It’s a fact: Nobody likes to think of death. Whether we’re talking about ourselves, our loved ones or our favorite pet, most people prefer to avoid talking about the subject. And when death comes knocking upon our door, decisions have to be taken.
How do you want your body to end up? Eaten away by Mother Nature under 6 feet of soil or reduced to a pile of ashes? If neither interests you, a new alternative exists: The LifeGem.
The LifeGem is a small diamond that is made with the carbon that is extracted out of a cremated body’s ashes. Once the carbon particles have been collected, they are purified and put inside a high temperature carbon press. The result? A small “real” diamond of the weight and color of your choice.
The price? Expensive. A basic LifeGem will cost you approximately $2700, and if you want something that weights over 1 carat, you’ll have to shell out over $25000.
A bit pricey, but hey, spending eternity trapped inside a diamond has to be expensive!
To celebrate their twentieth anniversary of sandwich making, the folks from Erbert & Gerbert built what they call “the world’s most powerful air vortex cannon”. Enjoy!
No idea on how large this thing really is, but according to the cannon’s official website, it’s about as big as the Appolo space capsule, and a little bit smaller than three ninjas.
After 15 years in a row of being the world’s richest man, Bill Gates finally had to step down from the podium and take the 3rd place. But please, don’t start sending donations to Mr. Gates yet, his fortune is still evaluated at over $58 billion.
The new world’s richest man is Gates’ friend and investment mogul Warren Buffett, according to Forbes magazine’s annual ranking of the world’s wealthiest people, which was released Wednesday. The magazine estimated Buffett’s worth at $62 billion, and Gates’ fortune not too far behind at $58 billion. But that doesn’t mean he only slipped one notch: Carlos Slim, a Mexican telecoms tycoon, came in second with an estimated worth of $60 billion.
Horror stories about how corporations get their important data stolen from mobile devices have been plentiful in the past few years. To fight the problem, most companies now require that hard drives inside their mobile fleet get encrypted before leaving in the hands of employees. Normally, such a means would be more than enough to ensure data privacy in case of theft, but according to a group of researchers from Princeton University, it isn’t the case anymore.
Like most people, I always thought that RAM modules couldn’t retain their information after being powered off, but guess what? We’re wrong! DRAM chips can take anywhere from a few seconds to a few minutes to lose their stored content, which incidentally can include a drive’s encryption key. Now extracting this key in just a few seconds makes the task downright impossible, but by putting a computer’s memory modules on ice (Yes, ICE!), you can extend their memory retention capability by a few times.
Using this technique, the researchers from Princeton were able to decrypt drives protected by three of the most popular encryption software out there: Linux’s TrueCrypt, Vista’s BitLocker and OS X’s FileVault.
Obviously, protecting yourself against “memory chilling” is very easy. All you have to do is to never leave your computer in sleep or hibernation mode, and to ensure that you power it off a few minutes before leaving it alone.
The following video explains the technique in much more details.
Not only could this be very embarrassing, it could also hurt your reputation and even expose you to legal actions. Before exchanging documents with tracked changes, you should always make sure the final copy is sanitized and cleared of any sort of hidden data. Take your data security and integrity to the next level by installing SendShield, a first line of defense against hidden data in incoming and outgoing documents.
A Worst case scenario
A finance department assistant prepares a document showing the projected sales for the year to come. Once a first draft is completed, the document is sent to the finance director.
The director turns on Track Changes in Excel and increases some projected sales values thinking employees would be delighted by the goals for the upcoming year. On the cell showing off the estimated revenues, he adds a comment aimed at the vice president:
“Hey Bob, I think we should revise these numbers up. Even if we don’t reach them by the end of the year, it might prevent some departures in the next few months as we expect a decrease in sales.”
Bob gets the spreadsheet, looks at the numbers, and adds his comment:
“Good idea, these kids in IT would surely jump on the occasion to leave the company. Let’s keep ’em in the dark.”
Bob hides the changes to see how the spreadsheet looks, gets a call, and makes a careless mistake while talking on the phone: He approves the document and sends it back to the assistant.
The assistant looks at the spreadsheet, and since everything looks fine, emails it to all employees. Ouch!
Unfortunately, situations such as this one are happening regularly. Check out this page to read a few nightmare stories that got media attention.
How can IT prevent this?
I recently stumbled on SendShield, a free software that installs itself as an Outlook plugin and scans attached office documents for hidden data. The application works at the client level, so it should not be seen as a server application.
Precisely, SendShield searches for the following items:
Tracked Changes
Comments
Hidden rows, columns and sheets (Excel)
Formulas
System requirements & download
Windows XP, Windows Vista or Windows Server 2003
Office 2007 or Office 2003 (coming soon: Office XP/2000)
Microsoft .NET 1.1
15 MB disk space
512 MB RAM
You can download SendShield for free without the need to go through a lengthy registration process. Before running the installation, make sure all Office programs are closed (including Outlook.)
How it works
SendShield kicks in as soon as you attach a Microsoft Office document into an Outlook email. It scans the file and displays a warning that you can’t really miss.
If you don’t take action at this point, you’ll be prompted once again when sending your email. This time, SendShield pops up an Unclean Attachments warning box requesting an action:
Either you let SendShield clean the attachment(s) (I gave this option a few try and it makes a perfect job.)
Or you can decide to leave the file(s) intact
SendShield has another interesting feature: it scans Office documents received by email. This could allow you to view hidden data you shouldn’t have been exposed to.
Summary
Just as a precaution, I strongly recommend Outlook users, especially those in the corporate world, to deploy SendShield. Give it a try with a few test users, and if you get good results, push it to everyone. Who knows how many embarrassing situations this could save you? Have you ever been exposed to hidden data in Office apps?
Researchers at Carnegie mellon University’s Robotics Institute are currently developing a magnetic levitation system that they claim provides the most realistic sense of touch yet to be seen on similar devices. Possible applications include microsurgery, computer-augmented design, robot control, and even data visualization.
Haptics is the study of touching, and haptic technology refers to that which applies force feedback, texture and other physical sensations when the user manipulates virtual objects. Healthy virtual tissue would feel soft; a tumor, hard. Models created by supercomputers could be manipulated without creating expensive physical artifacts.
The thing about instant messaging programs such as Pidgin and Skype is that their sounds suck. Their chat services may be the best thing since pop-tarts but it doesn’t take long for their sound effects to grate on your nerves. You know, the audio notifications that you’ve got a new message, that people have logged on, that sort of thing.
The good news is that you can change the sound to whatever you want and in true geek style, I changed it to Han Solo’s blaster. So now whenever I get an instant message coming in, my office sounds like Docking Bay 94.
“wav” audio files abound on the internet. Some sites try to charge for wav files but you don’t have to pay for them as there are countless sites giving these audio files away for free. Just decide what you want and google it, along with a “.wav” at the end. So to get the blaster file, I put “blaster.wav” into Google and I also considered “lightsaber.wav“, “phaser.wav” and so on. Just try different variations of the type of file you’re looking for and you should get quite a few download links.
Just remember though to choose a sound that isn’t going to irritate you. If you get quite a few messages each day, you’re going to hear that sound over and over. So choose very carefully.
Then head over to the sounds and notifications section of your instant messaging program and upload your wav file :
I know for a fact that Pidgin and Skype allows uploading of audio files. I can’t speak for the others. Maybe users of other IM programs can let us know in the comments if their preferred IM programs allow this too.
The Newton virus is a perfectly inoffensive little Mac application that will never replicate itself, mail itself to your contact list or delete any of your files. According to its designer, it was made to revive the golden era of “fun” viruses, which were created to make pranks upon your friends. The little critter comes on a USB key that looks like a cross between an evil Apple logo and a carnivore PacMan. If you want to infect someone with it, all you need to do it to plug the device on a Mac system for a few seconds and remove it. The Virus will then execute itself at a completely random time, and it will do so only once. Check out the following video to see it in all its destructive glory.
Gary Gygax, the co-creator of Dungeons and Dragons, passed away earlier today at his home in Lake Geneva, Wisconsin. He turned in his character sheet. Rolled a critical fumble; smote by the gods.
This amazing CG animation was created by a small French media marketing company named Akama Studio to promote Nestlé’s KitKat chocolate bar. I normally wouldn’t post something like this, but this animation is way too well made to be ignored. Enjoy!