Monday, December 5, 2011

Can you crack it? Solution



Click read more to see how I did it, but I suggest you have a good attempt beforehand. It’s a nice little reverse engineering exercise.

SPOILER – THIS IS THE SOLUTION. RUN AWAY AND HIDE IF YOU WANT TO HAVE A GO YOURSELF.


Stage 1 – Reverse engineering and decryption
Ok, so from the main page, I wrote out all the hexadecimal into a binary file. Like this:

EB04AFC2BFA381EC0001000031C9880C0CFEC175F931C0BAEFBEADDE02040C00D0C1CA088A1C0C8A3C04881C04883C0CFEC175E8E95C00000089E381C3040000005C583D414141417543583D42424242753B5A89D189E689DF29CFF3A489DE89D189DF29CF31C031DB31D2FEC0021C068A14068A341E88340688141E00F230F68A1C168A1730DA8817474975DE31DB89D8FEC0CD809090E89DFFFFFF41414141

I sat around for a good few minutes just reading the hex. However, I noticed something! “EFBEADDE”. This is the little endian storage of “0xDEADBEEF”. Tada, it’s probably code. So shoving it into a disassembler, I get some nasty x86 code. After whimpering at the sight of it, I cracked on and reversed engineered the code into lovely C.

But there was something missing! In the x86, it does a near call which pushes the return address onto the stack. This sneaky little program then pops this off the stack and then sets it as the new top of stack. After the return address, a sneaky pop loads 0×41414141, the last 32 bit value in the file, and then checks it does equal that. Then, it does another pop… wait a second. There is no more defined data, and it is looking for a 0×42424242. So, realising I copied the HEX wrong, I set about correcting it. Except, I didn’t copy it wrong, the data was truely missing! I checked the site source for any html comments; nothing. After downloading the png image on the website (the image with the hex data), I open it up in a hex editor, and I recognise a base64 encoded message in the comments section which indeed turns out to be the missing data!

So further analysis proved that I have all the data required to decrypt and complete this puzzle. I wrote this program to do it:
Hide ▲

/*
http://www.canyoucrackit.co.uk decrypter (and encrypter)
Reverse Engineered by Davee

http://lolhax.org
02/12/2011
*/


#include
#include
#include

typedef uint32_t u32;
typedef uint8_t u8;

#define TABLE_SIZE (0x100)

u8 g_ciphertext[] =
{
0x91, 0xD8, 0xF1, 0x6D, 0x70, 0x20, 0x3A, 0xAB,
0x67, 0x9A, 0x0B, 0xC4, 0x91, 0xFB, 0xC7, 0x66,
0x0F, 0xFC, 0xCD, 0xCC, 0xB4, 0x02, 0xFA, 0xD7,
0x77, 0xB4, 0x54, 0x38, 0xAB, 0x1F, 0x0E, 0xE3,
0x8E, 0xD3, 0x0D, 0xEB, 0x99, 0xC3, 0x93, 0xFE,
0xD1, 0x2B, 0x1B, 0x11, 0xC6, 0x11, 0xEF, 0xC8,
0xCA, 0x2F,
};

static __inline__ u32 rotr(u32 data, u32 bits)
{
/* rotate right */
return ((data >> bits) | ((data & ((1 << bits) - 1)) << (32 - bits)));
}

void decrypt_data(u8 *table, u8 *data, u32 size)
{
int i;
u8 bl = 0, dl = 0, dh = 0;

/* do the mangle algorithm */
for (i = 0; i < size; i++)
{
/* read the table and swap bytes */
dl = table[i + 1];
dh = table[(bl + dl) & 0xFF];
table[i + 1] = dh;
table[(bl + dl) & 0xFF] = dl;

/* set bl */
bl = table[(dl + dh) & 0xFF];

/* do the decrypt (or encrypt...) of the data */
data[i] ^= bl;
}
}

void generate_table(u8 *table, u32 seed)
{
int i;
u8 seed_indx = 0;

/* stage 1: set table value as index respectfully */
for (i = 0; i < TABLE_SIZE; i++) table[i] = i;

/* stage 2: seed the table */
for (i = 0; i < TABLE_SIZE; i++)
{
/* update seed index */
seed_indx += (table[i] + (seed & 0xFF));

/* rotate the seed 8 bits right */
seed = rotr(seed, 8);

/* backup element */
u8 temp = table[i];

/* byte swap */
table[i] = table[seed_indx];
table[seed_indx] = temp;
}
}

int main(void)
{
int i;
u8 table[TABLE_SIZE];

/* do decrypt etc */
printf("Decrypter, by Davee\nhttp://lolhax.org\n\n");

/* generate the table */
generate_table(table, 0xDEADBEEF); //0xAFC2BFA3); //3A3BFC2AF);//0xDEADBEEF);

/* decrypt data */
decrypt_data(table, g_ciphertext, sizeof(g_ciphertext));

/* write decrypted data */
FILE *fd = fopen("decrypt.bin", "wb");

/* check for error */
if (fd == NULL)
{
/* rage */
return printf("fuuuuuuuuuuuuuuuuu (aka cant open decrypt.bin)\n");
}

/* write */
fwrite(g_ciphertext, 1, sizeof(g_ciphertext), fd);
fclose(fd);

printf("done. check out decrypt.bin\n");
getchar();
return 0;
}

It successfully decrypted the message and decrypt.bin contained: “GET /15b436de1f9107f3778aad525e5d0b20.js HTTP/1.1.”. Ok, maybe I’m not done, following this GET request I got to “stage 2″. A VM in javascript.


Stage 2 – Javascript VM
This, is kind of like an emulator, you get a description of a “processor” and you follow the specification. If you do it correctly, you get the answer, easy.

I started off simply decoding the instructions and writing them to a file, like a disassembly. Then once I was happy that it was decoding it correctly, I scrapped together a simple tool interpret the instructions and then dump everything. Code below:
Show ▼

Then, the output_hex.bin contained another GET method: “GET /da75370fe15c4148bd4ceec861fbdaa5.exe HTTP/1.0″. Ok, cool.


Stage 3 – License check
After downloading and having a quick peek at the assembly, I saw it didn’t do that much. After running, it moaned about no hostname, so naturally, I set it to “canyoucrackit.co.uk” BAM, it screamed at me again, complaining about a license.txt.

I fully disassembled the executable and I quickly found the check, it was doing a scanf of a string from the license onto the stack and performing a check of the first 4 hex bytes.

This check looked for the values 67 63 68 71 in LE. This, translates to gchq, a UK government organisation. Regardless, I stormed through the rest of the code and saw that it does a “crypt” call on the license + 4, with a salt (or key or w/e).

char *c = crypt(license+4, "hqDTK7b8K2rvw");

if (strcmp(c, "hqDTK7b8K2rvw") == 0)
{
valid_license = 1;
}

Now, I know for a fact that crypt is a one-way function, so I didn’t bother with figuring out the original license text needed. If you guys know me, I like exploits. I saw one earlier on aswell. I jumped right back to the “scanf” call onto the stack and checked if I can cause a buffer overflow. It turned out I could! valid_license was stored further on the stack, so overflowing with a big string can set valid_license to non-zero passing that check! huzzah!

I used this license:

gchq------------lolhax.org------Davee-----------

So now, running the application I got this result:

keygen.exe

loading stage1 license key(s)...
loading stage2 license key(s)...

request:

GET /hqDTK7b8K2rvw/2d2d2d2d/686c6f6c/6f2e7861/key.txt HTTP/1.0

response:

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Sat, 02 Dec 2011 23:44:59 GMT
Connection: close
Content-Length: 315

Not Found
HTTP Error 404. The requested resource is not found.

Error, 404, odd. It tried to request “GET /hqDTK7b8K2rvw/2d2d2d2d/686c6f6c/6f2e7861/key.txt HTTP/1.0″. I recognise those HEX values. The first one looked the the hash check, the 2d2d2d2d, 686c6f6c and 6f2e7861 looked like data out of my license file. After confirming with the assembly, this information was true. the format of the license was:

[4 bytes header]
[8 bytes password]
[4 bytes first hex]
[4 bytes second hex]
[4 bytes third hex]
[0x18 bytes to bypass check]

Now, what the hell were these 4 bytes? They weren’t inside the application. I sat around, stressing over what these numbers are. I guessed a few of course, no luck. After a nice chill and a cup of tea, it struck me. There was a spare value in the first executable, which the program just jumped over. There was also the VM’s firmware version which was not used. These 3 unreferenced values may be the answer!

So I plugged them in, and what do you know! I don’t get the answer. Such a perfect scenario, but I still fall victim to this challenge.

Later on though, I thought I should try plug it into the browser… well, what do you know. It worked.
Hide ▲

Pr0t3ct!on#cyber_security@12*12.2011+

Completed
The winners’ page takes you to an application form to apply for a position within GCHQ. Shame I don’t have a degree yet :P

How about that eh? It’s a nice little challenge and I hoped you all attempted it your best before reading ...

Saturday, November 19, 2011

5 Tools for Keeping Track of Your Passwords


This post originally appeared on My Life Scoop, where Mashable regularly contributes articles about using social media and technology for a more connected life.



Time and time again, we’re warned of the importance of having strong, secure online passwords. Phishing scams — where legitimate looking e-mails and websites try to trick you into entering in your sensitive login information to a bank site, e-mail host or social network — are bad enough when a scammer is able to compromise your account, but the result can be many times worse if you use that same password for a number of online accounts.

Likewise, when crackers breach servers for various web services and expose the user information to other ne’er-do-wells, your accounts could be at the fate of many shady characters.

That’s why it’s more important than ever to use strong, secure and unique passwords for each of your online accounts. Of course, that sounds great in theory, but the main reason we often reuse the same password or passphrase is because trying to remember 50 different logins, each with various alphanumeric strings, is just not realistic.

Fortunately, there are some great tools and services available to users to not only keep your passwords secure, but to also make them accessible and usable from multiple computers or web browsers. Here are five of my favorites.


1. 1Password


1Password from Agile Web Solutions is my favorite way to manage, create and securely access my passwords from a Mac, iPhone, iPad or Android device. The program is $39.95 (a family license for 5 users is available for $59.95) but you can install it on as many of your own computers as you want. It’s a great way to create and fill-in passwords across the web.

The application has plugins for all the major web browsers — Safari, Firefox and Chrome, and you can also pull up your passwords from the application itself. The app works like this:

When you’re on a website and you create a new account, 1Password will prompt you to save that account to its database. In the future, rather than having to type it in manually or rely on your browser’s built-in manager, you can just use 1Password to automatically fill in your username and password data.

Even better, 1Password includes a truly fantastic password generator that lets you create robust passwords of a length that you choose. You can generate a password for an account and then automatically save it.

1Password saves all of your passwords and login information into its own secure database that is stored on your computer, but where 1Password really shines is with its ability to sync with Dropbox. Dropbox is a free service that lets you keep a cloud copy of anything within the Dropbox folder on your desktop. That folder is then accessible across computers and devices. Any change to that folder is synced across every connected computer. 1Password can use Dropbox to store its secure database, which means that if you use multiple Macs or want to have constant syncing on the iPhone, iPad or Android, you can.

1Password has a beta version of its app available for Windows. Like the Mac app, the Windows version can connect to a Dropbox account and sync its database with other platforms.

1Password can even store other form information like credit cards, address information, server logins for your website and software serial numbers.


2. LastPass


LastPass is a very popular cross-platform password manager that stores all of its data in the cloud. It works on Windows and Mac and in every major web browser. Like 1Password, LastPass can automatically save your logins, help you generate safe and secure passwords and automatically fill in your passwords when you visit a site.

The difference is that instead of storing its database on your computer or in Dropbox, it’s all stored on LastPass’s servers. LastPass actually has a really robust set of security around your data and if its center is compromised, your data still can’t be accessed.

LastPass is free to use but for $12 a year, you can gain access to LastPass’s many mobile apps (including iPhone, BlackBerry and Android) and gain access to priority support. It also means you get to skip any advertisements.


3. KeePass and KeePassX


KeePass and KeePassX (which is KeePass but for Mac or Linux) is a free, open-source password manager. It works very much like 1Password, in that the database is stored on your local computer. Like 1Password, you can use Dropbox to keep KeePass synced across machines and profiles.

KeePass can run off a USB drive, which makes it a great choice for users who frequently work on different machines but don’t want to leave any of their personal data on those machines.

KeePass isn’t as user-friendly as LastPass or 1Password, but its dedicated userbase loves it because it can be extended and used in a variety of ways. Plus, it’s free.


4. RoboForm


RoboForm is very similar to 1Password, but it’s just for Windows users. It works with Internet Explorer, Firefox, Google Chrome and with Safari and Opera via a bookmarklet.

RoboForm also has mobile apps for Android, iPhone, BlackBerry and Symbian. Like KeePass, you can even run it off of a USB drive, which is great for users who want a way to keep their passwords with them and use RoboForm on various computers they use, but don’t want to have to install a program on each of those computers.

You can also use RoboForm with Dropbox, which makes using it across machines that much easier. RoboForm is $29.95 for a single-user/computer license and you can get RoboForm with two computer licenses for $39.95.


5. Firefox Sync


Formerly known as Mozilla Weave, Firefox Sync is a plugin for Firefox 3.5/3.6 that will also be an integrated feature in the upcoming Firefox 4. Firefox Sync is a pretty cool concept and it takes a slightly different approach to password management and syncing from the other tools in this list.

Firefox Sync securely syncs and protects your passwords, bookmarks and browser tabs (you can choose to sync all or none of these items). When you login to another computer with Firefox on it, you can just login to Sync and have access to your existing data and even pull up tabs that are open on your other computer. When you log out, all of that information disappears.

Sync also has iPhone and Android apps so you can bring your tabs over to those mobile devices. The upcoming Firefox Mobile for MeeGo and Android will let you access your passwords securely and remotely as well.

By being built into the browser, Sync is a great way for Firefox users to keep track of their passwords. Because it is part of Firefox, Firefox Sync is really designed for people who use Firefox as their primary web browser. If you use Google Chrome, Internet Explorer or Safari, you’ll want to look at the other options listed above.

Do you use a password manager or syncing tool? Let us know in the comments and also share any of your best password tips.

Update: Several readers in the comments mentioned Passpack, a tool that’s really great for sharing and keeping track of passwords for teams and groups.

HOW TO: Protect Your Company’s Passwords

This post originally appeared on the American Express OPEN Forum, where Mashable regularly contributes articles about leveraging social media and technology in small business.

It’s almost impossible to understate the importance of having and using strong, secure online passwords. As important as it is for consumers to heed this advice, it can be even more important for businesses to use and secure the passwords of their various accounts. As tools like Firesheep have shown, gaining access to an email or Facebook account can be alarmingly simple.

Fortunately, there are tools and precautions companies can take that will help simplify the process of keeping passwords safe and protected.


Use Unique Generated Passwords for Different Accounts


No matter how often we’ve been warned, the reality is that most of us use the same password or group of passwords for all of our major accounts. At first, this doesn’t seem too bad — especially if that password is a unique and long mix of numbers, letters and cases. The problem with using the same password or group of passwords, however, is that if one account is compromised, other accounts can follow.

This is especially true for users that associate an e-mail address with an account. When Gawker Media’s web servers were breached last year, thousands of commenters had their usernames, passwords and e-mail addresses exposed. As a result, some of these users had their email, Facebook and Twitter accounts compromised as well.

For business accounts, using a separate, unique password for each major service — and making sure that none of these passwords are the same as those associated with personal accounts — is essential.

Good password management applications typically include a password generator, however, websites like Strong Password Generator are great in a pinch. Using more than 7 characters is a good idea, but be sure to check with your application or service for rules associated with the use of special characters.


Password Management Tools Are Your Friend


One of the primary reasons individuals reuse the same passwords is because keeping track of 100 different logins is difficult, if not impossible. This is where password management applications become crucial, especially in a business environment.

In the past, I’ve written about password management apps for Mashable and here are a few of my favorites:

1Password: 1Password is a solution for Mac OS X and Windows that allows users to not only store their passwords safely, but also access those passwords from within their web browser. That means that rather than relying on the built-in password manager, a user can use 1Password to fill in logins instead. These logins are protected by a master password, and Agile Web Solutions also makes an iPhone and Android app for accessing and securely logging into websites while on the go.

1Password starts at $39.95 for a single license and is $59.95 for a 5-user license.

LastPass: LastPass is a cross-platform password manager that works with all major web browsers to securely store and generate passwords. LastPass also has an Enterprise option for businesses that includes support for applications as well as websites.

LastPass Premium is $12 a year for individuals and starts $24 a year for Enterprise customers.

Passpack: Passpack is a tool designed for teams and businesses that want to make passwords accessible without making them insecure. What we like about Passpack is that it lets users store their personal and work-related passwords in one place, but then choose who has access to what passwords. Plus, Passpack makes sharing passwords secure and also makes it easy to update or change group passwords in bulk.

Passpack for departments and workgroups is $4 a month.


Use HTTPS Logins


Beyond just using unique, secure passwords and password management tools, it’s also important that businesses use secure logins, especially when accessing web services from outside of a corporate network.

In the last few months, a growing number of websites, including Twitter, Facebook, Gmail, Foursquare and HootSuite have started to implement HTTPS as a login option. Using HTTPS, logins are encrypted over the network. This means that even if the network itself is open, the password and username to your account isn’t visible to those sniffing the network.

Turning on HTTPS as a default login option in the web services that support it is a good idea for all users, but it makes even better sense in a corporate context.

Feel free to share your password protection tips in the comments.

25 Worst Passwords of 2011 [STUDY]

Pro tip: choosing “password” as your online password is not a good idea. In fact, unless you’re hoping to be an easy target for hackers, it’s the worst password you can possibly choose.

“Password” ranks first on password management application provider SplashData’s annual list of worst internet passwords, which are ordered by how common they are. (“Passw0rd,” with a numeral zero, isn’t much smarter, ranking 18th on the list.)

The list is somewhat predictable: Sequences of adjacent numbers or letters on the keyboard, such as “qwerty” and “123456,” and popular names, such as “ashley” and “michael,” all are common choices. Other common choices, such as “monkey” and “shadow,” are harder to explain.

SEE ALSO: HOW TO: Protect Your Company’s Passwords

As some websites have begun to require passwords to include both numbers and letters, it makes sense varied choices, such as “abc123″ and “trustno1,” are popular choices.

SplashData created the rankings based on millions of stolen passwords posted online by hackers. Here is the complete list:

  • 1. password
  • 2. 123456
  • 3.12345678
  • 4. qwerty
  • 5. abc123
  • 6. monkey
  • 7. 1234567
  • 8. letmein
  • 9. trustno1
  • 10. dragon
  • 11. baseball
  • 12. 111111
  • 13. iloveyou
  • 14. master
  • 15. sunshine
  • 16. ashley
  • 17. bailey
  • 18. passw0rd
  • 19. shadow
  • 20. 123123
  • 21. 654321
  • 22. superman
  • 23. qazwsx
  • 24. michael
  • 25. football

SplashData CEO Morgan Slain urges businesses and consumers using any password on the list to change them immediately.

“Hackers can easily break into many accounts just by repeatedly trying common passwords,” Slain says. “Even though people are encouraged to select secure, strong passwords, many people continue to choose weak, easy-to-guess ones, placing themselves at risk from fraud and identity theft.”

SEE ALSO: 5 Tools for Keeping Track of Your Passwords

The company provided some tips for choosing secure passwords in a statement:

  • 1. Vary different types of characters in your passwords; include numbers, letters and special characters when possible.
  • 2. Choose passwords of eight characters or more. Separate short words with spaces or underscores.
  • 3. Don’t use the same password and username combination for multiple websites. Use an online password manager to keep track of your different accounts.

Are these lists helpful? Do you need to rethink any of your password choices? Let us know in the comments.

Monday, November 14, 2011

Humans vs. Computers Infographic – How smart is your Laptop?

We’ve grown up with pop culture images of computers taking over the world. The ever popular Terminator franchise showed us battles between Skynet's intelligent machine network and human resistance. HAL 9000 is the antagonist in Arthur C. Clarke's science fiction Space Odyssey saga and in Blade Runner, replicants fought for freedom.

How far has does technology have to go before its starts to live up to science fiction? How long do we have before our laptops rule the world? Below is a light hearted look at computers v.s humans today.


If computers are going to take over the world I’d like them to start off with a few more simple tasks to make life easier like cleaning the oven and finding my missing keys. What weird and wonderful things would you like to see?

Tuesday, October 25, 2011

Serial-Key for any software :-

Hi frndz....
►1. Those who use trial versions of softwares..
►2. Go to GOOGLE.com
►3. Type '94fbr' Then space and then name of software u need..
►4. Google will show u links with ur desired serial key or patch files..

Thursday, October 20, 2011

Apple vs. Microsoft: Two Opposite Approaches to Building an OS

Microsoft and Apple are the developers of three of the most popular operating systems in the world (Windows, iOS & Mac OS X), yet their approaches to building the infrastructure that powers laptops, tablets and phones couldn’t be more divergent.
Microsoft recently published a blog post that addressed specific issues that Windows 8 developer preview users had with the start screen.
The Windows 8 team specifically tackles the complaint that the new Windows 8 start screen, which uses the app-style metro interface, isn’t effective at organizing apps (it was originally organized alphabetically) and doesn’t display enough apps on one screen (it originally displayed about 20 apps). Microsoft dives deep into the UX issues of start menus, even calculating how many apps Windows 8 can theoretically fit onto one display at different monitor resolutions.
In the end though, Microsoft concluded that its users were right about the Windows 8 start menu and made two important changes to it as a result. First, it now supports folder-style organization of apps. Secondly, Microsoft is making the start screen denser, meaning that more apps will be visible on a single screen.
The Apple Approach to OS DevelopmentMicrosoft’s approach lies in stark contrast to Apple‘s approach to OS development. The notoriously secretive company doesn’t like unveiling products until they are polished. It doesn’t publish detailed stats about how people are using its products. And it rarely makes dramatic changes based on user feedback.
It’s an approach that has worked just fine for Apple (more than fine, in fact). Steve Jobs and his team have been able to develop products and features that users wanted long before users they even knew they wanted them.
“It’s really hard to design products by focus groups,” Steve Jobs told BusinessWeek in 1998. “A lot of times, people don’t know what they want until you show it to them.”
This is why you won’t find an Apple blog that details user behavior in iOS. This is why Apple only gives developers a few months to play with new versions of Mac OS X before they get released to the public, while Microsoft will release a new version of Windows to developers more than a year before its official debut.
Both companies are wildly successful with their operating systems. Windows is still the world’s most popular OS, while Apple keeps selling iPhone and iPads by the millions. But we’re about to see what happens when these two opposing philosophies to development butt heads. Microsoft is preparing for war against the iPad, and Windows 8 is its weapon of choice.
Will Microsoft’s philosophy to development trump Apple’s approach? We don’t know the answer to that question yet, but we do know that the fireworks are just getting started.
Check out the galleries below if you want to do a side-by-side comparison of Apple and Microsoft’s approaches to building an OS. Let us know which philosophy you prefer in the comments.
Gallery: Windows 8
Windows 8 Metro Home Screen
This is the Metro interface in Windows 8
Click here to view this gallery.
Gallery: iOS 5
New Home Screen With Notification
Notifications are a big deal in iOS 5. Taking some cues from Android, iOS has finally unified the notification system and made it less clumsy and intrusive.
Message now appear at the top of the screen (though you can choose to allow them to display in the middle) while you are using the phone and they don't interrupt what you are already doing.
Click here to view this gallery.

23 incredible new technologies you’ll see by 2021



WHEN LOOKING AT THE present as an indication of where we’ll stand a year from now–much less a decade–feeling optimistic may not come easy. We look out to the universe and see an infinite, lifeless abyss enfolding upon our own small pocket of civilization, while the people we look to for guidance and information seem to be little more than straight-faced bearers of bad news.

Yet while we can’t predict what the future holds for our unending political discourses, we can look at how far we’ve come with technology in merely the last decade and realize the present we know now will, very soon, find itself memorialized in nostalgia. Here’s some technology emerging down the road that’s poised to change your life on a much greater scale than any outcome of a political debate.

2012

Ultrabooks – The last two years have been all about the tablet. Laptops, with their “untouchable” screens, have yet to match any tablet’s featherweight portability and zippy response times. However, by next year, ultraportable notebooks–Ultrabooks–will finally be available for under $1000, bringing a complete computing experience into areas of life which, until now, have only been partially filled by smaller technologies such as tablets and smartphones. They weigh around three pounds, measure less than an inch thick, and the hard drives are flash-based, which means they’ll have no moving parts, delivering zippy-quick startups and load times.

The Mars Science Laboratory – By August 2012, the next mission to Mars will reach the Martian surface with a new rover named Curiosity focusing on whether Mars could ever have supported life, and whether it might be able to in the future. Curiosity will be more than 5 times larger than the previous Mars rover, and the mission will cost around $2.3 billion — or just about one and a half New Yankee Stadiums.

The Brain Cap, from U of Maryland.

The paralyzed will walk. But, perhaps not in the way that you’d imagine. Using a machine-brain interface, researchers are making it possible for otherwise paralyzed humans to control neuroprostheses–essentially mechanical limbs that respond to human thought–allowing them to walk and regain bodily control. The same systems are also being developed for the military, which one can only assume means this project won’t flounder due to a lack of funding.

2013

The Rise of Electronic Paper – Right now, e-paper is pretty much only used in e-readers like the Kindle, but it’s something researchers everywhere are eager to expand upon. Full-color video integration is the obvious next step, and as tablet prices fall, it’s likely newspapers will soon be fully eradicated from their current form. The good news: less deforestation, and more user control over your sources.

4G will be the new standard in cell phone networks. What this means: your phone will download data about as fast as your home computer can. While you’ve probably seen lots of 4G banter from the big cell providers, it’s not very widely available in most phones. However, both Verizon and the EU intend to do away with 3G entirely by 2013, which will essentially bring broadband-level speeds to wireless devices on cell networks. It won’t do away with standard internet providers, but it will bring “worldwide WiFi” capabilities to anyone with a 4G data plan.

The Eye of Gaia, a billion-pixel telescope will be sent into space this year to begin photographing and mapping the universe on a scale that was recently impossible. With the human eye, one can see several thousand stars on a clear night; Gaia will observe more than a billion over the course of its mission–about 1% of all the stars in the Milky Way. As well, it will look far beyond our own galaxy, even as far as the end of the (observable) universe.

2014

A 1 Terabyte SD Memory Card probably seems like an impossibly unnecessary technological investment. Many computers still don’t come with that much memory, much less SD memory cards that fit in your digital camera. Yet thanks to Moore’s Law we can expect that the 1TB SD card will become commonplace in 2014, and increasingly necessary given the much larger swaths of data and information that we’re constantly exchanging every day (thanks to technologies like memristors and our increasing ever-connectedness). The only disruptive factor here could be the rise of cloud-computing, but as data and transfer speeds continue to rise, it’s inevitable that we’ll need a physical place to store our digital stuff.

The first around-the-world flight by a solar-powered plane will be accomplished by now, bringing truly clean energy to air transportation for the first time. Consumer models are still far down the road, but you don’t need to let your imagination wander too far to figure out that this is definitely a game-changer. Consider this: it took humans quite a few milennia to figure out how to fly; and only a fraction of that time to do it with solar power.

The Solar Impulse, to be flown around the world. Photo by Stephanie Booth

The world’s most advanced polar icebreaker is currently being developed as a part of the EU’s scientific development goals and is scheduled to launch in 2014. As global average temperatures continue to climb, an understanding and diligence to the polar regions will be essential to monitoring the rapidly changing climates–and this icebreaker will be up to the task.

$100 personal DNA sequencing is what’s being promised by a company called BioNanomatrix, which the company founder Han Cao has made possible through his invention of the ‘nanofluidic chip.’ What this means: by being able to cheaply sequence your individual genome, a doctor could biopsy a tumor, sequence the DNA, and use that information to determine a prognosis and prescribe treatment for less than the cost of a modern-day x-ray. And by specifically inspecting the cancer’s DNA, treatment can be applied with far more specific–and effective–accuracy.

2015

The world’s first zero-carbon, sustainable city in the form of Masdar City will be initially completed just outside of Abu Dhabi. The city will derive power solely from solar and other renewable resources, offer homes to more than 50,000 people.

Personal 3D Printing is currently reserved for those with extremely large bank accounts or equally large understandings about 3D printing; but by 2015, printing in three dimensions (essentially personal manufacturing) will become a common practice in the household and in schools. Current affordable solutions include do-it-yourself kits like Makerbot, but in four years it should look more like a compact version of the uPrint. Eventually, this technology could lead to technologies such as nanofabricators and matter replicators–but not for at least a few decades.

2016

Space tourism will hit the mainstream. Well, sorta. Right now it costs around $20-30 million to blast off and chill at the International Space Station, or $200,000 for a sub-orbital spaceflight from Virgin Galactic. But the market is growing faster than most realize: within five years, companies like Space Island, Galactic Suite, and Orbital Technologies may realize their company missions, with space tourism packages ranging from $10,000 up-and-backs to $1 million five-night stays in an orbiting hotel suite.

The sunscreen pill will hit the market, protecting the skin as well as the eyes from UV rays. By reverse-engineering the way coral reefs shield themselves from the sun, scientists are very optimistic about the possibility, much to the dismay of sunscreen producers everywhere.

Back from extinction. Image by JenJeff.

A Wooly Mammoth will be reborn among other now-extinct animals in 2016, assuming all goes according to the current plans of Japan’s Riken Center for Developmental Biology. If they can pull it off, expect long lines at Animal Kingdom.

2017

Portable laser pens that can seal wounds – Imagine you’re hiking fifty miles from the nearest human, and you slip, busting your knee wide open, gushing blood. Today, you might stand a chance of some serious blood loss–but in less than a decade you might be carrying a portable laser pen capable of sealing you back up Wolverine-style.

2018

Light Peak technology, a method of super-high-data-transfer, will enable more than 100 Gigabytes per second–and eventually whole terabytes per second–within everyday consumer electronics. This enables the copying of entire hard drives in a matter of seconds, although by this time the standard hard drive is probably well over 2TB.

Insect-sized robot spies aren’t far off from becoming a reality, with the military currently hard at work to bring Mission Impossible-sized tech to the espionage playground. Secret weapon: immune to bug spray.

2019

The average PC has the power of the human brain. According to Ray Kurzweil, who has a better grip on the future than probably anyone else, the Law of Accelerating Returns will usher in an exponentially greater amount of computing power than every before.

The Web Within Us. Image by Anna Lena Schiller.

Web 3.0 – What will it look like? Is it already here? It’s always difficult to tell just where we stand in terms of technological chronology. But if we assume that Web 1.0 was based only upon hyperlinks, and Web 2.0 is based on the social, person-to-person sharing of links, then Web 3.0 uses a combination of socially-sourced information, curated by a highly refined, personalizable algorithm (“they” call it the Semantic Web). We’re already in the midst of it, but it’s still far from its full potential.

Energy from a fusion reactor has always seemed just out of reach. It’s essentially the process of producing infinite energy from a tiny amount of resources, but it requires a machine that can contain a reaction that occurs at over 125,000,000 degrees. However, right now in southern France, the fusion reactor of the future is being built to power up by 2019, with estimates of full-scale fusion power available by 2030.

2020

Crash-proof cars have been promised by Volvo, to be made possible by using radar, sonar, and driver alert systems. Considering automobile crashes kill over 30,000 people in the U.S. per year, this is definitely a welcome technology.

2021

So, what should we expect in 2021? Well, 10 years ago, what did you expect to see now? Did you expect the word “Friend” to become a verb? Did you expect your twelve-year-old brother to stay up texting until 2am? Did you expect 140-character messaging systems enabling widespread revolutions against decades-old dictatorial regimes?

The next 10 years will be an era of unprecedented connectivity; this much we know. It will build upon the social networks, both real and virtual, that we’ve all played a role in constructing, bringing ideas together that would have otherwise remained distant, unknown strangers. Without twitter and a steady drip of mainstream media, would we have ever so strongly felt the presence of the Arab Spring? What laughs, gasps, or loves, however fleeting, would have been lost if not for Chatroulette? Keeping in mind that as our connections grow wider and more intimate, so too will the frequency of our connectedness, and as such, your own understanding of just what kinds of relationships are possible will be stretched and revolutionized as much as any piece of hardware.

Truly, the biggest changes we’ll face will not come in the form of any visible technology; the changes that matter most, as they always have, will occur in those places we know best but can never quite see: our own hearts and minds.

****This post is brought to you in partnership between Matador and our friends at Intel, whose technology enables so much of the lifestyle in which we thrive.

Thursday, October 6, 2011

Worldzzz Cheapest Tablet ... India Rockzzzzzzzzzzzzzzzzzzzzz............

Just a few hours after the launch of Iphone 4S, and a few hours before the death of “The father of IPad – Steve Jobs”, India came up with the world’s cheapest android tablet.


Aakash Android Tablet for just $45

Datawind Aakash Tablet for $45At a time, when pads are considered as the most expensive gadget in the world, India has come up with the cheapest android tablet – “Aakash” (means SKY). Aakash is the world’s cheapest tablet, which you can easily find for Rs. 2200 ($45).
This device is made jointly by an Indian IIT institute, in collaboration with UK based company – “Datawind”. Its founders, Raja Singh Tuli and Suneet Singh Tuli, developed it to help Indian Students in their studies.
That is why, Indian Students can buy it for a special price of Rs. 1400 ($28). Government, by providing this tablet for Rs. 1400 ($28) to 100000 college students, is trying to revolutionize Indian Education System.
Datawind is also planning to sell this Tablet in partnership with different Telecom companies, with Rs. 99 ($2) per month Internet Services. It is retailed under the brand name UbiSlate

Aakash – Is it an IPAD killer?

I am sure you guys are intelligent enough not to consider it as an IPAD killer. Because, it is not.
The price of an IPAD is 12 times more than that of Aakash TAB. So, don’t expect it to be as cool and stylish as IPAD. Plus, it is not as powerful as your home PC.
But still, it is not a bad device, especially at the price it is offered. It can do a lot of things that an IPAD can, but yes in its own way. After all, it is a tab for common men, who can’t afford Apple’s or Samsung’s.

Aakash Android Tablet – Key Features

At such a low price level, you can expect a tab to provide a lot of features. And this is where, Aakash Tab is so good. It provide some really good features, some of which are as follows:
  • It has a 7 inch (18 cms) touch screen.
  • It has 256 MB RAM.
  • It has a memory card slot, with 2 GB memory card. You can expand its memory up to 32 GB.
  • It is WIFI and GPRS enabled, that means you can also browse Internet on it.
  • It is a fully functional multimedia player – that means you can view movies, listen to songs and play games on it.
  • It runs on Android 2.2 Froyo version, with full access to the Application Market.
  • It provides 3.5 hours of battery backup.
  • You can access to 70000 ebooks and 2100 E-journals across 1500 colleges in India.
  • It also has a dedicated card to process 1080p videos
  • It is very lightweight, and weighs only 350gms.
  • And, at just $45, its very cheap.

Features Comparison – Aakash Vs. The world

The following figures shows the comparison of ”Aakash” with world’s popular tablets:

Aakash Tablet Other Tablets
Screen 7 inches 7-10 inches
RAM 256 MB 256 MB – 1 GB
Storage 2GB (32 GB Expandable) 4-64 GB
Price Rs. 2200 ($45) Rs. 15000 – Rs. 30000 ($500)
Ports 2 Full USB Micro USB
OS (Operating System) Android 2.2 IOS & Android 2.2 / 2.3

Aakash Tab – For Children of the World

While launching this tablet, Indian HRD minister named it as a device for the children of the world. I am a big criticizer of Indian Government, but this is one great step that they have taken for “not-so-rich” students of the world. Just imagine, a person, who can’t afford high end tablets, can also have a tablet of his own.
Of course, it can’t match the quality of Apple, Samsung or HTC. But, even they can’t match the happiness that this tablet will bring on the faces of “middle income group” people. So world, please step aside for Aakash, the cheapest android tablet of the world.