Friday, August 28, 2009


Washing Machine That Doesn't Need Water


British company Xeros looks forward to conquer the American market with its latest invention, a new washing system able to save a lot of water using nylon beads. The beads tumble wash clothes using 90 percent less water than traditional washers.
In addition, the company's latest invention, which is currently in the development stage, requires less detergent. Xeros claims that there would be no need for tumble drying and if the homes in the United States would switch to the new system, the emissions of carbon dioxide would be considerably reduced. The result would be as though 5 million vehicles have been removed from the road. The company also says that the new washing machine will save 1.2 billion tons of water each year, which equals 17 million swimming pools.
The washing machines does its job using small nylon beads that eliminate stains off clothes and lock them into the molecular structure of the nylon. The beadscan be used for hundreds of washes and afterwards they can be easily recycled. The technology behind the new washing machine is the result of a research carried out at the University of Leeds. It has been used in a concept washing machine by the Cambridge Consultants.
After carrying out tests for over three years, Xeros, a spinout from the University, managed to achieve an agreement with Kansas City-based GreenEarth Cleaning, which intends to market Xeros' latest invention across North American continent in 2010. You can read more about the product on the company's website.

No Washing Powder Required
Sanyo has announced it will begin marketing a washing machine which does not require washing powder or soap of any kind. The machine cleans the clothes by combining electrolysed water's dirt dissolving and bacteria removing properties with its ultrasonic wave technology. For really dirty clothes, there's a cycle suitable for using detergent, but if used in "zero detergent" mode, Sanyo claims the machine is capable of saving AUS$180 a year in detergent costs alone. No plans are in place for an Australian release just yet, but the Japanese domestic price of the machine will be around AUS$2000, meaning it will pay for itself in just over a decade.

Thursday, August 27, 2009


Quad-Core Processor

Intel Quad-Core Xeon E5450 Passive H E5450 , 3 GHz (BX80574E5450P) Boxed Processor



Overview

Introducing the Intel® Core™2 Quad processor for desktop PCs, designed to handle massive compute and visualization workloads enabled by powerful multi-core technology. Providing all the bandwidth you need for next-generation highly-threaded applications, the latest four-core Intel Core 2 Quad processors are built on 45nm Intel® Core™ microarchitecture enabling faster, cooler, and quieter desktop PC and workstation experiences.
Plus, with optional Intel® vPro™ technology, you have the ability to remotely isolate, diagnose, and repair infected desktop and mobile workstations wirelessly and outside of the firewall, even if the PC is off, or the OS is unresponsive.


Features and benefits


With four processing cores, up to 12MB of shared L2 cache¹ and 1333 MHz Front Side Bus the Intel Core 2 Quad desktops processor delivers amazing performance and power efficiency enabled by the all new hafnium-based circuitry of 45nm Intel Core microarchitecture.
Whether you're encoding, rendering, editing, or streaming HD multimedia in the office or on the go, power your most demanding applications with notebooks and desktops based on the Intel Core 2 Quad processor. Plus, with these processors you get great Intel® technologies built in²: Intel® Wide Dynamic Execution, enabling delivery of more instructions per clock cycle to improve execution time and energy efficiency Intel® Intelligent Power Capability, designed to deliver more energy-efficient performance Intel® Smart Memory Access, improving system performance by optimizing the use of the available data bandwidth Larger Intel® Advanced Smart Cache, optimized for multi-core processors, providing a higher-performance, more efficient cache subsystem. Intel® Advanced Digital Media Boost, accelerating a broad range of multimedia, encryption, scientific and financial applications by significantly improving performance when executing Intel® Streaming SIMD Extension (SSE/SSE2/SSE3) instructions. Intel® HD Boost³, implementing new Intel® Streaming SIMD Extension 4 (Intel SSE4) instructions for even greater multimedia performance and faster high definition video editing and encoding. Intel® Virtualization Technology (Intel® VT)², enabling greater security, manageability, and utilization. Future ready, designed to perform in highly threaded programs with powerful Intel® multi-core technology.

Tuesday, August 25, 2009

finger print door lock

Finger Print Door Lock





  1. Window 7

    .Windows 7 Home Premium offers a rich, dynamic entertainment experience on your PC, making it easy to create a home network and share all of your favorite photos, videos, and music. You can even watch, pause, and rewind TV or record it to watch whenever and wherever you want

    Features

    Run your PC more efficiently

    Pin any program to the taskbar: Any program is always just a click away – and




  2. you can rearrange the icons on the taskbar just by clicking and dragging.

    Record TV on your PC

    Record TV on your PC: Watch, pause, rewind, and record TV, movies, and other




  3. video content with Windows Media Center, updated to manage a single TV




  4. guide containing both standard and digital high definition TV shows.

    Easily connect a home network

    Share files across the various PCs in your home: Use HomeGroup to connect


  5. your PCs running Windows 7 to a single printer. Specify exactly what you want to share from each PC with all the PCs in the HomeGroup.





    Product Details


    System Requirements

    Microsoft Windows-based computers

    Processor 1GHz or faster 32-bit (x86) or 64-bit (x64) processor

    Memory 1GB RAM (32-bit) / 2GB RAM (64-bit)

    Hard Disk 16GB available disk space (32-bit) / 20 GB (64-bit)

    Video Card DirectX 9 graphics processor with WDDM 1.0 or later driver.

    Other 1For some Windows Media Center functionality, a TV tuner and additional hardware may be required. Windows Touch and Windows Tablet require specific hardware.

    DVD/CD authoring requires a compatible optical drive. Depending on resolution, video playback may require additional memory and advanced graphics hardware. Internet access required to use certain features (fees may apply).
    Music and sound require audio output.
    Some features in earlier Windows versions are not included in Windows 7. Get similar programs including Windows Live Mail™, Photo Gallery, Messenger and Movie Maker for free through Windows Live Essentials, at download.live.com.



















    Reasons to buy

    Record TV on your PC: Watch, pause, rewind, and record TV, movies, and other video content with Windows Media Center, updated to manage a single TV guide containing both standard and digital high definition TV shows.

    Personalize your desktop: Easily change backgrounds, window colors, and sounds to reflect your personal style. You can even turn your desktop into a slide show of your favorite photos.

    Enjoy better Web browsing with Internet Explorer 8: Get impressive new features such as Web Slices, which lets you track information such as auction items, sports scores, and weather reports without revisiting a site.

    Access recently used files with just two clicks: Right-click the relevant program icon (such as Word) on your taskbar and Jump List will show your most recent, frequently used, and pinned Word documents.

    Stream music files on any network-connected device: Just open Windows Media Player, right-click on what you'd like to hear, select Play To, and you'll see a list of devices and PCs on which you can play your music.

    Find virtually anything on your PC – from documents to photos to e-mail: Just click on the Start button, and enter a word or few letters in the name or file you want into the search box, and you’ll get an organized list of results.

    Share files across the various PCs in your home: Use HomeGroup to connect your PCs running Windows 7 to a single printer. Specify exactly what you want to share from each PC with all the PCs in the HomeGroup.

    Pin any program to the taskbar: Any program is always just a click away – and you can rearrange the icons on the taskbar just by clicking and dragging.

Monday, August 24, 2009


Blu-ray Disc



What is Blu-ray?
Blu-ray, also known as Blu-ray Disc (BD) is the name of a next-generation optical disc format. The format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data. The format offers more than five times the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer disc and 50GB on a dual-layer disc. For more general information about Blu-ray, please see our What is Blu-ray? section.



The name Blu-ray is derived from the underlying technology, which utilizes a blue-violet laser to read and write data. The name is a combination of "Blue" (blue-violet laser) and "Ray" (optical ray). According to the Blu-ray Disc Association the spelling of "Blu-ray" is not a mistake, the character "e" was intentionally left out so the term could be registered as a trademark. The correct full name is Blu-ray Disc, not Blu-ray Disk (incorrect spelling)The correct shortened name is Blu-ray, not Blu-Ray (incorrect capitalization) or Blue-ray (incorrect spelling)The correct abbreviation is BD, not BR or BRD (wrong abbreviation)



The Blu-ray Disc format was developed by the Blu-ray Disc Association (BDA), a group of leading consumer electronics, personal computer and media manufacturers, with more than 180 member companies from all over the world. The Board of Directors currently consists of:
ü Apple Computer, Inc.
ü Dell Inc.
ü Hewlett Packard Company
ü Hitachi, Ltd.
ü LG Electronics Inc.
ü Matsushita Electric Industrial Co., Ltd.
ü Mitsubishi Electric Corporation
ü Pioneer Corporation
ü Royal Philips Electronics
ü Samsung Electronics Co., Ltd.
ü Sharp Corporation
ü Sony Corporation
ü Sun Microsystems, Inc.
ü TDK Corporation
ü Thomson Multimedia
ü Twentieth Century Fox
ü Walt Disney Pictures
ü Warner Bros. Entertainment
What Blu-ray formats are planned?
As with conventional CDs and DVDs, Blu-ray plans to provide a wide range of formats including ROM/R/RW. The following formats are part of the Blu-ray Disc specification: BD-ROM - read-only format for distribution of HD movies, games, software, etc.BD-R - recordable format for HD video recording and PC data storage.BD-RE - rewritable format for HD video recording and PC data storage.There's also plans for a BD/DVD hybrid format, which combines Blu-ray and DVD on the same disc so that it can be played in both Blu-ray players and DVD players.
How much data can you fit on a Blu-ray disc?
A single-layer disc can hold 25GB.A dual-layer disc can hold 50GB.To ensure that the Blu-ray Disc format is easily extendable (future-proof) it also includes support for multi-layer discs, which should allow the storage capacity to be increased to 100GB-200GB (25GB per layer) in the future simply by adding more layers to the discs.

How much video can you fit on a Blu-ray disc?


Over 9 hours of high-definition (HD) video on a 50GB disc.About 23 hours of standard-definition (SD) video on a 50GB disc.
How fast can you read/write data on a Blu-ray disc?
According to the Blu-ray Disc specification, 1x speed is defined as 36Mbps. However, as BD-ROM movies will require a 54Mbps data transfer rate the minimum speed we're expecting to see is 2x (72Mbps). Blu-ray also has the potential for much higher speeds, as a result of the larger numerical aperture (NA) adopted by Blu-ray Disc. The large NA value effectively means that Blu-ray will require less recording power and lower disc rotation speed than DVD and HD-DVD to achieve the same data transfer rate. While the media itself limited the recording speed in the past, the only limiting factor for Blu-ray is the capacity of the hardware. If we assume a maximum disc rotation speed of 10,000 RPM, then 12x at the outer diameter should be possible (about 400Mbps). This is why the Blu-ray Disc Association (BDA) already has plans to raise the speed to 8x (288Mbps) or more in the future.



MPEG-2 - enhanced for HD, also used for playback of DVDs and HDTV recordings.MPEG-4 AVC - part of the MPEG-4 standard also known as H.264 (High Profile and Main Profile).SMPTE VC-1 - standard based on Microsoft's Windows Media Video (WMV) technology.Please note that this simply means that all Blu-ray players and recorders will have to support playback of these video codecs, it will still be up to the movie studios to decide which video codec(s) they use for their releases.


Linear PCM (LPCM) - up to 8 channels of uncompressed audio. (mandatory)Dolby Digital (DD) - format used for DVDs, 5.1-channel surround sound. (mandatory)Dolby Digital Plus (DD+) - extension of Dolby Digital, 7.1-channel surround sound. (optional)Dolby TrueHD - lossless encoding of up to 8 channels of audio. (optional)DTS Digital Surround - format used for DVDs, 5.1-channel surround sound. (mandatory)DTS-HD High Resolution Audio - extension of DTS, 7.1-channel surround sound. (optional)DTS-HD Master Audio - lossless encoding of up to 8 channels of audio. (optional)Please note that this simply means that Blu-ray players and recorders will have to support playback of these audio codecs, it will still be up to the movie studios to decide which audio codec(s) they use for their releases.


No, the development of new low cost hard-coating technologies has made the cartridge obsolete. Blu-ray will instead rely on hard-coating for protection, which when applied will make the discs even more resistant to scratches and fingerprints than today's DVDs, while still preserving the same look and feel. Blu-ray also adopts a new error correction system which is more robust and efficient than the one used for DVDs.


No, you will not need an Internet connection for basic playback of Blu-ray movies. The Internet connection will only be needed for value-added features such as downloading new extras, watching recent movie trailers, web browsing, etc. It will also be required to authorize managed copies of Blu-ray movies that can be transferred over a home network.


No, Blu-ray players will not down-convert the analog output signal unless the video contains something called an Image Constraint Token (ICT). This feature is not part of the Blu-ray Disc spec, but of the AACS copy-protection system also adopted by HD-DVD. In the end it will be up to each movie studio to decide if they want to use this "feature" on their releases or not. The good news is that Sony, Disney, Fox, Paramount, MGM and Universal have already stated that they have no intention of using this feature. The other studios, which have yet to announce their plans, will most likely follow suit to avoid getting bad publicity. If any of the studios still decide to use ICT they will have to state this on the cover of their movies, so you should have no problem avoiding these titles.


Yes, mandatory managed copy (MMC) will be part of the Blu-ray format. This feature will enable consumers to make legal copies of their Blu-ray movies that can be transferred over a home network. Please note that "mandatory" refers to the movies having to offer this capability, while it will be up to each hardware manufacturer to decide if they want to support this feature.

When will I be able to buy Blu-ray products?


If you live in the US or Canada you can already find Blu-ray players from Samsung, Panasonic, Sony, Philips and Pioneer available in stores, as well as a growing selection of Blu-ray movies. We also expect to see Blu-ray players from LG and Sharp, as well as a second-generation Blu-ray player from Samsung introduced in the near future. The first Blu-ray hardware and software should also be available in many European countries now.


As with any new technology the first generation of products will likely be quite expensive due to low production volumes. However, this shouldn't be a problem for long as there is a wide range of Blu-ray related products (players, recorders, drives, writers, media, etc) planned, which should help drive up production volumes and lower overall production costs. Once mass production of components for Blu-ray products begins the prices are expected to fall quickly. According to the Blu-ray Disc Association, the overall cost of manufacturing Blu-ray Disc media will in the end be no more expensive than producing a DVD. The reduced injection molding costs (one molding machine instead of two, no birefringence problems) offset the additional cost of applying the cover layer and low cost hard-coat, while the techniques used for applying the recording layer remain the same. As production volumes increase the production costs should fall and eventually be comparable to DVDs.
Blu-ray vs DVD

Will Blu-ray replace DVDs?


Yes, that's the expectation. The Blu-ray format has received broad support from the major movie studios as a successor to today's DVD format. In fact, seven of the eight major movie studios (Disney, Fox, Warner, Paramount, Sony, Lionsgate and MGM) have released titles in the Blu-ray format. Many studios have also announced that they will begin releasing new feature films on Blu-ray Disc day-and-date with DVD, as well as a continuous slate of catalog titles every month. For more information about Blu-ray movies, check out our Blu-ray movies section which offers information about new and upcoming Blu-ray releases, as well as what movies are currently available in the Blu-ray format. However, the two formats (Blu-ray and DVD) will most likely co-exist for quite some time until HDTVs become more widespread.

Will Blu-ray be backwards compatible with DVD?


Yes, several leading consumer electronics companies (including Sony, Panasonic, Philips, Samsung, Pioneer, Sharp and LG) have already demonstrated products that can read/write CDs, DVDs and Blu-ray discs using a BD/DVD/CD compatible optical head, so you don't have to worry about your existing DVD collection becoming obsolete. In fact, most of the Blu-ray players coming out will support upscaling of DVDs to 1080p/1080i, so your existing DVD collection will look even better than before. While it's up to each manufacturer to decide if they want to make their products backwards compatible with DVD, the format is far too popular to not be supported. The Blu-ray Disc Association (BDA) expects every Blu-ray Disc device to be backward compatible with DVDs.

Why should I upgrade from DVD to Blu-ray?


The simple answer is HDTV. If you've ever seen high-definition (HD) video on an HDTV, then you know just how incredibly sharp the picture is and how vivid the colors are. In fact, HD offers five times the amount of detail compared to standard-definition (SD). The problem with today's DVDs is that they only support SD and don't have the necessary storage capacity to satisfy the needs of HD. That's where Blu-ray comes in, it offers up to 50GB of storage capacity and enables playback, recording and rewriting of HD in all of the HD resolutions including 1080p. The format also supports high-definition audio formats and lossless audio. In addition to the greater video and audio quality, the extra storage capacity also means there will be plenty of room for additional content and special features. This combined with the new BD-J interactivity layer adopted by Blu-ray will bring the menus, graphics and special features to a whole new level. For example, you will be able to bring up the menu system as an overlay without stopping the movie, and you could have the director of the movie on the screen explaining the shooting of a scene while the scene is playing in the background. The advanced interactivity combined with the networking features of Blu-ray will also allow content producers to support new innovative features such as downloading extras, updating content via the web, and watching live broadcasts of special events. Thanks to the greatly enhanced HD video and audio quality as well as the advanced interactivity and networking features, Blu-ray represents a huge leap forward in the DVD viewing experience and will offer consumers an unprecedented HD experience.



Sunday, August 23, 2009


PC Lock

It is a very useful hardware designed by china, like USB,like Pen Drive having following features.
PC lock

Lock game

Control game

trim Lock Chat


It is a kind of USB key used for controlling computer programmers. It helps control children or emploees behavior on computers, also helps secure the private data etc.


Key Specifications/Special Features :



  1. PC lock

  2. Lock game

  3. Control game

  4. trimLock

  5. ChatLock

  6. internetControl online

  7. timeLock websites

  8. Lock all adult websites

  9. Lock CD/DVDs

  10. Lock computer system

  11. startScreen moniter

  12. Save onine log records

Saturday, August 22, 2009

Computers and Internet

ExportersIndia is a company , maintains a large database consisting of manufacturers, exporters, retailers, wholesalers and suppliers of computer & software and various other categories related with computer & software like: computer peripherals, modems, network device, notebooks/laptops, printers & scanners, ups & power supply, keyboards etc. Access to computers and the internet and the ability to effectively use this technology are becoming increasingly important. Computers play an essential role in industry, commerce, government, research, education, medicine, communication systems, entertainment and many other areas of our society. Professionals who contribute to the design, development, analysis, specification, certification, maintenance and evaluation of the many different applications of computer & software have a significant impact on society, making thereby beneficial contributions to society. Manufacturing and the export of computer & software parts are constantly rising. India is one of the leading manufacturer and exporter of computer & software parts. China is the largest exporter of computer parts and accessories.

Friday, August 21, 2009

Motherboard
The motherboard is the "brain"of the computer. Components directly attached to the motherboard include:
The central processing unit (CPU) performs most of the calculations which enable a computer to function, and is sometimes referred to as the "brain" of the computer. It is usually cooled by a heat sink and fan.
The chipset mediates communication between the CPU and the other components of the system, including main memory.
RAM Stores all running processes (applications) and the current running OS. RAM Stands for Random Access Memory
The BIOS includes boot firmware and power management. The Basic Input Output System tasks are handled by operating system drivers.
Internal Buses connect the CPU to various internal components and to expansion cards for graphics and sound.

Thursday, August 20, 2009

Google Earth

Google Earth is a virtual globe, map and geographic information program that was originally called Earth Viewer, and was created by Keyhole, Inc, a company acquired by Google in 2004. It maps the Earth by the superimposition of images obtained from satellite imagery, aerial photography and GIS 3D globe. It is available under three different licenses: Google Earth, a free version with limited functionality; Google Earth Plus (discontinued), which included additional features; and Google Earth Pro ($495 per year), which is intended for commercial use.

The product, re-released as Google Earth in 2005, is currently available for use on personal computers running Windows 2000 and above, Mac OS X 10.3.9 and above, Linux Kernel: 2.4 or later (released on June 12, 2006), and FreeBSD. Google Earth is also available as a browser plugin (released on June 2, 2008) for Firefox 3[4], Safari 3, IE6 and IE7. It was also made available on the iPhone OS on October 27, 2008, as a free download from the App Store. In addition to releasing an updated Keyhole based client, Google also added the imagery from the Earth database to their web based mapping software. The release of Google Earth in June 2005 to the public caused a more than tenfold increase in media coverage on virtual globes between 2005 and 2006, driving public interest in geospatial technologies and applications.

Wednesday, August 19, 2009


RAID
RAID is an acronym first defined by David A. Patterson, Garth A. Gibson and Randy Katz at the University of California, Berkeley in 1987 to describe a redundant array of inexpensive disks,[1] a technology that allowed computer users to achieve high levels of storage reliability from low-cost and less reliable PC-class disk-drive components, via the technique of arranging the devices into arrays for redundancy.
More recently, marketers representing industry RAID manufacturers reinvented the term to describe a redundant array of independent disks as a means of disassociating a "low cost" expectation from RAID technology.
"RAID" is now used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple hard disk drives. The different schemes/architectures are named by the word RAID followed by a number, as in RAID 0, RAID 1, etc. RAID's various designs involve two key design goals: increased data reliability or increased input/output performance. When multiple physical disks are set up to use RAID technology, they are said to be in a RAID array. This array distributes data across multiple disks, but the array is seen by the computer user and operating system as one single disk. RAID can be set up to serve several different purposes.

Monday, August 17, 2009

Transcend


Transcend have now announced availability of its new line of DDR3 ECC DIMM memory, the new RAM is server-grade and has built in thermal sensors. The is RAM is mainly intended for use in dedicated servers, however can also be used in workstations.
Transcend say that the RAM is “For high-end systems that constantly process huge amounts of data under non-stop operating conditions, CPU speed regulation and various other techniques to prevent overheating have become increasingly important in hardware design”.
All of these new memory modules come with a 3 year manufacturer and are currently selling at a range of prices starting at 3,000 Rs and ending at 8,400, what they will sell at in USD is yet to be seen.

Sunday, August 16, 2009

What Is The Department of Justice Doing About Internet Fraud?

Since February 1999, when the Department of Justice established its Internet Fraud Initiative, the federal government has been expanding its efforts to combine criminal prosecution with coordinated analysis and investigation as part of a comprehensive approach to combating Internet fraud.

Prosecution

The Justice Department has begun to bring a number of criminal prosecutions throughout the country against individuals and groups engaging in various types of Internet fraud. Here are some examples of federal criminal prosecutions directed at Internet fraud:
  • Auction and Retail Schemes Online

1. Oxford, Mississippi On August 27, 1998, a woman was sentenced in the Northern District of Mississippi to 15 months' imprisonment and $9,432 restitution on fraud charges relating to her conduct of a fraudulent scheme. The scheme involved her use of Web pages and interactive computer locations on the Internet for falsely advertising various computer hardware and software and computer accessories.

2. Philadelphia On March 2, 2000, three men were criminally charged in the Eastern District of Pennsylvania for their alleged roles in falsely offering the sale of Beanie Babies® on the Internet, and then failing to deliver the orders or sending stolen Beanie Babies® that generally were of substantially less value than the items ordered.


3. San Diego On March 6, 2000, a man pleaded guilty in the Southern District of California to mail and wire fraud in connection with his conduct of a fraudulent scheme involving Internet sales of Beanie Babies® that he never delivered.

4. Santa Ana, California On November 1, 1999, a man was sentenced in the Central District of California on mail and credit-card fraud charges to 14 months' imprisonment and $36,000 restitution, for his conduct of an Internet auction fraud that falsely offered digital cameras and laptop computers to consumers.

5. Seattle On August 6, 1999, a man pleaded guilty in the Western District of Washington to wire fraud in connection with his role in placing on various Web sites false advertisements for computer systems, for which he accepted victims' payments but which he never delivered.


6. West Palm Beach, Florida On February 12, 1999, a man was sentenced in the Southern District of Florida on wire fraud charges to six months home detention and more than $22,000 restitution, for his conduct of a fraudulent scheme in which he falsely advertised on Internet auction and retail sale Web sites computer components that he purported to have for sale, but did not have or obtain most of the merchandise he advertised.

  • Business-Opportunity Schemes Online


1. Los Angeles In November, 1999, four individuals were criminally charged in the Central District of California for their roles in conducting a fraudulent scheme, in which they sent out approximately 50 million e-mails that falsely advertised work-at-home opportunities for people but provided few actual opportunities for people who paid the $35 advance fee.

  • Investment Schemes Online "Pump-and-dump" schemes, short-selling schemes, Ponzi schemes, and other fraudulent investment schemes have all been subjects of federal prosecution throughout the country.
    1. Alexandria, Virginia In September 1997, a man was sentenced in the Eastern District of Virginia to one year's imprisonment and fined $20,000 on securities fraud conspiracy charges relating to his touting of a stock involved in a "pump and dump" scheme.

    2. Brooklyn, New York In August, 1999, four individuals were indicted in the Eastern District of New York on securities fraud charges for their alleged roles in the fraudulent promotion of eight stocks through misleading Internet Web site and e-mail newsletter profiles.

    3. Charlotte, North Carolina In 1999, two individuals pleaded guilty in the Western District of North Carolina to securities fraud charges for their roles in offering securities in a nonexistent investment bank that purportedly offered, among other things, a "guaranteed" 20 percent return on savings.
    4. Cleveland On March 22, 2000, four people were indicted in the Northern District of Ohio, on charges including conspiracy to commit and committing mail and wire fraud. The defendants allegedly devised and carried out a scheme to defraud "investors" in a "Ponzi" pyramid scheme. A company with which the defendants were affiliated allegedly collected more than $26 million from "investors" without selling any product or service, and paid older investors with the proceeds of the money collected from the newer investors.

    5. Los Angeles On January 4, 2000, two men were indicted in the Central District of California on securities fraud charges for their alleged roles in the NEI Webworld scheme described earlier. In addition, on August 30, 1999, the individual who conducted the PairGain Technologies scheme mentioned earlier was sentenced in the Central District of California to five months' home detention and $93,000 restitution.
    6. New York On August 9, 1999, a man was criminally charged in the Southern District of New York with securities fraud. The man allegedly conducted a scheme to unlawfully inflate the price of stock of a company involved in acquiring retail auto dealerships, by making various false claims that another company (located in the same office suite as the auto dealership company) had developed a cure for HIV infection and AIDS.


Credit Card Fraud

1. Ft. Lauderdale In November, 1997, a former graduate student was sentenced in the Southern District of Florida on wire fraud charges to four months' home detention, for a scheme in which he obtained the names of multiple students from a local university and fraudulently applied for 174 credit cards via the Internet. Because of the quick investigative work by the Postal Inspection Service, no losses were incurred.

2. Wilmington, Delaware In 2000, three individuals were indicted in the District of Delaware on charges of conspiracy, bank fraud, identity theft, Social Security fraud, and wire fraud, for their alleged roles in the military officers' Social Security number/credit-card fraud scheme described earlier.


Other Types of Internet Fraud


1. Los Angeles On February 7, 2000, a man was sentenced to 87 months' imprisonment for his role in a scheme that purported to provide immigration assistance to aliens seeking to become residents or citizens of the United States. Using Web sites, newspaper advertisements, recruiters, and word of mouth to offer their services to aliens, the leaders of the scheme typically charged more than $10,000 per client and promised that the client would receive particular immigration documents. In some cases, however, the leaders of the scheme provided their clients with counterfeit or false immigration documents; in other cases, they provided no documents at all, and blamed the government and the legal system for the delay in providing the promised documents.

2. Los Angeles In November, 1999, four men were criminally charged in the Central District of California for their alleged roles in conducting the "work-at-home" scheme described earlier.

Thursday, August 13, 2009

FILING COMPLAINTS ABOUT INTERNET FRAUD
If you think that you've been the victim of a fraud scheme that involved the Internet, you can file a complaint online with the Internet Crime Complaint Center, a joint project of the FBI and the National White Collar Crime Center. In addition, you can file complaints about specific types of fraud complaints with the following agencies:

Commodities Fraud: Commodity Futures Trading Commission (CFTC)

Consumer Fraud: Federal Trade Commission

Securities Fraud: SEC Enforcement Division Complaint Center or your state securities regulators.

Tuesday, August 11, 2009

TIPS ON SPECIFIC INTERNET FRAUD SCHEMES -
AUCTION AND RETAIL SALES SCHEMES

To reduce the chances that you may be victimized by fraudulent online auction or retail sales schemes, here are two basic tips:

Research The Prospective Seller Carefully.
If you haven't had personal (and favorable) experience with someone who's offering certain goods for online sale or auction, look for sources of information at the Web site where the offeror's information is posted, and at other Web sites. Some online auction sites provide their member with opportunities to provide "feedback" on their experiences with particular sellers (although certain sellers have tried to manipulate the "feedback" process by posting favorable but false reports about themselves).

Pay by Credit Card or Escrow Service If Possible.
If you charge your online purchase on a major U.S. bank-issued credit card, your liability may be limited to $50 under any circumstances, and at least one credit-card issuer has recently indicated that it will waive the $50 deductible. In the alternative, some online auction Web sites offer escrow services that (for a small percentage) will guarantee delivery of the ordered goods before releasing your payment to the seller.


INVESTMENT SCHEMES ONLINE
To reduce your risks from online investment opportunities that may be fraudulent, here are four basic tips:

A) Take Your Time In Making Investment Decisions.
Remember that in any "get-rich-quick" scheme, there's only one person who's guaranteed to get rich quick: the person promoting the scheme.

1) If you're thinking about pursuing some online investment opportunity, start by recognizing that you need to take your time in making decisions about what you do with your hard-earned money. Sound investing for the long term takes patience, the will to ignore momentary market fluctuations, and a carefully thought-out plan for reaching your investment goals.

2) Whether you're researching an investment opportunity on the Web, or talking with a broker or someone else who's offering you the opportunity, you should make it a habit to take notes of what you're reading or hearing. The North American Securities Administrators Association (NASAA) publishes an investor's notepad entitled, "When Your Broker Calls, Take Notes!" The forms are printed in notepad fashion so investors can get into the habit of making written records of their conversations with their brokers. The notepad is available from your state securities regulators or on the NASAA website at http://www.usdoj.gov/cgi-bin/outside.cgi?http://www.nasaa.org/whoweare/media/Notepad/html.

B) Research The Potential Investment Opportunity - And Who's Behind It - Carefully.
If you're making a major investment decision, here's an easy rule of thumb:
Count how many weeks, months, or years it took you to earn that amount of money, and then resolve to spend at least that many days to research the investment opportunity and the people who are promoting or running it.
Several agencies and self-regulatory organizations can give you a substantial hand with your research, at no cost to you:

1) The SEC's Web site, http://www.sec.gov/, contains a wealth of information about many companies, in at least two principal sources: (1) reports these companies file electronically through the EDGAR system; and (2) the SEC Enforcement Division's online files, which among other things list the persons against whom the SEC has filed civil enforcement actions for securities law violations (and, in some cases, against whom the Department of Justice or state or local prosecutors have filed criminal charges). You can use the built-in search engine at the SEC's Web site to check out names, and see whether you get any hits in the SEC enforcement action listings. The site also contains some excellent lists of questions to ask about any investment opportunity, and a discussion of how to spot signs of online investment scams.

2) The Federal Trade Commission's Web site, http://www.ftc.gov/, also has an internal search engine, which allows you to look for information on particular individuals or companies involved with your prospective investment, including listings of FTC enforcement actions.

3) The National Association of Securities Dealers (NASD) allows you to check for some disciplinary history on the broker or company that's touting a particular investment. Go to http://www.usdoj.gov/cgi-bin/outside.cgi?http://www.nasdr.com or call the NASD's Public Disclosure hotline at 800-289-9999.

4) State securities regulators in your state may also have information on the company or its organizers that you can obtain. Check your local telephone listings for the securities regulator in your state, or go to the North American Securities Administrators Association's Web site, http://www.usdoj.gov/cgi-bin/outside.cgi?http://www.nasaa.org, for a listing of state and provincial securities regulators in the United States, Canada, and Mexico.

5) If the potential investment involves commodities, you may also need to check out the Commodity Futures Trading Commission's Web site, http://www.cftc.gov/, and use its internal search engine to check out companies and people. The National Futures Association can also give you information on the disciplinary history of brokers or other commodity professionals, the registration status of firms and individuals, and arbitration and mediation procedures. Call them at 1-800-676-4NFA between 8:00 a.m. and 5:00 p.m. Central Time or go to http://www.usdoj.gov/cgi-bin/outside.cgi?http://www.nfa.futures.org.

6) If the prospective investment supposedly involves an Internet financial institution, go to the Federal Deposit Insurance Corporation (FDIC)'s Online Banks Web pages, and use the FDIC's Financial Institutions Search Engine you find there to see whether the financial institution has a legitimate banking charter and is a member of the FDIC.

7) When the potential investment is based outside the United States, remember that your money may be even more at risk, as you may have little or no recourse in the event of loss. The United Kingdom's Financial Services Authority allows investors to check out U.K. and European Union-based investment offers at its Central Register (call 01-71-929-3652).

8) Finally, use one or more of the many Internet search engines - like the ones available on your Web browser - to help you expand your research on the company's background and market performance.

If you use these resources, and find that one or more of the people behind your prospective investment has been subject to legal action, especially for investment offers, it's a very safe bet that the investment is a high risk at best and an outright scam at worst.


C) Boilers and "Boiler Rooms" Need High Pressure To Do Their Jobs. If someone online is insisting that you invest right away, or telling you that someone else will get the "deal of a lifetime" if you wait, ask yourself at that moment whether you're feeling pressured and uncomfortable. If you are, that's a major red flag warning you away from the investment.

1) Legitimate businesspeople and brokers don't need to subject you to "high-pressure" tactics to make you commit to an investment decision before you're ready. That's why the operations scam artists run are called "boiler rooms": like steam boilers, high pressure is what they're designed to generate (along with a wide array of lies, half-truths, and deceptive statements).

2) Even if you're in a chat room or online discussion group where everyone seems to be "just like you," enthusiastic about investing and looking for the next great investment, not everyone who's online at that moment is necessarily just like you. Some of the messages you see may be coming from someone working for the investment scheme's organizers - or even one of the organizers himself - who pretends to be someone else, so they can pressure you in less obvious ways and get you to fall for the scheme.

D) Check Out The Competition. If someone's promising you returns on investment that are far above what you see in the financial pages of your newspaper or at your local bank, ask yourself how they can possibly guarantee those fabulous returns.

1)Sometimes it's because, as in any good old-fashioned Ponzi scheme, they're paying older investors with money that newer investors gave them, and they're trying to string out the fraud to rope in as many investors as possible. Sometimes it's because they'll promise you anything, but give you nothing once you've entrusted your money to them.

2) If, after you've gone through all of the steps listed above, you still feel like the prospective investment is worth considering, talk to a broker, financial adviser, or banker with whom you've done business for a while, and ask whether his or her firm or financial institution can offer you a comparable type of investment with less risk.
a) The chances are that they'll say no, but they'll be willing to take time with you to walk through the information you have about the prospective investment and point out the risks you may be taking, as well as possible alternative investments that offer more realistic returns.

b)You lose nothing by consulting an investment professional about any major investment decision - and you stand to lose a lot if you don't.

GENERAL TIPS ON POSSIBLE INTERNET FRAUD SCHEMES

Don't Judge by Initial Appearances.
It may seem obvious, but consumers need to remember that just because something appears on the Internet - no matter how impressive or professional the Web site looks - doesn't mean it's true. The ready availability of software that allows anyone, at minimal cost, to set up a professional-looking Web site means that criminals can make their Web sites look as impressive as those of legitimate e-commerce merchants.

Be Careful About Giving Out Valuable Personal Data Online.
If you see e-mail messages from someone you don't know that ask you for personal data - such as your Social Security number, credit-card number, or password - don't just send the data without knowing more about who's asking. Criminals have been known to send messages in which they pretend to be (for example) a systems administrator or Internet service provider representative in order to persuade people online that they should disclose valuable personal data. While secure transactions with known e-commerce sites are fairly safe, especially if you use a credit card, nonsecure messages to unknown recipients are not.

Be Especially Careful About Online Communications With Someone Who Conceals His True Identity.
If someone sends you an e-mail in which he refuses to disclose his full identity, or uses an e-mail header that has no useful identifying data (e.g., "W6T7S8@provider.com"), that may be an indication that the person doesn't want to leave any information that could allow you to contact them later if you have a dispute over undelivered goods for which you paid. As a result, you should be highly wary about relying on advice that such people give you if they are trying to persuade you to entrust your money to them.

Watch Out for "Advance-Fee" Demands.
In general, you need to look carefully at any online seller of goods or services who wants you to send checks or money orders immediately to a post office box, before you receive the goods or services you've been promised. Legitimate startup "dot.com" companies, of course, may not have the brand-name recognition of long-established companies, and still be fully capable of delivering what you need at a fair price. Even so, using the Internet to research online companies that aren't known to you is a reasonable step to take before you decide to entrust a significant amount of money to such companies.

Sunday, August 9, 2009

Internet Fraud

The term "Internet fraud" refers generally to any type of fraud scheme that uses one or more components of the Internet - such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme.
If you use the Internet with any frequency, you'll soon see that people and things online tend to move, as the saying goes, on "Internet time." For most people, that phrase simply means that things seem to happen more quickly on the Internet -- business decisions, information-searching, personal interactions, to name a few - and to happen before, during, or after ordinary "bricks-and-mortar" business hours.
Unfortunately, people who engage in fraud often operate in "Internet time" as well. They seek to take advantage of the Internet's unique capabilities -- for example, by sending e-mail messages worldwide in seconds, or posting Web site information that is readily accessible from anywhere in the world - to carry out various types of fraudulent schemes more quickly than was possible with many fraud schemes in the past.

Major Types of Internet Fraud


In general, the same types of fraud schemes that have victimized consumers and investors for many years before the creation of the Internet are now appearing online (sometimes with particular refinements that are unique to Internet technology). With the explosive growth of the Internet, and e-commerce in particular, online criminals try to present fraudulent schemes in ways that look, as much as possible, like the goods and services that the vast majority of legitimate e-commerce merchants offer. In the process, they not only cause harm to consumers and investors, but also undermine consumer confidence in legitimate e-commerce and the Internet.


Here are some of the major types of Internet fraud that law enforcement and regulatory authorities and consumer organizations are seeing:


• Auction and Retail Schemes Online.

According to the Federal Trade Commission and Internet Fraud Watch, fraudulent schemes appearing on online auction sites are the most frequently reported form of Internet fraud. These schemes, and similar schemes for online retail goods, typically purport to offer high-value items - ranging from Cartier® watches to computers to collectibles such as Beanie Babies® - that are likely to attract many consumers. These schemes induce their victims to send money for the promised items, but then deliver nothing or only an item far less valuable than what was promised (e.g., counterfeit or altered goods).

• Business Opportunity/"Work-at-Home" Schemes Online.

Fraudulent schemes often use the Internet to advertise purported business opportunities that will allow individuals to earn thousands of dollars a month in "work-at-home" ventures. These schemes typically require the individuals to pay anywhere from $35 to several hundred dollars or more, but fail to deliver the materials or information that would be needed to make the work-at-home opportunity a potentially viable business.

Identity Theft and Fraud. Some Internet fraud schemes also involve identity theft - the wrongful obtaining and using of someone else's personal data in some way that involves fraud or deception, typically for economic gain.


  • In one federal prosecution, the defendants allegedly obtained the names and Social Security numbers of U.S. military officers from a Web site, then used more than 100 of those names and numbers to apply via the Internet for credit cards with a Delaware bank.


  • In another federal prosecution, the defendant allegedly obtained personal data from a federal agency's Web site, then used the personal data to submit 14 car loan applications online to a Florida bank.


Investment Schemes Online



o Market Manipulation Schemes. Enforcement actions by the Securities and Exchange Commission and criminal prosecutions indicate that criminals are using two basic methods for trying to manipulate securities markets for their personal profit. First, in so-called "pump-and-dump" schemes, they typically disseminate false and fraudulent information in an effort to cause dramatic price increases in thinly traded stocks or stocks of shell companies (the "pump"), then immediately sell off their holdings of those stocks (the "dump") to realize substantial profits before the stock price falls back to its usual low level. Any other buyers of the stock who are unaware of the falsity of the information become victims of the scheme once the price falls.


1) For example, in one federal prosecution in Los Angeles, the defendants allegedly purchased, directly and through another man, a total of 130,000 shares in a bankrupt company, NEI Webworld, Inc., whose assets had been liquidated several months earlier. The defendants then allegedly posted bogus e-mail messages on hundreds of Internet bulletin boards, falsely stating that NEI Webworld was going to be taken over by a wireless telecommunications company. At the time of the defendants' alleged purchases of NEI Webworld stock, the stock was priced between 9 cents and 13 cents a share. Ultimately, in a single morning of trading, NEI Webworld stock rose in 45 minutes from $8 per share to a high of $15 5/16, before falling, within a half-hour, to 25 cents per share. The defendants allegedly realized profits of $362,625.

2) In another federal prosecution in Los Angeles, a man who worked for a California company, PairGain Technologies, created a bogus Bloomberg news Web site which falsely reported that PairGain was about to be acquired by an Israeli company, and posted fraudulent e-mail messages, containing links to the counterfeit Bloomberg news site, on financial news bulletin boards. On the day that the bogus report was posted on the Internet, PairGain stock rose approximately 30 percent before PairGain issued its own press release stating that the report was false.


Second, in short-selling or "scalping" schemes, the scheme takes a similar approach, by disseminating false or fraudulent information in an effort to cause price decreases in a particular company's stock.



3) example, in one recent federal prosecution, a man who described himself as a "day trader" allegedly posted (more than 20 times) a bogus press release falsely stating that a major telecommunications- and Internet-related company, Lucent Technologies, Inc., would not meet its quarterly earnings estimates. The day trader allegedly traded approximately 6,000 shares of Lucent stock the same day that he posted the bogus press release. The false reports allegedly drove the stock's price down 3.6 percent and reduced Lucent's market value by more than $7 billion.
o Other Investment Schemes


Other types of fraudulent investment schemes may combine uses of the Internet with traditional mass-marketing technology such as telemarketing to reach large numbers of potential victims.



1) In a federal prosecution in San Diego, a major fraudulent scheme used the Internet and telemarketing to solicit prospective investors for so-called "general partnerships" involving purported "high-tech" investments, such as an Internet shopping mall and Internet access providers. The scheme allegedly defrauded more than 3,000 victims nationwide of nearly $50 million.
• Credit-Card Schemes.


Some Internet fraud schemes, which appear to be variations on the online auction schemes described earlier, involve the use of unlawfully obtained credit card numbers to order goods or services online.



1) One widely reported and intricate scheme, for example, involves offering consumers high-value consumer items, such as video cameras, at a very attractive price (i.e., below the price set at legitimate e-commerce Web sites). When a potential consumer contacts the "seller," the "seller" promises to ship the consumer the item before the consumer has to pay anything. If the consumer agrees, the "seller" (without the consumer's knowledge) uses that consumer's real name, along with an unlawfully obtained credit card number belonging to another person, to buy the item at a legitimate Web site. Once that Web site ships the item to the consumer, the consumer, believing that the transaction is legitimate, then authorizes his credit card to be billed in favor of the "seller" or sends payment directly to the "seller."

As a result, there are two victims of the scheme: the original e-commerce merchant who shipped the item based on the unlawfully used credit card; and the consumer who sent his money after receiving the item that the "seller" fraudulently ordered from the merchant. In the meantime, the "seller" may have transferred his fraudulent proceeds to bank accounts beyond the effective reach of either the merchant or the consumer.



• Other Schemes.


Some Web sites on the Internet have purported to offer those who want a "quick divorce" an opportunity to obtain a divorce in the Dominican Republic or other foreign countries for $1,000 or more, without even having to leave the United States. These sites often contain false, misleading, or legally inaccurate information about the process for obtaining such divorces (e.g., that neither spouse has to visit the country in which the divorce is being sought). Typically, people who have sent money to one of these schemes eventually receive false assurances that they are legally divorced. In fact, victims of the scheme have neither received legitimate legal services nor obtained valid divorces. People who are interested in obtaining a divorce, whether in the United States or elsewhere, should seek a lawyer with whom they can speak personally, and not rely solely on e-mail exchanges or online information.

Thursday, August 6, 2009

VIRUSES



VIRUSES and RELATED THREATS


virus: a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer ...


A program which can be transmitted between computers via networks (especially the Internet) or removable storage such as CDs, USB drives, floppy disks, etc., generally without the knowledge or consent of the recipient


PHASES OF VIRUS



l) Dormant Phase (idle phase)
II) Propagation Phase (the virus places an identical copy of itself into other program or system area on disk)
lII) Triggering Phase (The Virus Activated to perform the function)
lV) Execution Phase (The function is perform)




TYPES OF VIRUS



l) Parasitic Virus (tradisional and still most common form)
li) Memory-resident Virus (lodges in main memory)
lii) Boot Sector Virus (Infect a master boot record (MBR) and spreads when a system is booted)
lv) Stealth Virus (a Form a Virus explicite design to hide itself from detection by antivirus software)
V) Polymorphics (A mutates with every infection, making detection by signature of the virus imposible


HOME OF VIRUSES



l) Parasitic Virus (tradisional and still most common form)
li) Memory-resident Virus (lodges in main memory)
lii) Boot Sector Virus (Infect a master boot record (MBR) and spreads when a system is booted) lii) Stealth Virus (a Form a Virus explicite design to hide itself from detection by antivirus software)
lv) Polymorphics (A mutates with every infection, making detection by signature of the virus imposible




MACRO VIRUS



l) A Macro virus is platform independent
li) Infect document, not executable portion of code
lii) Easy spread most by electronic mail

About 3G


3G Technologies

-
3G technologies enabled faster data-transmission speeds, greater network capacity and more advanced network services. The first pre-commercial 3G network launched in May 2001 by NTT DoCoMo in Japan. The network was branded as FOMA. Following the first pre-commercial launch, NTT DoCoMo again made history with the first commrcial launch of 3G in Japan on Oct. 1, 2001.


The 3G technologies permit network operators a bigger repertoire of offerings to the public, at the same time having a bigger capacity via spectral performance. These services cover wide-area telephony and wireless data (broadband). Ordinarily, they would give services of 5 to 10 MB/second, but the emphasis is 'ordinarily'.
The 3G Network is a cell telephone network, and later on it embraced internet access, plus video telephony too. Very recently, December of last year, 190 3G network entities were running in forty nations, while 154 HSDPA networks were running in more than 70 countries. At Canada, Europe, USA, and Asia, the telecom firms utilize W-CDMA technologies, and they were supported by more or less 100 terminals for the 3G mobile systems.
Let us go to Europe, in this part of the world, 3G offerings got introduced in March, 2003 at Italy and the UK. Networks' rollout was affected (delayed) in some nations due to the big costs of licensing charges. For many nations, the 3G do not utilize the 2G's radio frequencies, thus, the operators have to erect new ones. Also, there were other delays, caused by the costs of upgrading for a new system.
Technical nature of the
3G mobile phones would all depend on the necessity for roaming to the 2G systems. As far as the leading countries are concerned, like South Korea or Japan, there was no such pressing need. Thus, the 3G phones or sets were small. That was not the case for America/Europe, manufacturing entities desired the multi-mode 3G handsets that could run on both 2G and 3G, one example would be the WCDMA. This would mean more weight, bulk, complications and naturally, the costs.
While this could be construed as a relative statement, many experts believe that the general inclination toward tinier phones has been stopped for a while. This is due to the presence of big-screen handsets that could give more gaming, video and even Internet access.
It could be said that the number one feature of the 3G is : it allows for a bigger number of data/voice customers, particularly from the urban territories. Not just that, higher data profiles at smaller incremental expenditures compared to the 2G systems.
The 3G network also permits the transmission of the 384 kbit/s to the mobile units, also, the 2 mb/s to the systems which are stationary.
How do we see all this 3G being applied in our daily lives? Well, number is the favorite of the married women, shopping- and translates to e-shopping. Think of it, one using his/her 3G phones or phone to access his bank account, and while in there, he would settle some bills. Not just that, he could then have a video-conference at the same time.
Let us assume that you are going to the South of France, those 3G phones could acquire the tour guides, or be used for the hotel reservations.

Latest 3G Phone Reviews

1. Sony Ericsson T707 LG Renoir
2.Nokia E63
3.DUALSIM Slider
4.Nokia N96

Popular 3G Mobile Phones

6.Nokia E63
7.Nokia N96
8.LG Renoir
9.Apple iPhone
10 Samsung D900i

Tuesday, August 4, 2009

About Pen Drives


Advantages and Disadvantages of Pen Drives

Advantages of pen drives are that they are resistant to scratches and dust. Some pen drives are water proof and can function even after being submerged in water. Their solid-state design means they often survive casual abuse. They are ideal for transporting personal data or work files from one location to another. The near ubiquity of USB support on modern computers makes it work everywhere. Pen drives have immense storage capacity and even inexpensive ones will hold lots of data. Top of the line pen drives have 64 GB storage. Power consumption of a typical flash drive is very low. Pen drives have no moving parts meaning that most modern operating systems can read and write to flash drives without any additional device turners. Pen drives are much more tolerant of abuse than mechanical drives.

Disadvantages are that they can sustain limited number of write and erase cycles before failure. Mid-range pen drives under normal conditions will support several hundred thousand cycles, although write operations will gradually slow as the device ages. Most USB pen drives do not include a write-protect mechanism. Write-protection makes a device suitable for repairing virus contaminated host computers without risk of infecting the USB flash drive itself. A drawback to the small size is that they are easily misplaced or lost. This is a particular problem if the data they contain are sensitive. It is for this reason that pen drives are now coming attached to key chains, necklaces and lanyards. They have limited capacity when compared to disk drives even in 2.5inch form factors. They get damaged or data is corrupted by severe physical impacts. Improperly wired USB ports can also destroy the circuitry of pen drives. Pendrives are costly .