Friday, August 10, 2012

WELCOME TO NORTON SCIENTIFIC JOURNAL

http://nortonscientificjournal.com/


Get your daily dose of science stories and announcements — for free! Norton Scientific Journal has everything covered in the field of science.

Norton Scientific Journal is organized specifically to help you find what you want. Fast. So browse in our numerous topic sections where you're surely find what you need.

Norton Scientific Scam - Fraud Prevention: Hottest Temperature at 7.2 trillion F in New York

Norton Scientific Scam - Fraud Prevention: Hottest Temperature at 7.2 trillion F in New York: http://nortonscientificjournal.com/research/ On June 25, the hottest man-made temperature has been recorded in a huge atom-smasher at Ne...

Hottest Temperature at 7.2 trillion F in New York

http://nortonscientificjournal.com/research/


On June 25, the hottest man-made temperature has been recorded in a huge atom-smasher at New York at 7.2 trillion degrees Fahrenheit — just 250,000 times hotter compared to the sun’s core.

This achievement occurred in the particle accelerator RHIC (Relativistic Heavy Ion Collider), a 3.9-kilometer tunnel under New York that researchers use to smash particles into one another to replicate conditions that happened a split-second after the Big Bang.

Creating the hot temperature in a controlled environment was done in Brookhaven National Laboratory through colliding gold nuclei with each other at the speed of light.

Once the collision of ions happened, the huge amount of energy it emits will melt the protons and neutrons in the gold nuclei, turning into a liquid composed of smaller particles called gluons and quarks.

At 7 trillion degrees Fahrenheit, normal matter would usually break down into sub-atomic particles, the gluons and quarks that supposedly composed the earliest plasma that scientist thought resembles the thing that consisted the universe right after the Big Bang happened, 13.7 billion years ago.

According to the head of the Brookhaven program, particle physicists formerly thought that quarks and gluons would be in gas form but this new study revealed that it is behaving more like a liquid. And while they already expected to get to such extreme temperatures, they were really surprised of it having an almost perfect liquid behavior.

Surprisingly, the liquid could occur at both ends of the spectrum — that is, a similar behavior of the liquid in trapped atom samples has been seen at extremely cold temperatures.

“Other physicists have now observed quite similar liquid behavior in trapped atom samples at temperatures near absolute zero, ten million trillion times colder than the quark-gluon plasma we create at RHIC,” said the head of Brookhaven’s particle and nuclear physics program.

The extremely hot temperature has been recognized by Guinness as the hottest temperature in history. By the way, Norton Scientific Journal measured that temperature through identifying the color of light coming from it.

Sunday, August 5, 2012

Norton Scientific Journal : Russian Startup Pirate Pay Claims to Stop Illegal Downloads


An up-and-coming Russian tech startup gained financial backing from Microsoft for developing a new technology that claims to shut down illegal downloads through torrents.

Pirate Pay (a homage to the prominent file-sharing site The Pirate Bay) has apparently stopped thousands of illegal downloads during a project carried out with big-time producers.

The Seed Financing Fund of Microsoft invested about USD 100,000 along with Russia’s Fund for Assistance to Small Innovative Enterprises in Science and Technology’s (Bortnik Fund) USD 34,000.

The founding team responsible for the project is composed of three Russian programmers — brothers Alexei and Andrei Klimenko together with Dmitry Shuvaev. Initially, they planned to build a program that could handle traffic management for file-sharing. But they soon realized that it could have other useful applications.

Pirate Pay CEO Andrei told Norton Scientific Journal, “After creating the prototype, we realised we could more generally prevent files from being downloaded, which meant that the program had great promise in combating the spread of pirated content.”

Pirate Pay would not really say how the system works but it is widely speculated that it floods torrent servers with bogus requests until they get warnings and terminate communication. This is because in order to download a file using torrent, one must need to know the IP address of another PC that has the file.

“We used a number of servers to make a connection to each and every P2P client that distributed this film. Then Pirate Pay sent specific traffic to confuse these clients about the real IP addresses of other clients and to make them disconnect from each other.”

Though not all the goals were accomplished, almost 50,000 users were not able to finish their downloads.

“It was not so hard to do from inside an ISP’s network. But to turn the technology into global service, we had to convince all ISPs to acquire our solution. That is what some could call mission impossible. So to create a global service, we had to find the way to do it from the cloud. So we needed money for development.” Andrei added.

He confirmed that high-level backing indeed permits their firm to turn its concepts into a profitable business.

They said that the service might cost customers from USD 12,000 to USD 50,000 but it still depends on the level of defense required. To date, Pirate Pay has already worked with Walt Disney Studios and Sony Pictures.

Norton Scientific Journal : Russian Startup Pirate Pay Claims to Stop Illegal Downloads

http://nortonscientificjournal.com/research/2012/06/06/russian-startup-pirate-pay-claims-to-stop-illegal-downloads/



An up-and-coming Russian tech startup gained financial backing from Microsoft for developing a new technology that claims to shut down illegal downloads through torrents.

Pirate Pay (a homage to the prominent file-sharing site The Pirate Bay) has apparently stopped thousands of illegal downloads during a project carried out with big-time producers.

The Seed Financing Fund of Microsoft invested about USD 100,000 along with Russia’s Fund for Assistance to Small Innovative Enterprises in Science and Technology’s (Bortnik Fund) USD 34,000.

The founding team responsible for the project is composed of three Russian programmers — brothers Alexei and Andrei Klimenko together with Dmitry Shuvaev. Initially, they planned to build a program that could handle traffic management for file-sharing. But they soon realized that it could have other useful applications.

Pirate Pay CEO Andrei told Norton Scientific Journal, “After creating the prototype, we realised we could more generally prevent files from being downloaded, which meant that the program had great promise in combating the spread of pirated content.”

Pirate Pay would not really say how the system works but it is widely speculated that it floods torrent servers with bogus requests until they get warnings and terminate communication. This is because in order to download a file using torrent, one must need to know the IP address of another PC that has the file.

“We used a number of servers to make a connection to each and every P2P client that distributed this film. Then Pirate Pay sent specific traffic to confuse these clients about the real IP addresses of other clients and to make them disconnect from each other.”

Though not all the goals were accomplished, almost 50,000 users were not able to finish their downloads.

“It was not so hard to do from inside an ISP’s network. But to turn the technology into global service, we had to convince all ISPs to acquire our solution. That is what some could call mission impossible. So to create a global service, we had to find the way to do it from the cloud. So we needed money for development.” Andrei added.

He confirmed that high-level backing indeed permits their firm to turn its concepts into a profitable business.

They said that the service might cost customers from USD 12,000 to USD 50,000 but it still depends on the level of defense required. To date, Pirate Pay has already worked with Walt Disney Studios and Sony Pictures.

Thursday, August 2, 2012

Norton Scientific Journal: Scams - Fall River, MA - The Herald News

Norton Scientific Journal: Scams - Fall River, MA - The Herald News: http://www.heraldnews.com/blogs/onmymind/x2130639276/Scams On My Mind Based on everyday experiences, a general conversation to help readers remain focused on their life objectives.



It used to be a scammer would come to your home, usually dressed as some type of a repairman (i.e., plumberroofer), and tell you it will cost thousands of dollars to do the repairs, but you would have to pay some money upfront. These scammers were eventually thwarted once the news media in television and printed newspaper go the word out to the public. It was a small victory to put a stop to it, but a victory nonetheless.
The next wave of scammer came in the form of postal mailings to your house or in the form of a phone call to your house. The mailing would state “you may have already won” or “your name and address were chosen” – something like that is how they got your attention. The phone calls were usually stating it was for some organization, some even stating it was for a police or firefighter organization. These scammers preyed on those who had their hearts in the right place and were willing to help do good in the community. That went on for some time until victims began going to their local news media outlet to report the victimization and complain that they weren’t happy with the way their local police department were handling the case. As with the first scammers, the scams were thwarted by the news media in both television and newsprint.
Then came electronic scamming by way of electronic mail, commonly referred to as email. Scammers even found a way to incorporate encoding into pop-up advertisements to install hidden software that would steal your information – or even to take control of your computer. This brought scamming to an entirely new level in which now it was clear that scamming people out of their money was now global. It took no time at all for companies like Microsoft and AOL to devise spam detection technology into their email programs. From this, came the birth of spam filtering software and webmail developers, as well as anti-virus and internet security software from companies like Symantec (Norton) and TrendMicro. The subject line reads “FBI…” or “Dear Beneficiary” HELLLOOOOO! This is one of many scams in the form of an email. Answer me this, if you can: Why would anyone open and respond to emails like this? As informed a society as we are, it makes no sense to me whatsoever why people would still be opening and even responding to emails like that – emails with the clear intention of getting your financial and other personal information so that these thieves can steal your money as well as your identity. In a thirty-day period, I receive up to nearly 300 emails like this – thankfully, those emails all end up in the SPAM folder automatically. Why would anyone click on a pop-up ad anymore? The encoding in some of those pop-up ads have viruses that will crash your computer hard drive or worms that will steal your passwords and personal/financial information.
Some scams that are seemingly as old as this country are better known as extortion. In 2010, a Florida woman was married to a seemingly wealthy man. She met another man at a gas station one day, and she came up with a plan to extort $50,000 from her husband, by a kidnapping plot. The two were caught, the husband divorced the woman, and a bill totaling $86,000 in overtime costs from the law enforcement personnel that were involved in this case. This was the costs that were involved for what was initially a kidnap-for-ransom case. One scam that I just saw was on Craigslist in the apartment/housing section for Rhode Island. An ad for a single family house and after the interested party stated it was not the right fit, the person who placed the ad simply said “Ok, just fill out the application and send the completed form to me.” <-THAT is phishing for your personal information. Another scam that actually surprised me: international scammers posing as United States military personnel – to get your money.
So what is the bottom line / moral of this writing? Trust no one but yourself and when in doubt, don’t open it!
Until next time!

Norton Scientific Journal: Scams - Fall River, MA - The Herald News

Norton Scientific Journal: Scams - Fall River, MA - The Herald News: http://www.heraldnews.com/blogs/onmymind/x2130639276/Scams On My Mind Based on everyday experiences, a general conversation to help readers remain focused on their life objectives.



It used to be a scammer would come to your home, usually dressed as some type of a repairman (i.e., plumberroofer), and tell you it will cost thousands of dollars to do the repairs, but you would have to pay some money upfront. These scammers were eventually thwarted once the news media in television and printed newspaper go the word out to the public. It was a small victory to put a stop to it, but a victory nonetheless.
The next wave of scammer came in the form of postal mailings to your house or in the form of a phone call to your house. The mailing would state “you may have already won” or “your name and address were chosen” – something like that is how they got your attention. The phone calls were usually stating it was for some organization, some even stating it was for a police or firefighter organization. These scammers preyed on those who had their hearts in the right place and were willing to help do good in the community. That went on for some time until victims began going to their local news media outlet to report the victimization and complain that they weren’t happy with the way their local police department were handling the case. As with the first scammers, the scams were thwarted by the news media in both television and newsprint.
Then came electronic scamming by way of electronic mail, commonly referred to as email. Scammers even found a way to incorporate encoding into pop-up advertisements to install hidden software that would steal your information – or even to take control of your computer. This brought scamming to an entirely new level in which now it was clear that scamming people out of their money was now global. It took no time at all for companies like Microsoft and AOL to devise spam detection technology into their email programs. From this, came the birth of spam filtering software and webmail developers, as well as anti-virus and internet security software from companies like Symantec (Norton) and TrendMicro. The subject line reads “FBI…” or “Dear Beneficiary” HELLLOOOOO! This is one of many scams in the form of an email. Answer me this, if you can: Why would anyone open and respond to emails like this? As informed a society as we are, it makes no sense to me whatsoever why people would still be opening and even responding to emails like that – emails with the clear intention of getting your financial and other personal information so that these thieves can steal your money as well as your identity. In a thirty-day period, I receive up to nearly 300 emails like this – thankfully, those emails all end up in the SPAM folder automatically. Why would anyone click on a pop-up ad anymore? The encoding in some of those pop-up ads have viruses that will crash your computer hard drive or worms that will steal your passwords and personal/financial information.
Some scams that are seemingly as old as this country are better known as extortion. In 2010, a Florida woman was married to a seemingly wealthy man. She met another man at a gas station one day, and she came up with a plan to extort $50,000 from her husband, by a kidnapping plot. The two were caught, the husband divorced the woman, and a bill totaling $86,000 in overtime costs from the law enforcement personnel that were involved in this case. This was the costs that were involved for what was initially a kidnap-for-ransom case. One scam that I just saw was on Craigslist in the apartment/housing section for Rhode Island. An ad for a single family house and after the interested party stated it was not the right fit, the person who placed the ad simply said “Ok, just fill out the application and send the completed form to me.” <-THAT is phishing for your personal information. Another scam that actually surprised me: international scammers posing as United States military personnel – to get your money.
So what is the bottom line / moral of this writing? Trust no one but yourself and when in doubt, don’t open it!
Until next time!