TOP BLOG ADS BY GOOGLE

Thursday, October 13, 2011

Google Maps puts WebGL 3D Graphics


Google has enabled a "MapsGL" option to show 3D buildings on the site through the use of WebGL, a 3D graphics technology for the Web that four of the five top browsers have embraced.
The move marks another step in the convergence of the browser-based Google Maps and the more immersive Google Earth software that stemmed from Google's 2004 acquisition of Keyhole. Google Earth lets people fly around, overlays imagery on contoured terrain, and shows 3D buildings.
With WebGL, Google Maps gets the 3D buildings--also visible on Android's Maps app--and more.
Other features include a swoopy transition from an ordinary bird's-eye view to Street View; the ability to rotate a map so something besides north is at the top; and a gradual transition from a straight-down satellite view to the more detailed 45-degree aerial photography views Google offers in some areas.
I found it to be nice, but a bit rough around the edges, chiefly because of screen clutter and some rough typography, but I also found it fairly slick. The way I see things headed, Google is creating a virtual reconstruction of the world in 3D, and this is a big step on the way.
To try the feature out, click the "Want to try something new?" words on the lower left side of the screen.
It won't be long now before Google conducts intuits your desires as you walk around a city, conducting real-time auctions to see which merchant gets to pop up a contextually relevant, targeted advertisement on your augmented-reality contact lenses.
Maybe that's a bit far-fetched, but then again, maybe not. "You're now one step closer to experiencing and interacting with a 3D mirror of the real world within your browser with Google MapsGL," said Brian McClendon, vice president of Google Maps and Earth, in a blog post today.
In any event, I see this as, if not a watershed moment for WebGL, at least a compelling reason why you might want to have it in your browser.
WebGL grew up through a collaboration between Mozilla and the Khronos Group, a standards organization, and Google quickly jumped aboard. At present, the Firefoxbeta and Chrome support WebGL, and it can be enabled in Safari. It's based on the OpenGL ES interface for graphics chips.
Today, Opera joined the WebGL world with the release of the Opera 12 alpha, code-named Wahoo, and for the occasion, the company released a WebGL version of the game Emberwood. Other

Tuesday, September 27, 2011

Website of Supreme Court of Pakistan Hacked

Website of the Honourable Supreme court of Pakistan is hacked, as you can see in the picture, rest of the message of the hacker is as under;

 

[!] Struck By Zombie_Ksa

The Notorious Zombie_Ksa is Back

You Must have Heard about me on, news, headlines, Gov. charges, blogs, blah blah

YES, Pakistan Supreme Court got STAMPED by Zombie_Ksa.

What i can see, I Guess, Supreme Court of Pakistan is in Wrong, Untalented Hands !!
Well Why Did I Choose Supreme Court of Pakistan for HaCkinG ?
Just tO Convey my Message tO Mr Chief So Called Justice Of Pakistan Iftikhar Mohammad Chaudry...
Mr Chief hello0 :D !! Hope So yO Enjoying your full time Luxurious Life.. :D aint u? O.o
So I am here tO request you to go 0ut there and help the poor,needy and hungry.
They Dont have money to Eat one time Meal
They dont Have Clothes to wear
They dont have Accommodation !!
Sitting 0n y0ur r0yal chair w0nt make any changes to 0ur Pakistan
Baby m here tO Tell this mofo World that We are Pakistan ....Not Pornistan... & Sir i need ur help.. Since u have powefull balls and i request you to take action to ban porn sites in Pakistan. Read it again I request you to BAN Pornographic sites in PAKISTAN... PTA is paid whore... they dont give a damn shit about our complains... They can BAN Porn sites... ANd if they dont WTF they are paid for? Mr CJ m again requesting you to take somoto action against PTA. If you dont then i myself will... I will Roast PTA's Asses like I raped FIA... & If they cant or they wont then InshALLAH I will raise the 1337 gr33n flag high and ll Hack PTA like i hacked bef0re =) ...
------------------------------------------------------------------------------------------------------------------
@Webmaster:Mr.Malik Sohail Ahmad The data is intact, no harm done. The index file is only replaced with this message.Well Dude You Don't Know Nothing !! Here in PAKISTAN who has Degree He Is Monster and you Idiot is Webmaster of Supreme Court of PAKISTAN ? Death to U !! Learn Some Serious Shit Insane !!>
We are L33t Pakistani H4x0rZ,
------------------------------------------------------------------------------------------------------------------
we are PAKbugs, We keep it real:
   Greetz: Zombie_Ksa | spo0feR | xOOmxOOm | Cyber-Criminal | bh | Agd_Scorp | aB0 m0h4mM3d | The Moorish | Shadow008 |

Tuesday, September 13, 2011

First Flaws in the Internet Banking Identified


Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts.
The attack is a result of a long-term cryptanalysis project carried out by Andrey Bogdanov (K.U.Leuven, visiting Microsoft Research at the time of obtaining the results), Dmitry Khovratovich (Microsoft Research), and Christian Rechberger (ENS Paris, visiting Microsoft Research).
The AES algorithm is used by hundreds of millions of users worldwide to protect internet banking, wireless communications, and the data on their hard disks. In 2000, the Rijndael algorithm, designed by the Belgian cryptographers Dr. Joan Daemen (STMicroelectronics) and Prof. Vincent Rijmen (K.U.Leuven), was selected as the winner of an open competition organized by the US NIST (National Institute for Standards and Technology). Today AES is used in more than 1700 NIST-validated products and thousands of others; it has been standardized by NIST, ISO, and IEEE and it has been approved by the U.S. National Security Agency (NSA) for protecting secret and even top secret information.

In the last decade, many researchers have tested the security of the AES algorithm, but no flaws were found so far. In 2009, some weaknesses were identified when AES was used to encrypt data under four keys that are related in a way controlled by an attacker; while this attack was interesting from a mathematical point of view, the attack is not relevant in any application scenario. The new attack applies to all versions of AES even if it used with a single key. The attack shows that finding the key of AES is four times easier than previously believed; in other words, AES-128 is more like AES-126. Even with the new attack, the effort to recover a key is still huge: the number of steps to find the key for AES-128 is an 8 followed by 37 zeroes. To put this into perspective: on a trillion machines, that each could test a billion keys per second, it would take more than two billion years to recover an AES-128 key. Note that large corporations are believed to have millions of machines, and current machines can only test 10 million keys per second.
Because of these huge complexities, the attack has no practical implications on the security of user data; however, it is the first significant flaw that has been found in the widely used AES algorithm and was confirmed by the designers.