete eradication to forgery.


Wednesday, October 21, 2009

Touchtop a QWERTY Ketboard replacement.







The Touchtop is the replacement of a QWERTY Keyboard which uses the touchpad like the "iphone" from Apple. A user can configure the keys according to his needs , choose the language options, select keys for gamming, media usage for playing movies,CAD and various other applications. The keyboard will be on a LCD or LED screen-touchscreen senors will provide the touch out put like a "i phone".People are now getting fanatic about touch and this is the time to replace the manual input device with a touch pad and remove the clutter from the screen and use it just to view the output.

Touchtop a Dual Screen Laptop



My Code7 Windows 7






My Code7 Windows 7


My idea of a Operating system installation medium. We use CD/DVD which on excessive usage becomes scratched and bad sectors appear but if we change the medium to a pendrive it could we used for a long duration of time and piracy could be stoped because the operating sytem will be installed after you provide the valid password and that could be copy protected. Another safty feature which is included is GPS tracker which helps the company to locate the customer and provide coustmer support and monitor the spread of the market. If OS could only run from the Pendrive and after removal the computer only has the storage function then its secure from hacking and data theft as when you take your OS out the computer does start but shows a flashing message that please connect the OS Drive to the system.

Wednesday, October 14, 2009

Forget computer hacking, your brain may be next target!Brain Hacking



Forget computer hacking, your brain may be next target!
Hackers who command your computer are bad enough. Now scientists worry that someday, they'll try to take over your brain.
In the past year, researchers have developed technology that makes it possible to use thoughts to operate a computer, maneuver a wheelchair or even use Twitter — all without lifting a finger. But as neural devices become more complicated — and go wireless — some scientists say the risks of “brain hacking”should be taken seriously.“Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future, ”said computer security expert Tadayoshi Kohno of the University of Washington. “But if we don't start paying attention to security, we're worried that we might find ourselves in five or 10 years saying we've made a big mistake. ”For example, the next generation of implantable devices to control prosthetic limbs will likely include wireless controls that allow physicians to remotely adjust settings on the machine. If neural engineers don't build in security features such as encryption and access control, an attacker could hijack the device and take over the robotic limb. “It's very hard to design complex systems that don't have bugs,”Kohno said. “As these medical devices start to become more and more complicated, it gets easier and easier for people to overlook a bug that could become a very serious risk. It might border on science fiction today, but so did going to the moon 50 years ago. ”
Some might question why anyone would want to hack into someone else's brain, but the researchers say there's a precedent for using computers to cause neurological harm.
In November 2007 and March 2008, malicious programmers vandalized epilepsy support websites by putting up flashing animations, which caused seizures in some photo - sensitive patients.
AGENCIES BRAIN STORMING: As neural devices go wireless, hackers might try to manipulate deep brain stimulators or electrode systems for controlling prosthetic limbs
Publication: Times Of India Hyderabad; Date: Jul 20, 2009; Section: Times Business.

Blog Archive

About Me

My photo
Jhansi, Uttar Pradesh, India
The researcher, for life on other planets existence.I believe that life in the universe is the cause of life on Earth. Life in other forms do exist. Those whom we call Gods were Genitic Engineers and of Alien Origin they came here and spread life after life was destroyed on other planet. No smoking, no drinking,like to eat chocolates!