30 janvier 2006

GFY China Telecom !

Cool, voici un petit hack pour Google china qui permettrait aux chinois de ne pas avoir leur résultats filtrés par XYZ:

Source de l'info : http://digg.com/technology/Hacking_Google_China


Chinese web users can see full, uncensored results for their Google search by replacing "&meta=" with "&meta=cr%3DcountryBR" in the URL. Once the string is replaced, the censorship will not affect the results.

28 janvier 2006

Pour les Sims2

Il semble que des petits malins ont réussi à faire rouler les sims 2 sans en mode ''NO-CD'', voici un (bordélique) collectif des découvertes à ce sujet.

info trouvée icitte.: http://www.mgforums.com/forums/archive/index.php/t-30450.html
gros carck mongole: http://www.gameburnworld.com/dl/dl.php?file=Sims2v1.0FixedexeDVDEng.rar

mini image qu'y disent qui marche: http://dl.gamecopyworld.com/?d=2004&f=ind-sims.2.virtual.disk!rar

update:

Registered User

Join Date: Jun 2003
Location: Nederland
Posts: 12
Ewoud is off the scale
===================================================================
YEAH!
U GUYS ARE LEGENDS!!!
thx soooo much; thx 2 your advice i got this game working.
however i did have some dificulties 2 start with (u know, understanding what does what) and so i thought as a thank you, i would post a "sims 2 for dummies" sort of thing.

so this is the (extremely simplified) steps i took 2 get this game running:

first i installed the game onto my hard-drive (DVD version).

then i searched on google for "daemon tools". this came up with their official web page (i think). from that site i downloaded the program daemons tools (top of the downloading list btw). i then extracted it 2 my hard-drive and installed it. it apperaed as a thumbnail picture at the bottom of the screen (lighting picture). that is now set up and ready 2 go.

i then when 2 a few pages back on this thread and found the link 2 the download of the mini image. it was posted by a person with a picture of the crabman off futurama, and is says "the mini image is HERE" and the word here is the link 2 download the mini image. once that had downloaded, i extracted it 2 my desktop.

now i right clicked on the thumbnail picture representing daemon tools and went 2 "emulation > safedisk" then i right clicked on iot again and went 2 the top option which is "virtual cd/dvd rom". from there i went 2 device > mount image > browse and opened the file that i had just extracted onto my desktop. this opens up a folder (this is normal). thsi is simply fooling ur computer into thinking that u have the cd/dvd in the rom. keep that window open and go and find the sims2.exe on ur hard-drive.double click on it and it should work perfectly.

BTW: my computer does not have clone cd installed or anything like that so read the previous posts 2 find out what 2 get rid of if this doesn't work.

any corrections feel free 2 post

thank u guys and i hope this helps sum1 else

cheers :beer:

==================================================================

Fix: download ça ,met pas de crack sur ton jeu pis C'est une micro image que tu ronne avec daemon tools , avec SafeDisk emulation ON.

Dans un forum y disent que le jeu detecte si daemon tool est installé pis que si c'est le cas,les murs marchent pas...





Pis sur le site du jeu, y'a ça:


Why aren't the Build Mode tools functioning?


Answer

If you find out that you are unable to do anything in build mode, like build a foundation, walls, windows, Doors, or anything then your Sims2.exe files has been corrupted. This can happen for a number of reasons, one of the most prominent is if you are using a 3rd party Patch, Hack, or Mod that changes or replaces this file or add additional files to your game. We do not recommend or support any of these downloads that alter the game in anyway.

Unfortunately if you do not have a back up of the files that have been changed you will need to uninstall and then reinstall the game to return it back to normal.

Delete the game registry keys.(Warning: Changes to the registry can cause your computer to operate improperly, so please follow these instructions exactly as they are written.)


Back-up the registry.

Follow these steps to back-up the registry so that should something go wrong, you can restore your system back to a working state:

  1. Click on the Start button.
  2. Click on Run.
  3. Type regedit into the available text field, and press OK.
  • If you are using Windows 2000/XP, click on File on the tool bar, and select Export.
  • If you are using Windows 95/98/ME, click on Registry on the tool bar, and select Export Registry File…
  1. Check All under Export Range.
  2. Type registry_archive into the File name field, and click Save.
  3. Close the Registry Editor by clicking on the X in the top right corner of the window.

Remove the registry keys.

Follow these steps to remove the game registry keys from your system.

  1. Click on the Start button.
  2. Click on Run.
  3. Type regedit into the available text field, and press OK.
  4. Double-click on HKEY_LOCAL_MACHINE.
  5. Double-click on SOFTWARE.
  6. Double-click on EA GAMES.
  7. Right-click on the following folders and select Delete to remove them:
    • The Sims 2
  8. When prompted if you are sure, select Yes.
  9. Click on the minus sign next to EA Games.
  10. Double-click on Microsoft.
  11. Double-click on Windows.
  12. Double-click on CurrentVersion.
  13. Double-click on Uninstall.
  14. Right-click on the following folder and select Delete to remove it:
    • {40C03514-89C3-41BA-0090-3B440256DB87} - for the DVD version

    • {8AB8D458-939E-403F-0097-9BA1C1F013D5} - for the CD version

    • {6E7DD182-9FC6-4651-0095-2E666CC6AF35} - for the UK/European edition.

  15. When prompted if you are sure, select Yes.

  16. Close the Registry Editor by clicking on the X in the top right corner of the window.

Ma pub de ipod

Pas de pitier pour les croissants.

Qui ce souviend de cette émission ? Je ne m'en souviend presque plus, il me semble que c'était une émission à sketch...

J'ai loué Back to the future II , skinny Oups, Skinner, c'est vraiment un nom étrange non?

C'est amusant de voir les technologies futuriste de 2026 du film qui font déjà partie de notre quotidien (Interac dans le TAXI)... et aussi de voir qu'il n'y a aucune référence à Internet dans le film!

BTW: Some people should know what ''violent'' mean...
BTTF2 IS violence to the ''Mental toughness!''.

24 janvier 2006

Capturer de la 3d...

Oui, vous pouvez capturer de la 3d OpenGl et même l'éditer dans Blender grâce a Ogle...

http://ogle.eyebeamresearch.org/readme

Une imprimante 3d pour vos modèles capturés : http://www.dimensionprinting.com/


C'est malade non?

23 janvier 2006

un PC physique transformer en Virtuel.

Source et crédit:

http://macrolinz.com/macrolinz/index.php/2006/01/09/physcial-to-virtual/

VRAIMENT INTÉRESSANT...

===================================================================
Début du copy&paste:

How to convert a physcial computer to a virtual machine

Filed under: HowTo, Virtualization, Systems Engineering | Lindsay @ 10:04 pm

I recently got a new replacement laptop for work. I had a lot of stuff on the old laptop after 2+ years of use and so I didn’t want to have to rush myself in remembering everything in one or two passes before formatting it to send back to the office. There are always things I forget when I’m mostly focused on moving data files over: files in “hidden” places like IM logs and non-file based data such as product keys, configuration info, settings for programs and other stuff. So I decided the best thing to do was make it into a VM and take my time about reinstalling and configuring the new laptop to match.

After some Googling I found a forum conversation on ArsTechnica about how some people did it. I had been planning to use Symantech Ghost but the version my company supplied was old and I didn’t want to shell out another $70 of my own. Someone mentioned in the post that you could use NTBackup, a free, already-there backup application on Windows XP. He said it was actually a preferred method because NTBackup is actually there to provide recovery services from backups made on different hardware. There would be no tweaking of drivers necessary on the new VM.

So I tried the P2V using NTBackup and it worked well. My last attempt (out of 3) was relatively painless. The first two failed because of miscalculations on my part. Since I had trouble finding information on how to do it and I generally need more detailed steps than the hardware gurus give me, I thought I’d document the process here in case anyone else has the same challenges I did.

Disclaimer: Use these steps at your own risk. Theoretically the worst that could happen is you could waste some time and/or end up with a VM that doesn’t work correctly so you can just scrap it and try something else!

What you will need to get started

  • Your two laptops (obviously)
  • VMWare Workstation (version 5.5 recommended, what I used) - You may download and use a free 30-day trial of Workstation. After the trial ends, if you don’t want to purchase a license, get the free VMWare Player which allows you to use existing VMs but not create new ones.
  • An external drive or a networked drive that has enough room for your backup file that both laptops can access (I used a 100GB USB external harddrive)
  • Microsoft Windows installation discs or ISOs
  • Enough space on your new laptop to host a VM of the old one, or just use the external drive to host the VM
  • Some thing else to work on during the hours and hours it takes to do the backup and restore after you get them running

Make a backup of your old laptop (Windows XP)

  1. Go to Start->Run and type NTBackup.exe and click OK
  2. Choose to run the Wizard and select Backup Files and Settings , click Next>
  3. Choose All information on this computer, click Next>
    Update: A friend of mine did this and it attempted to back up the external harddrive that he was using to write the backup to (which caused it to run out of space and fail). If you’re using an external drive you may want to choose Let me choose what to back up instead and drill down to My Computer. If you do this remember to check System State as something to back up!
  4. Browse to or type the path to where you want your backup file created: somewhere you can get to from your new laptop. I used my external harddrive to store the image on for easy transfer.
  5. Type a name for your backup file. I chose something with the date in it just to make it easier to remember
  6. It says you need a floppy disk. If you have a floppy drive for both of your laptops, then you can use them and it will save you a step later. If you don’t, don’t sweat it. Click Next>
  7. Click Finish and find something else to do for the next 5-10 hours or so. Mine took about 9 hours to fully back up (it is a 40GB drive). At the end, if you don’t have a floppy drive, it will complain about it, but just click ok, all is well.

Create the Windows Virtual Machine on your new laptop

(These instructions are for VMWare 5.5, if you have another verison they may vary)

  1. Open VMWare and choose File->New->Virtual Machine…
  2. Choose Typical, click Next>
  3. Choose Microsoft Windows and your Version
  4. Give your VM a name and location, click Next>
  5. Choose Use bridged networking, click Next>
  6. Be careful when choosing your disk size. I screwed this up twice. Just go ahead and make it at least as big as the physical drive on your old laptop (this is where it helps to have an external drive to store these things on, like my 100GB one). Leave the box to allocate space now unchecked, and it will only take up as much room as it needs. Click Finish
  7. Start your new VM.
  8. Choose VM->Removable Devices->CD ROM (IDE:0)->Edit… and point it to where ever you have your Windows install disc (I had an ISO file)
  9. Choose VM->Settings, click the Options tab and then Shared Folders and set up a shared folder to the path where your backup file can be found.
  10. Stop your VM (it will be hung anyway) and restart it to get it to notice the installer cd.
  11. If you have the recovery floppy and you pay attention at the very beginning of the install, you can press F2 and have Windows create the install directly from your backup file. I haven’t done this so I can’t guide your steps, but you shouldn’t need to do the next steps if you can do that.
  12. Otherwise, follow the Windows install. Make sure that you set up your partitions to match your old laptop (this was another place I miscalculated and had to start over with).
  13. Choose as many of the defaults as possible when installing Windows. It won’t matter since all the settings will be overwritten when you restore your backup.
  14. After you’ve installed Windows, install the VMWare tools (VM->Install VMWare Tools…) on the virtual machine (this needs to be done before you restore). Select defaults in the install wizard and Windows will require a restart after the install.
  15. Update: If you created more than one partition during your install, make sure that you format the partitions other than C: before you perform your restore! Go to Start->Run, type compmgmt.msc, click on Disk Managment, right-click your drive and choose Format.

Restore your backup of the old laptop into the new VM

  1. After it’s restarted, in the VM, map a drive to the shared folder you set up. It should be under VMWare Shared Folders when you browse for it. The mapped drive path will start with something like \\.host
  2. Click Start->Run, type NTBackup.exe and click OK.
  3. Follow the wizard steps to restore your backup. There shouldn’t be any “gotchas” there. Find your backup file on the share you mapped to and it will load in the treeview under “File”. Check all the pieces you want to restore, which in my case was everything. Don’t forget to check the System State (probably the last thing in the list) as something you want to restore!
  4. Click Finish. You will be prompted about restoring system state; just click OK.
  5. Wait for a couple or 3 hours for the restore to finish!

And now you should have your old laptop on your new one. All your data files, installed software, security settings and even application state information (I was suprised to find that the ISO file I had loaded into Daemonware was still loaded!) right there and usable.

There could be other uses for P2V as well, of course… You could take your whole computer on the road in just an external harddrive (of course you’d need a PC with VMWare installed at your destination to use it). But for travel from office to office, that might be a good alternative to lugging a laptop around the airport!

Update: After restoring, the drive map I had set up was no longer there (to be expected). I noticed that I no longer could see the VMWare Shared Folders when browsing the network connections to re-establish the map. To fix this problem, reinstall the VMWare tools.

Update 2: For those of you who are into (or getting into) Virtualization, I’d appreciate any feedback you can give me on the issues I have found trying to go the virtual route. Please feel free to leave your advice comments on my second virtualization post!! I’d love to hear what other people are doing.

» » » » » » » » » » » » »

18 Responses to “How to convert a physcial computer to a virtual machine”

  1. Martin Mueller Says:

    Thx for sharing - just what i needed!

    Regards
    Martin Mueller
    Denmark

  2. Lindsay Says:

    Glad it is useful, Martin! Good luck with your virtualization.

  3. paintballer Says:

    Perfect!
    MUCH better than using other tools, it’s already included after all…

  4. Orhan Karsligil Says:

    If you have the software an easier process is:
    1.) Create an image of your laptop using Symantec Livestate.
    2.) Using VMPlayer convert this image to a Virtual Machine and you are all set.

    This way your hardware configuration is maintained in the Virtual Machine as well. I am not sure if NTBackup can bring over your installed software. It can copy the data and Windows/Office settings and some other Windows Application settings but other software is not coppied over (the files might be there but the most probably will not work) The livestate->VMPlayer definetely solves this problem. Taking a livestate image of a laptop should not take more than 2 hours (USB 2.0 harddrive or a 100MB Network connection), VMPlayer image conversion takes also around 2hr on a good machine. But then again nothing beats “free”. Of course licensing is not free. The laptop OSes normally are OEMs and can only be run on the laptop. Virtualization of that license is not normally allowed….

  5. John Bokma Says:

    “the free VMWare Player which allows you to use existing VMs but not create new ones.”

    But as
    http://johnbokma.com/mexit/2005/10/26/vmware-player-windows-xp.html
    explains one can create virtual machines with freeware. No need to download and install the trial of Workstation.

  6. John Bokma Says:

    Just a small note: nofollow links suck. Moderate your comments, but don’t punish genuine comments with using nofollow by default.

  7. Lindsay Says:

    Orhan -

    All the software I had installed on my old laptop is still installed in the backup as well… the System State restore takes care of it. Like I said, not only was the software still installed and usable, even the things that were loaded (like the ISO image on Daemonware) were still running! I am even doing .Net development on it until I get my new environments set up and everything works fine.

    The only problem I’ve encountered is that I lost one of my databases in SQL Server… it is now “suspect” and I can’t open it. I would make sure if you run SQL Server that you stop the service before you do your backup. I think I left mine running.

    So if you don’t have the Symantec Livestate tool, NTBackup is still a good option!

    As for the OEM licensing issue, I didn’t have that problem… I wiped and reinstalled my laptop when I first got it so the original OS installation was no longer there. But that might be a problem for others, yeah… Unfortunately I don’t know how to resolve that problem.

    John -
    Thanks for the link.. That’s pretty cool. I already bought a copy of VMWare because I need to be able to create VMs easily for my job, and can’t afford the time of hacking scripts for it, but that’s good information to know!

  8. Lindsay Says:

    John -

    I am still relatively new to Wordpress (I think it will be a month in a couple of days), and didn’t even know what nofollow was until I just Googled it from your comment. Certainly it isn’t my intention to punish anyone for commenting. I will look into it and find out my options are. Thanks for making me aware of it.

  9. Fabian Says:

    Typically SQL server will mark a db suspect as soon as it can’t open one of its files at startup. Once it is marked suspect, you can’t do anything. I believe there is a stores proc to reset the status (I’m on my mac now, so no access to help books online)

    I wonder if you could achive the same thing by brute force: copying your partitions straight to a file (or files) and use some free free tools like QEMU for virtualization (I like QEMU better because it is really free, opensource, and does not require any install on the host)

    I would create the image by using a simple live linux and using the command dd …

    Just a thought :)

  10. Antimail Says:

    Using NTBackup to achieve P2V

    I always thought about writing a post about physical-to-virtual migration strategies in combination…

  11. Mike G Says:

    Great article, I’ll be trying this out soon. It should work the same for a Server Edition install, yes?

  12. John Bokma Says:

    Lindsay - There is no scripting involved, just running a command line tool. On the other hand, as soon as I notice that I use the player more then casual I am going to buy Workstation :-)

    And thanks for looking into the nofollow issue.

  13. Dave D Says:

    Nothing wrong with Nofollow for comments…it’s not punishment. If Lindsay or another blog owner want to reward you for a good self-link they can and should do an update/edit or a new post including the link so it gets its search engine props.

  14. John Bokma Says:

    Dave -
    If you don’t moderate you get comment spam anyway
    If you do moderate, there is (IMNSHO) no reason for nofollow. If someone just posts to get a good link, the blog owner can reject the comment. That’s what I do.

  15. Federico Says:

    Did anyone get this error message when attempting this?

    —————————————
    Windows could not start because of a computer disk hardware configuration problem.

    Could not read from the selected boot disk. Check boot path and disk hardware.

    Please check the Windows documentation about hardware disk configuration and your hardware reference manuals for additional information.
    ————————————–

    I followed all the steps mentioned above, and this popped out at when I rebooted after restoring. I’m somewhat desperate to get my data back, and I’ve read a lot about chaning the boot.ini file to fix this problem, but I haven’t figured out how as I am running Ubuntu 5.1 as the host, and as a VM I can’t figure out how to get the “recovery console” (see http://support.microsoft.com/?kbid=314477#kb1). Any help would be wonderful. Thanks!

  16. Phil Schaffner Says:

    Have been getting similar errors when trying to follow the ArsTechnica Ghost procedure Lindsay referenced at the top. Failure to get multiple approaches to fixes for that to work for my backup/restore VMs led me here. (Have yet to get time to restore my Win2K NTBACKUP image to a VM). The Ghost-restored-image boot process always fails before one could get to the “F8″ options to boot to a console. Booting from a windows installation CD should give a recovery option, but this didn’t help for my Ghost image problems.

    The “captive” NTFS driver in older Knoppix distros was said to allow NTFS write access, but that was discontinued due to filesystem corruption problems in later releases.

    Another way to get write access to boot.ini would be to follow the procedures outlined at ArsTechnica to mount the “bad” VM disk as the second drive on a fresh installed Windows VM. Uet another would be to use a bootable Windows CD per the BartPE approach at http://www.nu2.nu/pebuilder/

  17. Bill W Says:

    Phil,

    Using Bart PE and REG.exe, you may be able to “fix” your ghost image within the vmsession. You will need to know the vm’s hardware types and storage type… most likely these are APCI/EPIC with IDE storage devices. I don’t have the exact reg keys, but you should be able to boot the vmsession with bart and use the reg.exe command to inject the correct vmhardware info into the reg of your restored ghost image. Oh… you may (probably) need the correct hal.dll, ntoskrnl.exe, and ntkrnlpa.exe files for a vm windows seesion as well. Since you have a ghost image you can safely experiment with this. Good luck.

  18. matthew k Says:

    I have been using vmware for years now for support, so I can walk folks through issues on different OS’s, but you hit on a really cool idea. I will have to try it. The use goes way beyond laptops.



===================================================================
/fin du copy&paste.

20 janvier 2006

Je teste IE 7 Beta2

Ca fait chier, je ne vois pas ce que je tape en cemoment...
Ça marche pas avec google maps....
Ni même avec Live mail,pourtant un produit microsoft...

C'est bizarre, en fait maintenNANT JE VOIS CE QUE JE TAPE MAIS AVEC UN DELAISD DE 5 SECONDES!!!

jE VAIS RETOURNER TESTER LES APPLICATIONS AJAX POUR VOIR C'EST QUOI LE PROBLÈME....

UPDATE:

FINALEMENT C'ÉTAIT LA VERSION BIDOUILLÉE TROUVÉE SUR UN FORUM QUI CHIAIT, AVEC L'AUTHENTIQUE BETA2 ÇA MARCHE PRESQUE BIEN...

19 janvier 2006

US administration go for World Wide Web domination.

Ça y est , c'est la fin.

Yahoo a donné son data de requêtes au gouvernement Bush.
Google combat l'administration Bush pour ne pas avoir a faire de même.

Preuve Yahoo:X

Preuve Google:X

texte Yahoo.

Google, Yahoo Subpoenaed By Bush Administration

By Antone Gonsalves, TechWeb News

One of at least two major search engines subpoenaed by the Bush administration handed over search data in the government's efforts to revive an anti-porn law that was rejected by the U.S. Supreme Court.

Yahoo Inc., based in Sunnyvale, Calif., acknowledged on Thursday handing over search data, but insisted no personal information on users was given to government attorneys. The disclosure followed reports that rival search engine Google Inc. had refused to comply with a similar subpoena, issued last year.

The government had asked Google, based in Mountain View, Calif., for a broad amount of data, including a million random Web addresses and records of Google searches over any week, the Associated Press reported. The information came from U.S. Justice Department papers filed Wednesday in a San Jose, Calif., federal court.

A Yahoo spokeswoman said the company, which she described as a "rigorous" defender of user privacy, did not provide personal data in response to the Justice Department subpoena.

"In our opinion, this is not a privacy issue," spokeswoman Mary Osako said in an email. "We complied on a limited basis and did not provide any personally identifiable information."

It was not immediately clear whether other major search engines had received subpoenas. Microsoft Corp., which owns the MSN search engine, declined to discuss the matter, issuing instead a statement saying, "It is our policy to respond to legal requests in a very responsive and timely manner in full compliance with applicable law." Ask Jeeves, owned by InterActiveCorp, was not immediately available for comment.

The high court ruled two years ago that the 1998 Child Online Protection Act requiring adults to use access codes or register with a site before receiving adult material violated free speech. The court also ruled that filtering software was adequate to protect children. Administration lawyers are hoping that the search data will help convince a Pennsylvania federal court that technology is doing an inadequate job, the AP said.

At least one search expert argued that the government could test whether children can get pornography through search engines, without seeking such a huge amount of data from search engines.

"If you want to measure how much porn is showing up in searches, try searching for it yourself rather than issuing privacy alarm sounding subpoenas. It would certainly be more accurate," Danny Sullivan, editor for Search Engine Watch, said Thursday in his Web log.

While it appeared the government was not seeking personal data that would identify individuals, there was still reason for concern, Sullivan said.

"Nothing suggests that they wanted to know who did the searches in any way," Sullivan said. "Having said this, such a move absolutely should breed some paranoia. They didn't ask for data this time, but next time, they might."

Sullivan also noted that the government-requested data could also be obtained through Internet service providers.

Texte Google:

Google will fight Bush Administration demand for search records

From James Bone of The Times in New York

The US Government is taking legal action to gain access to Google’s vast database of internet searches in an historic clash over privacy.

The Bush Administration has asked a federal judge to order the world’s most popular internet search engine to hand over the records of all Google searches for any one-week period, as well as other closely guarded data. The California-based company is to fight the move.

The immediate flashpoint is the Government’s effort to revive an online child pornography law that was struck down by the Supreme Court two years ago.

The US Justice Department requested access to Google’s search records as part of its effort to prove the constitutionality of the 1998 Child Online Protection Act.

The controversial law sought to curb minors’ access to internet pornography by making it a crime to publish material that is "harmful to minors" on the web.

The law was immediately challenged by civil liberties groups and never came into force. It was eventually struck down by the Supreme Court on the grounds that it was unconstitutionally restrictive of free speech.

But the Supreme Court gave the Government a second chance to prove that the law’s proposed criminal penalties would work better to protect children than internet filters or other methods.

The Government’s request for Google data came to light when Justice Department lawyers filed papers in federal court in San Jose, California, revealing that the internet search firm had failed to comply with a subpeona for records in the case.

The Government indicated that other unnamed search engines had already agreed to release the information, but not Google, which runs 46 per cent of all US web searches.

"The production of those materials would be of significant assistance to the government’s preparation of its defence of the constitutionality of this important statute," the government lawyers wrote.

Nicole Wong, Google’s associate general counsel, countered: "Google is not a party to this lawsuit, and the demand for the information is overreaching."

Design sans Design.



Voilà mon re-design.

18 janvier 2006

A Strip a Day

A Strip a Day

Un ''comic'' par jour. (Anglais)

Y sont pas pire.

SIDA: On va te vacciner la yeule en sang a coups de yogourts!

Oui, ils vont mettre des bactéries dans le yogourt, celles-ci boostant l'immunitée virale , ce produit pourrait vous rendre plus résistant au Vih/SIDA.

Personnellement je vais bientot cesser de manger du yogourt car si j'ai bien lus entre les lignes, ILS S'APPRÊTENT A MODIFIER NOTRE CODE GÉNÉTIQUE POUR MIEUX RÉSISTER AU SIDA!!!

Vous vous doutez que si je refuse les vaccins et antibiotiques, j'ai pas l'intention de me faire ''modder'' le gros gêne...

Faut noter la dernière ligne de l'article:
''Human trials could begin in 2007.''

Publié sur: http://www.livescience.com/humanbiology/hiv_yogurt.html

Voici l'article:

Bacteria in Yogurt Modified to Fight HIV Infection
By LiveScience Staff

posted: 18 January 2006
10:04 am ET


Bacteria in yogurt have been modified to deliver a drug that blocks HIV infection.

In their natural state, the bacteria (Lactococcus lactis) produce lactic acid and are used to make cheese and yogurt. It is not harmful to humans.

Research based at Brown Medical School in Rhode Island altered the genetics of the bacteria so they generate cyanovirin, a drug that has prevented HIV infection in monkeys and human cells, according to a report at news@nature.com.

Cyanovirin binds to sugar molecules that are attached to the HIV virus, blocking a receptor used by HIV to infect cells.

"It's basically passive immunization," said Sean Hanniffy, a member of the research team from the Institute of Food Research in Norwich, UK.

Cyanovirin could be put into gels that women would apply to the vagina before sex. Or, an oral dose might provide long-term protection, the researchers speculate. They note that there could be public resistance to the whole idea of genetic modification.

The work has only been proved in a lab setting, however. Human trials could begin in 2007.

Best Viewed With Firefox.

Merci beaucoup à
http://www.ac-graphic.net/blog/13-la-transparence-css.php5#contenu ,
pour le hack de transparence pour IE et Firefox !

Maintenant y'a au moins deux navigateurs qui peuvent bien apprécier
le design spartiate de mon Blog.

Mais je suis pas sûr que les utilisateurs de Internet Explorer peuvent voir mes vidéos...

Comme si ça me dérangeait.

Le Logiciel que j'attendais depuis longtemps.

Ça vous ''gosse'' que Windows Xp soit trop cave pour vous dire le poids des dossiers,
par exemple vous devez entrer dans le dossier,tout selectionner et après avoir la taille des données contenues...

Y'a une solution, et open-source en plus !

FOLDERSIZE.

Oui ça marche très bien pour moi.

15 janvier 2006

Google video c'est riche en contenu finalement.

En charchant horror ..free ... sur google video vous pourrez voir boogieman gratos...
Mais qu'est-ce que google est en train de foutre ?!

Pour tout le reste, y'a mastercard

Peut-être que...

Peut-être qu'en allongant le message précédent le vidéo deviendra visible sous IE... Non.
Ou en postant un message additionnel, ça va peut-être ''réaligner'' le site ....Non.

Est-ce que je commence à m'en contre-saint-ciboirisé ? ... D'après-vous?

Comme je suis pas si violent que ça, j'vous donne le lien pour installer Firefox : X

Des fois, j'me trouve tellement fin...
Ben non, jai pas l'intention de juste décrire à quel point je peux rusher quand il s'agit de faire quelque chose de relativement simple sur mon blog...

Voilà un joli cadeau: Un vidéo démontrant une partie de half-life... sur un Ipod Nano !

C'est platte mais on dirait que le vidéo marche avec Firefox mais pas avec Internet Explorer...

Hon! C'est platte hein ?













Commentaires et compagnie

Bon voilà, à partir du code d'un modèle de base de blogger j'ai pût enfin activer les commentaires !

Astheure, si je pouvais trouver un myen de faire fonctionné la transparence du skin dans Firefox, ce serait vraiment cool, parceque ça me fait très, très chier que mon blog ait plus belle allure sous Internet Explozer.

Les commentaires?

Mais yé ou l'ostie de lien ?!?

MODESTE ET VIOLENT 2.0



Voilà, re-designé le font de mon site car à l'origine c'était du copier-coller d'une excellente artiste qui a gracieusement offert son modèle sur je ne sais plus trop quel site, voici donc ma dernière oeuvre créée a partir de l'ancien.

Vous aurez remarquez que vous ne pouvez pas,en ce moment, laissé de commentaires...
Je cherche (un peu) comment les activer.

11 janvier 2006

Deux nouvelles qui mettent en tabarnac.

Récupéré sur Clubic, ces 2 nouvelles ont réussi à me mettre en tabarnac (surtout la seconde).

1- Le brevet sur la FAT confirmé pour Microsoft
(Là, y vont vraiment faire chier la communautée du logiciel libre)

2- Quid de la durée de vie des CD /DVD enregistrables

Extrait viandeux de l'article:
...La durée de vie d'un CD-R/CD-RW d'entrée de gamme serait, en moyenne, de deux ans et ...

quant aux DVD vierges, leur durée de vie serait encore plus courte que celle des CD enregistrables et cela serait particulièrement vrai dans le cas des modèles bas de gamme.

(Là, y font vraiment chier les consommateurs, dont moi.)

Bon, c'est peut-être une nouvelle provenant directement des Lobbyistes de l'industrie cinémato-musico-escroco-graphique, mais on sait jamais.

05 janvier 2006

Je l'ai eue !

J'ai ma montre mp3 ! Je trippe comme un malade ! J'écoute Insane in the brain !
J'adore la technologie ! Je son est écoeurant !

04 janvier 2006

Site du jour... égalité pour 3 !

pollywogs.blogspot.com
y'a quelque chose de méchant, peut-être même d'un peu vicieux dans son choix de sujets...

et

www.we-make-money-not-art.com
C'est plein d'info en tout genre... un peu bordélique comme agencement, j'aime (surtout l'url).

et enfin une très bonne surprise:

www.popularmechanics.com
Vous direz avec raison que je suis trop con mais j'adore ce magasine qui coûte trop cher
et j'ai jamais pensé à chercher la version en ligne !

Broadcom présente une puce Blu-Ray et HD-DVD

Broadcom présente une puce Blu-Ray et HD-DVD.
On va peut-être éviter une guerre des formats. (x)

Today: The future of renewable energy...

Today: The future of renewable energy...

C'est beau l'Italie

Une boîte à bébé de grossesses indésirées, pour stopper la propension des gens là bas à laisse leur BéBé dans une poubelle.

http://www.we-make-money-not-art.com/archives/007769.php

Trouvé grâce à : X

Buddha's Pillow

Buddha's Pillow

Un boudiste wanna-bee, très sympatique.

Y a t'il un enfant en danger...

Peut-être que je suis parano mais il me semble que quelque chose ne tourne pas rond avec ces parents là: X voir la section Poor KId...

Source de divertissement

icitte

House of Horrors: Yes, Iran is near building the Bomb. We know. We have the receipts.

House of Horrors: Yes, Iran is near building the Bomb. We know. We have the receipts.

Les titres de ce blog sont hilarants. Le contenu peut-être moins.

the daily furball: i, Robot

the daily furball: i, Robot

On vous encourage a Hacker nos robots domestiques !

Voir, si vous ne trouvez pas via le lien ci-haut, ici

M.A.N. Une crosse de l'industrie musicale !Free CD

Pour plus d'explications: ici

Pour obtenir un cd gratuit des producteurs de ''bruits'': ici (bientôt)

Extrait juteux:

originally, "Mothers Against Noise" (as represented by www.mothersagainstnoise.us) is a marketing hoax to build hype for a Big Record Company "alternative" release.

Plus ou moins découvert grâce à : rewriteablecontent.blogspot.com

Mondolithic Sketchbook: DIGGING THEIR OWN GRAVES

Mondolithic Sketchbook: DIGGING THEIR OWN GRAVES

Je suis d'accord: moi aussi j'en ai marre de la TV: je n'ai plus le câble depuis plusieurs années, pas seulement pour les publicitées mais à cause de la déchéance de l'être humain qui y est représentée et encouragée.

AMD Live

Tiens voici AMD live, avec de l'info presque pertinente et plein de videos ici, j'adore AMD mais j'aurais apprécié des explications concrète concernant ce qu'AMD Live apportera aux consommateurs.

Sur la page principale d'amd live vous trouverez de l'information relative à la production de EPISODE III et de son rapport avec AMD.

C'est sur que prendre AMD donne un avantage certain; c'est pas du Intel...

Je suis fatigué donc je blog tout croche.

Je sais que mon blog a l'air un peu d'un rammassis de copier-coller pour l'instant,
il faut comprendre que je travaille comme un dingue donc je me contente de vous donnez
l'information qui me semble la plus pertinente du moment.

Si ça vous intéresse IBM a réussi a ralentir la lumière au 1/300ème de sa vitesse normale et les prochaines télévisions seront basées sur des projections lasers si le marché le permet.

J'ai appris ça via un magasine qui traite des lentilles, laser et photo-optiques, j'ai oublié lequel.

Hamachi, open source zero configuration VPN

Hamachi, open source zero configuration VPN.

trouvé ici

02 janvier 2006

Après ça on dit que je manque d'impartialité...

Voilà probablement une source de ma surcharge de travail...
Merci Microsoft ...

Trouvé via: http://www.pcworld.com/news/article/0,aid,123431,RSS,RSS,00.asp

Microsoft Patches Break Some Sites
Change in ActiveX controls may conflict with some Web page functions.

Jeremy Kirk, IDG News Service
Friday, November 04, 2005

Two patches released by Microsoft earlier this year for its Internet Explorer browser may cause some Web sites not to load properly.

The bulletins, MS05-038 and MS05-052, removed "unsafe functionality" and change how the browser handles ActiveX controls for security reasons, Stephen Toulouse, a program manager in Microsoft's security unit, wrote on Thursday on the Microsoft Security Center Response Blog.

After installing MS05-038, which was published August 9 on the Microsoft Download Center, Web pages containing Component Object Model (COM) objects called monikers may not work as expected.


Patch Particulars

MS05-052, which was published October 11, added an additional check for a specific interface for ActiveX controls before allowing a COM object to run in Internet Explorer. But it also blocks some Web pages containing ActiveX controls, Microsoft said. Users who are missing certain registry subkeys may also experience problems with this patch, Microsoft said.

Microsoft has published instructions on how to resolve the MS05-038 issues.

Also available is additional information on the two possible problems with MS05-052.


My fureteur IZ a Monster.

...et tout mon PC tant qu'a y être !

Pour les intéressés, voici les extensions ce que j'utilise dans Firefox 1.5;

Fireftp, Web developer, Gspace, downthemall, tab mix plus,flashgot,IEtab (très utile),IEview,Allow right-click, tab x (ESSENTIEL !),restart firefox ,LInky (Essentiel !)et Pdf download (J'adore).

Pour mon pc, j'utilise:

Ad Aware (attention de prendre celui de Lavasoft !!!), Anydvd (demo),
CamStudio20Fr.exe, CCleaner (Dangereux et efficace),
CD DAE et CDEX (convertion wave mp3 rip ...),CPU-Z,
Daemon Tools (attention à l'installation de la version 4 il propose une toolbar qui est un spyware,
Damn Small Linux embedded dans Qemu,
Drive rescue (Impressionnant, les messages d'erreurs sont des bugs innofensifs je crois),
dvd decrypter , dvd shrink, Eraser (pour ma paranoïa), Exact Audio copy,
Free download manager, Google Earth ,HijackThis, Intervideo Windvd (m'emmerde mais dépanne assez souvent pour pas le scrapper),Izarc, Kaspersky anti-virus (je vais peut-être passer à AVG 7 mais j'hésite encore),Kazaa Lite k++, Leech Ftp, MacTracker, Matricielle.exe, Microsoft Synctoy (gadget),
Microsoft Time Zone pour le boulot, MSRMesh-VirtualWIFI.MSI,
Myslax Creator, Nero 7 (j'sais plus trop pourquoi), NetStumbler, Nlite,
Norton partition magic,
NTFS4dos (pour dépanner les amis),Office (à cause du boulot sinon y'a word viewer et excel viewer et powerpoint viewer),Offline NT Password and REgistry Editor v:BD050303, PCAnywhere
Pdf creator (vraiment cool),Pe builder,PhotoFiltre, Portable Firefox, Powerbatch, Powertoys -Tweak UI (Enlève le dangereux autoruns des Périphériques),Qemu (Voir damn small linux),
Quicktime (J'étais distrait quand j'ai installé ça),Reader Speedup (devenu inutile dans mon cas),
RootkitRevealer,
Sequoia View pour afficher l'espace pris par les gros fichiers,génial.),
Shareazaa pour les torrents et plein d'autres trucs,
Smiletris,
Spybot search and destroy (yeah ça c'est du soft),
Station Ripper (pas pour longtemps: y m'énarve),Stinger, TightVnc,
VLC Media Player / VideoLan (Y fait tout), Visdata,
Visual Boy Advance, VMWare player windowsxpreactivatorv1.0&keyrecovereranddiscovererv5.12buran
et Xp-Antispy (augemente limite de connection après SP2).

,
Je vais bientôt essayer: grabit (voir ici),
DVDFAB decrypter, FREEDvd.exe, Kerio Personnal Firewall et Truecrypt 4.1.



et enfin mes fils rss sont digg,i-hacked, clubic et download squad.


Vous remarquerez que je ne t'chatte pas car le t'chat est à mon avis une faille de sécurité en lui-même, le courriel permet plus de pro-activité.

Vulnérabilitée Logicielles en pagaille pour 2005 !

Voici le merveilleux rapport sur la sécurité informatique de 2005 !

Plus précisément c'est un listing de Vulnérabilitées Logicielles fourni par le CERT, ze U.S. Computer Emergency Readiness Team .

Y'en a 5198; 812 dans les produits Windows , 2328 combinés dans les Linux et Unix de tout acabits (incluant Mac OS X) , et 2058 affectant plus d'un système d'exploitation.

Je savoure déjà votre crise paranoïaque !

Rapport complet ici.

Nouvelle trouvée ici.

La République Tech

Voilà la république des Techs, en ligne évidemment, en anglais, emmerdemment.

Bonne source d'information. De Pubs aussi.

Un BillBoard de Hackers !

Un BillBoard de Hackers très intéressant. ici.

Jeu gratuit : ENEMY NATIONS

Téléchargez le gratuitement et légalement via bittorent ici:

La page du jeu ici.

Amusez-vous bien à vous entre-tuer ! (Vous faites si bien ça)...

Un jammer de cellulaire !

Vous savez comment j'aime les cellulaires, alors voici une façon de vous défendre contre cette violente agression et menanace à la société moderne.



(Y'a même des liens pour en acheter) ...

Le lien mêne à un cache... pour plus de prévention de perte de l'information voici une copie tirée du site au-cas-ou.

Note le site est bourré d'allusions anti-européennes, ça ne réflète en rien mon opinion .
J'aime les européens, ils font de la putain de bonne bouffe et sont vraiment drôle lorsqu'ils se mettent en pétard.

This is G o o g l e's cache of http://gbppr.dyndns.org/PROJ/mil/celljam/ as retrieved on 1 Jan 2006 12:42:58 GMT.
G o o g l e's cache is the snapshot that we took of the page as we crawled the web.
The page may have changed since that time. Click here for the current page without highlighting.
This cached page may reference images which are no longer available. Click here for the cached text only.
To link to or bookmark this page, use the following url: http://www.google.com/search?q=cache:cpFkqNE5SmoJ:gbppr.dyndns.org/PROJ/mil/celljam/+&hl=en


Google is neither affiliated with the authors of this page nor responsible for its content.


GBPPR Cellular Phone Jammers

Can you hear me now? No. Good.


Overview

Device(s) to disrupt the reception of cellular phone system downlink frequencies. This will prevent a cellular phone user from sending or receiving cellular phone calls within the small jam radius. Advanced electronic and RF engineering technical skills will be required.

Also, be sure to read this excellent thesis paper by Limor Fried:

Social Defense Mechanisms: Tools for Reclaiming our Personal Space (14.3M PDF)

Abstract: In contemporary Western society, electronic devices are becoming so prevalent that many people find themselves surrounded by technologies they find frustrating or annoying. The electronics industry has little incentive to address this complaint; I designed two counter-technologies to help people defend their personal space from unwanted electronic intrusion. Both devices were designed and prototyped with reference to the culture-jamming "Design Noir" philosophy. The first is a pair of glasses that darken whenever a television is in view. The second is low-power RF jammer capable of preventing cell phones or similarly intrusive wireless devices from operating within a user's personal space. By building functional prototypes that reflect equal consideration of technical and social issues, I identify three attributes of Noir products: Personal empowerment, participation in a critical discourse, and subversion.

Read more about it in this article: Zone of Silence.

And a small feature from Make - Page #1 and Page #2

Old Schematics


teh ghey^

New Schematics

Under Construction

This section will contain new, updated cellular jamming schematics, pictures and notes. The old ones (above) are now mostly for reference use.

The "Exciter" schematics contain only the sweep & generator sections and the VCO for that particular band. Match it with the RF power amplifier schematic for higher output power.

Construction Notes / Pictures

Square Wave Generator

The TL074 quad op-amp (U1) sweep generator of the cellular jammer exciter is based around a few simple op-amp building blocks. First, op-amp U1a is configured as a relaxation oscillator, or square wave generator. Basically, feedback resistor Rf charges capacitor C until it reaches a voltage level set by resistors R1 and R2. The op-amp then discharges, resulting in a waveform which is a square wave. The frequency of the square wave is determined via the following Perl equation:

# $FRQ is the oscillator's output frequency, in Hz

$Rf = 10000; # resistor Rf, in ohms (10k)
$C1 = 0.00000001; # capacitor C1, in farads (0.01 uF)
$R1 = 3300; # resistor R1, in ohms (3.3k)
$R2 = 22000; # resistor R2, in ohms (22k)

$FRQ = 1 / (2 * $Rf * $C1 * log(((2 * $R1) / ($R2) + 1)));

This equation is usually accurate only for a dual-supply op-amp configuration, (i.e. op-amps using both + and - voltages). A single-supply configuration will often output at a slightly higher frequency - and I'm not really sure why. It will help to experiment a bit.

The above values produce a frequency of approximately 19 kHz. "Real world" testing, however, showed the frequency to vary between 17-18 kHz. It reached 30 kHz when using a single-supply op-amp configuration. The component's exact value isn't too critical in this application. The main feedback resistor (Rf) is the main determining factor of the oscillator's frequency. Change it to a potentiometer (100k to 1M) to vary the output frequency. The other resistors in the oscillator control the duty cycle of the square wave, and for the most part can be left alone.

Integrator / Buffer

A square wave is pretty useless in a jamming circuit. Ideally, we want a "ramp" or "triangle" waveform. When applied to the voltage tune pin on an external Voltage Controlled Oscillator (VCO), the resulting RF output will be "swept" across the entire tuning band. This is what is neeed for wideband jamming applications.

In this particular circuit, op-amp U1b is configured as an integrator, or triange wave generator. The resistor (R4) and capacitor (C2)in the integrator op-amp's feedback network form a RC time constant which is used to convert the incoming square wave into a triangle wave. I actually found the best resulting output waveform by experimenting with different capacitor values in the feedback network (it will be frequency dependant). The feedback resistor (R4) should be approximately 10 times the input resistor (R3). A feedback capacitor value of 2200 pF was found to output the cleanest triangle waveform with minimum signal attenuation.

Mathematically, the integrator's components are found via the following Perl equations:

# $R4 is the integrator's feedback resistor, in ohms
# $C2 is the integrator's feedback capacitor, in farads
# $FRQ is the input square wave's frequency, in Hz

$R3 = 10000; # resistor R3, in ohms (10k)

$R4 = 10 * $R3;

$C2 = 1 / ($FRQ * $R4);

But, I'd trust what an oscilloscope has to say more...

Op-amp U1c is configured as a buffer (gain = 1). This helps to isolate the oscillator network from the rest of the circuits. The series 0.1 µF capacitors remove any DC bias voltage which may be present on the op-amp's outputs. Low-leakage film capacitors will work the best.

Mixer / DC Offset

The final op-amp, U1d, is configured as a summing amplifier (gain = 1), otherwise known as a mixer. The output of a summing amplifier is the sum of the input voltages. The sum of these input voltages should not exceed the the +9 VDC of the TL074's positive voltage rail. The input to this mixer is a triangle wave and a random "noise" signal. These signals are mixed to form a new, "noisy" triangle waveform. When applied to the VCO, the resulting RF signal will "sweep" across the cellular downlink frequencies, and will be Frequency Modulated (FM) with the noise signal. This noise modulation helps to increase the jammer's effectiveness.

Another thing this op-amp performs is to provide a DC offset for the VCO's voltage tune pin. What this does is give the triangle wave a positive DC voltage offset to help "center" the triangle wave within the required frequency range.

Example:

(RF Output of a Particular VCO)

Voltage Tune (+ Volts DC) Frequency Output (MHz)

0 790
1 810
2 830
3 850
4 870
5 890
6 910

In our above example, a particular VCO is capable of tuning between 790 to 910 MHz with a voltage tune of 0 to +6 VDC. This works out to about 20 MHz of tuning per volt. So, if a person wanted to "jam" the frequencies between 870 and 890 MHz, they would need a +1 volt peak-to-peak triangle wave, with a DC offset of +4 volts. This would result in voltage signal sweeping between +4 and +5 VDC (referenced from ground), sweeping the VCO RF output between 870 and 890 MHz. Of course, in real life, the voltage-to-frequency mappings are not this precise.

The DC offset is provided via two multiturn potentiometers. One provides a "coarse" tuning and the other, smaller value one provides the "fine" tuning. The use of multiturn potentiometers is not a requirement, but is highly recommended for ease of tuning.

Noise Generator

The noise generator is just a standard 6.8 volt Zener diode with a small reverse current and a transistor buffer. The (optional) National LM386-1 audio amplifier acts as a natural band-pass filter and small-signal amplifier. The noise jamming signal is then mixed with the triangle wave input. This will help in masking the jamming transmission, making it look like random "noise" to an outside observer. Without the noise generator, the jamming signal is just a sweeping, unmodulated Continuous Wave (CW) RF carrier.

The LM386-based noise generator may break into oscillation or output a very low signal. If it does this, adjust the Zener bias resistor (2 k) up or down a few hundred ohms while observing the signal (disconnected from the LM386) on an oscilloscope for the maximum noise signal. Be sure that everything is grounded properly. The LM386 will oscillate without a good grounding system and poor power supply bypassing.

Any Zener diode above or equal to 6.2 volts will work in the noise generator, as these Zener diodes have an "avalanche" region which generates a tremendous amount of noise when properly biased.

Voltage Controlled Oscillator

The Voltage Controlled Oscillator (VCO) is arguably the most important component in a cellular phone jamming system. It is little four-terminal device (Power, Ground, RF Output, and Voltage Tune) which generates the required, low-level RF output signal with a minimal of fuss. Unfortunately, they can be harder to find than a black man in Canada. Companies such as Mini-Circuits and Z-Communications are very helpful to amateur electronics enthusiasts, and will sell their VCO models in single quantities directly, or point you to a local distributor.

Ideally, the VCO you choose should cover the frequency range of the cellular base station's downlink frequencies (tower transmit) you wish to jam. You always jam a receiver, so in this case, you'd jam the mobile station's (handset) receive frequencies - which are the cellular tower's transmit frequencies.

Here's a website which shows the U.S. cellular carrier-to-frequency mappings:

http://www.criterioncellular.com/tutorials/findfrequencies.html

Here's a little chart to help you choose the right cellular frequency ranges:

GSM / GPRS / HSCSD / EDGE (TDMA formats)

Mainly used in Eurosavage-land, Asia, Latin America, and some parts of North America.

Description / Band Mobile Station Frequencies (MHz) Base Station Frequencies (MHz)
GSM 450 Band 450.4 - 457.6 460.4 - 567.6
GSM 480 Band 478.8 - 486.0 488.8 - 496.0
GSM 750 Band 777.0 - 792.0 747.0 - 762.0
GSM 850 Band 824.0 - 849.0 869.0 - 894.0
GSM 900 Band 890.0 - 915.0 935.0 - 960.0
GSM 900 Extended Band 880.0 - 915.0 925.0 - 960.0
GSM 900 Railway Band 876.0 - 915.0 921.0 - 960.0
DCS 1800 Band 1710.0 - 1785.0 1805.0 - 1880.0
PCS 1900 Band 1850.0 - 1910.0 1930.0 - 1990.0



EIA-136 / EIA-95 / EIA-95A / EIA-95B / CDMA2000 / 1xEV-DO (EIA-136 is TDMA, the rest are CDMA formats)

Mainly used in North America, some Latin America, Korea, some Asian countries, Japan.

Description / Band Mobile Station Frequencies (MHz) Base Station Frequencies (MHz)
800 MHz Systems (US, Korea) 824.0 - 849.0 869.0 - 894.0
800 MHz Systems (Japan) 887.0 - 925.0 832.0 - 870.0
1900 MHz Systems (US) 1850.0 - 1910.0 1930.0 - 1990.0
1900 MHz Systems (Korea) 1750.0 - 1780.0 1840.0 - 1870.0
NMT 450 Band 411.0 - 483.0 421.0 - 493.0
NMT 2000 Band 1920.0 - 1980.0 2110.0 - 2170.0



W-CDMA / TD-SCDMA (Combination TDMA and CDMA formats)

Mainly used in North America, some Eurosavage countries, Korea, Japan, some Asian countries.

Description / Band User Equipment Frequencies (MHz) Base Station Frequencies (MHz)
IMT 2000 Band 1920.0 - 1980.0 2110.0 - 2179.0
PCS 1900 / W-CDMA Band 1850.0 - 1910.0 1930.0 - 1990.0
DCS 1800 Band 1710.0 - 1785.0 1805.0 - 1880.0
W-CDMA Band 1900.0 - 1920.0 (UE & BS) 1900.0 - 1920.0 (UE & BS)
W-CDMA Band 1910.0 - 1930.0 (UE & BS) 1910.0 - 1930.0 (UE & BS)
W-CDMA Band 2010.0 - 2025.0 MHz (UE & BS) 2010.0 - 2025.0 MHz (UE & BS)
TD-SCDMA Band 2010.0 - 2025.0 MHz for TD-SCDMA mode 2010.0 - 2025.0 MHz for TD-SCDMA mode
TD-SCDMA Band GSM 900 and DCS 1800 for GSM mode GSM 900 and DCS 1800 for GSM mode

RF Power Amplifiers

The second most important part of the RF chain is the RF power amplifier. This is a device which may take a small RF signal, say at +10 dBm (10 milliwatts) and amplify it up to around +34 dBm (2.5 watts). The cheap & easiest source of these amplifiers is from old cellular phones themselves. Some cellular phones will use broadband RF power "hybrid" modules which helps make their construction easier and smaller. These RF module devices tend to be very widebanded, and will easily amplify RF signals outside of their intended range. Increasing the module's bias, power control, or Vdd voltage can also milk a little more gain out of them. The modules will need to be connected to a large, smooth heatsink and may also require a cooling fan.

This picture shows a Hitachi PF0030 820-850 MHz, 6 watt RF power amplifier module installed in an old Nokia/Radio Shack cellular phone. This particular module will work up to over 900 MHz, with only a slight decrease in gain at those higher frequencies. Running the Vdd voltage at +15 VDC also slightly increases the RF power output. I've gotten them to hit 10 watts output, when properly layed out and constructed with a big heatsink.

This is an example picture of a Hitachi PF0031 880-915 MHz, 6 watt RF power amplifier module which is mounted in a portable jammer. The PF0031 is intended for operation at slightly higher frequencies, so it gives a little better RF output and input SWR performance and will also run cooler than the PF0030.

Here is an even bigger RF power amplifier. It's connected to an old Motorola Mostar 800 MHz trunked mobile radio. Only the RF power amplifier is used. RF output is over 30 watts into a homebrew Yagi antenna.

Most broadband RF power hybrid modules rarely need more than +13 dBm (20 mW) of RF input to work properly. This is perfect for being driven directly from the VCO's RF output without the need for any additional MMIC amplification. Increasing the RF input power only shortens the life of the power module, with little result in output gain.

Another useful device to place in the RF power amplifier chain is an isolator. An isolator is a ferrite circulator with one of the ports connected to a pure 50 ohm resistive load. Basically, from port 1 to port 2, (RF power amplifier to antenna) there is minimal insertion loss. But, any RF power flowing back from port 2 into port 1 is "diverted" into port 3, the 50 ohm load. What this means is that the RF power amplifier is always "seeing" a perfect 50 ohm load (perfect SWR), even if the antenna is removed! These are very handy little devices, but are harder to find then $2600 Magazine's integrity. Use 'em if you've got 'em.

Here is a picture of the RF power amplifier section on a four watt, 1.9 GHz PCS jammer. The RF module's output is fed into an isolator (that big round thing). RF input is on the left, the antenna connection is on the right, and the 50 ohm load is on the bottom. The silver rectangle thing is a directional coupler. This is a device which samples the module's RF output, then sends it to a diode detector/transistor buffer to control a "RF Output" LED.

Antenna / Feedline

The most important part of a radio system is the antenna. Spend 90% of your money on the antenna system and coaxial cable, and you'll have no problems. Use a coathanger and some alligator clips and you'll be emailing me 50 times a day saying it doesn't work. Thankfully, you can also salvage the antenna from old cellular phones. Those magnetic or trunk mount antennas work best. Glass mount antennas or anything "stick-on" are crap. Directional gain antennas can be used to increase the jammer's performance, but only in the direction the antenna is pointed. High-gain, omni-directional antennas are the best. For homebrew designs, you can scale down (or up) 900 MHz (33 cm) band amateur radio band antennas.

For 1.8/1.9 GHz band antennas, you are pretty much stuck with using commercial designs. Building antennas at those high of frequencies is quite difficult and not worth the trouble.

Ramsey Electronics sells nice wideband Yagi antennas for everything betweeen 400 MHz and 6 GHz.

Pictures / Waveforms

  • Picture 1 Picture of the prototype TL074 triangle wave generator.
  • Picture 2 Example oscilloscope picture of the raw TL074 triangle wave generator's output. Y = 1V, X = 20 µS.
  • Picture 3 Example oscilloscope picture of the LM386 noise generator's output. Y = 0.5V, X = 10 mS.
  • Picture 4 Example oscilloscope picture of the triangle wave output (1 Vpeak amplitude) with a 0V DC offset. Y = 2V, X = 0.1 mS.
  • Picture 5 Example oscilloscope picture of the triangle wave output (1 Vpeak amplitude) with an approximate 2.3V DC offset. Y = 2V, X = 0.1 mS.
  • Picture 6 Example oscilloscope picture of the triangle wave output (1 Vpeak amplitude) mixed with a 100 kHz sine wave, to simulate noise, and an approximate 4V DC offset. Y = 2V, X = 0.1 mS.
  • Picture 7 Example overview picture of the GBPPR JAMCAT. Noise generator is on the left-hand side.

A Brief History of GSM Development

The Global System for Mobile Communications (GSM) system was introduced in Eurosavage-land around 1992. Its development and deployment went something like this:

1910 - 1920s -   

* U.S. Bell System develops first mobile radio telephone. It was the size of a large truck.
* Europe kills millions and millions of people.

1930s -

* U.S. Bell System continues development on the mobile radio telephone.
* Europe kills millions and millions of people.

1940s -

* U.S. Bell System stops development, uses copper to protect Europeans.
* Europe kills millions and millions of people.

1950s -

* U.S. Bell System develops first long-range VHF mobile telephones.
* Europe denies the whole Hitler thing.
Demands the U.S. protect, help, and feed them.

1960s -

* U.S. Bell System growing faster and faster, first radio telephone cellular network appear.
* Europe builds a wall.

1970s -

* U.S. cellular phones become common. AMPS standard is started.
* Europe wastes Marshall Plan money.
Does everything except build a Holocaust museum.

1980s -

* U.S. cellular phones become even more widespread, full country coverage.
* Europe sells weapons to hostile countries and terrorists.
Never repays any WWII debts or Marshall Plan money.

1990s -

* U.S. cellular phone starting to move to a new, superior CDMA format.
* Holy Shit! Europe develops GSM with Marshall Plan money, money they save
by denying the Holocaust, money the save by denying the whole Hitler thing,
money stolen from Jews, and by spying on the U.S.

2000s -

* U.S. has full coverage of a superior CDMA cellular format.
* Europe brags about their "advanced" cellular network technology, which ham radio
operators invented, and where using, 15 years earlier.

Datasheets / Links to Suppliers

Miscellaneous Pictures

Miscellaneous Notes

Other Countries

GSM isn't used here, so I can't verify they work. I made these schematics as starting diagrams for anyone who needs to make their own GSM900 jammer.

Remember! If U.S. taxpayers didn't have to pay for the rebuilding of war-torn Europe, the excavating of mass graves in Europe, the feeding of starving Europeans, protecting Europeans from other Eurosavages, paying to locate stolen Jewish money/artwork/valuables, spending more money on AIDs research then all the countries in the E.U. combined - we'd have a "cool" GSM cellular network just like yours! Suck it assholes! Ask Hitler, Mussolini, Stalin, and Chirac why you can't find any good electronic parts stores in your countries.

Additional notes:

the max vco 2623 was sufficient to work from freq range of 700mhz-1100mhz. we introduced a control for diff sweep freq by varying the capacitance value of 555 timer ic in its astable mode of operation.the sweep best suited was 100khz and not 1khz.rest the remaining part was same we used pf08103b as the power amp instead of pf0030.

American tourists view of Europe's cellular phone system:

This goddamn Europe. A thousand years of unending quarrels behind them, and they are still fighting. This place was a cesspool, beyond redemption. Why didn't the U.S. turn its back on them? Let them kill each other. Why should America sacrifice its young men in fruitless carnage?

Construction Overview of a Homebrew P2JBZ-style Cellular (GSM 900) Jammer

PCB Size: Top track to bottom track is 408 mm, left track to right track is 160 mm. Double-sided FR-4, 1.6mm thick

Datasheets for the above jammer.

Commercial Cellular Phone Jammers

Can't build your own, dumbass? Then buy one.

Cellular Phone Talker-Over

Device to talk over someone's cellular phone - analog AMPS only.

Cellular Phone/GPS "Burst" Tracking Device Jammer

Simple device to defeat most cellular-based GPS tracking devices.

Cellular Phone Jammer Detector

Use an old cellular phone to detect any cellular phone jamming.

Cellular Phone Based Surveillance Bug

Turn an old Motorola cellular phone into a high power surveillance device.

GBPPR Non-Linear Junction Detector

Determine if a person's carrying a cellular phone or a fucking bomb!

GPS Jammer

Assholes in Europe have been leaching off U.S. taxpayers for too long! Lets make those bastards build their own satellite system for cellular network timing and carrier synchronization.


Return to Homebrew Military & Espionage Electronics Page