skip to main | skip to sidebar

Wednesday, September 14, 2011

GLONASS - The Younger Brother or An Adequate Response to GPS?

5 comments
Determination of the location for many centuries it was a whole art. It is striking how representatives of the ancient civilizations made sea travel, arriving exactly at the destination. They used with the techniques that can sometimes strike a modern man. It was no joke - to make a long voyage, navigating by the sun and the stars "by sight"?

It is believed that the first cards appeared in the IV century BC. Later the invention of the astrolabe, quadrant, sextant, compass and then, then the gyro. Thanks to the efforts of geographers, astronomers and tourists on the cards was applied to an increasing amount of detail.

For many centuries people dedicate their lives to the development of cartography and navigation. And these skills were highly valued. Drastically changed with the advent of all of the space age - navigation became available to everyone anywhere in the world.

Modern navigation

The conquest of a man near-Earth space was the impetus for the development of many areas of science and technology. Every second satellites transmit vast amounts of information of various types: the results of shooting at different ranges of a certain area of the Earth's surface and to satellite television, which has become habitual. Sin does not use this to solve the problem of determining its location.

A few words about the GPS ...

GPS (Global Positioning System) - the satellite navigation system. This system was originally developed by U.S. Department of Defense, through which, incidentally, saw the light of the global Internet.

The first satellite of the 24 needed to cover the entire surface of the Earth, was launched in 1974, the last - in 1993. Now continue launching advanced satellites to replace the defective.

The system is used to provide navigational data of both civilian and military. And the accuracy of data collected by the military, above that provided by the use of additional ranges and immunity encoded signal.

GPS-receivers, whose existence is not only lazy, or have heard the representatives of the African tribes use public channels of navigation information.

... And GLONASS

Lagging behind the Americans, under the auspices of the Ministry of Defense, in 1982 launched the first satellite system GLONASS (Global Navigation Satellite System). Satellites in this system is also 24, and their "park" is also constantly being updated.

Roskartografiya developed appropriate card in Russia and abroad are available GLONASS receivers.

However, the accuracy of the GLONASS coordinate inferior competitor. The cause and the number involved in the system of ground stations, and in coding the signal, and the accuracy of data ephemeris and almanac.

Brothers forever?

The fact that GLONASS should be demonstrated by the fact that some foreign and domestic companies produce hybrid receiver - a device that can operate simultaneously with the GLONASS and GPS satellites at the respective frequencies, using the desired signal format.

One of them - a Russian company Lexand. Navigator Lexand SG-555 - almost the first GLONASS / GPS navigator (after several failed experiments), which anyone can buy at retail.

The main advantages of not only Lexand SG-555, but all hybrids are as follows:

- A higher rate of cold and hot start;

- High positioning accuracy;

- High stability when a signal is received.

Marketing ploy? Not at all. To determine the coordinates on the surface of the earth and GPS, GLONASS, and must establish a connection with at least four satellites! In the GPS receiver in an active 24 satellites, the receiver GLONASS - the same as a hybrid - the same Lexand SG-555 - already 48. Almost fifty!

Not surprisingly, the four-any connection is made quickly enough.

Here we recall and about the stability of the signal. Buildings, topographic features, clouds and even the foliage of trees can temporarily hide one or more satellites. But tune in to the other hybrids easier, again, for the reason indicated in the preceding paragraph.

The same is true and accurate. Numerous sources claim:

- The more satellites the receiver sees, the more accurate will be determined by the coordinate;

- GLONASS satellites in the northern hemisphere are better GPS satellites due to a tilt of the orbit.

No comments.

Alas, the accuracy and incidence of GLONASS devices - so far "younger brother". But he has every chance to become a "proper response". But we, the users still enjoy the smooth running of the hybrid receivers, which combine the best qualities of both.

Short Educational Program on the Work of Navigators. What is The Ephemeris and Almanac?

0 comments
The processes taking place in modern technology, the user is a mystery. Moreover, the user often they did not care, either not interested or simply do not care. This applies to the navigators. Included - and you know your coordinates. A few finger movements - the route is ready. Sometimes, however, to understand the technical characteristics of the same browser, you must know more than you need just to use it.

So, make a reservation at once: the article will be of interest to those who are not satisfied with the role of an ordinary user "black box with a screen." For those who want to explore all points of the technical characteristics of the device before purchase. For those who enjoy understanding the processes occurring in a variety of devices.

Such people do not say "I do not know" to questions like: "What is on your computer has a processor?". Question-what is essentially an elementary, but you'll be surprised at what percentage of fellow comrades know the answer to it. Try it!

A little about the terms

In every field of science and technology is full of terms. These terms are sound mysterious to the uninitiated, but are, in general, understandable, a closer look.

In theory, satellite navigation system is also a set of terms. Not surprisingly, this sphere of knowledge and is associated with the movement of satellites in near-Earth space, and the reception, processing, signaling, and their coding.

Terms that are useful to be considered is the concept of the almanac and ephemeris. Why are these concepts we are interested in? Yes, because the knowledge of these concepts is based understanding of the "cold" and "hot" start device.

Almanac of modern navigation and not just

Even before the era of satellite navigation concept Almanac already existed. Almanac named directory that contains the basic astronomical data - positions of celestial bodies and their binding to the calendar. One of the oldest almanac is a Chinese book Tong Shin.

Today heralds the appointment has not changed. Only changed the amount of data they contain, and their accuracy. Almanac of satellite navigation - the collection of data on the basic parameters of satellite orbits in the navigation system. The presentation of these data for us, actually, not so important.

Almanac contains six parameters of the satellite's orbit at a particular time. Each satellite system has data on other satellites. Navigator, establishing a link with only one companion, after receiving the almanac has information about the parameters of the orbit, and others. Almanac loaded in the memory of the satellite, valid for 30 days. Nevertheless, these data are specified more often - every few days during a session with one of the ground stations.

Ephemerides

In addition to the basic orbital parameters, the navigator receives from each of their satellites ephemeris, this data, which used to calculate the deviation of the orbit, the perturbation coefficients, etc. That is, with the help of their navigator with high accuracy can locate satellites.

Ephemerides carrying more precise data become obsolete much sooner. Their data are only active for about 30 minutes. They also updated the ground stations.

Without data on the location of navigation satellites can not determine the coordinates of the receiver. Necessary for the entire four satellites. On the singularities of the navigator and the inclusion of a "cold", "warm" and "hot" start, let's talk in the next article.

Sunday, August 21, 2011

You Can Think of to Account Security? No Password, and Login!

2 comments
Once again to further protect your accounts from hacking into some of the interactive customer resources Web 2.0, you can do this.

One of the vulnerable factors in the security of the Internet can not only be too simple password, and in addition thereto it is known to many around your e-mail.

Unfortunately, so are arranged, for example, Google and mail.google.com. From their e-mail accounts "grown up" social networks - and they coincide with the login authentication login address.

But there are systems in which as a login, you can use e-mail, not associated with the very resource. This is the case, for example, Facebook and several other social networks.

A similar situation, for example, in a variety of technological and technical Internet services - for example, many systems of contextual advertising. In the same way with the authorization process is organized in many famous Russian shops.

We make a general preliminary conclusion: safe / not safe by themselves may not be password or login name individually, but as if it was a pair of "login - the password." Since the password is something attackers can even pick up, but the login ...

The Internet is a set of email services - ordinary "mail" to find them easily. Register for one of them myself e-mail address and use it solely as a login in order to log into these systems. On it will receive messages of one kind only - incoming service announcements on these systems.

Yes, of course, superfluous "e-mail" - it is a pain, but think about what is more important: the additional security or conditional carelessness. Let this be your kind of network "door" to which only you will know and only you, because you are because of her no "show" - it will only work on the entry.

In this case:
- Never, to anyone, under any circumstances, does not tell your e-mail address;
- In any case, do not post it on your business cards;
- Never with anyone he did not write;
- Never "prescribe" the account to the POP3-and SMTP-settings for your email, use this almost exclusively through the web interface;
- In this case (see previous item) is always the "exit" from the email account for its next use.

You can, of course, to make such an address in the system of corporate e-mail domains - the system administrator of the company (organization, institution), where you say, work.

But a little-known in the remote mail system of various e-mails can be tens of thousands (and it also may be a dozen different to writing e-mail domains), and individual user nobody, in fact, is not needed.

But your extra corporate mailing address can easily know your system administrator. Even if it is - an absolutely honest man, your e-mail may be accidentally "seen the world", say, from a certain list of email addresses of employees who, being prepared for the banal reason that may later come to be in the trash.

The main conclusion: as a login in order to log into any interactive online system is to use e-mail, which in principle will be known solely to you.

When used as such, known to many of your mail write an attacker to "break" only a password.

In our more perfect case of need to know more and login.

Wednesday, August 17, 2011

Why Thematic Sites Generate More Money?

0 comments
Requests often come in a mini-audit of the owners of sites that collected information is heterogeneous.

Typically, these owners say as key words are the most popular themes: e-books, pay online, useful links, and of some of their personal interests. So what's wrong with that?

Bad - nothing. But no good.

Previously, these pages called Home page (home page), or "hamster." So they remain today. Because, besides the author and owner of the site, it is not interesting.

There are just too simplified versions. For example, a site with my personal photos. If the author has created it to all friends and had a chance to admire them - then no problem. But when an author wants to "get to first place in the word" picture "" - this is, to put it mildly, unwise.

So, the problem number 1 - this site very few people interested. At least, because that man was created, not so long to come to the Internet. And so it is hardly a collection of materials, which he dragged to the other sites of interest to others more experienced.

Problem number 2. The materials which are copied from other sites, or placed in violation of generally accepted rules (without attribution and links to the source site) or simply obsolete. (Which is sometimes more dangerous than you think. Depends on the subject. This is a separate article.) They are perceived negatively by Google. And this site does not occupy high positions.

Problem number 3. The Internet wins specialization. Where will look for refrigerators? On specialized sites. But not on the website "All about everything." Because nobody would think of it this look. A ranked first in terms such as "refrigerator" or other competitive terms, this site unrealistic.

Problem number 4. This site is difficult to unwind (if we forget about the first problem). Because every site should have a name. The more "telling" it would be better, the more people remember him. But what to call the site "Everything"? So we get the faceless names like "Portal Vasey Doe." Or louder - "Information Center ...."

And in the keywords to be simply a collection of popular keywords. And no use of this site will not be. Because the increase in its popular search phrases will be difficult. And if they raise, what then? For a while  then the author wants to make money on it, hang about five banners on every page. And would think that soon grow rich, with attendance of 50-100 people a day "on such a steep keywords." Hence the next problem.

Problem number 5. These sites have no prospects. First they are to assert itself. For him, they unwind, using all available means, including the Pyramids, the system simply wrapping counters and the automatic link exchange. And then what?

Then the site owner to get bored, and the project abandoned. Especially if he was on a free hosting. And then hosting? Granted, the author of the resource for it does not pay, then the value of any site in the head. If he had to pay 5 bucks a month, he would have thought a hundred times - that is put on paid hosting? And so, for free, and can distribute the junk. Just because it's interesting now.

In the best case, the author will learn the basics of html and php, will explore ways of site promotion, and he will make enough competent webmaster. He quickly realizes what sites should be done. Especially if you want to earn money on it.

And those who did not become sensible webmaster, is likely to tell everyone that the Internet - is nonsense, it's just a toy, and no persuasion from him. Or start packs to create a site (copy ready) to participate in a variety of pyramids and lure them to naive newcomers. In the first case of swell various myths about the Internet. In the second are the regular garbage sites that litter the Internet.

The moral of the article: Create themed sites. They are easier to spin and easier to sell them through something. But to successfully sell something in particular - should be properly plan for the site.

But on the plan - the next time.

Tuesday, August 16, 2011

How Much Does the Cat-Spy? History of Acoustic Kitty

0 comments
The film "Cats & Dogs" clearly shows that our pets should be checked not only for fleas and ticks, but the content of any spy devices. But it is in the film, but is it possible to turn a lump of purring fur intelligence agent in?

Let's look first at the opposite camp - the dogs. They have long been working in the field of security. Customs Service, Department of Narcotics, rescue - all of them anywhere without the dogs. But in the meantime the cat walk by themselves, even visited by a new batch of feed (or to shat in the tray or sneakers). Is there a cat Yuri Kuklachev representatives engaged in socially meaningful activities. The rest of the cats - the narcissistic lazy, selfish and parasites on society.

But what potential! Where you want to get through where you want, and because brain is - it can not deny. No, not such good fail. Talked about as the CIA in the early '60s, conceiving the project Acoustic kitty (Acoustic Kitty). Already from the name you can guess that the cat will be engaged in guinea wiretap negotiating a potential enemy, that is, the Soviet Union. No, the cat did not attempt to teach human language, and then give the general secretary of the CPSU Central Committee. All turned out to be darker (for the cat).

Equipment and training involved in a cat Department of Science and Technology by the CIA. It was his experts found a way to turn the animal into a living listening device. Recommend to owners and cat lovers to stop reading the article, when you come to describe the manipulation of the cat. Cat survived not the most pleasant transaction. He probably would have rather preferred to daily surgical castration, rather than all this. The transmitter and battery were implanted into the animal, and the antenna passes through the tail. The brain also had a few animal ... change, the cat did not feel hungry. Last had to do because, hungry, animal forgot about the duty to his country and began to look for food. After surgery, the cat was fed by force is not to die of starvation.

Office cat at the CIA was short-lived. After training, he was released on the lawn near the Soviet Embassy in Washington ... And a couple of minutes the cat was brought down to death a passing taxi. The project cost $ 20 million. And it's not today's papers of the State Bank USA, and real money. Experts from the archives of the U.S. National Security concurred that the cat still would not last long after that happened to him.

Former CIA officer Victor Marchetti (Victor Marchetti), told reporters: "They literally cut it in half, shoved into all of these devices and sewn back. They have created a monster. "

The sad story of a spy cat ended quite well for the founders of the project. Their work was rewarded. The CIA said: "Work undertaken reflects the enormous contribution of our employees, whose energy and imagination can be an example to all the pioneers of science."

Coincidentally, a year when the project "Acoustic kitty" ended in failure, the screens out the British film "The Spy with a cold nose", where the main role was played by a dog, "equipped" to spy on the "evil empire" (the Soviet Union again, if who do not know). Still, sometimes not leave fiction behind the screen.

Friday, August 12, 2011

How to Protect Personal Information Online?

0 comments
Scandals involving leaks of personal information on the Internet in recent years there with enviable regularity. Just recently discovered that in the search results of "Google" it is possible to obtain information about jobs in various online stores, including sex shops. In an open access was complete information about the customer, including name and full mailing address, as well as the contents of the order.

To do this, just enough to type a query «inurl: 0 inurl: b inurl: 1 inurl: c status of an order." Such a terrible gibberish actually stands for is quite simple: we ask to find pages that contain the phrase "order status", and in the URL of the page should present the symbols "0», «b», «1» and «c». Incidentally, in 2009, with the appearance in the query language of "Google" operator «inurl:» experts warned that in the first place hackers will appreciate its advantages, which will pick up sites that use repetitive engines with known vulnerabilities.

So in this case fell under the distribution of customers of online stores that use the script WebAsyst Shop-Script. Naturally, the extreme in this case is not found. The owners of online stores charge "Yandex" that his robots poke your nose where you should not. "Google" says that just does its thing, and blame the site owners do not provide safety information.

Suspicion fell a set of services "Google." Supposedly all the affected sites were on board this "snake". Finding your way is difficult, but nevertheless the search engine Google, which has the same operator «inurl:», personal information will not allow extradition.

But be that as it may, and the rescue of drowning - the handiwork of drowning. And his own drowning, too. Users are much easier to work attackers. For example, in the search results on that same terrible request, I found a page that allows a person to check the status of your order. Field "Order Number" and «E-mail» had already been filled. In order to get detailed information requested log - enter your last name.

It seems to be good. But e-mail address look like familiya_imya@mail.ru! Naturally, after entering this very site helpfully opened family me complete information about the order. Yes and no very obvious addresses of the form "chto-to@mail.ru" easy to calculate the surname. Enough, for example, simply make a search of this address on the Internet or access social networking "My World". For this you need only to address my.mail.yahoo / mail / xxxxxx / xxxxxx replace this "something" from the address. Most probably we will get on your personal page owner. And this is not a burglary, the man himself posted it on public display. And as to the personal page you can find out almost everything.

Therefore, by registering on social networking sites, forums, online stores, remember - you disclose about yourself is often much more information than appears at first glance. And no one knows who to hit this information, and how he will use it. For example, it is not surprising that the employer did not take to the driver, who on a personal page tells us that not paying attention to traffic lights, even if he lives in does that, and just wrote nonsense. Therefore, adherence to a few simple rules simply need to:

1. Minimize the communication on the Internet. It is clear that for many this is tantamount to a smaller board to breathe. But in this case, we can reduce the risk to a minimum.

2. Limit the amount of personal information that is publicly available. Use aliases and nicknames that are not associated with a real name. It is especially important to teach this child.

3. Use multiple e-mail address: Separate - for business and personal correspondence, separately - a public address (for forums, shopping carts and so on). Public address must provide the minimum information about the owner.

4. For different accounts and services should use different passwords. If you remember many passwords is difficult, it is possible to develop a simple mnemonic rule. For example, this: my password - the word "spade", then the first three letters of the site address and the number corresponding to the length of the name of the site.

Naturally, all this should not replace but complement the use of antivirus software, firewalls and other tools in the arsenal of technical protection, which is powerless if the user himself puts personal information online.

Wednesday, August 10, 2011

How to Write An Article in Windows 7?

0 comments
After reading the title, most would think: "Is he serious? What kind of question is this, frankly stupid? You open a text editor and ... "And that, ladies and gentlemen? Print! And not writing. I'm going to write. By hand.

This idea - not a whim but a desire to quickly step into the future. Two years ago, I would not have believed that I would do in a computer without a paddle-type "mouse". But here - no carpet, no rodent! More user-friendly tool drove less convenient. There was, in a deep philosophical sense, the evolution of human-machine! In this article predict a return to writing.

I will, unfortunately, biased, and explore the possibility of writing the text of one-sided - for example, the features of Windows 7. Fans of Apple and Linux users do not propose to hold holywar in the comments, and share their experiences handwriting - the most interesting, and the purchase of iMac is postponed indefinitely. Set as some Ubuntu, then to set up all night tablet driver, no desire at all.

Operating System Version - Max, therefore possibly some functions described by me, will not be available in less advanced assemblies. So, the guys from Redmond have prepared for the leap into the future? With Windows 7, when you connect the tablet machine comes with a virtual keyboard support for handwriting, and in the Control Panel, hiding two options: "Tablet PC Settings" and "pen and touch input." The latter offers a set of gestures for a pen tablet in combination with a touch screen.

Why do you want a pen for touch screen, which the producers sharpened by human fingers, remained unclear. The gloomy genius Ballmer? The first option is used to calibrate the touch screen and allows you to run a virtual keyboard. More precisely, the application-shifter, able to pretend and keyboard (screen), and "paper" for writing.

Hurry will not - start with the virtual keyboard. I tried two ways: by touch-screen poke your finger (see photo at the beginning of the paragraph), and the second option - to stick your cursor over the letters (a better result, however, by the time I got used and found a point). It turned out not so hot. However, with fast print and on the conventional, hardware, keyboard error missing. True, the print still comes out faster (yet). And besides, who said that the most important work - it's the speed?

Initially, this was a disadvantage, as an unfortunate location of the application window. It hides the left or right on the screen and a little comes out when the cursor is brought to the edge of the display. But here's the problem - sometimes in the province are the buttons interface of any application (browser, for example). And you want to poke a button and you get to "control gestures", which immediately turns around and occupy the lower third of the screen (well, not third, and somewhere in one-fifth of an exact count, but it still interferes, when there is no need in this panel) . I had already wanted to give up writing and turn off the application when the thought of to get into the "Tablet PC Settings" and got the opportunity pinned launch a virtual keyboard on the taskbar next to the language bar. There he lives.

Well, now switch the keyboard to handwritten input and try to write something. Enter text into any application can be: notepad, browser, graphics editor. When writing in Word, there are two options: either to remain a handwritten "cuneiform", or he, if you write on the virtual keyboard is converted to typed text. Print in the document where you have written something, you can. But the letter written by the editor, in fact, just the drawings, which will lie on top of a printed text. Slightly better is the case in OneNote - a tool for creating notes from MS Office. Printed text is divided into blocks that can be placed randomly in the document, and the free space insert notes or comments. At the same time the printed text can emphasize or highlight marker, as many like to do in the present paper documents.

As for an alternative text editor - Writer of a set of Open Office, then write directly to him is impossible. True, there is an article on the internet about inscribing Chinese characters when using Open Office in Ubuntu, but support for the Russian letters in the experiment could not be found. Therefore have to sacrifice the bottom of the screen (one-fifth) for the application of virtual input.

Somehow it seems to me that such tricks can be of interest to the child. In cases where the child refuses to learn the spelling of the standard method is to offer him a way to advanced. Not yet in play Crysis 2! Kalyakat on a computer can be any number. Now that regular, analog, paper will endure, the digital and even more so. The similarity of the e-mail with a drawing like returns us to the point of creation of the first icons. The story takes place in a spiral, and we were lucky (or unlucky) to be at a new round. After all, the sixth production cycle is not far off - there were a whole five years. But the cycles in different times, and finally the historical example of the importance of handwriting.

Being an old man, Nietzsche received a gift typewriter. This has helped to continue the philosopher writing. Losing sight of Nietzsche mastered the blind and print can type text with their eyes closed. It is true that the transition from writing for publication has changed (as Nietzsche thought Editors) style of his work - keep it simple, almost telegraphic. Philosopher agreed with the comments and moved the blame on a typewriter. Like, when we associate a letter written word and the idea of physically, by hand, but any printer (including the keyboard and computer to which the philosopher did not live) is an intermediary between the author and his text. A mediator brings is its change in relations between the two entities, whether the seller and the buyer (growth centers) or author and muse.

I would, of course, blamed not a typewriter, and old age and the increasing madness of Friedrich Nietzsche, but after reading enough of the Internet works - from blogs to online novels, writing for the importance of brain development will not challenge. Let until all this is nothing more than an experiment, but perhaps will soon be able to resurrect the epistolary genre, and we begin to really write to each other emails!