round minus
round plus

A Telepresence Robot!


It's here folks.

A telepresence bot ... or one giant leap toward the Singularity? Dock an iPad on this rover and it uses the tablet's camera and display to serve as your eyes and avatar at far-flung meetings, Little League games, ballet recitals, or anywhere else you can't—or don't want to—be.Also it's the same one used by our beloved Sheldon from the fuck somi he Big bang theory!

2 comments:

Windows 7 GOD MODE!

Did you know that windows 7 has a GOD Mode?
Yes ! you heard me God mode! And it is aptly named because when you enable it you can access virtually all of the configurable settings present in windows 7.

To enable it simply  create a new folder on your desktop--or anywhere you'd like--and name it: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}. Don't include the final period. The resulting folder will contain 270 items, representing virtually every configurable option in Windows 7.

Easy as that!

 

1 comments:

Mini Bluetooth Wireless Keyboard Keypad For iPhone iPad PS3

  • Weight

    250.00g
  • Description

    The Bluetooth wireless keyboard makes typing easy on your iPhone, iPad, Playstation 3, smart phone, PDA, Tablet, etc. It is light weight and compact design, good for travelers. Easy to charge and the battery lasts for long time use.
  • Features

    - Bluetooth Version Bluetooth V2.0
    - 49 keys mini keyboard
    - 2.4GHz band wireless frequency
    - Built in rechargeable Li-ion battery
    - Micro USB port charging
    - Color LED for working status indication
    - Working wireless range: 10m
    - Charging time: 3- 4 hours
    - Palm-size compact design.
  • Specification

    Compatible With:
    - Computers with Windows/Mac Linux OS
    - Handhelds with Android/Windows Mobile( 6. 0 &later) / Nokia Symbian S60
    - Sony Playstation3
    - HTPC with built- in Bluetooth
    - Apple iPad, iPhone/ Touch in 4. 0 OS

    Mobile System Requirements:
    - The device must built in Bluetooth function
    - The mobile Operating System should be one of following:
    - Google Android OS
    - Windows Mobile (6. 0 & above) OS
    - Nokia Symbian S60(V3. 0 & above) OS
    - iPhone 4.0 OS
  • Package include

    - Mini Bluetooth Keyboard
    - Installation CD Incl User Manual
    - Power USB2.0 Cable
  • Compatible Brand

    Apple
  • Interface

    Bluetooth
  • Type

    Wireless


2 comments:

12 Very Helpful Facebook shortcuts





Facebook has very become a necessity these days. It is the number one Social networking site in the world! Undoubtedly so awesome that it surpasses over a billion users!  
To navigate around Facebook easily and more conveniently, here are some neat little shortcuts that can improve your Facebook experience!

 

 


Send a New Message Shortcut


  • If Firefox is being used, to send a new message press the key combination Shift + Alt + m
  • In Google Chrome use Alt + m and you can compose a new message.
  • For Internet Explorer the shortcut Alt + m + Enter has to be pressed to send a new message.

 

Facebook Help Center Shortcut


Wherever you're on Facebook, to go to Help Center straight away, Firefox users type Shift + Alt + 0. Chrome users Alt + 0 and using Internet Explorer press Alt + 0 + Enter

Facebook Home Shortcut

From wherever to reach Home page, Firefox users press the shortcut Shift + Alt + 1, chrome users Alt + 1 and when IE is being used Alt + 1 + Enter

Facebook Profile Page Shortcut

To view your Profile page in Facebook, Firefox users have to press Shift + Alt + 2 where as the key combination is Alt + 2 for Google Chrome users and Explorer users can press Alt + 2 + Enter

Shortcut to Find Friends, Send Friend Requests

To send friend request, Firefox users press Shift + Alt + 3. Chrome users Alt + 3 and IE users Alt + 3 + Enter

Shortcut to View Messages in Facebook

To view the messages press Shift + Alt + 4 in Firefox and while using Chrome press Alt + 4 and Internet Explorer users press Alt + 4 + Enter

Your Notifications Shortcut

To view all the notifications reached to your profile, in Firefox use shortcut Shift + Alt + 5, in Chrome it is Alt + 5 and for IE users the shortcut is Alt + 5 + Enter


Account Setting Shortcut


To view your Facebook account settings:
  • In Firefox Shift + Alt + 6
  • Chrome users Alt + 6
  • Explorer users Alt + 6 + Enter

Privacy Settings Shortcut

For reaching your privacy settings:
  • While in Firefox press Shift + Alt + 7
  • Chrome users press Alt + 7 and
  • IE users press Alt + 7 + Enter

Official Facebook Page Shortcut

To go to Facebook official home page,
  • In Firefox type Shift + Alt + 8
  • Chrome users Alt + 8
  • Internet Explorer users Alt + 8 + Enter

Service Agreement Shortcut

To view the Facebook rules and regulations, shortcut Shift + Alt + 9 is for Firefox users, Chrome users Alt + 9 and IE users Alt + 9 + Enter

Like/Unlike Photos, Previous Post, Next Post Shortcuts

  • To like or unlike a photo, shortcut key L is used which works in all windows browsers. Whatever may be the browser press L key for Like/Unlike, for the first time appears dialogue box and it is enough that you check the 'Don't ask me again' option.
  • To go to the previous post in the news feed use shortcut K
  • Useful shortcut for next post in news feed is J



0 comments:

Will you be checking in.....?




1 comments:

Phishing over a WAN

Phishing Over A Wide Area Network



(Disclaimer: This tutorial is for educational purposes ONLY and is not intended to be put into practise unless you have authorised access to the system you are trying to break into. The authors of Zettaflops DO NOT claim any responsibility for the actions of their viewers. )
In this tutorial, you will learn how to perform a phishing attack on a wide area network (WAN), meaning that you can target victims worldwide. For those of you who are unfamiliar with what a phishing attack is, here's a brief explanation. Phishing is a method that is utilized to capture usernames and passwords through the use of a fake or cloned login page. 
Prerequisites
BackTrack 5
An internet connection
A router
Your router's login info
Before we begin, let's take a quick look at our agenda.
Learn our network's external IP address
Configure an inbound service on our router
Configure the phishing attack
Clone Facebook's login page
Create a link to our phishing page
Lure a victim
Now that you've met the prerequisites and you understand the agenda, let's get started.
1. Boot BackTrack 5 and login
First, we need to learn our network's external IP address.
2. Open a web browser and navigate to "http://whatismyip.org"
3. Make note of your external IP address
Now we need to learn our computer's local IP address.
4. Open the Wicd network manager
5. Make note of your computer's IP address
You can find your IP address in the bottom status bar of the Wicd network manager
Now we need to log into our router and configure an inbound service. I'm using a Netgear DGN1000 N150 wireless router. If your router's web interface is different than mine and you are having trouble following along, you can Google "how to setup inbound services on [your router here]"
6. Open a web browser and navigate to your router's web-based control center
This is done by entering your router's local IP address in the URL bar
If you don't know your router's IP address, you can find it by navigating to "http://findmyrouter.net"
7. Navigate to your router's Firewall Preferences or Rules
8. Select the option that allows you to add an inbound service
9. For the service type, select "any service" or "all services"
If your router will only allow you to select a single service, select the option for HTTP or port 80
10. For action, select "allow always"
11. Set you LAN server to your computer's local IP address
This is telling your router to send traffic from your phishing page to your computer
12. For WAN users, select "any" or "all"
Once you've finished configuring your inbound service, save it and log out of your router. Now, it's time to configure our phishing attack and launch it. 
13. Open a terminal
14. Type "cd /pentest/exploits/set"
15. Type "./set"
16. Select option 1- Social Engineering Attacks
17. Select option 2- Website Attack Vectors
18. Select option 3- Credential Harvester Attack Method
19. Select option 2- Site Cloner
20. When prompted to enter the IP address of the POST back machine, enter your network's external IP address
Example: "71.142.91.56"
21. When prompted to enter the URL of the website to clone, enter the URL for Facebook's login page
Example: "https://www.facebook.com"
Now your phishing attack is active and running. If you want to test your phishing page, you can open a web browser and enter your network's external IP address in the URL bar. This is the same page that your victim(s) will see; however, you don't want to send your victim(s) your IP address as a link because it would be suspicious. So, to disguise our IP address, we are going to use Google's URL shortener service.
22. Open your web browser and navigate to "http://goo.gl"
23. Enter your computer's local IP address and click "Shorten URL"
Example: "http:71.142.91.56"
24. Make note of your shortened URL
Now it's time to lure a victim to our phishing page.
25. Send the shortened URL to your victim
When your victim clicks the link, he or she will be taken to your phishing page. Then, when your victim attempts to login, his or her username and password will be returned to you.
Recommended Lure Methods
Email
SMS Text Message
Facebook Comment
Instant Message
Tweet
Email Lure Tips
Hyperlink your shortened URL to an image or another piece of text
Include enticing text and images
Check for spelling and punctuation errors
Change your email display name
Change your reply-to email address

2 comments:

Phishing attack over a LAN

Phishing Over A Local Area Network
(Disclaimer: This tutorial is for educational purposes ONLY and is not intended to be put into practise unless you have authorised access to the system you are trying to break into. The authors of Zettaflops DO NOT claim any responsibility for the actions of their viewers. )
In this tutorial, you will learn how to perform a phishing attack on a local area network (LAN). For those of you who are unfamiliar with what a phishing attack is, here's a brief explanation. Phishing is a method that is utilized to capture usernames and passwords through the use of a fake or cloned login page.
NOTE: When phishing on a local area network (LAN), you must be connected to the same network as your victim. Although this isn't very practical for real-world applications, it is a good place to begin for practice. If you want to target victims outside of your local area network, refer to "Phishing On A Wide Area Network." 
Prerequisites
BackTrack 5
An internet connection
Before we begin, let's take a quick look at our agenda.
Configure the phishing attack
Clone Facebook's login page
Create a link to our phishing page
Lure a victim
Now that you've met the prerequisites and you understand the agenda, let's get started. First, make sure you are connected to the same network as your victim.
1. Boot BackTrack 5 and login
2. Open a terminal
3. Type "cd /pentest/exploits/set"
4. Type "./set"
5. Select option 1- Social Engineering Attacks
6. Select option 2- Website Attack Vectors
7. Select option 3- Credential Harvester Attack Method
8. Select option 2- Site Cloner
9. When prompted to enter the IP address of the POST back machine, enter your computer's local IP address
If you don't know your IP address, you can find it in the bottom status bar of your Wicd network manager
Example: "192.168.0.5"
10. When prompted, enter the URL of the website that you want to clone. For this tutorial, we are going to use "https://www.facebook.com"
Now your phishing attack is active and running. If you want to test your phishing page, you can open a web browser and enter your local IP address in the URL bar. This is the same page that your victim(s) will see; however, you don't want to send your victim(s) your IP address as a link because it would be suspicious. So, to disguise our IP address, we are going to use Google's URL shortener service.
11. Open your web browser and navigate to "http://goo.gl"
12. Enter your computer's local IP address and click "Shorten URL"
Example: "http:192.168.0.5"
13. Make note of your shortened URL
Now it's time to lure a victim to our phishing page.
14. Send the shortened URL to your victim
When your victim clicks the link, he or she will be taken to your phishing page. Then, when your victim attempts to login, his or her username and password will be returned to you.
Recommended Lure Methods
Email
SMS Text Message
Facebook Comment
Instant Message
Tweet
Email Lure Tips
Hyperlink your shortened URL to an image or another piece of text
Include enticing text and images
Check for spelling and punctuation errors
Change your email display name
Change your reply-to email address

2 comments:

5 Extremely Useful Apps

Given the amount of android apps these days it's very difficult to find out which apps are the most useful. But after painstaking reviewing here are five extremely useful apps you'd wanna see:

1. GREENIFY


 Nothing stirs us more than the notification from our smartphone that says,
"Battery Low"
Our android's battery is more precious to us than our own health nowadays given the importance of smartphones in our life. To protect and to save your beloved android's power, Greenify comes to the rescue!
It saves a tremendous amount of battery by hibernating all the applications that are either minimized or running in the background. This saves more battery than you think. Don't believe me? Just try GREENIFY!

2. DROPBOX


You have probably already heard of the PC version. This is exactly that except in Android platform!
For all those who dont know what dropbox is? Well it's a magical app that let's you upload your files on the net and share them with your friends as easy as dropping something into a box!


3. TASKER

This awesome app let's you totally automate your android phone! How you say? Well if you have always wanted to "do X as soon as Y happens", you can do it now!


4. AIRDROID


 With this app you can totally control your Android from your computer! If your boss hates seeing you on your phone all the time, Well Now you can do all your android stuff from your Computer and your boss will certainly not mind (Because he wont have any idea ... YAY)!

5. ES FILE EXPLORER


No "useful list" can be complete without featuring an awesome application manager! ES File explorer is not only an application manager but it will also manage your files for you!

0 comments:

Apple Beware:Android on the loose




0 comments:

Android market growth


0 comments:

iPhone 5s going gold


All that glitters...


The iPhone 5s, reported to be launching in September, is rumoured to be spotting a gold color option, or as cited on the Japanese site Macotakara "champagne". Not only that ,analysts say the new flagship will boast 128GBs of storage along with a very likely 64-bit processor. The new A7 system on chip is loosely based on the 64-bit  ARMv8 ,the A7 will be more efficient and faster. That's not all the 5s also will feature an 8MP camera with a larger aperture, dual Led flash and a sapphire home button which doubles as a fingerprint scanner analysts say.

0 comments:

Haptix 3d: Multi touch interface on any surface

Amazing how technology is progressing these days. Just a decade ago nobody would have believed that a screen can become touch sensetive and now we can make any surface 'a touch interface' by using this wonderful device called Haptix 3d.

“Haptix is based on completely radical algorithms in computer vision and image processing,” says co-founder Lai Xue.

By using Haptix, any flat surface can be made into a touch interface. Don't want to use your laptop's keyboard? Then dont! Just get a Haptix 3d device and turn your laptop's keyboard touch sensitive. Now you want have to press the keys, just hover your fingers above the keyboard like a magician and type away!

This is what Jennifer Bergen, writer for a famous blog, has to say about Haptix,
 
" Is Haptix a mouse-killer? Ractiv believes so. The team say they haven’t used a mouse “in a while,” and haven’t missed it. Haptix even lets you define different functions for different fingers, so you can set your middle finger as the cursor, your index finger to left clicks, and your ring finger to right click, for example. Haptix works on Windows XP, Windows Vista, Windows 7 and 8, and Ubuntu (sorry, Mac-users)".



The list goes on and on ...



0 comments:

Hack Your Elevator

Getting Late...?


0 comments:

808:Sony LBT-GPX77

Did someone say bass.....?!!!

The new LBT series model is here. This being the flagship mini sound system of Sony comes loaded with 4 subwoofers and two tweeters all providing a massive 1800 watts of rms, the neighbours will surely hear. Also One-touch connections with Near Field Communications (NFC) takes Bluetooth® connectivity to the next level by allowing you to align your enabled devices and tap them together to pair and activate the connection. In addition to CD playback1, you can also connect and playback music stored on USB thumb drives2. Additional features include EQ and DJ effect controls to customize the sound, AM/FM radio with 30 station presets and dual rear auxiliary inputs for use with other music devices. So break out the stationary and start writing because Santa is a very busy man.

0 comments:

The mini Doughnut Factory










DearSanta.....

      Automatic Mini Donut Factory lets you create donuts with easeUnless you’re on a super healthy diet, chances are you may indulge in a donut every so often, or if you’re a huge fan of donuts and can’t get through the week without having one every other day, then you may want to consider investing in the Automatic Mini Donut Factory.
All it takes is some donut batter and some hot oil and the machine will produce miniature-sized donuts for your enjoyment. It even comes with a see-through window so your kids (or even yourself) can watch as your donuts happily cook away. The company is claiming that it should take about 90 seconds to make a batch of 30 miniature donuts which seems like a considerably shorter time than walking out to the nearby bakery.

1 comments:

Lost And Found...

Theft recovery microchips 


These are the microchips ,avaiiable on Hammacher Schlemmer, that use radio frequency identification to verify the ownership of stolen items. Using the same technology for identifying lost pets, you register each chip with an item using a proprietary global database. Any item recovered after a theft will reveal a chip's hidden presence and its owner during a scan by law enforcement personnel or dealers--the chip will still signal ownership even if a thief has removed or altered an item's original serial number. At 1/2" long and no thicker than the lead of a pencil at 3/32", a chip can be permanently implanted inside a belonging, such as a guitar's endblock, a painting's wooden frame, or a firearm's stock using the included 3/32" drill bit (requires drill). An existing screw hole can be deepened or a new hole can be drilled to an optimal scanning depth of 1 1/2". A chip also adheres to plastic, metal, or wood surfaces when drilling isn't practical or desired using the included tube of epoxy.

0 comments:

Candy Apple: iPhone 5c

No Siri?....

0 comments:

Point-Of-View: Nokia Lumia 1020

Nokia's second coming?....


2 comments: