Saturday, June 25, 2011

Ancient Process of Extraction of Iron from its ore in a small Village, Kakching during 19th Century

http://wwwchem.uwimona.edu.jm/gifs/blast.gif

During the 19th century a group of people in the North East Part of India called Kakching has produced Iron from its ore in their own method. But the process was banned by the then King of Manipur for he is worried that this people may rise against the king by using modern weapons made from the Iron produced by the people of Kakching.

A small description about Kakching:

It is a matter of much debate whether the term “kakching” originally referred to a group of people or a place. In the current usage it is being used for both the place and the people, I think. Traditionally, like many other communities in Manipur, Kakching was associated with a “sinpham” (an occupation). Smelting of iron is said to be the main occupation of the people of Kakching. The (main) patriarchal deity Ibudhao Khamlangba is intimately associated with the secrets of iron smelting. In an article published in 1910, by a British administrator-cum-ethnographer, J. Shakespear wrote this about the people of Kakching – “The people claim that their ancestors came from Cachar, whence their most important clan’s name, Meyang langbam, Meyang denoting a foreigner from Cachar. The story runs that the ancestors of the Meyang langbam and Khettri mayum clan were one day walking near Thoubal, and noticed some earth thrown out of a bamboo rat’s burrow, which resembled that in which iron was found in Cachar, so they gathered it and on their way home they met the Raja, who asked what they were carrying, and, being told, ordered them to experiment and report the result. Eventually the community,

Click here to get the pdf file of the extraction of Iron by the people of Kakching

Virus, Worms, Trojan hourse, Spyware, Malware, Adware ....


A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive

A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer

A Trojan horse, or Trojan, is a destructive program that masquerades as a benign application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.[1] Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.

The term is derived from the Greek myth of the Trojan War, in which the Greeks gave a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. However, after the Trojans dragged the horse inside their city walls, the Greek soldiers sneaked out of the horse's hollow belly to open the city gates and allowed their compatriots to pour in, capturing Troy.

Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

While the term spyware suggests software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet connection or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is provided by the term privacy-invasive software.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. [1] They may also be in the user interface of the software or on a screen presented to the user during the installation process. The object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware may come with integrated spyware such as keyloggers and other privacy-invasive software

Monday, February 4, 2008


A Computer that is considered, or was considered at the time of its introduction, to be at the frontline in terms of processing capacity, particularly speed of calculation is known as SUPERCOMPUTER. The term "Super Computing" was first used by New York World newspaper in 1929.

Extraction of pure water by Scientific Method

As the human population increases rapidly day by day there need a lot of new technology in all fields to improve or increase the products. Otherwise there will be an unbalance between the user and the product.

For instant, the amount of product (eatable food stuff) consumed by the consumers say ”x” is “y”, as the value of the “x” increase day by day, there needs new technologies to increase the value of “y” to protect from the imbalance.

Now here is a scientific method to extract pure water. Although around 75% of the earth is occupied by water, the pure water available in the earth is very less around 95% percent of total amount of water is salty and that why this water can not be used in day to day life.

So in countries like Australia, UAE etc a good technology to extract pure water from salty water is required. The very method to perform this job is known as Solar desalination

Saturday, February 2, 2008

Serial ATA Hard Disk and Parallel ATA Hard Disk


Both the Serial ATA (SATA) Hard disk and Parallel ATA (PATA) Hard disk are storage device which stores digital encoded data in a Computer. At the beginning Hard disk are made only for one purpose, i.e for storing digital encoded data in Computers but now a days the uses of it has expanded beyond computer to include Digital video recorders, Digital audio players, Personal digital assistants, Digital cameras and Video game consoles. In the year 2005 Samsung and Nokia design hard disk included mobile phone.

The main advantages of Serial ATA over the older Parallel ATA interface are faster Data Transfer, ability to add or take out devices from the system while operating (Hot swapping), thinner cables that lead air cooling work more efficiently and easier, and more reliable operation with tighter data integrity checks.

It was designed as a successor to the legacy Advanced Technology Attachment standard (ATA), and is expected to eventually replace the older technology (Retroactively renamed Parallel ATA or PATA). Serial ATA (SATA) adapters and devices communicate over a high-speed Serial cable.

Thursday, January 31, 2008

EEM-GTMS-300BK (latest optical (800dpi) module of a mouse)

As the human technology developed day by day we modify the existing technology in the better one for many purpose. EEM-GTMS-300BK is the new model of mouse having the following features, These mice are quickly morphing into something incredible and, perhaps, will soon turn into real ones reigning the computer screen
Related links

The EEM-GTMS-300BK finger mouse