DATABASE SECURITY SYSTEM WITH BIOMETRIC TECHNOLOGY

Security in the virtual world of technology at this very necessary considering the number of people who are familiar with these technologies, so many kecederungan want to know or even steal something that is very confidential or protected by the copyright laws for profit individuals with ways to krek or better known as “hackers”.

To anticipate these possibilities need any way that hackers can not be opened or stolen documents
confidential and only certain people can access. Many technologies have been developed to address database security, but, if passwords or passwords to remember atau harus other key must be hidden and probably will not forget the crack bigger, why not use something inherent in our own bodies without having to remember to remember.

To overcome the above method is developed biometric technology that has outstanding properties can not be eliminated, forgotten or transferred from one person to another, is also difficult to be imitated or forged.

Biometric technology is developed because it can fulfill two functions namely identification and verification, besides it has the characteristics such as biometrics, can not be lost, can not be forgotten and not easily falsified because inherent in human existence, where each other will not be the same, then uniqueness would be more guaranteed.

Biometric technology offers the biological authentication allows the system to recognize users more precisely. There are several methods including: a fingerprint scanning, retinal scanning, and DNA scanning.Two last method is still in its early stages of research, while fingerprint scanning is now widely used and is used in conjunction with a smartcard in the authentication process. In North America, a man named E. Henry in the year 1901 has been successful prior to use fingerprints to identify the dismissal of workers to cope with the double remuneration.

The use of fingerprint biometrics using New Generation Matching technology (NGM) for fingerprint management seeking the order list, has been applied at some airports for the waiting list. NGM is a fully operational technology, is a result of progress fingerprints, NGM allows for fingerprint processing at very high speeds. It only requires two individual fingerprints (the general index) to process a search among the millions of people. Achievement and ability with a perfect fit for the management of waiting lists.
In the implementation of the security of a fingerprint database of all data from every user who has access to a database maintained and purified in the database and the computer.
For example, following the implementation of fingerprint in the database are described from the quote the results of research “PerlMonks” which has a good heart to be able to access the source code of this program, as stated by PerlMonk in writing as follows: “This program is divided-distributed in the hope that it will be useful” , is as follows;

#!/usr/bin/perl -w
#$Header: sunfingerprint,v0.9 2000/12 afb$
#$! sunfingerprint: checks file list against Suns md5 database
# reads input file/stdin, of the format:
# /usr/bin/ls
# /usr/bin/cat
# that is, one file per line, md5's the files and fetches the results of
# a search against Sun's md5 executable db.
# Relies on some formatting of Sun's results page, which may vary someday.
# Always tests the md5 executable, also.
# fixed 20/0 matches oops - multiple matches appear for same exe in multiple
# Sol versions
# added -l libs flag so you can check lib files (not executables)

require LWP::UserAgent;
use Getopt::Std;
use strict;

my $debug = 0;
my $md5 = "/usr2/local/bin/md5­";
my $request;
my $output_all = 0;
my $errors_only = 0;
my $un_html = 1;
# Sun's fingerprint site
my $request_http = "http://sunsolve.Sun­.COM/pub-cgi/fileFin­gerprints.pl";
my $Usage = "Usage: $0 [-d X|-l|-e|-h|-o X] file_list
file_list: a text file w/ full path names for the files to be viewed
use - to use stdin, e.g.: find /bin -print | $0
-d X debug level X
-h   leave html tags in output
-e   errors only
-l   libs, ignore executable status
-o X output level X (0 matches only, 1 Sun results,
2 full text, 3 full html page)

";
my %opts;
# must have a file list
die "$Usage" unless @ARGV;
getopts('lho:d:e',\%­opts) or die "$Usage";
$debug = $opts{d} ? $opts{d} : 0;
$errors_only = 1 if $opts{e};
$un_html = 0 if $opts{h};
$output_all = $opts{o} ? $opts{o} : 0;
$output_all = 0 if $errors_only;

my $mdlist;
my %mdlist;
my %matches;
my $mdhash;

# read input, check file's existence/executable
while (<>) {
chomp;
next unless /^\s+\//;
$mdlist{$_} = "Not Found!";
if ( -s $_ ) {
$mdlist .= "$_ " ;
$mdlist{$_} = "Found";
if ( ! -x $_ ) {
$mdlist{$_} .= ", Not Executable" unless $opts{l};
}    # if ! -x
}      # if -s
}        # while <>

# add md5 exe to list
$mdlist .= "$md5";
# ugly hack
$mdlist{$md5} = "Found";

# md5 the files
open(MD5, "$md5 $mdlist | ") or die "can't open md5 $md5: $!";
while (<MD5>) {
$mdhash .= "$_";
}
close MD5;

# fetch the cgi results from sun
my $ua = LWP::UserAgent->new;
print STDERR "POSTing $mdhash to $request_http\n" if $debug > 20;
if ( $mdhash ) {
#$request = new HTTP::Request POST => $request_http;
$request = HTTP::Request->new('­POST', $request_http);
$request->content_ty­pe('application/x-ww­w-form-urlencoded');
$request->content("m­d5list=$mdhash");
} else {
die "$Usage";
}

print STDERR "Request: ", $request->content, "\n" if $debug > 20;
my $response = $ua->request($reques­t); #  actually fetch the doc

if ( $response->is_succes­s ) {
# split up the html return and process the lines between the
# "Results ..." line and the end of the list </dl>
my $pr = 0;
my $file_path;
print STDERR "Success\n" if $debug > 10;
foreach ( split(/\n/, $response->content) ) {
next if /^\s*$/;
if ( $pr ) {
last if /<\/DL>/;
s/<[ =#\/\w]+>//g if $un_html;
# line w/ sun's response:
# 36e7b0c2c6b2b391722c­2471688a060b - (/usr/bin/ls) - 1 match(es)
if ( /match/ ) {
print STDERR "match: $_\n" if $debug > 2;
# get file name and matches
/\((\S+)\) - (.*)/;
$file_path = $1;
# add Sun's response
$mdlist{$file_path} .= ", $2 w/ Sun";
$matches{$file_path} = "$_\n" if  $output_all;
} else {
$matches{$file_path} .= "$_\n" if  $output_all > 1 and $file_path;
}
}           # if pr
# start printing
$pr++ if /Results of Last Search/i;
}             # foreach content

# output the final data, input files and any results
if ( $output_all != 3 ) {
foreach my $file ( sort keys %mdlist ) {
if ( $errors_only ) {
$_ = $mdlist{$file};
print "$file: $mdlist{$file}\n" if /Not/ or / 0 match/;
} else {
if ( $matches{$file} ) {
print "$file: $matches{$file}\n";
} else {
print "$file: $mdlist{$file}\n\n";
}    # if matches
}      # if errors_only
}        # foreach file
} else {
# dump the whole page, if wanted
print "Content: ", $response->content, "\n";
}          # if output_all == 3
} else {
print STDERR "Result: cgi request failed! $request_http\n";
}

As described brief description of the following examples from the program: “Frank J Tobin> GnuPG-Interface-0:33> GnuPG:: Fingerprint.
1. Name
GnuPG:: Fingerprint – Fingerprint Objects GnuPG
2. Summary
# Assumes a GnuPG:: Key in $ key
my $ fingerprint = $ key-> fingerprint-> as_hex_string ();
3. Description
Gnupg:: Fingerprint Object is usually part of GnuPG:: Key Object, and not created on top of their own.
4. Method Object
Inisilisasi the method
new (% initialization_args)
This method creates a new object. Initialisasi optional argument is the data member, initialisasi conducted in a manner according to the method described it creates “new_hash_init” in Class:: MethodMaker
hash_init (% args).
This method works as described “new_hash_init” in Class:: MethodMaker
5. Object-related data
Note that this data member associated with each other via a reject methods that were created using a method other than the method described “get_set” in Class:: MethodMaker, or “object” in Class:: MethodMaker.
as_hex_string
This is the value of the fingerprint grooves that tangible objects, in the format string
In addition, the method is still a lot of other method of supporting the fingerprint program.

The fingerprint biometric techniques are seven forms of papillary ridge that is:
Loop, Arch, whorl, Tented Arch, Double Loop, Central Loop Pocked, and accidental. Besides, there is some measure of anatomical fingerprints, among others;
Ridge, Evading Ends, Bifurcation, Hook, Fork, Dot, Eye, Island, Enclosed Ridge, Specialties, Enclosed Loop, each of which has been described in atsas.
Fingerprinting techniques can be categorized into two methods; minutae-based and correlation-based, both have kelibihan and deficiencies in the correlation-based applications can provide better benefits than the minutae-based applications. Besides those in the fingerprint can also be classified based on the assignment of the fingerprint into a pre-specified types of five-class problem and four-class problem.
In the use of passwords with fingerprint biometric can provide better security, because passwords are not easily forged or lost because its existence inherent in human limbs that can not be changed except for injury or other damage insident bored.
As an illustration of programming can be seen in the source code quoted from “PerlMonks” and described briefly on the program quoted from “Frank J Tobin> GnuPG-Interface-0:33> GnuPG:: Fingerprint.

Advertisements

Peak Light Technology, USB 3.0 Port Router

Intel saw its new device called the Peak Light technology, which is used to connect many devices to remedy optic cable. This technology has the potential to be a substitute according to Intel’s USB 3.0, which means it will eliminate the need for regular use of the port is in a lot of gadgets nowadays. Peak Light Technology Intel has been published since last year, and according to a senior Intel, Kevin Kahn in the IDF in Beijing, Intel will manufacture this technology in late 2010 and expect a lot of partners that can help sales.

However, this trend trend optic cables are without electricity this can provide benefits that separate optic cable is also support for various protocols, such as for USB and Serial ATA, said Justin Rattner, head of Intel Labs. Peak Light can run multiple protocols at the same time and more than one line, so all the data for separate cables can be run on a single cable Peak Light. Intel explains, there is no conflict between the two technologies, namely Light Peak and USB. Intel saw the Light Peak is a complement of USB 3.0, because the Light Peak make USB and other protocols can run together in one long cable and high speed in the future, Kahn added.

According to Kahn, Light Peak can transfer data with 10Gbps speed or fast enough to send the Blu-ray movie in half a minute. Peak Light can be plugged in the laptop via a USB 3.0 port with an additional component to receive optical signals. According to Kahn, the USB 3.0 into a place fit for Light because it does not need anymore Peak Light Peak ports, especially for use in portable computers. While USB 3.0, a new version of USB is still slower than the rate of Peak Light 5Gbps signals, but faster than previous USB versions. (Heni Pratiwi

Canon PowerShot S95 S90 Successor carrying HS System and Video HD 720p

Famous brand Canon has recently launched a premium compact camera Canon PowerShot S90 Canon S95 as a successor. Camera Model Canon S95 This latest upgrade includes a sensor capable of recording 720p HD video and add the HS system and the system of ‘Hybrid IS’ that can muffle a wider variety of shock. Control Ring for lens which was introduced on the PowerShot S90 is further enhanced with a better level of flexibility lagi.Ukuran LCD is still the same as S90 is 3.0 inches with a level of detail 461 000 dot LCD screen PureColor II G type capable of displaying a better picture even in bright conditions.

Canon PowerShot S95 has a HS system – which is a combination of the 10.0 Megapixel CCD sensor with high sensitivity and DIGIC 4, providing great performance in low light conditions better than its predecessor. HS system allows the camera to support a maximum ISO 3200 at full resolution and work to reduce the occurrence of noise at all ISO for high quality images. Users can also set their own parameters in Auto ISO mode, with the ability to membatasikecepatan ISO while shooting.

Using the Low Light mode, the camera has a range of ISO 320 to ISO 12 800, captures images at 2.5MP resolution. untukManual control of ISO settings and white balance in low-light mode also provides greater control over pictures taken in dark conditions, which allows users to accurately capture the atmosphere of the dimly lit environment just like they see it. Low Light mode also allows high-speed image capture, capture up to 3.9 images per second so that each moment is not missed. Lenses used were 28mm wide angle with an optical zoom up to 3.8 times.

Now the owner of the main features of the Canon S90 is awaited features 720p HD video recording with frame rate up to 24fps with stereo sound. (Source)

Canon S95 Specifications Main:

* HS System & f / 2 lens
* High-sensitivity CCD 10 MP
* 28mm wide, 3.8x zoom lens, Hybrid IS
* Control Ring Lens, Full Manual & RAW
* 7.5 cm (3.0 “) PureColor LCD II G
* HD movies, HDMI
* High Dynamic Range mode
* Smart Auto
* Multi-Aspect Shooting
* Optional Waterproof Case

Dracula Therapy for Beauty

Technology Therapy Dracula who recently introduced can help you to overcome the problems of aging, look younger and have skin supple and beautiful. Dracula Therapy in this process is the doctor will take blood from your body, “filter”, then injected it back on your face. This therapy is also known as S3, short for Self Serum.hal stimulated this looks very simple (in the process of therapy)

S3 was first introduced by Daniel Sister, a French cosmetic doctor who opened the practice in London. Innovation that he created are believed able to restore youthfulness on someone’s face. The way he did was to take the patient’s blood, and then divided into red blood cells, serum, and platelets. After the added vitamins and amino acids, the serum is injected back to the face. According to Dr Sister, this action will make the patient more comfortable than synthetic fluids must receive injections in her face, or undergo laser peels are painful.

According to Dr Sister, this serum is rich in growth factors, proteins that can accelerate the natural healing and reverse the damage that occurs in the body. Such action is actually not the first time. All this time the serum therapy of this kind has been done by the dentist to cure the problems of the gums.

We will try this treatment, the doctor will take approximately four small bottles of blood from the patient’s arm. Blood then inserted into the centrifugal machine to separate the red blood cells. After a few moments, the little bottle out of the machine with a red blood clot on the bottom and a yellow liquid on top. Yellow liquid was separated, then mixed with vitamins and protein. The liquid is then injected on the whole face, starting from the section near the growing hair around the face to the jaw area, and other facial parts.

This action ended with lying under the red and blue lights therapeutic for wounds on the skin, once spent a bacteria, including bacteria that cause acne. This new injection will be seen the effect in a few days or weeks. Recommended for repeated treatment with the distance S3 is the next 4-6 months. Prices range from USD 7.9 million this therapy, which when compared with other beauty treatments are relatively cheap, but unfortunately the so-called Dracula Therapy treatment is currently only available in London.

Linux mint 9 Isadora

None of the most meritorious than Clement Lefebvre has announced the next major version of Linux Mint operating system. Was called Isadora, Linux Mint 9 is available starting today and ready for download. Open source operating system is distributed both to the architecture 32-bit and 64-bit, like a Live CD or Live DVD (with Oracle’s Java 6, VLC media player, OpenOffice.org, F-Spot, Samba, wallpapers and extra fonts Dejavu).

The existence of Linux Mint 9 (Isadora), itself based on the latest release of the Ubuntu operating system 10:04 LTS (Lucid Lynx), and is supported by the Linux kernel 2.6.32.11 same. Linux Mint 9 is equipped with more than 30,000 software packages repository, backup / restore the latest tools, Mint Menu has been repaired, the Windows installer, new artwork and lots of other good repair.

Linux Mint 9 This has an installer that has been modified and looks similar to the features possessed his colleagues Ubuntu 10.0. These operating systems include the latest features that spelled good. And one feature not found on the popular Ubuntu OS, is the welcome screen which is very helpful and instructive. The existence of a useful application and desktop improvements, such as Mozilla, Thunderbird 3 Pidgin or Open in Terminal script to Nautilus was also present in this release!

Linux Mint 9 (Isadora) was able to boot faster, with support for three years on the desktop and five years on the server (LTS release). In the presence of many good and beautiful wallpaper, some good themes GNOME and GNOME icon modest, would have made the operating system it will feel pleasant to the eye.

Literally, Linux Mint will still always be an operating system is elegant, easy to use, up-to-date, 100% free and the Linux operating system based on the popularity of the Ubuntu operating system. This operating system offers both a paid commercial support to companies and individuals. Ityu addition, of course, the existence of free community support available from the forum and IRC channel.

MRAM:The latest memory technology to beat the speed of RAM

A new type of memory for computers developed by German physicists and engineers will enhance the development of mobile computing and storage levels.
According to sources, that memory system works faster than the RAM is even more frugal energi.IBM and several other developers are planning to use MRAM, this MRAM will play the electrons to change the magnetic poles. This is also known as a spin-torque MRAM (swivel torque MRAM) technology is now being developed by the German physicist and engineer.
How it works is to build the pillars of the small size of 165 nano-meters, will result in the top layer of the magnetic variable will cause an electric current flows from the bottom up and will play the position of the electron. This magnetic field will change and just need a little time to change this magnetic field. Then north and south poles will switch, which would speed MRAM reach 10 times the speed of the RAM speed can still be further developed in the future.

BIODISC

World Health recently issued another health technologies that will add to the collection recovery solution for doctors is called biodisc technology.
According to reliable sources, the technology was invented by dr.ian Lyons who, after doing research for 25 years.
Invention and then tested in children suffering from leukemia (blood cancer) and conditions of these children recover with treatment over 13 months.

The workings of the device itself is using
nano resonance technology (the smallest part of the atom), using ordinary water that has been in treatment by the biodisc later in the drinking water twice a day
had a lot of testimonies from users of his biodisc & water treatment
(Several testimonies mentioning even water that has been in treatment by
biodisc effect is better than the hexagonal water bloom in the market).