Monday, September 4, 2017

Critical Inflection on Youth-Blue Whale

What is BLUE WHALE?
Blue Whale is a kind of online game which was introduced by secret social media group called 'F57' in 'Vkontakte'.('Vikontakte' is world's second largest social media network,a Russian social network). It can be considered as kind of a challenge like ALs Ice bucket challenge or Harlem Shake.
                                     This game was invented by a 22 year old psychology student who has expelled from his university and unfortunately around 150 deaths has reported around the world due to this fatal game.
                                     


                            In the game,each contestant get an observer and as well as a list of missions(about 50) to be done on particular deadlines. Each of these objectives are evaluated by observers and need to upload a photograph as an evidence to the completion of each objective.At the beginning contestant may face quite easy missions and as the game goes on, get more and more dangerous and challenging objectives are there to be completed.


                   At the first stage contestant has to do activities like watching a horror movie, wake up at unusual times in night etc. And then,he/she has engage things like to head stand on the bridges and stand on vertical needle which causes to hurt and bleed the contestants. The final and ultimate challenge given(Which is 50th one) is to Suicide.Mostly, teenagers are trapped in the this fatal game and they are automatically step towards their own suicide as the game flows.

                         This was rapidly spread over Russia and in the year of 2016 and "Philip Budeikin" who is considered as the inventor of this game has arrested.At the time of arresting he has told to the media that he is doing a social service and in biological manner he helps to remove the people who are not worth to this world in order to make this world a better place.

                         Because of this fatal Blue Whale challenge, new laws and regulations were established in Russia and now the newest trap of this infection is our neighbor India.
Plenty of suicides are being reporting from India these days and most of them are teenagers.According to investigations,victims are either people who are depressed or non socialized.

On last Wednesday 19 year old boy named Vignesh from Tamilnadu  hung himself on roof.
A piece of paper which was found on his table had following sentence on it
"You can enter it. But you can not exit the game"

moreover a blue whale figure was drawn on his arm and as IIT specialists says, he was in his final levels of the game.

These days India is going to launch a movie subjected on this fatal inflection and its trailer was published couple of weeks ago.Ranveer Kapoor,Preethiviraj and Kamal Hassan are participating in Acting for this movie and hopes this might be a good approach to teach society about Blue whale disaster.

Tuesday, July 18, 2017

NotePicker- Smart Note Keeper + Smart Scanner(OCR Detection)

Note Picker is simple and smart note keeping application which provide you handle your notes handy manner.
Notes Library provides you the convenience of  reading,modifying and managing all the notes. All the notes have been recorded and saved with the time and date you created it.
The best feature you gain from Note Picker is Scanning notes simply from your camera without respect to where it placed. Any note contained in paper,notice,book,fabric,wall or any other place can be easily copied to your note from Note Picker.Plus, notes that can hardly typed(long serial numbers with special characters etc) can be added to your note with convenient manner by this Application
Download Now from Play store!...
https://play.google.com/store/apps/details?id=gihanMora.blogspot.NotePicker


Download Now from Play store!...
https://play.google.com/store/apps/details?id=gihanMora.blogspot.NotePicker



Wednesday, July 12, 2017

Privacy Policy

Privacy Policy

Gihan Gamage built the Note Picker app as a Free app. This SERVICE is provided by Gihan Gamage at no cost and is intended for use as is.
This page is used to inform website visitors regarding my policies with the collection, use, and disclosure of Personal Information if anyone decided to use my Service.
If you choose to use my Service, then you agree to the collection and use of information in relation to this policy. The Personal Information that I collect is used for providing and improving the Service. I will not use or share your information with anyone except as described in this Privacy Policy.
The terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, which is accessible at Note Picker unless otherwise defined in this Privacy Policy.
Information Collection and Use
For a better experience, while using our Service, I may require you to provide us with certain personally identifiable information, including but not limited to Camera. The information that I request is retained on your device and is not collected by me in any way
The app does use third party services that may collect information used to identify you.
Link to privacy policy of third party service providers used by the app
Log Data
I want to inform you that whenever you use my Service, in a case of an error in the app I collect data and information (through third party products) on your phone called Log Data. This Log Data may include information such as your device Internet Protocol (“IP”) address, device name, operating system version, the configuration of the app when utilizing my Service, the time and date of your use of the Service, and other statistics.
Cookies
Cookies are files with small amount of data that is commonly used an anonymous unique identifier. These are sent to your browser from the website that you visit and are stored on your device internal memory.
This Service does not use these “cookies” explicitly. However, the app may use third party code and libraries that use “cookies” to collection information and to improve their services. You have the option to either accept or refuse these cookies and know when a cookie is being sent to your device. If you choose to refuse our cookies, you may not be able to use some portions of this Service.
Service Providers
I may employ third-party companies and individuals due to the following reasons:
  • To facilitate our Service;
  • To provide the Service on our behalf;
  • To perform Service-related services; or
  • To assist us in analyzing how our Service is used.
I want to inform users of this Service that these third parties have access to your Personal Information. The reason is to perform the tasks assigned to them on our behalf. However, they are obligated not to disclose or use the information for any other purpose.
Security
I value your trust in providing us your Personal Information, thus we are striving to use commercially acceptable means of protecting it. But remember that no method of transmission over the internet, or method of electronic storage is 100% secure and reliable, and I cannot guarantee its absolute security.
Links to Other Sites
This Service may contain links to other sites. If you click on a third-party link, you will be directed to that site. Note that these external sites are not operated by me. Therefore, I strongly advise you to review the Privacy Policy of these websites. I have no control over and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.
Children’s Privacy
These Services do not address anyone under the age of 13. I do not knowingly collect personally identifiable information from children under 13. In the case I discover that a child under 13 has provided me with personal information, I immediately delete this from our servers. If you are a parent or guardian and you are aware that your child has provided us with personal information, please contact me so that I will be able to do necessary actions.
Changes to This Privacy Policy
I may update our Privacy Policy from time to time. Thus, you are advised to review this page periodically for any changes. I will notify you of any changes by posting the new Privacy Policy on this page. These changes are effective immediately after they are posted on this page.
Contact Us
If you have any questions or suggestions about my Privacy Policy, do not hesitate to contact me.
This privacy policy page was created at privacypolicytemplate.net and modified/generated by App Privacy Policy Generator

Friday, May 12, 2017

The World's First Underwater Tennis Court



Dubai is one of the best places on Earth that you can see wonderful things in your lifetime.
The people living in Dubai seem to love their tennis courts. Because in the year 2005, the world'1 heighest tennis court was built by them on top of one thousand feet tall burl-A-Arab Hotel. And now, the city may venture beneath the sea with the amazing world’s first underwater tennis court.



 This underwater complex is proposed by earlier in this year by well known Polish architect named Krystztof Kotala who is also the Founder of the  8+8 Concept Studio.This is  situated at offshore in the Persian Gulf, between the Burj al Arab and the Palm Jumeirah islands in the United Arab Emirates. The full proposed structure will house to seven courts, each with  rooftop a coral reef is designed to build an illusion of a natural atoll.

                                While this creative idea drew so much interest from worldwide spectators, it also comeup with many technical and engineering concerns for engineers. Sara Fray, who is the director of Engineering and Technical Services at the Institution of Structural Engineers in London, has reported to "MailOnline" that the transparent ceiling would need a continuous pane which is made of glass measuring at leaat 180 feet-wide and weigh possibly 100 tons to accommodate the court and spectators . Aside from the major concern of leakage of water, Fray also noted a few important things that the complex would need, including a feasible and strong structure that could withstand earthquakes and tsunamis, and an efficient connection which is to the surface as emergency exit. Not only that she even questioned whether tennis players could play in these courts, as it would be difficult to control the light refraction inside the courts.


Beyond these technical issues, this entire project is also extremely expensive to build. Currently this is estimated to cost a whooping $1.7 -$2.5 billion, according to reviewers in an interview with CNN, the architect hopes the project to be a “combination of ecology, technology and sport” which has a strong commercial potential.
There is no doubt this will multiply the tourist attraction in the country..


Wednesday, May 10, 2017

Find your BMI...






BMI can be considered as a successful way to measure the level of health of a person.It confirms that your weight is appropriate to height.

BMI stands for Body Mass Index and given by following formula.


B.M.I=Weight(kilograms)/Height(meters)^2

It is recommend to maintain BMI within sustainable range.

*    Underweight: BMI is less than 18.5.
*    Normal weight: BMI is 18.5 to 24.9.
*    Overweight: BMI is 25 to 29.9.
*    Obese: BMI is 30 or more.


Engage in exercise everyday,have a balance diet,reduce consumption of sugar,junk food and fat will bring you a regular amount of BMI.

Frequently checking BMI using this application will prevent you from obesity and underweight!

Tuesday, May 9, 2017

Find your missing Mobile Phone in few seconds!!




Android Device Manager





                                  Google can be considered as one of the best user friendly companies around the world which provides you wonderful services through-out the past couple of years.By this service you can easily find your missing android device with few seconds.
                                  If you've lost a device (mobile etc.), you can use Android Device Manager to find its approximate location on a map and when it was last used within just few seconds. When Android Device Manager locates your device, that device also will get a notification.

Before you can use Android Device Manager to locate your device:
 Your device's location access need to be turned on and be signed in to your Google Account too. Obviously these two things will be already done as you already signed in with your email and play-store accounts. Note that: Android Device Manager won't work for devices that are turned off or that don't have a mobile data or Wi-Fi connection.
Note: If you've linked your phone to Google (learn how), you can find or ring it by simply searching for “find my phone” on google.com.
You can also ring your mobile/lock it or erase your data too.
Locate a lost device using Android Device Manager

  1. Sign in to your Google Account on android.com/devicemanager (If you are not singed up yet).
  2. If you have more than one device, click the arrow next to the device name to select a different device(Your most frequently used device will appear first).
  3. Android Device Manager will show you the approximate location in a map of the device selected.
If you have another mobile device, you can use the Android Device Manager application to locate your lost device. You need to have the Android Device Manager app installed on the particular device that you plan to use.
  1. First on the device that you have with you, open the Android Device Manager app Android Device Manager app.
  2. Log in to your Google Account.
  3. Change the device displayed:
    • On your phone: Swipe along the bottom of the screen to see devices you are using.
    • On your tablet: Press on the arrow next to the device to select a device.
  4. Android Device Manager will show you the approximate location on a map of the device selected.
For Android Wear users(Smart watches), you can also use your watch to find your device if it's connected by Bluetooth.
 
Once you find your device, you can remotely ring, lock, or erase it using the Android Device Manager. 
NOTE: Android Device Manager doesn't collect and store location history of your device. It requests your device's approximate location when you first sign in and this location data is deleted when you sign out of the device manager.

Sunday, May 7, 2017

What is Deep Web??








Deep Web, also known as “Deepnet,” the “Invisible Web,” the “Undernet” or the “hidden Web,” are parts of the Internet that are not considered part of the “surface web,” or the portion of the World Wide Web(WWW) that is indexed by conventional search engines. Many deep web sites are not indexed because they use dynamic databases that are devoid of hyperlinks and can only be found by performing an internal search query.
Put simply, it is the partion of the internet that is hidden from viewing by typical browsers.
  • Surface Web
·          
    • 4% of the WWW content
    • Also known as the ‘Visible Web’, it is content that can be found and frequently using by search engines such as Google or Yahoo. It is controlled under constant surveillance by the government.
  • Deep Web
·          
    • 96% of the WWW content
    • Also known as the ‘Invisible Web’, it is the content of the internet that cannot be indexed by search engines. And it is hard to keep track of and thus not in control.
The Deep Web is estimated to be at least 500x the size of the Surface Web which we use day-today life.


According to The New York Times, computer scientist Mike Bergman is credited with coining the term of “deep web” in a paper which is titled “The Deep Web: Surfacing Hidden Value” published in The Journal of Electronic Publishing in August year of 2001. In the paper, Bergman mentions that Internet business author Dr. Jill Ellsworth coined the phrase “invisible Web” in 1994 when referring to websites that were not viewed by common search engines. Addition to that the paper also estimated that at the time of publication, information on the deep Web was “400 to 550 times larger than the commonly defined World Wide Web,” or approximately 7,500 terabytes of data.

Methods which prevent web pages from being indexed by traditional search engines and belongs to deep web can be categorized in to following areas:
  1. Contextual Web: pages with content differs for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence).
  2. Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only by using a form, specially if open-domain input elements (such as text fields) are used; such fields are hard to navigate without domain knowledge.
  3. Limited access content: sites that limit access to their pages in a technical method (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies).
  4. Non-HTML/text content: textual content which is encoded in multimedia (image or video) files or specific file formats not handled by search engines.
  5. Private Web: sites that require registration and login to be accessed (password-protected resources).
  6. Scripted content: pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers such as via Flash or Ajax solutions.
  7. Software: certain content is intentionally hidden from the regular Internet which we are using, accessible only with special software, such as Tor, I2P, or other darknet software. For example, Tor allows users to access websites using the .onion server address anonymously, hiding their IP address.
  8. Unlinked content: pages which are not directly linked to by other pages, which may prevent web crawling programs from accessing the content. This content is referred to as pages without backlinks (also mentioned as inlinks). Also, search engines do not always detect all backlinks from searched web pages.
  9. Web archives: Web archival services such as the Wayback Machine enable to people who use internet to see archived versions of web pages across time, including websites which have become inaccessible, and are not indexed by search engines such as Google/yahoo.
Is it legal?
Yes. You use it as you are using any internet browser. Many people are now started to use TOR as a way to maintain their privacy whilst online.
  • Who else uses it:
·          
    • In Military Cases
    • Police and crime units worldwide
    • Journalists worldwide
    • Whistleblowers
o     
      • Edward Snowden
      • Julian Assange
Due to the anonymity that TOR offers, the Deep Web has also become a popular nesting ground for various criminal activity. This includes things such as:
  • Drug dealing
  • Weapons trading illegally
  • Child pornography

Privacy Policy Python Basics app

  Privacy Policy 1. Introduction Welcome to the Privacy Policy for the Python Basics Android application ("Python Basics", "w...