Removing a Custom Service Added via Automator in Mac

To remove a custom service added to a finder or any other application using Automator, follow the following steps :

1. Open the application for which the service is attached.(Lets say finder).

2. Go to Application menu (Here Finder menu).

3. Here choose Services submenu.

4. In this you will be able to see the scripts attaches. Here select the Services Preferences menu.

5. From the window which appears, deselect the attached script you want to remove.

6. Close the window and you are done.

We can reenable the service using the same procedure and selecting the service from the list.

Security Tips for Smartphone Users

Here are seven best tips to keep your phone and personal data as safe as possible.

Encrypt public Wi-Fi transmissions.

If you’re using Wi-Fi in a public place, anyone with packet sniffing software can eavesdrop on your transmissions to and from with the wireless router. That’s why it’s best to encrypt as many communications with websites as you can.

Not every online service offers encryption — for example, Facebook, Twitter and Gmail do, but Yahoo! Mail doesn’t. Going to websites with “https” in the address is good, but those sites don’t always encrypt everything you do.

There are several third-party apps available to provide firewalls and encryption (or both) to your smartphone for use on public Wi-Fi networks.

Enable remote ‘wiping’ of data.

Pressing a button on a website to restore your smartphone to its factory state, thus erasing all user data, is the single simplest way to make sure your information doesn’t fall into the wrong hands if your phone is lost or stolen.

First thing anyone should do when he or she loses a phone is to hit the remote-wipe button from a PC, especially if the phone is lost in a public place. It doesn’t take long to get to a public terminal in an airport or hotel.

All the major smartphone operating systems offer this feature

Don’t store passwords on the phone.

Accessing email accounts and social networks often relies on stored passwords, usually in a “keychain” file, which lets the various apps automatically log into those accounts.

Convenient as that may be, it’s better to simply not have the keychain file on your phone at all. The safest place for passwords is always in your head.

Avoid location “check-ins.”

Similarly, a lot of apps, such as Foursquare and Facebook, ask for constant updates of your physical location. Not that many apps really need that information. There is no reason to tell someone where you are when you’re ordering something online or streaming music. If you don’t want to tell the world  that you’re not home, then disable this option.

Turn off geotagging, or turn off photo auto-uploads.

Many smartphone social-networking apps automatically upload photos to the Internet.Many phones embed location tags, also called “geotags,” right into the photo files themselves.

Anyone with the right software can look at your Facebook or Flickr photos and determine where you’ve been. If you’re auto-uploading images, it’ll tell them where you are at that very moment.

The geotagging feature can be turned off on most phones. If you’d rather keep the geotags, then turn off auto-uploading of photos instead.

Use a PIN code or pattern lock on your phone.

Most smartphones have an optional locking feature that requires a password or passcode to use the phone. Android phones also offer a “pattern lock” that allows you to create your own connect-the-dots diagram instead of a password.

Install anti-virus software, and keep it updated.

With the explosion of smartphone software came an explosion of smartphone malware. Anti-virus should be installed and keep updated to avoid these malwares.

Types of hackers

  • White hat (Ethical hacker) : Breaks security for testing vulnerabilities in a security system. Ethical hacker performs penetration tests and vulnerability assessments within a contractual agreement.
  • Black hat : Breaks into secure networks to destroy data or make the network unusable for those who are authorized to  use it.
  • Grey hat : A combination of Black Hat and White Hat hacker. They surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked.
  • Elite : A social status among hackers for the “most skilled” one. Newly discovered exploits circulate among them.
  • Script kiddie : A non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept.
  • Neophyte (noob or newbie) : Someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of the technology and hacking.
  • Blue hat : Someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed.
  • Hacktivist : A hacker who utilizes technology to announce a social, religious, political message.

Multipoint Wireless Data Acquisition System for Smart Vehicle

In the design of vehicles of public transport as much as private, it is important to know the real load properties which are put under the vehicle. Although typical load histories are available, these files were obtained in other countries where the conditions of the ways and the operation of the vehicles are very different. In order to be able to obtain histories of loads in the conditions of our country, a system based on a wireless sensing modules network has been developed to measure deformations, temperature and accelerations in multiple points of the vehicle in real time. The obtained data of each sensor is prepared, processed, stored and transmitted in time intervals towards a receiver, which is in charge to send them to a Internet server for its storage, visualization and analysis for any user connected to the network who have accessibility to the collected information and can make the pertinent procedures and actions. In this work the design of the instrumentation system is based on a wireless sensing modules network and its uses the GPRS protocol which is based on GSM cellular technology, it permit send all the data received from each wireless module to the server host.

This project includes features like fuel leakage detection, engine temperature, alcohol detection, speed measurement, location of car using Global Positioning System, all the data is recorded on a smartcard. Using GSM technology the current detail of the car can be sent to a dedicated mobile. The project is developed using ARM microcontroller.

Terahertz Imaging

Terahertz radiation are nothing but electromagnetic radiation with a frequency range in teraheartz(10^10).Terahertz radiation can penetrate fabrics and plastics so it can be used in areas like security screening, to detect the objects concealed under the clothing of a person, remotely. Different objects will have different intensities in the image like the intensity of clothing will be very low where as that of  metals, wood, stone will have a higher intensity. This offers the possibility to combine spectral identification with imaging. Passive detection of terahertz images avoid the bodily privacy concerns of other detection by being targeted to a very specific range of materials and objects.

It can also help the blinds, if we fit some terahertz sources in the walking stick for getting an information about the obstacles in his path by providing some vibratory alarm for high intensity images or something.


what is cryptography????………
Want to save  your accounts,messages,personal deatails…….. from others  cryptography may help u.Cryptography is a technique through which the message to be send are encoded in some other format so that an un-authorised user may not acess the original message.
The origin of cryptography is usually dated from about 2000 BC, with the Egyptian practice of hieroglyphics.
Cryptography can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network. Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical. Symmetric encryptions, or algorithms, use the same key for encryption as they do for decryption. Other names for this type of encryption are secret-key, shared-key, and private-key. The encryption key can be loosely related to the decryption key; it does not necessarily need to be an exact copy.Asymmetric cryptography uses different encryption keys for encryption and decryption.he asymmetrical cryptography method has been proven to be secure against computationally limited intruders
goals:data security,data authentication,data integrity,data confidentiality
simple representation:plain  text—>encryption—>cipher text formed—>decryption—>text retrieved safely
several new cryptographic techniques are available………


Do you know what is Steganography?

Steganography is the method of hidding message in such a way that no one apart from the sender and the intended recipient can view the message.The word steganography means concealed writing..

a small comparison with steganography and cryptography..

  • the goal of cryptography is to make data unreadable by a third party,
  • the goal of steganography is to hide the data from a third party

With computers and networks there are many other ways for hiding message which include

  • covert channel
  • hidding text within webpages
  • null ciphers

The following formula provides a very generic description of the pieces of the steganographic process.


Image steganography:technique to pack the hidden message into insignificant bits in  image data.

Audio steganography:here hide the message inside an audio file.Here the messages can be embbeded using LSB algorithm.

LSB Algorithm:

  • select an audio file
  • secret message is embedded at the least significant bit of the audio file
  • sender and recipient share the secret key.
  • in destination as soon as the audio file is got,the message will be stored in a buffer
  • the message can be retrieved only by using the stego_key