ISRO’s Bhuvan vs Google Earth

ISRO Logo

The India Space Research Organisation has done a lot for the advancements of Space Research & Administration in India. ISRO created history by the launch of Chandrayaan. And it has established two main Space Systems: INSAT & IRS & has developed two satellite launch vehicles PSLV & GSLV to place INSAT and the IRS satellites in the required orbits.

Now, ISRO is up with Bhuvan to compete with Google Earth. “Bhuvan” is a sanskrit word meaning “Earth”. Bhuvan will provide services similiar to Google Earth & Wikimapia, but it will be confined only within India.

Bhuvan has some special features which sets it aside from Google Earth & Wikimapia. It will have a better zooming efficiency, multilayer viewing technology, and it will update its data yearly unlike Google Earth & Wikimapia which update their data in 4 years. Using the multilayer technology, we can see data from the past dates also!

According to a article at TOI:

Bhuvan allows you to zoom far closer than the aerial view from a chopper. If Google Earth shows details upto 200 meters distance and Wikimapia upto 50 meters, Bhuvan will show images upto 10 meters, which means you can easily see details upto a? three floor high building and also add information.

And the last fact, ISRO’s Bhuvan will be using indian satellites.

Here’s a table of comparison of Google Earth & Bhuvan from Wikipedia:

Feature Google Earth Bhuvan
Max Zoom 200m 10m
Layer Single Multi
Update Frequency 4 yrs 1 yr
View Viewing from only one date. Options for viewing from different dates.
Source (Satellite) Commercial/International Indian
Imagery World World

I hope to see this ISRO’s new innovation go live soon. :)

3 Uncommon Internet Errors | Error 103, 104, 105

Error 103?104? 105? or 404?
Are you suffering from any of these errors?

Error 103: This error occurs when your computer or router is not able to find the internet connection. This error usually results by fault in the settings of the modem/router, and is the most popular error on DLink Modems and Routers.

Solution:

  1. Try “https” instead of “http” in the URLs.
  2. Make sure your router or modem is configured correctly and your firewall is not blocking your internet connections.
  3. Reset your modem or router, and reconfigure it properly.

Error 104: Also appears as Error 104(ERR_CONNECTION_FAILED). This error occurs when your computer is not able to establish a connection to the server.

Solution:

  1. Check if your internet connection/gateway connection is connected.
  2. Use a proxy server in your router.
  3. Take help of your ISP.

Error 105: This error occurs when the TCP connection to the server times out. This error occurs when there’s a big load on your network, your speed is too slow or your server is down.

Solution:

  1. Check if your LAN is overloaded.
  2. Restart your router or modem.
  3. Reconfigure your router modem.

Call for FREE to over 40 Countries

Yeah, now its possible to call for free over the net to over 40 countries, including India, China, US & Canada…!

While browsing the WWW, I came through a VOIP service called TuiTalk, which allows users to call for free to over 40? countries. (Click here to see the listed countries)

TuiTalk gives 6 free calling minutes to its users per day, these minutes are automatically added everyday to the user’s account. TuiTalk provides its users with free calling minutes for watching advertisements which are automatically displayed when a call is being made.

TuiTalk has recently released TuiTalk Mobile for its Mobile Users. The TuiTalk Mobile currently supports Windows Mobile and iPhone.

Click here to start talking for FREE

Top 10 Trojans of All Time

1. NetBus

It was created in Delphi by? Carl-Fredrik Neikter, in 1998. It is a software for remotely controlling a system which runs Microsoft Windows. Not only remote control, it can also be used as a backdoor. Like any other trojan, NetBus also has 2 components: the client and server. The server infects the host computer and the client is used to control it.

2. Back Orifice

Back Orifice’s main purpose is to remotely control a Microsoft Windows Powered system. It has the potential of being used as a RAT (Remote Administration Trojan). It is widely used by “Script Kiddies” due to its easy installation and GUI features. The name “Back Orifice” derives from “Microsoft BackOffice Server“. According to the group, its purpose was to demonstrate the lack of security in Microsoft’s operating system Windows 98. BO was created in Delphi.

3. Sub7

Sub7 or SubSeven is a popular backdoor program and RAT. It is mainly used for causing mischief, but it can also be used to steal credit card information and other such confidential data. Its name “Subseven” is derived by spelling “Netbus” backwards as “SubTen” and replacing “ten” with “seven“. Sub7 is less stable than Netbus, but has more features than it.

4.Beast

It is a Windows-based backdoor trojan program (RAT). It is capable of infecting all Windows OSs. Like most of the trojans, it is also written in Delphi, by Tataye, in 2002. Beast has many unique features, it was one of the first trojans to use the “Reverse Connection” and it used “Injection Method” for its DLL. Its unique features made it popular.

5. ProRat

It is a Turkish-made, Windows-based RAT, made by the PRO Group. It comes in two versions: free and paid version. The free version cannot perform operations on computers present on the WAN, but only on LAN. Its server is known for being almost impossible to remove without up-to-date antivirus. It has many features & it can perform many malicious operations on the victim’s computer. It also has a server creator which enables users to create servers which are undetectable and provides other advanced features.

6. Zlob Trojan

Also known as Trojan.Zlob is a trojan horse which masquerades as a needed video codec in the form of ActiveX. After a victim installs it, it displays popup-ads with a similiar appearance to that of the Microsoft Windows warning pop-ups, informing the user that their computer is infected with a spyware, clicking on these pop-ups starts the download of fake anti-spyware programs.

7. SpySheriff

As the name suggests, it claims to be an anti-spyware program, but it is actually a malware. It gives the infected computers, fake spyware and threat alerts and prompts the user of the infected PC to buy the program. SpySheriff is sometimes not even detected by actual spywares. It is very difficult to remove SpySheriff from the computer which it has infected. It causes many problems, including the Blue Screen of Death!

8.Vundo

Also known as Vundo Trojan, Virtumonde, Virtumondo or MS Juan, is a trojan horse that causes pop-ups & advertisements for Rogue Security softwares and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook. Vundu causes your browser to show pop-ups from time-to-time.

9.Turkojan

Turkojan is a RAT and spying tool for Microsoft Windows. It is not detectable by many AVs and only up-to-date antivirus programs can detect it. It is very much similar to ProRat in features, but has some plus and minus.

10. Trojan-Downloader.Win32.Kido.a

It is a Windows DLL file, it copies its executable file with random names to “Program Files“, “Temp“, “Special Folder” & “System“. It also registers its executable file to the registry to ensure that it is launched automatically at system start-up. It also modifies registry keys to make it impossible to boot into “Safe Mode“.
Its removal is not so easy if you don’t have an up-to-date Antivirus Software. The removal procedure includes some binary editing in registry.

Detect Invisibles on Yahoo

Hello guys, troubled of invisibles on Yahoo? Want to chat with persons who always signin as invisibles?

Thats the case with many of us, our friends are invisible and we aren’t able to chat with them. In this post, you’ll be learning to detect the invisibles!

There are two ways of doing it:

  1. Yahoo Invisibility Detection sites
  2. Using Yahoo’s Resources

1.Yahoo Invisibility Detection Sites:

I’ve found many sites which helps you to see which of your buddies are online Some of these sites are:

These site are very easy to use. Just enter the ID you want to trace and get the results.

2.Yahoo Resources

Here are some bunch of URLs that can be used to detect invisibles, just replace “[username]” with the username you want to detect :

  1. http://mail.opi.yahoo.com/online?u=[username]&m=g&t=0
    (Shows up a yellow smiley if the person is online and gray if the person is offline or invisible)
  2. http://mail.opi.yahoo.com/online?u=[username]&m=g&t=1
    (Shows up a button with ?Online Now? or ?Not Online?)
  3. http://mail.opi.yahoo.com/online?u=[username]&m=g&t=2
    (Shows an image with ?I am Online send me a message? or ?Not Online right now?)
  4. http://mail.opi.yahoo.com/online?u=[username]&m=a&t=0
    (Shows a text with ?[username] is ONLINE or NOT ONLINE?
  5. http://mail.opi.yahoo.com/online?u=[username]&m=a&t=1
    (Shows ?00? if person is offline and ?01? if he is online)

Don’t forget to replace the text in blue colour in the URL with the YahooID you want to trace!
Example: Take my YahooID “hack_minded” as an example, lets see the first URL:?http://mail.opi.yahoo.com/online?u=[username]&m=g&t=0
After the replacement it would appear as:?http://mail.opi.yahoo.com/online?u=hack_minded&m=g&t=0

Good Luck Detecting!

Multiple GTalk Simultaneously

Have Multiple Google Accounts?
And want to login with both of them on Gtalk on single PC?

This is what I wanted to do as I’ve got two Google IDs, so I found out the way to run multiple GTalks simultaneously…

How to do it:

  1. Create a shortcut to GTalk on your desktop (if you dont have currently).
  2. Go to the properties of the shortcut. There in the target, you’ll see something like: “C:\Program Files\Google\Google Talk\googletalk.exe”
  3. Add /mutex to that target line. Then the line would be : “C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex
  4. “Apply” it and then click “Ok”.
  5. Check out if it works, Enjoy Multi-GTalks!

Don’t forget to leave comments here if this works…[:)]

How this Works:
The mutex is short for mutual exclusion object. A mutex is a program object that allows multiple program threads to share the same resource, but not simultaneously.

So, in the hack above, we used nomutex (no-mutex) so to use the same resources simultaneously…

Budding Bloggers | Get a free domain and top class hosting

A blogger? You’re very lucky today as you are reading this Post!

Budding Bloggers is a program started by W3Mixx in association with GeniusHackers.com.
It is a golden chance for the Bloggers to get a free domain, hosted on a top class hosting.

In my view, the lack of a domain name and hosting is the biggest problem faced by all the bloggers. After switching to custom domain, I realized that all time that I spent blogging on blogging sites (namely Blogspot and WordPress.com) was just a waste. Thanks to Budding Bloggers for providing me with this HackersLane.com (yes, this blog is sponsored by BuddingBloggers.com).

Many bloggers are late to realize the need of a custom domain, but at some point, they realize that. So, be early and apply for the “Budding Bloggers” program. (click here to apply)

What you get from this program:

  • A domain of your choice pre-installed with WordPress powered blog.
  • 200 MB Hosting Space.
  • 10 GB Bandwidth.
  • 1 MySQL Database (applicant can request a add on).
  • 1 FTP (applicant can request a add on).
  • 1 Mail Account (applicant can request a add on).
  • Custom reviews of your design.
  • Adsense optimization for maximum profits.
  • Search engine optimization services.

And…This all is provided to you for free. There’s no hidden fees.

TrueCrypt- For All Your Encryption Needs

TrueCrypt is a free, open-source, disk encryption software which protects your disks/files from unauthorized access. It is a software with bundles of features, simple and advanced. Its main features are:

  • Creation of virtual encrypted disks (&) mounting them as real disks.
  • Encrypting the entire HDD or a partition of HDD.
  • Encrypting a whole removable drive, such as USB Flash Disk.
  • Encrypted Disks can contain Hidden OS.
  • Encrypted disks can be made hidden, so that you’re not forced by anyone to reveal the password and view your files.
  • TrueCrypt Volumes cannot be identified, it will appear as an unknown file. (Unless you have the TrueCrypt Software directly installed on your PC, and the format of your volumes is shifted to .tc instead of anyfiles( .*).
  • TrueCrypt supports the following algorithms:
  1. AES-256
  2. Serpent
  3. Twofish

I myself have tried TrueCrypt on my USB and found it super!
You can get more information of TrueCrypt from its official site: http://www.truecrypt.org

Download TrueCrypt:

  1. From Easy Share: Click Here!
  2. From Easy Share: Portable Version– Click here!