This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, 23 March 2012

Electric poncho keeps you warm on the go

Electric poncho keeps you warm on the go

electric-poncho
With the mild winter and spring we have had, it might seem strange to think about ways to keep yourself warm, but there’s no better time than the present to prepare for chilly weather down the line.
In his blog [Berto] was thinking about how to keep warm when things cool off again, and decided that a heated poncho would be great to have on hand. He found a dead simple way to craft his heated poncho, requiring little more than a bit of wiring, some thread and cloth, as well as a pair of scissors.
[Berto] picked up a 12V-powered electric blanked, then proceeded to cut a head-sized slit in the middle of it, avoiding the heating coils. He sewed a bit of cloth around the hole to ensure it didn’t end up ripping over time, then he wired the blanket up to a 12V battery he tucked away in his backpack.
The result is a variable-temp poncho that you can use to keep warm in a variety of situations. [Alan Parekh] from Hacked Gadgets says that he thinks the poncho would be awesome on a full-day snowmobiling trip, and we think he’s right!
Continue reading to see a short video where [Berto] explains how to put one of these heated ponchos together.

Nokia Giving Out Free Mobile Charger Replacement

Nokia Giving Out Free Mobile Charger Replacement

 

Nokia has announced to recall 14 million mobile phone chargers through an exchange programme. These chargers are said to be faulty.
So how to get the Nokia Replacement battery charger?
The affected chargers are those manufactured by BYD between June 15, 2009 and August 9, 2009 and with the following model types
  • AC -3U
  • AC-3E
and those manufactured by BYD between April 13, 2009 and October 25, 2009 and with the following model type
  • AC-4U
Charger label one
Nokia has launched a site to check your affected nokia battery charger. You can visit chargerexchange.nokia and find out whether your battery charger is affected or not. You can also view this site in Hindi or other langagues

Saturday, 17 March 2012

Rise of the Hack


Rise of the Hack

I didn’t know it could be someone’s job to attend hackathons. I hadn’t heard of a developer evangelist before, so a year ago when I stumbled across an opportunity to become one, I was drawn by its novelty.
The mission was to build a developer community from the bottom up by saturating the hackathon scene, gaining allegiance from the early-adopters, the enthusiasts, the hackers. The kind of people who geek out over a new JavaScript library, smother their MacBook Airs with stickers, and maintain wardrobes consisting primarily of startup t-shirts.
If the goal is to build a business on an API, were hackathons the place to start? I wasn’t sure. The tactic seemed so niche. But hey, if someone wanted to pay me to travel and build weekend hacks, that sounded fun to me.

My first hackathon surprised me. I expected it to be quiet and secluded, consisting of the most die-hard geeks, an exclusive community disconnected from the outside world.
But it wasn’t. It was inviting. It was cool. It was a spot for anyone with an entrepreneurial itch to try something new, from bankers to artists to lawyers, all sprinkled amongst designers and developers of all skill levels.
I expected it to feel underground, but it didn’t. Microsoft and Amazon, among other high-profile sponsors, pitched their tools, platforms, and APIs to an eclectic group of would-be world-changers.
I realized after that first event that my weekend calendar was not going to be free for a while. There was no shortage of events to attend or companies wanting to throw sponsorship dollars at them.
I travelled to hackathons in Dallas, Portland, Boulder, Chicago, Las Vegas, Seattle, DC, and Boston, among others. Every city I went, I asked them the same question: what’s the tech scene like here?
Every time I got the same response: It’s growing.
Everywhere I went, people told me that their tech community was thriving, that their city was going to be the next big tech hub. A year ago there was nothing. Now there were incubators, investors, meetups, and new hackathons popping up every month.
It quickly became clear to me that hackathons are not an outlandish trend, popular only among techies in Silicon Valley and NYC. They are a national phenomenon.

We asked 150 hackathon attendees, hosts, and sponsors from across the country what they thought about the rise in hackathons. This is what we found;

Mozilla Firefox all shortcuts keys

Mozilla Firefox all shortcuts keys

Shortcut keys Action
CTRL+A Selects the all items on active page
CTRL+B Display the "Organize Bookmarks" dialog box
CTRL+D Include the active page to your Bookmarks list
CTRL+F Display the "Find" dialog box to search text
CTRL+I Display the Bookmarks pane
CTRL+H Display the History sidebar of Mozilla Firefox
CTRL+N Use to open new Mozilla Firefox page
CTRL+P Use to print the active web page
CTRL+R Use to reload the active web page
CTRL+T Display a new Tab in active Firefox window
CTRL+U View the source code of active web page
CTRL+W Closes the active Mozilla Firefox window
CTRL++ Use to increase the font size of active page
CTRL+ - Use to decrease the font size of active page
CTRL+Tab Move to next Tab in Mozilla Firefox
ALT+Home Use to open the home page of internet explorer
ALT+Left Arrow Go to previous page of active page
ALT+Right Arrow Go to next page of active page
ALT+B Go to Mozilla Firefox Favorites Menu
ALT+D Go to address bar of current Firefox page
ALT+E Go to Mozilla Firefox Edit Menu
ALT+F Go to Mozilla Firefox File Menu
ALT+S Go to Mozilla Firefox History Menu
ALT+T Go to Mozilla Firefox Tools Menu
ALT+V Go to Mozilla Firefox View Menu
Tab Move forward between all items on active web page
F5 Refresh the active web page
F7 F7 activate the cursor to move with keyboard
CTRL+SHIFT+DEL Use to clear all Private Data history
CTRL+SHIFT+D Use to Bookmarks all Firefox Tabs
F11 Press F11 key to view any webpage in full-screen view and then again press for normal view.
Press Ctrl+Enter Windows will automatically add both "www" and ".com". For example, if we type google in an address bar and then press Ctrl-Enter,Windows will take us to the ........... www.google.com
Press Shift+Enter Windows will automatically add both "www" and ".net"
Press Ctrl+Shift+Enter Windows will automatically add both "www" and ".org"

Wi-Fi users in India vulnerable to virus attack, warn analysts

Wi-Fi users in India vulnerable to virus attack, warn analysts

 
Wi-Fi users in India vulnerable to virus attack, warn analysts 
Wi-Fi users in the country are vulnerable to virus attack, warns an Indian computer security analysis firm. According to the Indian Computer Emergency Response Team (CERT-In), the virus attacks through Wi-Fi could lead to crashing and even hacking of the secure networks. The firm has discovered that the Wi-Fi Protected Setup (WPS) has a design error, which increases risks of virus attacks and may allow attackers to take unauthorised control of the affected system. The error can also help attackers crack and stealthily enter into an encrypted and password protected system.
“The virus is streaming in the Indian Internet networks with a high severity. The combat mechanisms are being deployed,” a computer security analyst with a government agency said. “An unauthenticated, remote attacker within range of the wireless access point could use the PIN (password) to gain unauthorised access to the device to retrieve the password for the wireless network or change the configuration of the device. Failed attempts to exploit the vulnerability could lead to a denial of service condition,” the CERT-In said in its alert to Wi-Fi users.
The agency also pointed out its reports that revealed several WPS devices do not feature any kind of lockout policy for such attack attempts. Users in India mostly use the WPS method to set up a wireless router for home network. The WPS procedure requires a PIN that can be used during the setup phase. Issuing an advisory to the Wi-Fi users, analysts of CERT-In said that users should disable the external registrar feature of the WPS to protect their device from virus attacks.

Free gprs for idea, hutch, airtel, bsnl

Free gprs for idea, hutch, airtel, bsnl

Manual Hutch Gprs Settings
1. Account Name - Hutch_GPRS
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes
5. Access Point Name - portalnmms
6. Full Internet Access Point Name - www
7. Proxy and Server address - 10.10.1.100
8. Proxy and Server Port - 8080
9. Homepage - http://hutchworld.co.in
10. Authentication Type - Normal

Manual Airtel Gprs Settings
1. Homepage - any page you want to set.
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes.
5. Proxy and Server Adress - 202.56.231.117
6. Proxy and Server Port - 8080
7. Data bearer - GPRS or Packet Data.
8. Access Point Name - airtelgprs.com
9. Authentication Type - Normal
10. Use preferred access point - No

Manual Airtel live settings
1. Account Name - Airtel_live
2. Homepage - http://live.airtelworld.com
3. Username - Blank
4. Password - Blank
5. Proxy - Enabled/yes
6. Proxy and Server Adress - 100.1.200.99
7. Accespoint Name - airtelfun.com
8. Proxy and Server Port - 8080
9. Data bearer - GPRS/ Packet Data
10. Authentication Type - Normal


Free gprs for idea, hutch, airtel, bsnl

Manual Idea Gprs Settings
1. Account Name - idea_GPRS
2. Username - Blank
3. Password - Blank
4. Homepage - http://wap.ideafresh.com
5. Proxy and Server Port - 8080
6. Proxy and Server adress - 10.4.42.45
7. Databearer - GPRS / Packetdata
8. Acces Point Name - imis
9. Proxy - Enabled/yes
10. Authentication Type - Normal

Manual Bsnl Gprs Settings
1. Account Name - BPL WAP
2. Username -
3. Password -
4. Proxy - Enabled/yes
5. Homepage - http://wap.mizone.bplmobile.com
6. Proxy and Server address - 10.0.0.10
7. Proxy and Server Port - 8080
8. Acces Point Name - mizone
9. Data bearer - GPRS/ Packetdata
10. Authentication Type - Normal

Free gprs for hutch

 Free gprs for  hutch 


Manual Hutch Gprs Settings
1. Account Name - Hutch_GPRS
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes
5. Access Point Name - portalnmms
6. Full Internet Access Point Name - www
7. Proxy and Server address - 10.10.1.100
8. Proxy and Server Port - 8080
9. Homepage - http://hutchworld.co.in
10. Authentication Type - Normal

Top 15 Hacking Software

Top 15 Hacking Software

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
Get Nmap Here

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Get Nessus Here

3. John the Ripper
Yes, JTR 1.7 was recently released!
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
You can get JTR Here

4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
Get Nikto Here

5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
Get SuperScan Here

6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
Get p0f Here

7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here

8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
Get Yersinia Here

9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
Get Eraser Here.

10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.
Get PuTTY Here.

11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.
Get LCP Here

12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
Get Cain and Abel Here

13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
Get Kismet Here

14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized “rogue” access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.
Get NetStumbler Here

15. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

 

Wednesday, 14 March 2012

10 Incredibly Nice Robbers


 

10 Incredibly Nice Robbers




The thief who returned stolen laptop contents on USB stick

The thief who returned stolen laptop contents on USB stick
A thief stole a university professor's laptop, and then returned the contents on a USB memory stick. The professor, who teaches at Umeå University in northern Sweden, was devastated when his laptop, containing ten years of work, was stolen.

The professor had left his bag containing the laptop hidden behind a door in his apartment stairwell while he went into the building's laundry room. When he emerged a short time later, the bag had gone. It was returned shortly after, without the laptop. However, a week after the theft, the professor received a USB stick containing all the documents - which would have taken several hours to download again.



The robber who beat retreat after children offered savings

The robber who beat retreat after children offered savings
An armed robber who held up a babysitter at gunpoint in Lower Saxony was shamed into leaving empty-handed by the two young children of the house, who offered him their pocket money. The man had rung the doorbell of the house in the northern town of Schwanewede near Bremen, Germany, and forced his way in. Wearing a balaclava and a long black coat, the man was holding the terrified babysitter at gunpoint, when the children she was looking after came downstairs. When they offered him their savings, he was obviously overcome with shame and left the house without a word – or a cent.

Police did not release the ages of the children in order to protect them from being identified, but did say they were both younger than seven.


The thief who turned in cell after finding child porn

The thief who turned in cell after finding child porn
Back in October 2011, a crook saw that a car window wasn't rolled all the way up in a supermarket parking lot. The thief did what thieves do, stole two mobile phones and a wallet out of the vehicle. When he powered one of the phones on, he found child pornography images on it. The images disgusted him so much that he turned himself in to assist authorities with investigating the individual that he stole the items from. The investigation led to the arrest of a 46-year-old man.

Ballarat, Australia, magistrate Michelle Hodgson was blown away by the thief's willingness to face charges, so that he could help bring down the man who had child pornography on his phone. She wanted the Good Samaritan thief to be publicly recognized for his deed.

The man was given one month in jail and a fine for his crimes, but his assistance led to bringing down a man who had committed a much greater crime.




The robber who returned stolen car to chastise parent after finding baby inside

The robber who returned stolen car to chastise parent after finding baby inside
A man who stole a car left idling on the seawall, returned and chastised the owners after realizing a child was inside.

A Houston woman, 22, and her boyfriend took the child fishing with them where a rock pier juts into the Gulf of Mexico. After taking all their equipment to the fishing spot, the woman decided the weather was too cold for her 2-year-old boy. She went back to the car, seated the child inside and left the heater going, and then went to help her boyfriend with the fishing equipment. The woman planned to leave the child in the car only long enough to retrieve the fishing equipment.

Police suspect a homeless man was watching the couple and saw an opportunity to take the car. The man got in the car and drove off. After a few blocks, he turned around and came back. When the man got out of the gray Mitsubishi Eclipse, the woman asked, “What the hell are you doing?” That's when the burglar decided to reprimand her for leaving her kid unattended in the car. The woman called the police but the suspect had fled, escaping capture.


The thief who returned terminally ill woman's camera

The thief who returned terminally ill woman's camera
Jami McElrath got her camera stolen when a thief broke into her car. When the thief found out that Jami was terminally ill, he had a change of heart and returned the camera. McElrath, who has inoperable cancer, was collecting photos to place in a scrapbook for her children so they could remember her after she was gone. The camera had belonged to her father, who had died of a heart attack two years before. The woman told her heart-wrenching story to Dallas-area news station WFAA TV, appealing to the burglar to return the camera.

Then something remarkable happened. A few days after the story aired, WFAA reporter Jim Douglas got a call from a man who told him to look behind a red car in the station's parking lot. The caller didn't leave his name; he said only that he felt bad about the incident and wanted to return the camera.


The Santa-stealing thief who returned decoration with apology note

The Santa-stealing thief who returned decoration with apology note
An Indiana thief must have been worried he'd end up on the naughty list. He had stolen an inflatable Santa Claus and two inflatable penguins from James McClaren's yard in Unionville, IN. With no way to track him or her, McClaren was out a Santa. But a couple of days later, the 16-foot-tall St. Nick was returned with a written apology. The note read, "Returning your property is the right thing to do." The thief also left $100 for more decorations.





The thief who returned stolen jewelry after 10 years

The thief who returned stolen jewelry after 10 years
An unknown thief returned jewelry to its owner nearly 10 years after stealing the items from a house in Saudi Arabia, saying in a letter he feels sorry for the theft and asking the owner to forgive him. The owner said he found the returned jewelry in a bag placed near the door which he opened in response to urgent knocking late night. He informed the police about the unknown bag, adding that when police opened the bag, he quickly recognized the jewelry as his.

“The thief left a letter in the bag saying he was sorry and asking the man to forgive him,” Sabq News said in a report from the western town of Taif. “He also said that he was in need when he stole the jewelry but decided to return them because he no longer needs money after his financial position improved…he said he considered the gold as a trust returning to its owner.” The paper said the thief returned all the jewelry and “this means the man will make a big profit since gold prices have largely risen in 10 years.”


The compassionate thief who returned stolen car after receiving a call from owner

The compassionate thief who returned stolen car after receiving a call from owner
A thief in Brazil who stole a car, returned it after the owner rang him up in the car and told the thief he was going through some financial difficulties.
The butcher from Mauá in São Paulo called his own cell phone number after his car was stolen with his cell phone still inside. The thief answered and listened to the emotional man on the other side of the line. The butcher pleaded with him to return the $2250 car.

Not only did he pick up the phone, but he heard the owner's emotional plea. The owner explained he was having financial problems and that the car was the only thing he had. The soft-hearted robber got emotional too and told him to go to a parking lot to get his car back.


The thieves who hand back a £2.75 million painting after failing to sell it on black market

The thieves who hand back a £2.75 million painting after failing to sell it on black market
A valuable painting that was stolen at gunpoint from a Brussels museum in 2009, was handed back after the thieves failed to sell it on the black market. A daring daylight raid on Belgian surrealist René Magritte's former terraced house saw armed robbers put a gun to the concierge's head. They threatened staff and visitors, before making off with the £2.75 million nude portrait of Olympia.

But two years later, they contacted art expert, Janpiet Callens, to hand back the piece that depicts the artist's wife Georgette, which no one would buy.

12 Most Reckless People on Motorcycle


 

12 Most Reckless People on Motorcycle

Published on 3/5/2012 under Misc - by Gracie Murano - 72,994 views



Stroller pushing fail. 



Another superdad. 



Safety comes first. ()





Indian family on the run… 6 people and 2 dogs.



Skylab motorcycle taxi in the Philippines.





()



Only in the Dominican Republic. 



Asunción, Paraguay. 



It's actually an ingenious method of preventing the kid from hyperventilating when he starts panicking after they crash. 



Going to school in Iran. 






Riding a scooter to school? No time to waste! Must finish homework

10 Weirdest Medical Syndromes


 

10 Weirdest Medical Syndromes




Sexsomnia Disorder

Sexsomnia Disorder
Sexsomnia is a disorder in which people participate in sexual acts (either solo or with a partner) while sound asleep. It is classed as one of many parasomnias, which also include things like sleep-walking and talking. Though this is a relatively new syndrome (officially identified in 2003) it has already been accepted as a defense against some alleged rape cases.



Fish Odor Syndrome (Trimethylaminuria)

Fish Odor Syndrome (Trimethylaminuria)
Trimethylaminuria is a rare metabolic disorder that causes a defect in the normal production of a specific enzyme. Long story short, when the body can't break down trimethylamine during food digestion, the compound builds up and is released in the person's sweat, urine, and breath, giving off a strong fishy body odor.

The odor varies from person to person; in one, it will just smell like terrible body odor, but in most people it gives off a noticeable pungent fish odor.


Exploding Head Syndrome

Exploding Head Syndrome
Exploding Head Syndrome is a parasomnia disorder that causes sufferers to hear loud, explosion-like noises that seem to originate from within their own head. The "explosions" usually occur right after the victim has fallen asleep and sound like a roar, gunshot, loud voices or screams, a ringing noise, or the sound of electrical buzzing.

While victims of this syndrome aren't physically injured, they tend to experience fear and anxiety after such attacks. There is no known cause or cure for this condition, though it has been linked to stress and fatigue and often vanishes without treatment.




Foreign Accent Syndrome

Foreign Accent Syndrome
Foreign accent syndrome (FAS) is a speech disorder that is often a side effect of severe brain injury, such as stroke or head trauma. FAS causes sudden changes in speech patterns, intonation and pronunciation so that the victim suddenly starts speaking with a "foreign" accent. FAS typically develops within one or two years after the injury and is often incurable.


Non-24-Hour Sleep-Wake Syndrome

Non-24-Hour Sleep-Wake Syndrome
Non-24 is a chronic circadian rhythm sleep disorder defined as "a chronic steady pattern comprising one-to-two-hour daily delays in sleep onset and wake times in an individual living in society." The pattern of delay persists "around the clock," taking several weeks to complete one cycle. This disruption of the body clock causes cyclical bouts of nighttime sleeplessness and excessive daytime fatigue and napping.

It is a neurological sleep disorder that has been traced to genetic abnormalities that affect specific factors in the brain. While anyone can be diagnosed with Non-24, the disorder affects proportionately more totally blind individuals than sighted.


Genital Retraction Syndrome

Genital Retraction Syndrome
People who suffer from Genital Retraction Syndrome (GRS) are overcome by the fear that their external genitals (and the breasts, for women) are shrinking and/or retracting into the body to the point of complete disappearance. GRS is a mental condition prevalent in cultures that are often without sufficient medical resources and who attribute the condition to voodoo, witchcraft, or superstition. In Asia and Africa there have been widespread instances of this syndrome called "Penis Panics."


Gourmand Syndrome

Gourmand Syndrome
Gourmand syndrome is a rare condition that sometimes occurs in people who sustain injuries to the right frontal lobe. These people develop a new, post-injury passion for gourmet food. Lesions or injuries to this specific portion of the brain cause an intense preoccupation with food and a preference for fine eating.

The condition is considered "benign" or not harmful, but it sounds pretty painful for the wallet.


Walking Corpse Syndrome (Cotard's Syndrome)

Walking Corpse Syndrome (Cotard's Syndrome)
People who suffer from Cotard's Syndrome have the delusional belief that they are dead, do not exist, are putrefying, or have lost their blood or internal organs. There may also be sensory hallucinations, for instance, they might think that they smell of rotting flesh. The disorder tends to occur intermittently rather than being chronic and may be a feature of mood disorder, schizophrenia or organic disorders.


Busy Life Syndrome

Busy Life Syndrome
Since the main symptoms of this lifestyle syndrome are forgetfulness and lack of concentration, we're pretty sure we all have it. According to researchers: “Forgetfulness is an ordinary part of getting older but anecdotal evidence suggests that it is now affecting people earlier in life as a result of busy work and home lives, and so-called 'information overload' from the various media channels we consume today,” lead researcher Dr. Alan Wade said.

The recommended treatment is a drug called memantine, which is also used to treat Alzheimer's Disease

Moebius Syndrome

Moebius Syndrome
Moebius syndrome is a rare neurological disorder that is present at birth. People with the condition are unable to move their faces (they can't smile, frown, suck, grimace or blink their eyes) and are unable to move their eyes from side to side. There may be skeletal problems as well, causing hand/feet anomalies such as club feet. Respiratory problems, speech and swallowing disorders, visual impairments, sensory processing disorder, sleep disorders, and weak upper body strength may also be present. Approximately 30% of children with Moebius syndrome are on the autism spectrum