Saturday, 29 March 2014

15 Awesome, Useful Internet Tricks


1. For clumsy fingered folks, if you accidentally close a tab on Google Chrome, press Control+Shift+T and it’ll come back from the dead.
2. If you’re in a particular country that can’t access important content on US websites like Hulu or Netflix, Firefox and Google Chrome offer a free extension called Media Hint that can have you watching Orange is the New Black and other American exclusives in no time.
3. Control+F or Command+F will allow you to find specific terms on a page. If only life had a version of this for when we lose our keys, phone, dignity, etc.
4. Want to surf the web in private with no recording of your web habits? For Firefox users, press control+shift+p, or for Chrome it’s control+shift+N, and you’ll be browsing off the record. This isn’t just for porn watching purposes as one might think, but for several other benefits such as websites that track your cookies and use ‘em to their advantage (I’m looking at you, hotel & airline companies). This simple incognito window defeats their swindling ways.
5. If you hate YouTube’s (or other website’s) ads before the start of your videos, Adblock Plus is what you need in your life. It’s basicallylike having Dikembe Mutombo protecting your eyes from any type of advertisement.
6. If you put define: in front of a word and Google it, you’ll get that word’s definition.
7. What you type into the URL bar can be surrounded by www. & .com by pressing control + enter.
8. For more specific search results, try utilizing the AROUND feature. It allows you to find separate phrases, not just mentioned in the same article or page, but inside of a specific amount of words apart. For example, if you wanted to find writings about ‘Kanye West’ and ‘pizza’ within 12 words of each other, your search would look like this:
“Kanye West” AROUND (12) “Pizza”
Having the terms you’re searching in quotation marks, the wordAROUND written in ALL CAPS and the number in parenthesis are all necessary for this to work.
9. Another way to improve search accuracy is by taking advantage of the minus sign. E.g. Selena Gomez -Bieber. Boom! – you’ll get all the glorious Selena results without any of Justin’s douchey, mop bucket urinating shenanigans killing your vibe.
10. If you’re too lazy to lift a finger and click on your desired tab, control+tab (or control+shift+tab) will switch you between ‘em. As a lethargic tab hoarder, this is a great way to minimize hand movement while allowing that article from three weeks ago, that you swear you’re going to read, to remain open.
11. Corrupt A File is an enabler that can be a procrastinator’s best (or worst?) friend, allowing them to corrupt a file and make it seem like they did their work on time, but it’s unfortunately malfunctioning.

12. You can find a lot of textbooks on Google if you enter their title, then the desired file type. So an example would look like this: Book Title filetype:PDF

13. Too lazy to get up and grab your glasses? Control + or control – will allow you to adjust text sizes larger or smaller.
14. Need a disposable e-mail to avoid putting yourself at risk for spam? There’s a place called 10 Minute Mail that’s pretty self-explanatory.
15. If you’re going to do online shopping, try leaving your desired purchases in your cart for a while, and eventually you’ll get some type of discount code in an email that gives off desperate ex vibes, borderline begging you to finish the purchase. (This doesn’t ALWAYS work, but it happens enough that it’s worth trying if you don’t need whatever you’re ordering hastily.)

Thursday, 27 March 2014

How to automatically disable Wi-fi on an android device when it goes into sleep mode.


There probably isn't any reason for your Android phone's Wi-fi connection to remain active while not in use as it continues to drain the battery.

Though, disabling Wi-fi on devices with 3G / 4G connection, will only increase data consumption and will probably do no good to the battery life unless it's configured not to sync on the mobile connection.
Therefore, this can only be advised on a Wi-fi only Android device such as Tablet.So having taken that into consideration, here's how to go about it.
  1. Navigate to the Wi-fi settings
  2. Select Menu and choose Advanced
  3. Use the “Keep Wi-fi on during sleep” option.
  4. Finally, choose between the three settings available i.e Always,
    Only when plugged in &
    Never.
Note »
*. ‘Always’ mode :
In this mode,the 3g or 4g connection is not in use.
However, it's a big threat to the battery life.
*. ‘Never’ mode : In this format, the Wi-fi connection will be cut off once the Tablet goes into 'sleep mode'.
But note, it doesn't cut off immediately as it takes a few sec. to do so.

Wednesday, 26 March 2014

Your tongue is the strongest muscle in your body.

This fact is up for debate, so let me save you the hustle. See, a number of muscles in the human body could lay claim to this title, depending on how you measure strength.
Tongue-strongest-muscle
If you were looking for the muscle that can exert the most force, the soleus (calf muscle) would emerge victorious, according to Gray’s Anatomy (the book, not the TV show). Without the soleus, we wouldn’t be able to stand, walk or show some dance moves. We would always be falling over ourselves if this muscle was not continuously pulling.
What about the muscle that can exert the most pressure? Maybe it befits the title, maybe not. The masseter, aka jaw muscle, has no rival in delivering the greatest amount of pressure, according to the Clinical Oral Science book. This is the muscle that enables you to chew and clench, and boy, can some people bite hard.  Richard Hofmann of Florida made his way into the Guinness Book of Records in 1986 by registering a bite strength of 975 pounds, or 442 kilograms!
There are those who say the myometrium (uterine muscle) – used in childbirth – are the most powerful. However, this is discounted since the muscles are not used often or depend on some biochemical and hormonal factors.
So, where does this leave the tongue? The tongue can be said to be the strongest muscle in terms of versatility. This amazing body part combines its elasticity and force to enable us to speak, eat, lick or kiss – attributes you’ll probably need on your first date. In that regard, the tongue can be said to have no rival in terms of its deftness.
                                                                                                                 SOURCE

Canada has more lakes that the rest of the world put together.

Most of the lakes in the world are fresh water, with the majority of them located in the Northern Hemisphere. Canada is the second largest country in the globe, but this is not all it has to brag about.
Canada-has-most-lakes-than-the-rest-of-the-world-combined
Of all the natural lakes in the world, Canada is home to a staggering 60 percent of them. Thought Finland with almost 190,000 lakes was amazing? Well, it doesn’t even come close to Canada whose total number of lakes stands at about 3 million, with no official estimate of the number of smaller lakes. In other words, the country has more lakes than the rest of the countries combined.
561 of the lakes have a surface area larger than 100 sq. km, and four of the Great Lakes fall here. 9 percent of the total land surface in Canada is covered by freshwater.

                                                                                                              SOURCE

After sex, some men experience sadness and regret, which is known as Post-coital tristesse.

You probably have experienced it, but didn’t know what it was. Well, it’s actually normal, and the word for it is PCT (post-coital tristesse), ‘tristesse’ being another word for sadness. Not everyone experiences it and many sufferers may suffer great feelings of anxiety for five minutes or even 2 hours after intercourse.
Post-coital-tristesse
So, what leads to the depression? Post-coital tristesse is said to be as a result of the loss of semen and the exhaustion of the body following a round of sex. Rather than feel the usual relief that ensues (after dopamine is released), the body feels weak and exhausted. There’s even a Latin adage that goes, ‘omne animal post coital triste’ loosely translated to mean ‘all animals are sad after sex’.
Post-coital tristesse can be found in from the works of famous philosophers like Aristotle. After an orgasm, a hormone used in production of breast milk (prolactin – also found in men) rises high. In fact, it escalates as high as 400 percent during sex than during masturbation. The feeling can also be experienced of you have intercourse with someone you don’t care about.
                                                                                                        SOURCE

Teenagers who spend much of their time listening to music are more likely to be depressed!

Researchers at the University of Pittsburgh School of Medicine carried out a study in 2011 that gauged the depression statistics of teenagers based on the amount of time they spend consuming different forms of media. There was a total of 106 participants aged between 7-17 who were closely monitored for 2 months; 46 of whom had been diagnosed with depression previously.
Music-leads-to-depression-in-teenagers
They found out that teens who spend most of their time listening to music were 8.3 times more likely to be depressed as compared to those who did not spend most of their time listening. On the contrary, and this may not be the first time every teenager hears this, students who read books the most were found to be a mere 1/10 times likely to suffer from depression.
Music contributed to the most depression risks of all the media reported (TV, movies, Internet, video games and printed media). However, this is not to say that music leads to depression for everyone: for some, it might prove beneficial.
                                                                       SOURCE

Tuesday, 25 March 2014

The voice of Darth Vader was mute for 8 years when he was a kid!

Not many an actor can boast as fantastic a voice as James Earl Jones whose booming voicebox has become a characteristic feature of box office hits The Lion King (he played Mufasa), Star Wars films (Darth Vader) just to mention two of the most popular ones. It would thus come as no surprise that James Earl Jones has won the Golden Globes Awards and Tony Awards.
Darth-Vader-voice-was-mute-for-8-years
Who many know as Vader was born in the 1930s in Mississippi to an actor, boxer and chauffeur going by the name Robert Earl Jones and a Ruth Jones – mother, maid, teacher. His dad took off just after James was born, and he was raised by his grandma.
But what’s most surprising is that the one voice we all know as Vader’s couldn’t have come to be had James’ condition carried on into his adult years. After he moved to his grandparent’s farm in Michigan, the transition was so difficult for him that he developed a stutter and went mute for an entire 8 years! Not until he got to high school that a teacher took interest in the boy and worked together with him to overcome the stutter. After being exposed to poetry and showing a natural penchant for the same, his voice came back. Thanks be to that teacher!

The first eBay auction was for a broken laser pointer

Some eBay trivia…What was the name used originally by eBay? – AuctionWeb. When was the company founded? eBay was founded in 1995 as AuctionWeb, the same year that Amazon rolled out its service. What did the first auction entail? It was for a broken laser pointer that fetched at $14.83.
eBay-history
eBay and Amazon may be the giants today, but you might be amazed to know they were not the first ecommerce sites, at least according to reports. Online retailer NetMarket claims they made the first secure retail online transaction. This was in August 1994, and they sold a copy of Ten Summoner’s Tales Sting CD for $12.48, including shipping. Internet Shopping Network also contends the crown by claiming they had sold an item a month before NetMarket.
Anyway, the brains behind eBay is Pierre Omidyar, a French-born Iranian-American programmer. It flourished during the dot.com bubble and today is a multibillion dollar business that many can’t live without. The buyer of the said broken laser pointer was asked by Pierre via email if he was aware that the laser pointer was broken. His answer was:
‘I’m a collector of broken laser pointers.’
And the first product was moved.

Napoleon claimed he was abducted by aliens and scientists found a microchip in his head

Whether the claims by Napoleon Bonaparte are true or false remains divided opinion, with some rubbishing the claims while others believe the allegations hold some water. What’s even surprising is that scientists themselves think Napoleon was indeed abducted by the extraterrestrial kind.
Napoleon-Bonaparte-abducted-by-aliens
Scientists examining the remains of the French emperor said they were ‘deeply puzzled’ after stumbling upon a mysterious half-inch long microchip embedded in his skull, which suggested that he had once been kidnapped by a UFO. The revelations were made by Dr. Andre Dubois in a French medical journal following his study of the exhumed skeleton of the emperor after the French government offered him a $140k grant.
Here’s what he says:
The possible ramifications of this discovery are almost too enormous to comprehend. Until now, every indication has been that victims of alien abduction are ordinary people who play no role in world events. I was hoping to learn whether he suffered from a pituitary disorder that contributed to his small stature.’
But what he encountered next was extraordinary:
As I examined the interior of the skull, my hand brushed across a tiny protrusion. I then looked at the area under a magnifying glass – and was stunned to find that the object was some kind of super-advanced microchip.’
The microchip is believed to have been implanted when Napoleon was young. See, the emperor vanished from sight for several days in the month of July, 1794, aged 25. He later alleged that he had been held captive during the Themidorian coup, although no record of that exists. The proponents of this theory believe this is the time the abduction by aliens went down.

The marriage killer: One in five American divorces now involve Facebook

When your girlfriend insists on friending you on Facebook and you’re not for the idea, she may be trying to salvage your relationship – well, and marking her territory, of course. The social networking site has been blamed for rising cases of marital fallouts.
Facebook-responsible-for-many-divorce-cases
Divorce lawyers are of the view that the upsurge in popularity of social networks such as Facebook and Bebo is tempting people to cheat on their partners.  Suspicious partners have used the platforms to seek evidence of flirting and affairs that has led to high cases of divorce.  A survey by the American Academy of Matrimonial Lawyers found that divorce lawyers are reporting a surge in the number of cases that employ social media for evidence of cheating. Flirty messages on Facebook and emails are increasingly being quoted as evidence of undue behavior.
The 20 percent figure comes from a survey by a UK law firm some years back (2009) that showed 20% of its divorce filings arose from flings on the social networking giant. Additionally, the divorce lawyers from the American body established that Facebook was the biggest culprit, followed by MySpace and then Twitter.

Israel asked Albert Einstein to be their president in 1952.

It’s an offer many of us would not think twice about: ceremoniously heading one of the most wild card countries and freedom to flex their muscle as they squeeze their neighbor’s balls whenever someone eggs them. Not Albert Einstein though.
Albert-Einstein-Israel-presidency
Einstein was offered the chance to be president of Israel in 1952 but he turned down the chance. The Israeli presidency is an honorary role, and the scientist – a Jew but not an Israeli – pondered on what to tell the ambassador. He didn’t want to accept the offer and so decided to phone ambassador in Washington directly, rather than send a telegram.
The ambassador, however, asked Albert Einstein for a written statement, which the latter wrote in a moving manner. Sample this:
I am deeply moved by the offer from our State of Israel (to serve as President), and at once saddened and ashamed that I cannot accept it. All my life I have dealt with objective matters, hence I lack both the natural aptitude and the experience to deal properly with people and to exercise official functions. Therefore I would also be an inappropriate candidate for this high task, even when my old age didn’t interfere with my forces more and more. [...] … I wish from the bottom of my heart that a man is found who will be able to take over the hard and responsible office due to his work and his personality.’

Monetizing Blogs – The new way to make a living



Unless you are living under the rock for the past few years, you may have heard of the term “blogs” or personal diaries that are published online by millions of users across the globe. (Stats say that 71.5 million blogs exist as of today)

Jumping the blogging bandwagon is simple — pick your niche, choose a blogging platform (like Blogger, WordPress) and start writing. The moment you hit that publish button, your thoughts and commentary instantly reach hundreds and thousands of souls with little effort.


You can blog on virtually any topic from shoes to iPods to cooking to stuffed toys — think of a niche that you are passionate about, write consistently and you will automatically find readers in some corner of the world who’ll enjoy your writing and keep coming back for more.

People have quit their 9-to-5 jobs to take up blogging as a full time profession and they aren’t complaining.

And blogging is not just about sharing expression; it can even help pay your utility bills provided your blog gets a decent amount of traffic. (Monetisation can be tough if there’s just one person reading your blog — you)

There are generally two options to generate revenue from blogging — you either make money because of the blog or from the blog. In the former case, people (clients or potential employers) can offer you consulting and other paying gigs because you have a blog that reflects your knowledge and command over some subject.

The other more popular option, which we discuss in detail, is about making money directly from the blog through advertising, sponsorships, paid reviews, donations or even selling merchandise (like T-shirts and mugs).

The grand-daddy of all advertising programmes is Adsense from the same company whose name is synonymous with internet search — Google. Adsense is a contextual advertising programme meaning they scan your web page and deliver ads based on the context. For instance, a website on mobile phones is unlikely to see random ads of cars or cooking recipes — the ads will be about mobile phones or something related like ringtones and chargers.

Adsense is hugely popular in India for several reasons — first, it’s the brand “Google”. They have tonnes of advertisers in their kitty so your web pages are less likely to run out of ad inventory. Google’s contextual advertising system is solid and known to deliver mostly relevant ads — therefore the conversation rates are high keeping both the advertisers and publishers happy.

[Yahoo! and MSN are also expected to launch similar advertising programmes for Indian publishers sometime in near future.]

Text Link Ads and Adbrite are other good sources of revenue for bloggers. You place a link on your website / blog pointing to the advertiser’s page and are paid based on the time for which the link is live.

Next in the list are affiliate programmes like the ones offered by Amazon, Commission Junction and eBay. These programmes pay only when the click turns into a sale — the payouts are higher than standard advertising rates but the probability of earning review is relatively low because a lot of people may quit the advertiser’s site without making a purchase.

Services like Payperpost and ReviewMe are also receiving lot of attention in the blogging community. Bloggers are paid anywhere between $10 and $250 for writing product reviews on their personal blogs. The blogger’s fee is dependent on factors including blog popularity and the blogger’s niche. For instance, a gadgets blog may invite a higher rate than a parenting blog or even vice-versa.

Blogs have tremendous potential in terms of revenue provided you are willing to make a dedicated and consistent effort. There are people who have quit their regular 9-to-5 jobs to take up blogging as a full-time profession and they aren’t complaining.

Let non-English Visitors Read Your Website

Imagine someone coming to your site and leaving it the very next moment, not because the content was bad but because the site content was not written in his native language. It is a perfect case of a missed opportunity.Statistics show that the web has just 60% English speaking users. The rest may be from Russia, Japan, the Middle East or other regions, where people are either less comfortable reading English content or can’t read and interpret the language at all.By confining your website to English (or for that matter, just one language), you are missing a large group of people (or site traffic), who could have become potential customers or regular visitors if the website’s content had been written in their native language.
Most of the machine translation services like Google Translate, Altavista, Yahoo Babelfish, Lycos are powered by Systran software. So you can choose to incorporate either of these services and the results are pretty much the same in all cases.Too see how this kind of translation works, type labnol.blogspot.com and click the country flags on the top. Say you click the page of Russia, the site would be translated from English to Russian using Google Translate.If you are a small company who has little or no budget for translation, machine translation is the best option for you. Large companies with bigger budgets and international clients, hire professional translators to write their website content in different languages. There are a lot of translation companies on the internet, like World Lingo and Systran, that can do professional translation of your websites. With machine translation, you have little control over the grammar of the translated text, while in manual translation, the text is always grammatically correct.Machine translation is limited just to a few languages like French, German, Chinese, etc but you can easily find a human translator for languages like Hindi, Farsi, Telugu, Arabic or even Sanskrit.There’s also another option – where you download the translation software on your computer, translate content offline and publish the translated version of the pages on your site. This approach saves your visitor from requesting another site to do the translation. It looks slightly more appealing and professional, as the translated content is displayed using the same look n’ feel of your existing website. Systran, Babylon and WordWeb are popular softwares in this category.You would notice that a lot of popular blogs and websites have a replica of their English websites in French, Russian, Spanish and other languages, to expand their subscriber base and readership levels.There are basically two ways to add translation to your website: either you do it manually or let software do the job for you. We’ll discuss both the approaches here, weighing the pros and cons of each style.Let’s look at the software option first. The translation software is hosted on the third party website and a visitor to your website sends a request to that site, to translate the page for him. The translation is done in real time.

Top 15 Security/Hacking Tools & Utilities Want to Learn Penetration Testing

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.

Get Nmap Here

2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

Get Nessus Here

3. John the Ripper

Yes, JTR 1.7 was recently released!

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

You can get JTR Here

4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).

Get Nikto Here

5. SuperScan

Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.

If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

Get SuperScan Here

6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:

– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.

Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.

Get p0f Here

7. Wireshark (Formely Ethereal)

Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.

Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

Get Wireshark Here

8. Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

The best Layer 2 kit there is.

Get Yersinia Here

9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.

An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.

Get Eraser Here.

10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.

Get PuTTY Here.

11. LCP

Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.

A good free alternative to L0phtcrack.

LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.

Get LCP Here

12. Cain and Abel

My personal favourite for password cracking of any kind.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

Get Cain and Abel Here

13. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

A good wireless tool as long as your card supports rfmon (look for an orinocco gold).

Get Kismet Here

14. NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.

NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized “rogue” access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.

Get NetStumbler Here

15. hping

To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

Inside the LEO Doghouse: The Art of Expander Cycle Engines



If you go back several generations on my mother’s side of the family, you will find a famous artist named Charles Frederick Kimball. Also on my mother’s side of the family, in a different branch, a couple of generations later, there was a professional commercial artist. On my father’s side, my grandmother was a wonderful artist who painted mostly landscapes of the Mohawk and Hudson River valleys in upstate New York. And, of course, I’m married to an extremely talented artist. You would think with those bloodlines and that much exposure, I’d have a just bit of artistic ability myself. You would be wrong. I love art. I just can’t make it.


The closest thing that I come to visual expression is confined to Microsoft PowerPoint creations. However, within that narrow arena, particularly when it comes to engineering subjects, there is still fun to be had. What we’re going to do for this article is undertake one of my favorite pseudo-artistic hobbies and play with expander cycle engine schematics.

So, let’s start with a simple, happy little cycle called the Closed Expander Cycle. Most of what you need to know about this cycle is in the name. First, it is closed. That means that all of the propellants that come into the engine leave by going through the throat of the main combustion chamber thereby yielding the greatest chemical efficiency available. Later, we’ll see that the opposite of “closed” is “open.” Second, it is an expander. That means that turbomachinery is driven by propellants that picked up heat energy from cooling circuits in the main combustion chamber and nozzle. Typically, expander cycle engines use cryogenic propellants so that when these propellants are heated they change from liquid-like fluids to gas-like fluids. Turbines very efficiently make use of gas-like drive fluids. (Note that I keep referring to “fluids” rather than simply liquids and gases. That’s because it’s usually a good idea to deal with supercritical fluids in cooling tubes or channels. Phase changes can be unpredictable and lead to some odd pressure profiles.)


Above is a Microsoft PowerPoint masterpiece illustrating the Closed Expander Cycle rocket engine. Fuel and oxidizer come in from the stage and are put through pumps to raise their pressure. On the fuel side, the pump discharge is routed through the main fuel valve (MFV) to the nozzle and the main combustion chamber (MCC) cooling jackets. I’ve not shown the actual routing here. Typically, the MCC is cooled first and then, the now warmer fuel is used to cool the nozzle. The heat loads in the MCC are significantly higher than those in the nozzle. But whatever is the exact routing of the cooling fluid, the discharge, now full of energy picked up from the process of cooling, is fed into the turbines. The oxidizer turbine bypass valve (OTBV) shown in the diagram is a means for controlling mixture ratio by moderating the power to the oxidizer turbine. In some cases, if you have only one mixture ratio setting for the engine, you might be able to put an orifice here rather than a valve. The turbines are driven by the warm fuel and then the discharge of the turbines is fed through to the main injector and then into the combustion zone. On the oxidizer side, the routing is much simpler. The oxidizer pump discharge is plumbed through the main oxidizer valve (MOV) directly into the main injector. Within the MCC, you have the combustion of your propellants, the resultant release of energy, the generation of high-velocity combustion products, and the expulsion of these products through the sonic MCC throat and out the supersonic nozzle. Ta-da, thrust is made!

The closed expander is one of the most simple engine cycles that has ever been imagined. The venerable RL10 engine first developed in the 1950s and still flying today is based on this cycle (with the slight twist that there is only one turbine and the pumps are connected through a gear box – thereby eliminating the need for the OTBV). This simplicity is both the strength of the cycle and also it’s limiting feature. Consider the fact that all of the fuel – hydrogen in the case of most expanders – gets pushed all of the way through the engine to finally end up getting injected into the combustion chamber. All that pushing translates to pressure drops. It means that the turbines don’t have that much pressure ratio to deal with in terms of making power for the pumps. In other words, the downstream side of the turbine is the lowest pressure point in the cycle and that’s the combustion chamber. The result is that your chamber pressure can’t be very high. That means that the throat of your MCC is relatively large and then that means the expansion ratio of your nozzle and nozzle extension start to get limited simply by size and structural weight.


Also, note that all of the power to drive the entire cycle is provided by the heat picked up by the fuel in the MCC and nozzle cooling channels. This then becomes a limiting factor in terms of the overall power and thrust-class of the engine. As an engine gets bigger, at a given chamber pressure, the thrust level increases to the second power of the characteristic throat diameter, but the available surface area to be used to pick up heat to power the cycle only increases by that characteristic diameter to the first power. In other words, thrust is proportional to “D-squared” but, to a first order, turbine power is proportional to “D.” Thus, you can only get so big before you can’t get enough power to run the cycle. One means for overcoming this is to make the combustion chamber longer just to give yourself more heat transfer surface area. The European engine called the Vinci follows this approach. But even this approach is limiting if taken too far since a chamber that is too long makes for less efficient combustion and, of course, a longer combustion chamber also starts to get awfully darn heavy.

So, how big can a closed expander cycle rocket engine be? Well, that’s a point of recurring dispute and debate. I can only give my opinion. I would say that the closed expanding cycle engine most useful and most practical when kept to a thrust level of less than approximately 35,000 pounds-force.

Getting back to the notion of artistic expression, what then are the possible variations on the theme of the expander cycle engine? Well, the themes and variations are used to explore and potentially overcome perceived shortfalls in the Closed Expander Cycle. The first in this series is the Closed Split Expander, the portrait of which is below:


The shortfall being addressed here is the fact that in the Closed Expander Cycle all of the fuel was pushed all over the engine resulting in large pressure losses. In this case, some – usually most – of the fuel is pumped to a lower pressure through a first stage in the pump and then another portion is pumped to a higher pressure. Thus, the fuel supply is “split” and that’s the origin of the name. It is this higher pressure stream, routed through the fuel coolant control valve (FCCV) that is pushed all over the engine to cool the MCC and nozzle and to drive the turbines. The lower pressure stream is plumbed directly into the main injector. The theory is that by not requiring all of the fuel to be pumped up to the highest pressure, you relieve the power requirements for the fuel turbine. It is always the hydrogen turbopump that eats up the biggest fraction of the power generated in the cycle so this is an important notion.

Does this cycle help? Yes, some. Maybe. The balance of how much to split, what that split does to the efficiency of the heat transfer (less flow means possibly lower fluid velocities, lower velocities means lower heat transfer, lower heat transfer means less power…) makes it not always clear that you gain a whole lot from the effort of making the cycle more complex. The portrait, however, is nice, don’t you think? It has a realistic flair, a mid-century industrialist-utilitarian feel.

Next, wishing to express yourself, you can address the age-old issue of the intermediate seal in the oxidizer turbopump. Take a good look at the first two schematics presented here. You will see that the oxidizer pump is being driven by a turbine using fuel as a working fluid. This is a very typical situation with rocket engines, whether they’re expander cycle engine or other cycles. For example, this is the situation that you have in the RS-25 staged-combustion cycle engine and in the J-2X gas-generator cycle engine. What that situation sets up, however, is a potential catastrophic failure. You have fuel and oxygen in the same machine along with spinning metal parts. If the two fluids mix and anything rubs, then BOOM, you have a bad day. So, inside oxidizer pumps you usually have a complex sealing arrangement that includes a continuous helium barrier purge to keep the two fluids separate. For the next expander cycle schematic, however, we can eliminate the need for this complex, purged seal.


This is a Closed Dual Expander Cycle. It is still “closed” in that everything that comes into the engine leaves through the MCC throat. The new part is that it is “dual” in that we now not only use the fuel to cool, but we also use the oxidizer. Thus, we use heated fuel to drive the fuel turbopump and heated oxidizer to drive the oxidizer turbopump. For this sketch, I’ve used a split configuration on the oxidizer side with a portion of the flow being pumped to a lower pressure and routed directly to the main injector and another portion pumped to a higher pressure, routed through the oxidizer coolant control valve (OCCV), to be pushed through the regeneratively cooled nozzle jacket and then through the oxidizer turbopump turbine. I’ve done this since you’re likely running the engine at a mixture ratio (hydrogen/oxygen) of between 5 and 6. You wouldn’t want to push that much oxidizer through the nozzle cooling channels or tubes. Now, if you’re designing an expander with something like methane as your fuel so your mixture ratio lower, then maybe you can consider a non-split oxidizer side.

Note that with the dual expander approach I’ve gotten rid of the need for the purged seal package in the oxidizer pump and thus I’ve eliminated a potential catastrophic scenario (in the event of seal package failure). However, I’ve accomplished that at the cost of some cycle complexity. Also, cooling with oxidizer does not always make everyone happy. Whenever you have a cooling jacket (either smooth wall or tubes), you always have the potential for cracking and leaking. If you’re cooling with hydrogen, then a little leakage of extra hydrogen into a fuel-rich environment is a relatively benign situation. It happens all of the time. But what if you leak oxidizer into that fuel-rich combustion product environment? Well, some studies have suggested that you’ll be fine, but it makes me just a little uneasy. Then, also, you’re using heated oxidizer to drive your turbine. It can be done, but using something like oxygen to drive spinning metal parts requires great care. Under the wrong circumstances, a pure oxidizer environment can burn with just about anything as fuel, including most metals. So, for all your effort to eliminate the seal package in the oxidizer turbopump, it’s not clear to me that you’ve made the situation that much safer. However, despite these potential drawback, the schematic portrait itself has a certain baroque feel to it with the oxidizer side being positively rococo.

So, you’ve gone this far. Why not take the final plunge? Introducing the “Closed Dual Split Expander:”


By now, having stepped through the progression, you understand how it is “closed,” how it is “dual,” and how it is “split” (on both sides this time). It’s not practical in terms of being a recipe for a successful rocket engine design for a variety of reasons balancing complexity versus intended advantages, but it’s an impressive schematic. To me, it has a gothic feel, almost like a medieval cathedral with glorious flying buttresses and cascading ornamentation that just leaves you dazzled with details.

So, we’ve wondered off and into the weeds of making expander cycle portraits for the sake of their beauty rather than necessarily their useful practicality. Let’s return to the more practical realm and question that which has been common to every cycle thus far presented. It’s been the word “closed.” Does an expander cycle engine have to be a closed cycle? Of course not! Once we’ve made that observation, we come to a very practical option. Introducing the “Open Expander Cycle:”


This biggest difference between this and every other previous schematic is the fact that the working fluid driving the turbines is dumped into the downstream portion of the nozzle. This is a much lower pressure point than the main combustion zone. The first thing that most people think when they see this cycle is that it must be a lower performance engine. After all, you’re dumping propellant downstream of the MCC throat. And, yes, that is an inherent inefficiency within this cycle. Whenever you expel propellants in some way bypassing the primary combustion, you lose efficiency. However, here is what you gain: lots and lots of margin on your pressure budget. Because I don’t have to try to stuff the turbine bypass into the combustion chamber, I can make my chamber pressure much higher. In a practical sense, I can make it two or three times higher than in a simple closed expander cycle engine. What that allows me to do is make the throat very small and that, in turn, provides for the opportunity for a very high nozzle expansion ratio within reasonable size and structural weight limits. The very high expansion ratio means more exhaust acceleration and, in this way, I can get almost all of the way back to the same kind of performance numbers as a closed cycle despite the propellant dump.


Here, however, is the really cool part of the open expander cycle: I can leverage the high pressure ratio across the turbines such that I can get more power out of a given heat transfer level in the cooling jackets. Up above, earlier in this article, I suggested that there was a practical thrust limit for closed expanders of approximately 35,000 pounds-force (my opinion) and this was due to the geometric relationships between thrust and heat transfer surface area. For an open expander, I can design high-pressure-ratio turbines for which I don’t need as much heat pick up to drive the pumps. Thus, I can make a higher thrust engine. How high? Well, my good friends from Mitsubishi Heavy Industries (MHI) and the Japanese Space Exploration Agency (JAXA) have designed a version of this cycle that gets up to 60,000 pounds-force of thrust and I’ve seen other conceptual designs that go even higher. The folks in Japan already fly a smaller version of this cycle in the LE-5B engine that generates 32,500 pounds-force. Note that they often refer to this cycle by another name that is very common in the literature and that’s “expander bleed cycle,” with the “bleed” portion describing the overboard dump into the nozzle. I prefer the designation of “open” since it clearly distinguishes it from the “closed” cycles illustrated earlier.

We have just about reached the end of this article but we have not reached the end of possibilities with expander cycle engine schematics. That’s what makes them fun and, in my mind, kind of like playing with art. You can come up with all kinds of combinations and additions. For example, what if you took an expander cycle and added a little burner? Over and over I’ve said that the limiting factor for a closed expander is the amount of heat that you pick up in the cooling jackets. Well, okay then, let’s add a small burner that has no other purpose than to make the turbine drive gas hotter. The result looks something like this:


This cycle has a gas generator but is not a gas generator cycle since the combustion products from that GG are not used to drive the turbines directly. Rather, the GG exhaust is piped through a heat exchanger and then dumped overboard. Yes, you lose a little of your performance efficiency because it’s no longer a closed cycle, but the GG flows can be small and what you get out of it is a boost in available turbomachinery power and therefore potential thrust. That’s my own little piece of artwork to demonstrate and anyone can do it.


Remember Bob Ross from Public Broadcasting? I loved watching his show and, as I’ve said, I can’t paint worth a lick. But his show was relaxing to watch and listen to and he was always so relentlessly supportive. There never were any mistakes. Everything could be made all right in the end. And anyone could make pretty mountains and happy little trees. I’d like to suggest that the same is true about my little hobby of assembling happy little expander cycle schematics. No, most will probably never be built or fly and the schematic portraits will probably never grace the walls of MOMA, but that’s okay. My artist grandmother used to tell me that sometimes the purpose of doing art was not necessarily found in the end product, but instead as part of the journey of creation.

Sunday, 23 March 2014

Eminem was one of the highest scoring Donkey Kong players in the world!

Marshall Mathers III, aka Eminem, was proud to let the world know that not only does he engage in some Donkey Kong guilty pleasures, but also that his abilities belie those of the very best – the world over. Here’s a tweet he sent in December 2009:
Eminem-world-class-donkey-kong-player
I just want everyone to see my actual new high Donkey Kong score. Wiebe beware!’
This was in reference to the then king of Donkey Kong, Steve Wiebe, an everyday engineer whose mission to vanquish the game warranted the release of a documentary. In March of the following year, Eminem followed up his earlier tweet with this other one:
To my fellow Kongers, peep the new high score. Just imagine if I had more spare time.’
At the time, he had a score of 465,800 – one deemed world class and just enough to land him in the Top 20 category. The rapper had a sit-down with Rolling Stone during which he officially proclaimed that he is a vintage video game junky. He’s spruced up his study lobby with Donkey Kong, Space Invaders and Frogger.

Steven Spielberg put every actor in Saving Private Ryan through army training… except for Matt Damon!

The film Saving Private Ryan was precipitated by a monument Robert Rodat saw in 1994 in Putney Corners, New Hampshire that memorialized the individuals killed during the Civil War in Vietnam. Rodat observed that names of eight siblings who all died during the American Civil War and inspired by the story, he did a bit of research and made a decision to write a story resembling the World War II set.
Saving-Private-Ryan
Rodat was to then submit the script to Mark Gordon – the producer – who liked it but only after 11 redrafts. Gordon then shared the fine copy with Hanks who also liked it and gave it to Spielberg to direct. The date for shooting Saving Private Ryan was thus set for June 27, 1997.
Before the shooting kicked off though, a number of the film’s stars had to endure boot camp training for ten days and this was overseen by Marine veteran Dale Dye and a California company that trains actors for military portrayals. The lot included Vin Diesel, Edward Burns, Tom Hanks and Giovanni Ribisi. However, Matt Damon was intentionally excluded from the military drills and this made the rest of the group resent him. The film’s epic success could be attributed to this kind of meticulous attention to detail and diligence.

Isaac Newton invented calculus because his University closed due to the bubonic plague!

Isaac Newton – the scientist who died a virgin – was born on January 4, 1643 or Christmas Day of the previous year based on the Julian calendar that was in use then. Newton was sent to Trinity College, University of Cambridge after proving he couldn’t make as good a farmer as his father.
Isaac-Newton-invented-infinitesimal-calculus
In January 1665, he received his BA degree just as the bubonic plague was hitting London. The university was forced to close down later in the same year, advising its students to escape to the sparsely populated countryside. The young man went back to his family’s farm until the plague had passed.
Not being much of a farmer, what would idle Isaac Newton do? It is then that he began working on a branch of mathematics called infinitesimal calculus. By 1687, he was introducing it to his students at Cambridge, the first lot to experience the wrath of this head-scratching branch of mathematics.

Saturday, 22 March 2014

A woman in Russia once caught her boyfriend cheating when she saw his photo with another woman using street view on Google Maps.

A Russian woman was using Yandex Maps – Russia’s version of Google Maps’ Street View – when she switched to a mode that enables one to get a panoramic view of the area you wish to look closely. Marina Voinova was looking at a certain building’s exterior, but alas! She was shocked to see her boyfriend of 5 years with his arms around another woman.
Yandex-Maps-leads-to-couple-split
First I noticed a familiar silhouette. First I thought, ‘how can someone else look so similar to my Sasha?’ I looked more carefully, zoomed in and saw that it was indeed him. I realized that he was lying and cheating on me all this time.’
See, Russia’s Yandex Maps does not blur recognizable faces as Street View does. When she approached the fiancĂ©, he decided to come clean, blaming it on stupidity as opposed to love for the second woman. Miss Voinova could take none of it and eventually, they couple parted ways, thanks to Yandex Maps.

Beautiful women are more likely to give birth to daughters

Jessica Alba, Beyonce, Kim Kardashian (love her or hate her) – have one thing in common: they are blessed in the looks department and they’ve all given birth to daughters. This is the same reason many model mothers have daughters who follow in their catwalk footsteps: Yasmin Le Bon, Jerry Hall, you name them. These are real life examples to illustrate this fact.
Beautiful-women-bear-daughters
Dr. Satoshi Kanazawa of the London School of Economics evaluated data from a survey involving 17,000 babies born in March 1958 in Britain and followed them throughout their lives. Their teachers rated their attractiveness at the age of 7, and when they hit 45, they were asked about the gender of the kids they sired.
Those rated as attractive were more likely to have daughters than their not so beautiful counterparts, according to the journal Reproductive Sciences. Another study of 2,000 Americans established that women are growing more beautiful over the generations (they are, right?) since the pretty ones have more children than their plain counterparts – and a higher percentage of their children are girls.

Wednesday, 12 March 2014

Many cultures have the same belief that the Earth rests on the back of a giant turtle

Man has made giant leaps in a bid to understand the mysteries around him. Things like how continents shift, the shape of the earth, how mountains and canyons form and so on. Coming to the correct understanding did take a lot of trial and error, so sample this one.
Geoterrapinism-Theory
True story, even in this day and age: there are indeed people who believe that we live on the back of a giant turtle. There are other theories that also claim we live on the back of a serpent or elephant, but this post is just about turtle theory – apparently the most popular belief in this category of beliefs.
It is better known as the Geoterrapinism Theory. It was first brought to the European public attention in the 1600’s when a man going by the name Jasper Danckeaerts heard about it from some Native American he stumbled upon.
It is not just the natives who held this belief of the world resting on the back of a turtle – the Indian and Chinese cultures believed in it too.

How To Extract ISO File Into Computer Hard Disk Drive



I think maybe some of you especially the IT technical may know about ISO file. It is an image file which in fact “the image” of entire CD or DVD. It means all contents in CD or DVD can be represented in a single ISO image and it usually come in a big size.



I believe most people always perform burning process to extract the ISO files and save their contents in CD or DVD. But, I prefer to extract them and save their contents into computer hard disk. It is because I don’t need to spend money to buy a new CD or DVD when every time the version of the ISO file I downloaded from Internet had been updated by manufacturer.



What You Need
Daemon Tools Lite. Click here to download.



Before The Procedures

First of all, you must install the Daemon Tools Lite in your computer. I had installed it in myWindows Vista computer.
Double click to launch the Daemon Tools Lite installer –-> click Continue –-> you will see the interface below.




Click Next –-> click I Agree




Click radio button Free License –-> click Next –-> click Next –-> click Install –-> wait for installation process running




This is an optional step. You can install this gadget if you want but I choose not to install. So, I click Don’t Install


Then, you will see the interface below




Click to clear the sign in both check box –-> click Finish –-> close the web browserappears on your screen.



The Procedures

Now, you have done installing Daemon Tools Lite software. At this second stage, you will begin to extract the ISO file.
Double click the Daemon Tools Lite’s icon in your computer desktop. See below




Then, you will see the interface below. Right click on Device 0: [F:] No Media –-> clickMount




The Open textbox like below will pop up on your screen.




Find and click the ISO file you want to extract –-> click Open –-> wait to allow image to be mounted.


Then, you will see the AutoPlay box below –-> click Open folder to view files.



Note:
If you don’t see the image above, right click on Device 0: [F:] KB3AIK_EN –-> click Open in File Explorer. See below




You will see the contents of ISO file like below.




Create a new folder in your computer desktop –-> copy and paste the contents of ISO file in step 6 into the folder.



Now all done.