Wednesday, October 28, 2009

JPGFun: Apply Funny Photo Effects to your Images for Free

All my publications related to the free services helping you to make fun of your pictures with no experience and long hours to spend, were warmly accepted by readers, and I noticed immediate traffic increase impact from this site.

Jpgfun is one more easy-to-use free online service to edit your own photos, loaded on their server. You can improve your pics with multiple funny effects and nice frames, presented on the site (182 templates, as of today), or put your photo on a magazine cover through offered templates (40 templates, as of today). Authors even offer you some erotic backgrounds as well, if you want to make your images really spicy.

You can share your pictures-collages with your friends, discuss them, and laugh at them as much as you wish. Everything is included, and it is free.

How to Use JpgFun:

1. Upload your photo
2. Select what effect you want to use.
3. Mark the area you need. Click 'Create Picture'.

Also you are given a code which you can easily place on your blog or in your profiles at MySpace, Facebook, Orkut, Hi5 etc to show the photo to everybody.

Access the website:

If you like Jpgfun and want to explore its competitors, please check the following free services as well:

Tuesday, October 13, 2009

How to Upload Photos from Mobile Phone to Facebook

You captured a bunch of photos using the camera of your mobile phone - now how do you upload these pictures directly to Facebook without having to transfer them to a desktop computer?

There are basically three ways by which you can send photos from a mobile phone to the Facebook website - MMS, Mobile Phone Apps and Email. Let’s look at each of these options one by one.

Facebook Apps for Mobile

If you have a smartphone like the iPhone, BlackBerry, Windows Mobile or Nokia (with Ovi Store), you can visit using the internet browser of your mobile phone and download the Facebook application for your device. These apps will often integrate with the camera function of your phone and provide an option to directly upload pictures to Facebook right after they’ve been taken.

Facebook MMS

Now if you are not carrying a smartphone but still want to move pictures from the phone to Facebook, you can use picture messaging or MMS. Here’s how it works.

Compose a new MMS message on your mobile phone and attach the image file that you want to post to your Facebook stream with the MSS message. Send that MMS to (email, not phone) and Facebook will send you a confirmation code (via text) to associate your mobile phone number with your Facebook profile.

The MMS option looks like a nice technique for upload photos from old phones but the problem is that it may not always work as expected and secondly, sending MMS messages per picture (depending upon your carrier plan) can sometimes turn out to be an expensive proposition.

Facebook Email

Luckily, there’s another option provided your mobile phone can send email. Go to, click on the Activate Facebook Mobile button, and note a special "upload" email address (like that has been assigned to you by Facebook. Any photograph (or video clip) that is sent to this address via email will instantly get posted to your Facebook page. Make sure the picture is included as an attachment to the email.

Much like Flickr, when you send a photo to this "unique" email address, the subject of your email message will be used as the photo caption.  And these photos will get saved in the "Mobile Uploads" photo album of your Facebook account visible to all your Facebook contacts. You can consider changing the privacy settings of your "Mobile Uploads" folder to change the default viewership of photographs upload from a mobile device.

Another tip - the email address assigned by Facebook can be quite long and complex so you may want to save it to your phone address book beforehand for easy access.

Wednesday, October 7, 2009

Modern Realities – Cyber War and Cyber Terrorism

Threats of cyber war were on the top of inquiries on a news conference, marking the opening of the ITU Telecom World exhibition and forum in Geneva.

"The next world war could begin in cyberspace," warned Hamadoun TourĂ©, secretary general of the International Telecommunication Union, the United Nations agency that organized the event.

The beginnings of such an unconventional war could be out of the control of conventional diplomacy, he said, because in cyberspace "there is no such thing as a superpower: Every citizen is a superpower." With an army of "bots," or compromised computers, at their command, almost anyone could wield great power in a virtual battle, as a number of recent denial of service attacks against targets around the world have shown.

"We know from conventional wars that the best way to win is not to start," Touré said.
That's why the ITU is pushing an ambitious worldwide program for cyber security and peace.

"By the end of next year, we will broker a global agreement with every country to protect its citizens online, not to harbor cyber terrorists, and not to start an online attack," he said.

But, the real cyber weapon is already in use by different political and religious groups, and even by different countries.

For example, on August 8, 2008, Nino Doijashvili, CEO of Atlanta-based hosting company Tulip Systems was paying a visit to her home town in Tsiblinki, Georgia, thus putting her at the nexus of the first modern use of cyber attacks in conjunction with an invasion. While Russia amassed a force of 150 tanks on the border of Georgia, and while the world was occupied with the Olympics in Beijing, and coincidently just after NATO decided to postpone voting on admitting Georgia into its alliance, there began a concerted denial of service (DoS) attack against Georgia.

Russian nationalists (or maybe, it was direct governmental strategic attack) who wished to take part in the attack on Georgia could do so from anywhere with an internet connection, simply by visiting one of several pro-Russia websites and downloading the software and instructions needed to perform a “distributed denial of service” (DDoS) attack. This involves sending a flood of bogus requests to an internet server, so that it is overwhelmed by the demand and becomes unusable.

One website, called StopGeorgia, provided a utility called DoSHTTP, plus a handy list of target websites, including those of Georgian government agencies and the British and American embassies in the capital, Tbilisi. Launching an attack was as simple as entering the address and clicking a button labelled “Start Flood”. The StopGeorgia website helpfully indicated which target sites were still active and which had collapsed under the weight of bogus requests. Other websites explained how to write simple programs to send a flood of requests, or offered specially formatted webpages that could be set to reload themselves continuously, deluging particular Georgian websites with traffic.

Knowing something about bandwidth and server hosting Doijashvili offered the services of her hosting facilities to the Georgian government who agreed. Now attacks targeted against Georgian government websites were finding their way to AtlantaGeorgia in the U.S. So, Tulip Systems got directly involved in a cyber shooting war between Eastern European states.

Image and video hosting by TinyPic

Another wave of cyber attacks on Estonia in 2007 brought down key financial and state systems and had demonstrated how cyber-terrorism could take down national infrastructure with "very serious consequences”. This time, it was just one 20-year old, acting by himself; there was no ideological motive behind it, so it wasn't a terrorist attack per se, but it did illustrate clearly the potential harm that could be done.

Suleyman Anil, head of NATO's Computer Incident Response Capability Co-ordination Centre, admitted that determined cyber attack on a country's online infrastructure would be "practically impossible to stop". Anil believes the threat will continue to grow as terrorist groups become aware of the potential to cause maximum damage at minimal cost. Cyberwar could become a very effective strategy because it is low-risk, low-cost, highly effective and easily globally deployable. It is almost an ideal weapon that nobody can ignore.

Threat to the World though cyber terrorism becomes more and more real, as modern society is getting hocked on the fruits of the new computerized technologies on all life aspects.

Sources and Additional Information:

Related Posts Plugin for WordPress, Blogger...