Monday, January 27, 2014

"Freebird" by Lynyrd Skynyrd and "Hold the Line" by Toto - Musical Monday!

Hey everyone!! HAPPY MONDAY!! :D



"Freebird" by Lynyrd Skynyrd




Lyrics


If I leave here tomorrow
Would you still remember me?
For I must be traveling on, now
'Cause there's too many places
I've got to see

But, if I stayed here with you, girl
Things just couldn't be the same
'Cause I'm as free as a bird now
And this bird, you'll can not change
Oh, oh, oh, oh, oh

And the bird you cannot change
And this bird you cannot change
Lord knows, I can?t change
Bye, bye, baby it's been a sweet love

Yeah, yeah
Though this feeling I can't change
But please don't take it so badly
'Cause the Lord knows
I'm to blame

But, if I stayed here with you girl
Things just couldn't be the same
'Cause I'm as free as a bird now
And this bird, you'll can not change
Oh, oh, oh, oh, oh

And this bird you cannot change
And this bird you cannot change
Lord knows, I can't change
Lord help me, I can't change
Lord I can't change

Won't you fly high, free bird, yeah?



"Hold the Line" by Toto




Lyrics


It's not in the way that you hold me
It's not in the way you say you care
It's not in the way you've been treating my friends
It's not in the way that you'll stay till the end
It's not in the way you look or the things that you say that you do

Hold the line
Love isn't always on time

It's not in the words that you told me
It's not in the way you say you're mine
It's not in the way that you came back to me
It's not in the way that your love set me free
It's not in the way you look or the things that you say that you do

Hold the line
Love isn't always on time

It's not in the words that you told me
It's not in the way you say you're mine
It's not in the way that you came back to me
It's not in the way that your love set me free
It's not in the way you look or the things that you say that you do

Hold the line
Love isn't always on time

It's not in the way that you hold me
It's not in the way that you make me feel
You see
It's all about the way you do the things you do
The way you do it
You've got to hold it
Hold it

Hold the line
Love isn't always on time

Hey! I hope you all love the songs and enjoy them. See ya all soon! Good day!! :D

Sunday, January 26, 2014

Android Application Development Tutorials Part 21/25 by thenewboston - Sunday Funday Tutorials

Hey all my dear readers! :D I hope you all are doing just great! :)



Ready to continue where we left last week? I hope you all are having fun! :D



For these tutorials, don't forget to thank thenewboston. You can check their Youtube Channel by clicking the image below:



#161 - Setting up Widget Configuration Activity




#162 - Basic Widget Design




#163 - Updating and Deleting Widget




#164 - Updating a Widget TextView




#165 - Setting up Widget Configuration Class




#166 - Relating Context with the Widget Manager




#167 - PendingIntent and widget Buttons




#168 - Introduction to OpenGL ES




I hope you all like them. Grasp them, and I'll be back with the next 8 on next Sunday! :) Have a great day, stay safe and have fun! ^_^ See you all soon :D

Tuesday, January 21, 2014

Guidelines for securing Operating System Part 8 - Data Encryption - Tech Tuesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



Continuing the Security Tips series I started in July '13, today I wish to discuss with you all the topics listed after the following links. Just in case you want to access the last posts in this series, here are the links:

Part 1: General Guidelines - Click Here
Part 2: Microsoft Windows - Click Here
Part 3: Macintosh - Click Here
Part 4: Guest Accounts - Click Here
Part 5: Windows Firewall - Click Here
Part 6: Event Viewer & Netstat - Click Here
Part 7: Antiviruses - Click Here

Let's first consider in brief the structure of this post.

  • Introduction
  • What is encryption
  • Objectives of Encryption
  • Usage of Encryption
  • Types of Encryption
  • Symmetric v/s Asymmetric Key Encryption
  • Encryption Standards
  • Digital Certificates
  • Digital Signatures
  • Cryptography Tools
  • TrueCrypt
  • Conclusion/Comments

Introduction


Personal computers and portable computing devices often contain confidential data such as payment information, personal files, bank account details, and more, which must be shielded from prying eyes in the event of theft or loss of the device. I’ll be talking about encryption and how can we as users use this superb technique to protect our data.



Plaintext: In cryptography, plaintext is the ordinary, readable text from before being encryption into cypher text and is the result of decryption.
Cipher Text: Cipher text is the encrypted text that is unreadable until it has been decrypted to plaintext with a key. It is used to securely send messages over the Internet.
Encryption Key: A key is a piece of information that can encrypt, decrypt, or perform both functions, depending on the type of encryption being used.

What is encryption


Encryption is the process of converting information, programs, images, and other data into an unreadable cipher text to prevent unauthorized access by applying a set of complex algorithms that transform the data into blocks or streams of random alphanumeric characters.

If Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form. As only Alice has access to her Private Key, it is possible that only Alice can decrypt the encrypted data. Even if someone else gains access to the encrypted data, it will remain confidential as they should not have access to Alice's Private Key. Thus cryptography secures the data against eavesdropping. We can also see it is irreversible since everyone knows public key to send the message, the private key to decrypt is known only to the receiver.




To add a digital signature to his message (which guarantees the originality of the sender), Bob does a compilation involving both his private key and the message. When the receiver, Alice, gets the message, she checks the digital signature to verify the origin of the message being genuine or not.

Objectives of Encryption


There are 3 major objectives:
  • Confidentiality: is probably the most common aspect of information security. We need to protect our confidential information. An organization needs to guard against those malicious actions that endanger the confidentiality of its information. Confidentiality not only applies to the storage of the information, it also applies to the transmission of information. When we send a piece of information to be stored in a remote computer or when we retrieve a piece of information from a remote computer, we need to conceal it during transmission.
  • Integrity: means that changes need to be done only by authorized entities and through authorized mechanisms. Integrity violation is not necessarily the result of a malicious act; an interruption in the system, such as a power surge, may also create unwanted changes in some information.
  • Availability: The information created and stored by an organization needs to be available to authorized entities. Information is useless if it is not available. Information needs to be constantly changed, which means it must be accessible to authorized entities. The unavailability of information is just as harmful for an organization as the lack of confidentiality or integrity. Imagine what would happen to a bank if the customers could not access their accounts for transactions.

Usage of Encryption


  • Encryption is used to protect user credentials such as user names and passwords.
  • It helps to safely store sensitive information on a computer or external storage media.
  • Encryption provides a secure medium for users to connect to their friends or employees’ networks from outside the home or office.
  • It provides a higher level of trust when receiving files from other users by ensuring that the source and contents of the message are trusted.
  • Encryption is used as a resource for web-based information exchange to protect important information such as credit card numbers.
  • It provides assurance of a sender’s identity.
  • Encryption helps avoiding attention to a confidential email.

Types of Encryption


  • Symmetric Encryption: It is private key encryption technique which ensures privacy and confidentiality. Only one key is used for both encryption & decryption. It can be either block cipher or stream cipher.
  • Asymmetric Encryption: It is public key encryption technique and ensures non-repudiation and user authentication. The user uses 2 keys, public key for encryption & private key for decryption.
  • Hash Function: It ensures integrity, which is also referred to as one-way encryption and message digest. Hash functions are used by the operating systems to encrypt the passwords and ensure that files are not altered by unauthorized users.

Symmetric v/s Asymmetric Key Encryption


Symmetric Key Encryption Asymmetric Key Encryption
Symmetric encryption uses only one key for both encryption and decryption Asymmetric encryption uses a public key for encryption & private key for decryption
The key cannot be shared safely In asymmetric encryption, the public key can be freely shared, which eliminates the risk of compromising the secret key.
Symmetric encryption requires that the sender and the receiver of the data know the secret key Only the public key is known
The algorithm is less complex & faster Algorithm is slower & complex
The key length is fixed The key length is variable
It is used for bulk encryption, i.e., for encrypting files & communication paths It is used for key encryption & distribution
Symmetric encryption ensures confidentiality and integrity Asymmetric encryption ensures confidentiality, authentication, non-repudiation, and integrity






Encryption Standards


  • DES
    The data encryption standard is the name of the Federal Information Processing Standard (FIPS) 46-3, which describes the data encryption algorithm (DEA). The DES has a 64-bit block size and during execution it uses a 56-bit key. When it is used for communication, both the sender and he receiver must know the secret key that is used to encrypt and decrypt the message, or to generate and verify a message authentication code. It is a symmetric cryptosystem originally designed to be implemented in hardware. It is used for single-user encryption such as storing encrypted files on a hard disk.
  • AES
    The advanced encryption standard is an iterated symmetric block cipher defined in FIPS, which means that it works by repeating the same defined steps multiple times. It is a secret key encryption algorithm, and operates on a fixed number of bytes. AES-128, AES-192, AES-256 are the three block cipher present in AES.

Digital Certificates


A digital certificate is an electronic card that provides credential information while doing business or other online transactions on the web. It contains the name, expiration date, signature information, and serial number, copy of the owner’s public key, and digital signature authentic. It is used to verify one’s identity and can be used in various ways such as to control access on websites, to secure email, to create virtual private networks, and to assure the authenticity of downloaded software. Digital certificates can be personal certificates, server certificates, or certificate authority certificate. Digital certificates are used for Identification, Authentication, and Security.

A user requests a certificate from a Registration Authority, which verifies the applicant, and requests the Certification Authority issues a certificate to the user. The Certification Authority issues a public key certificate to the user and sends the updated information to the Validation Authority, which is contacted by someone who wishes to verify the digital certificate of the user.

Digital Signatures


A digital signature is a cryptographic means of authentication. Public key cryptography, which uses an asymmetric key algorithm, is used to create the digital signature. The two types of keys in public key cryptography are the private key & the public key. “Hash function” is a process which is used when creating and verifying a digital signature. This algorithm creates a digital representation of a message, but is still unique. If any change is made to the message, it will automatically produce a different hash result; it is not possible to derive the original message from the hash value in case of a secure hash function, which is also known as “one-way hash”.

The hash result of the original message and the hash function that is used to create the digital signature are required to verify the digital signature. With the help of the public key and the new result, the verifier checks:
  • If the digital signature is created with the related private key
  • If the new hash result is the same as the original hash result, which was converted into a digital signature during the signing process
To correlate the key pair with the respective signer, the certification authority presents a candidate that is an electronic record of the public as the subject of the certificate, and confirms the identity of the signer as the related private key owner. The future signer is called the subscriber. The main function of the certificate is to bind a pair of public and private keys to a particular subscriber. The receipt of the certificate relies on a digital signature created by the subscriber named in the certificate. The public key listed can be used to verify that the private key is used to create the related digital signature.

The certification authority digitally signs the certificate to assure the authenticity of both the public key and the subscriber’s identity. The authority’s digital signature on the certificate can be verified with the help of the public key of the certification authority recorded in another certificate, which belongs to another certification authority. This certificate can be authenticated with the help of another public key recorded in another certificate and so on.

The repository can be made to publish the certificate; the public key and its identity are available for verification of the certificate. The retrieval and verification of the digital signature is made with the help of online databases called repositories, which holds the certificates and other information. The certification authority may suspend or revoke the certificate.





Cryptography Tools

TrueCrypt


Since this post has already been quite long, I’ll discuss Cryptography Tools and TrueCrypt in my next post. Thank You!

Conclusion/Comments


I hope you find all the relevant information you must know about the topic of security I discussed with you all today. For any queries or suggestions please feel free to comment here.

I hope you all have a great day ahead! :) Happy Tuesday :) See you all soon! :D

Sunday, January 19, 2014

Android Application Development Tutorials Part 20/25 by thenewboston - Sunday Funday Tutorials

Hey all my dear readers! :D I hope you all are doing just great! :)



Ready to continue where we left last week? I hope you all are having fun! :D



For these tutorials, don't forget to thank thenewboston. You can check their Youtube Channel by clicking the image below:



#153 - Reading JSON information




#154 - Setting up XML Parsing Project




#155 - StringBuilder and XML Parsing Framework




#156 - Setting up a parsed XML data collection class




#157 - SAXParserFactory and XMLReader




#158 - Start Element method




#159 - Finishing XML parser




#160 - Creating a Widget receiver




I hope you all like them. Grasp them, and I'll be back with the next 8 on next Sunday! :) Have a great day, stay safe and have fun! ^_^ See you all soon :D

Saturday, January 18, 2014

"Nuclear Bike 2" and "3D Sniper" - Gaming Saturday!

Hey all my dear friends! :) How are you all? Welcome to my blog on this Gaming Saturday! :D Let's play some nice games! :D



Nuclear Bike 2

Description


A continuation of a famous biking game Nuclear Bike is finally here! Rock on with Turbo and many new features!


Game Features

Breath taking game play
Amazing physics

Taking look at the screenshots below you'll come to know ore about the game. It looks more like the Bike Games on Android platform, so I guess everyone would like it since everybody loves Android these days -_- (I HATE IT!) Anyways, the game is fun. Atleast as long as you are not bored of roaming around(Right and Right and Right) in the game. It is a good play for a couple of hours and a little stress-buster sort of ! :)

ScreenShots and Download Links








Click the following button to Download now! Don't worry the link is 100% safe and legal! :)

Download Size: 7.7 MB






3D Sniper

Description


You are a US SWAT fighter. Your special task is to destroy the international terrorists camp that is based in eastern Africa.


Game Features

A breathtaking shooting
2 different locations
Many dangerous enemies

Now this game is real cool. I mean not talking about the 2.5D graphics of the so called 3D game, the game is really fun. Seems like the good old VirtuaCop is taken as the base and a new game is made. The game play is cool, and being an FPS genre game it is really time-pass one. Check these screenshots to see for yourself! Bon Playin'! :D

ScreenShots and Download Links








Click the following button to Download now! Don't worry the link is 100% safe and legal! :)

Download Size: 3.7 MB

I hope you find these games fun enough to pass some your boring time :P Have fun, have a great Saturday Evening!! ^_^

A new signature for my posts! :D

Hey all my dear readers! :D I hope you all are doing great! ^_^

I was buys Inkscaping his afternoon and created a nice signature for my posts at this blog. How's that?! :D



Now I'll be adding it to all the posts I'll make here, of course at the end.

And I am about to come up with some games in a couple of hours and tomorrow the tutorials. Later on Tuesday I will coming up with part 8 of the security guidelines series. OK? Good Evening!! :D

Tuesday, January 14, 2014

Guidelines for securing Operating System Part 7 - Antiviruses - Tech Tuesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



Continuing the Security Tips series I started in July '13, today I wish to discuss with you all the topics listed after the following links. Just in case you want to access the last posts in this series, here are the links:

Part 1: General Guidelines - Click Here
Part 2: Microsoft Windows - Click Here
Part 3: Macintosh - Click Here
Part 4: Guest Accounts - Click Here
Part 5: Windows Firewall - Click Here
Part 6: Event Viewer & Netstat - Click Here

Let's first consider in brief the structure of this post.

  • Introduction
  • Need for Antivirus Program
  • How does Antivirus Software work?
  • Some popular Antivirus Software
  • Choosing the Best Antivirus Software
  • Steps to Install Antivirus
  • How to test if Antivirus is not working
  • Configuring McAfee Antivirus (Scanning & Scheduling)
  • Configuring Kaspersky PURE (Parental Control & SafeMoney)
  • Configuring Avast! Antivirus (Added utilities)
  • Configuring BitDefender Antivirus (Firewall & Wallet)
  • Conclusion/Comments

In the configuring antivirus topics, I would discuss configuration of an antivirus software in detail. For different options I’ll use different antivirus software. Since one kind of option is almost similar for all these, so I thought to discuss different features on different antivirus to make you feel confortable with interface of most of them.

Introduction


A computer connected to the Internet is always at high risk, and it is always recommended to install antivirus software onto the system. Get it? Always remember you are never 100% secure! A computer virus can degrade the performance of a computer and delete stored computer data. Viruses usually spread through networks by means of download, emails, shared disks, and due to browsing a lot of ‘unmentionable-content’ (get it? :P). If an infected file is attached to these sources, then the system is likely to become infected upon opening the infected files. Some of the symptoms indicating viral infection are improper functioning of applications, slow operation, an unusual error message, frequent hanging, frequent-restarting, problem printing, double extension on any attachment, and distorted menus and dialog boxes, and BLAH! BLAH! BLAH! You know this stuff guys!



An antivirus program scans the hard drive, optical drives, floppy disks (LOL! Do they exist yet? :P), removable media, etc. etc. etc.!!! PHEW! Oh I was saying it scans all that to protect your computer against viruses, worms, spyware, Trojans, and more. It ensures that the system is healthy and alerts the person to implement safety measures against harmful attacks. Regularly update the antivirus software by subscribing to the updates from antivirus vendors whenever offered. The virus dictionary and suspicious behaviour approaches are the most widely used approaches by antivirus software to detect malware.

Now that was a long Introduction! Let’s get deeper into the discussion.

Need for Antivirus Program


Today in the digital domain, loads of data is stored on computers and it has become significant to protect the data. When a PC is connected to the Internet the PC has to combat various and different types of malware programs (I have discussed different types of malware in my earlier posts). Cyber criminals such as attackers and hackers use these malicious programs as tools to steal important information such as personal data stored on the computer. These programs pose a severe threat to the computer and may destroy its functionality in different ways.

Malicious programs pave their way into one’s PC through email attachments and spam email, through USB drives, visiting fraudulent websites, etc. Due to the invasion of malicious programs in cyberspace, antivirus programs have become necessary for computers. If your computer has a good antivirus program installed on it then it is protected against and can combat most of the malware.

How does Antivirus Software work?


There are two common techniques used by antivirus software for virus detection, or rather ‘suspicious file detection’ to be more precise since they are known to show certain false positives. These two are:

  1. Virus Dictionary: To look for some known virus
    • While examining files, the antivirus software refers to the virus dictionary which is created by the antivirus creators
    • If certain snippet in the code is equivalent to that in any virus, it is considered malware of that virus kind
    • It is necessary that this dictionary is always up to date
    • On-access protection implies the file will be scanned every time any user/daemon process access that file.
    • Scheduled scans are quite successful in reducing the risks
  2. Suspicious Behaviour: To examine any suspicious behaviour as shown by malware
    • In this approach, the antivirus software monitors the behaviour of all programs instead of identifying the known viruses
    • Whenever a program with suspicious behaviour is found, the software alerts the user and asks what to do
    • This is better in identifying new and unknown viruses
  3. Other techniques:
    • Anti-virus software will try to emulate the beginning of each new executable code that is being executed before transferring control to the executable
    • If the program seems to be a malware/self-replicating/self-modifying code, then it immediately examines the other executables
    • Much more false positives are thus detected
    • Sandbox emulates the host OS and runs all executable (generally suspicious ones) in an inert environment for execution. The sandbox is examined for viruses after the program terminates.

Some popular Antivirus Software




Choosing the Best Antivirus Software


When purchasing an antivirus software, look for certain features and choose the one that can best serve your needs.
The most important things to consider are:

  • Antivirus Scanning
    • Antivirus Detection Accuracy: Ensure that antivirus scans and detects viruses accurately and detects majority of threats
    • Scanning Speed: Ensure that the antivirus software can perform the task quickly and efficiently
    • Resource Utilization: Ensure that the antivirus software utilizes minimal resources and does not affect system performance when scanning the computer
  • Hacker Blocking: Prevents other users from gaining unauthorized access and stealing important data such as passwords and other confidential information
  • Bidirectional Firewall: Ensure that the antivirus software is equipped with a software firewall to scan both incoming and outgoing traffic
  • Technical Support: Look for good technical support so issues can be solved easily
  • Parental Controls: Ensure that the antivirus program has parental control features so children can browse the Internet safely
  • Easy Installation & Use: The software should be user-friendly and easy to use
  • On-demand and scheduled scanning: Allows you to schedule a scan according to a user-specified time. Users can schedule the scan daily, weekly, or monthly
  • Automatic Updates: keeps the user abreast of the latest online threats without the user having to visit the vendor’s website time and again
  • Spyware detection and prevention: Checks for antispyware components keeping spyware at bay
  • Email scanning: Email protection can monitor POP and SMTP ports and ensure that the emails do not contain a threat to your computer

Steps to Install Antivirus


Most of the antivirus software use an install wizard which is quite easy to follow. I think I should not discuss this in more detail, since I have already talked about installing avast! and eset earlier.

How to test if Antivirus is not working


To determine the presence of consistent virus protection, follow these steps:

  • Open a new document in Notepad
  • Copy the following code into it, and save the file.

    X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

  • Rename the file as myfile.com
  • Run the antivirus scan on myfile.com
  • If the antivirus is functioning properly, it will generate a warning and immediately delete the file.









Configuring McAfee Antivirus (Scanning & Scheduling)


First I am sharing pics of how to install McAfee Antivirus:















Okay, done? Now let’s continue with its configuration:

  • On the main Security Centre console, click Schedule and run scans, and select scan you PC.




  • After selecting, Scan your PC, select any one of the available scan types. This initial scanning of computer as soon as we install an antivirus is recommended to make sure our system is clean.




  • Done with the initial scans? Now let’s schedule some scans. So again, on the main Security Centre console, click Schedule and run scans, and select Schedule scans





  • Now select some sensible values. Why I say that? The recommended ones Friday, 04 am, etc. are totally ridiculous! So make sure you select some days and time combination when your PC is actually ON in order to get a scan done.


Configuring Kaspersky PURE (Parental Control & SafeMoney)


First let’s talk about the installation process, nothing big really, but I am sharing screenshots, okay?





















Done with the installation, now let’s see how to configure Parental Control in Kaspersky PURE.

  1. SafeMoney: It is a handy tool that prevents the burden of entering important bank information at ecommerce websites again and again by securely saving it in an encrypted vault. This also prevents any eavesdropper from seeing your information, which can be seamlessly entered into the website using SafeMoney
    • Click on the Safe Money tab in lower left side of the main window


    • Click Add bank or payment system to enter the details

  2. Parental Control: Another great tool to keep your children safe online. Do configure it if you have a family where you wish to impose certain restrictions on other people using your computer.
    • Click on parental control tab on the right side of the main window

    • Setup a password to secure your settings from modifications. Also mention what all settings you wish to safeguard using the password




    • Select a computer user to impose restrictions on by clicking the Select control level button beside the username

    • Select a level control if you wish to use a predefined one, or click on Custom Restrictions and settings button to make some custom restrictions

    • Make whatever settings you wish to make for a number of issues you can see in the window that opens. Save and apply changes.


Configuring Avast! Antivirus (Added Utilities)


For installation and review of avast! antivirus, consider this link: http://toxifier.blogspot.com/2013/09/the-best-free-antivirus-avast-review.html
Now let’s talk about configuration part.

There are various added features provided by most vendors. Avast! provides some really common and cool ones. I’ll discuss them here.

  • Browser Cleanup: This tools help you get rid of damn cookies, some ‘ahem-ahem’ history traces, idiotic toolbars, and all other browser level crap! Click Tools, select Browser Cleanup. Click start Browser Cleanup. After analysis is complete select your browser to reset.





  • Secure Line: This is a VPN service provided by avast! It is really cool. If you’d like to spend a little money, do check this out :)

  • Software Updater: This is a utility that helps you check for updates of all the monitored software which include browsers, plugins, windows updates, etc.

  • Access Anywhere: This is used to remote control your device

  • Rescue Disk: This is an awesome feature, to save state of your computer to recover back to if you bring upon some disaster on your PC!


Configuring BitDefender Antivirus (Firewall & Wallet)


  1. Firewall: Firewall is a great tool. I have already discussed Windows Firewall earlier here: http://toxifier.blogspot.com/2013/08/guidelines-for-securing-operating_20.html
    • Click on the gear icon

    • Check Settings tab and configure your firewall rules under different link buttons

    • Check the Advanced tab, the pic below will help you realize what settings are recommended

  2. Wallet
    This tool helps a lot for those with personal computer. You can store important credentials like email account passwords, etc. in the wallet for fats, easy, and secure access.

    • Click the wrench icon to manage the settings of the wallet

    • Under enhanced apps tab you can read description of wallet and configure which apps to be monitored with your wallet

    • Master Password & Wallet tweaks tabs will help you manage security issues for your wallet




Conclusion/Comments


I hope you find all the relevant information you must know about the topic of security I discussed with you all today. For any queries or suggestions please feel free to comment here.

Just click the image below to download avast! for free  Don’t worry it is completely legal, free and safe to use!



I hope you all have a great day ahead! :) Happy Tuesday! :) See you all soon! :D That was a very very long post! I am going to sleep now! zzzzzzzzzzzzz