Friday, April 29, 2011

the royal wedding




Bells pealed, crowds cheered, even the sun put in a timely appearance, as Prince William emerged from Westminster Abbey with his bride on his arm.


Wearing a broad smile, a Wartski wedding ring of Welsh gold and an ivory gown with lace applique, Kate Middleton – now Her Royal Highness the Duchess of Cambridge – joined The Firm amid the pomp and pageantry Britain prides itself on performing well.


Before a global television audience of many millions, Kate played her part to perfection. From the dress – by Sarah Burton at Alexander McQueen, kept a secret until the last moment and sending the British fashion industry into paroxyms of ecstacy – to the 1936 Cartier diamond tiara loaned by the Queen, she looked every inch the fairytale princess.


Which, of course, she was not. The Queen's conferring of the ancient title of Duke of Cambridge on her grandson just hours before the ceremony deprived his wife of the title Princess Catherine. But she is a duchess, which is several rungs up the social ladder than her standing before entering the 1,000-year-old abbey this morning.



And there was no mention of fairytales – unlike 30 years ago when Robert Runcie, then Archbishop of Canterbury, gushingly pronounced Prince Charles's union with Lady Diana Spencer "the stuff of fairytales". Lessons have since been learned.


Instead, the Bishop of London, the Rt Rev Richard Chartres, read a prayer penned by William and Kate, and asking for spiritual help to guide them through their new life together.


And this time, the bride did not forget her groom's name and the groom did not stumble over the wedding vows. Indeed, apart from some slight wrestling required get the tight ring on to Kate's finger, everything appeared to go without a hitch.


William, in the bright red dress uniform of a colonel of the Irish Guards, whispered: "You look incredible, beautiful," as his bride arrived at his side in front of the High Altar. The two exchanged smiles and glances throughout the service
The couple, in the 1902 state landau, were borne to Buckingham Palace on a sea of union flags and a tide of well wishes. And the kiss on the palace balcony, duly demanded by the crowd below, was executed with poise and with a few blushes from an embarrassed William. It was a fleeting and quite chaste kiss. It was repeated as the crowd bayed for more, with William's seeming awkwardness reflecting his father's own self-consciousness when he had been required to perform "that caper" in front of millions.

It was the father of the modern British constitution, the 19th-century essayist Walter Bagehot, who once wrote "a royal family sweetens politics by the seasonable addition of nice and pretty events".

Such was today's occasion, a moment of light to pierce the economic gloom. Kate, unblemished, beautiful and carrying a bridal bouquet that included sweet williams in tribute to her prince, hid her nerves well.

There surely were nerves as the couple made their vows in front of God, the so-called great and the good and a global TV audience of millions.

About 44 foreign royals were seated close to 51 members of the Queen's extended family. The lesser royals had been bussed to the abbey in minibuses.
After the couple said their vows, in which she did not promise to obey William, the archbishop of Canterbury, Rowan Williams, declared: "I pronounce that they be man and wife together, in the name of the Father, and of the Son, and of the Holy Ghost. Amen."

They spent a private moment together with their families as they signed the marriage register.

The congregation included heads of state, diplomats, charity workers and the couple's friends. David Beckham, prominently displaying his OBE on the right lapel of his Ralph Lauren morning suit, was accompanied by his pregnant wife Victoria. Elton John, the singer, and Guy Ritchie, the film director, were among the celebrity faction.

David Cameron, who slept on the Mall the night before Charles and Diana's wedding, wore morning dress while his wife, Samantha, chose to go hatless, unlike most of the female guests.

The Middleton family guests were bussed in four silver mini-coaches from the Goring hotel, which the family had taken over for the pre-wedding night, thus bestowing on the hotel global publicity of inestimable value.
Other guests included Hash and Chan Shingadia, who run the convenience store in the Middletons' Berkshire village of Bucklebury, and obligingly added a love of Haribo sweets to Kate's many attributes.

Villagers not in possession of a golden wedding ticket indulged in some celebratory duck and lamb racing on the green – and a spot of morris dancing.

Back at Buckingham Palace, 650 of the guests enjoyed a champagne and canape reception.

Royal officials said William and Kate were involved in planning their wedding day, from the music at the ceremony to the flowers and the cake.

Guests and observers agreed, it was a stylish marriage. Naturally it included a carriage. There was, though, a bicycle made for two at their disposal – a tandem given to the couple as a wedding present by the London mayor, Boris Johnson.










Computer Hacking and Cracking basics introduction


Computer Hacking and Cracking basics


Nuts and Bolts
To know what is computer hacking, one must know their terms. A list of certain significant ones is described below.
Hacking run
essentially, a hacking run is a hacking session that lasts longer than normal working times, i.e. a hacking run that lasts for in excess of eight to ten hours.
White Hat
considered one of nice guys, a white hat hacker is one who hacks and the informs the owner of the hacking
Black Hat
in contrast, the black hat hacker is considered a criminal and uses his/her skills to break the law

Gray Hat
as one would imagine, a gray hat hacker sometimes is good, and sometimes is criminal; a combination of the white and black hat
Script Kiddie
a demeaning term, used for those who hack but do so by following directions and not creating anything of their own
Trojan horse
deceptive programs that pretend they do one thing, only to enter the computer system and do another; however, they need not be bad for the computer
Virus
a self-replicating program that inserts itself into executable codes or documents
Worm
also a self-replicating program, but a worm breeds itself in computer systems.
Software, Hardware, and Internet Hacking
Although the computer languages should solely be used for the legitimate purposes such as learning and other constructive purposes, yet there are lots of ways these languages are used as the means of destructions. The languages such as C, C++, java, Pearl and few more like these are used for hacking. Hackers are the programming experts who have sound grips in the language mentioned above. The language C is the utmost flexible and is the widely accepted one as the ported language in the community of the hackers.


Linux is the strongest hacker-friendly operating system that can be used by the hackers intending to hack another system. The hackers use wide range software to break into the remote systems. Although these programs and software were constructed for some legal purposes, yet they have turned to be the serious hacker tools. A few worth mentioning software and programs are DeCSS 1.2b, Coldlife 4.0, PCHelps Network Tracer, IntelliTamper 2.07 and etc.

Friday, April 22, 2011

Shift cipher or ceaser cipher


In cryptography, a Caesar cipher, also known as a Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals.
The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenère cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security.
Example:-
The transformation can be represented by aligning two alphabets; the cipher alphabet is the plain alphabet rotated left or right by some number of positions. For instance, here is a Caesar cipher using a left rotation of three places (the shift parameter, here 3, is used as the key):

Plain:    ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher:   DEFGHIJKLMNOPQRSTUVWXYZABC
The encryption can also be represented by using modular arithmetic by first transforming the letters in to numbers , according to the scheme, A=0,B=1,.....,z=25. Encryption of a letter x by a shift n can be described mathematically as, 
E_n(x) = (x + n) \mod {26}.
Decryption is performed similarly,
D_n(x) = (x - n) \mod {26}.

There are different operations for the modulo operation. In the above, the result is in the range 0,...........,25, i.e. if x+n or x-n are not in the range 0,........,25 we have to subtract or add 26.
The replacement remains the same throughout the message, so the cipher is classed as a type of monoalphabetic substitution, as opposed to polyalphabetic substitution.
this kind of cipher is introduced by julius ceaser, a rome emporer


Tuesday, April 5, 2011

The lyrics of the video i like most



Life is tough, that’s a given. 
When you stand up, you’re gonna be shoved back down. When you’re down, you’re gonna be stepped on.
 My advice to you doesn’t come with a lot of bells and whistles.
 It’s no secret, you’ll fall down, you stumble, you get pushed, you land square on my face. And every time that happens, you get back on your feet. You get up just as fast as you can, no matter how many times you need to do it. Remember this, success has been and continues to be defined as getting up one more time than you’ve been knocked down. 
If experience has taught me anything, it’s that nothing is free and living ain’t easy. 
Life is hard, real hard, incredibly hard. 
You fail more often than you win, nobody is handing you anything.
 It’s up to you to puff up your chest, stretch your neck and overcome all that is difficult, the nasty, the mean, the unfair. 
You want more than what you’ve now, prove it! You want beat the very best out there that is, get out there and earn it! Once you decide that, you’ll know where it is you want to be, then you won’t stop pushing forward until you get there! That’s how winners are made. 
At the end of the day, success is what we all want. 
We all wanna win, and the race will be won. There is no question about that. 
So c’mon, get out on top, run faster, dream bigger, live better than you ever have before. This is in you. 
You can do this. 
Do it for yourself. 
Prove it to yourself.
the video just rocks think this might become a new inspiration to you people watching this
thank you!!!!!!!!

Sunday, April 3, 2011

the bhargav's ultimate blog: How to enable/disable usb ports

the bhargav's ultimate blog: How to enable/disable usb ports: "'Warning : Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These p..."

How to enable/disable usb ports


"Warning : Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall your operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk. If a USB storage device is already installed on the computer"


set the Start value in the following registry key to 4: 


HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor


When you do so, the USB storage device does not work when the user connects the device to the computer.


To set the Start value, follow these 


steps:1. Click Start, and then click Run. 
2. In the Open box, type regedit, and then click OK. 
3. Locate, and then click the following registry key:


HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor 


4. In the right pane, double-click Start. 
5. In the Value data box, type 4, click Hexadecimal (if it is not already 
selected), and then click OK. 
6. Quit Registry Editor. 

Comments

blog comments powered by Disqus