This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

16GB Mechanical Memory Key






16GB Mechanical Memory Key
zoom
Description
So this is Mechanical Memory key Number 3. Its probably, in my opinion, my most successful so far. It has however taken an age to finish (approx 10-12 hours) mainly due to the detail and having to harvest the pieces from the watches myself - I think I probably used parts from around 6 different pocket watches (from brand new ones to watches over 100 years old).





The key is made out of purple heart & has approximately 26 Ruby's which look great when the key catches the light, & when the Keys plugged into a USB, it glows green from underneath the gears giving the key a good sense of movement.





The key's stated size is 16GB (as with all Flash memory sticks, some of that memory holds the 'Plug & Play' drivers) & runs at a fantastic 110x!


cost:

$10.00 USD

wana buy go to  etsy.com

Open Source at Google | Android Scripting Environment is noy open

The Android Scripting Environment (ASE) brings scripting languages to Android by allowing you to edit and execute scripts and interactive interpreters directly on the Android device. These scripts have access to many of the APIs available to full-fledged Android applications, but with a greatly simplified interface that makes it easy to:



  • Handle intents

  • Start activities

  • Make phone calls

  • Send text messages

  • Scan bar codes

  • Poll location and sensor data

  • Use text-to-speech (TTS)

  • And more




Scripts can be run interactively in a terminal, started as a long running service, or started via Locale. Python, Lua and BeanShell are currently supported, and we're planning to add Ruby and JavaScript support, as well.





Scripts can be edited directly on the phone.





The script manager displays available scripts.









Scripts can be launched interactively or as background services.







Interactive terminals can be started for interpreters that support it.







Scripts can use the Android UI to get user input.



You may ask, why write scripts instead of real Android applications? Admittedly, Android's development environment makes life pretty easy, but you're tied to a computer to do your work. ASE lets you develop on the device itself using high-level scripting languages to try out your idea now, in the situation where you need it, quickly. Have a look at the following example Lua script to see for yourself:

--Placing the phone face down will disable the ringer. Turning it face up again will enable
--the ringer.
require "android"
android.startSensing()
android.sleep(1) --Give the sensors a moment to come online.
silent = false
while true do
s = android.readSensors()
facedown = s.result and s.result.zforce and s.result.zforce > 9
if facedown and not silent then
android.vibrate() --A short vibration to indicate we're in silent mode.
android.setRingerSilent(true)
silent = true
elseif not facedown and silent then
android.setRingerSilent(false)
silent = false
end
android.sleep(1)
end


Here's another useful script, this time in Python.

"""Say chat messages aloud as they are received."""

import android, xmpp

_SERVER = 'talk.google.com', 5223

class SayChat(object):
def __init__(self):
self.droid = android.Android()
username = self.droid.getInput('Username')['result']
password = self.droid.getInput('Password')['result']
jid = xmpp.protocol.JID(username)
self.client = xmpp.Client(jid.getDomain(), debug=[])
self.client.connect(server=_SERVER)
self.client.RegisterHandler('message', self.message_cb)
if not self.client:
print 'Connection failed!'
return
auth = self.client.auth(jid.getNode(), password, 'botty')
if not auth:
print 'Authentication failed!'
return
self.client.sendInitPresence()

def message_cb(self, session, message):
jid = xmpp.protocol.JID(message.getFrom())
username = jid.getNode()
text = message.getBody()
self.droid.speak('%s says %s' % (username, text))

def run(self):
try:
while True:
self.client.Process(1)
except KeyboardInterrupt:
pass

saychat = SayChat()
saychat.run()



These scripts demonstrates several of the available APIs available for both Lua and Python. It is intended to be run as a service and silences the ringer when the phone is placed face down. For some scripting languages, like BeanShell, it's possible to access Android's Java API directly. To simplify things, ASE provides the AndroidFacade class. For other languages, like Python and Lua, the API is made available via JSON RPC calls to a proxy. Naturally this means that only the part of the API which has been wrapped by the AndroidFacade and AndroidProxy are available to cross-compiled interpreters like Python and Lua. Thankfully, both AndroidFacade and AndroidProxy are simple to extend.



If you'd like to give ASE a try, it's not yet published to the Market, but will be soon. You can download the latest APK from our project page. Some sample scripts and documentation are also included there to help you get started. We always love to hear what you think, so please send us feedback or ask your questions in the ASE discussion group.

super Bluetooth Hack software 2009 latest version download

Super Bluetooth Hack



Hacking Bluetooth



Once connected to a another phone via bluetooth you can:

- read his messages

- read his contacts

- change profile

- play his ringtone even if phone is on silent

- play his songs(in his phone)

- restart the phone

- switch off the phone

- restore factory settings

- change ringing volume

- And here comes the best

“Call from his phone” it includes all call functions like hold etc.

Super Bluetooth Hack for S60 2nd-3rd devices.



Works very well on Sony Ericsson and Nokia phones



Plus some handy extra’s!!!!



DOWNLOAD:



http://hotfile.com/dl/3478804/147b4ca/BluetoothHackPack.rar.html

Google wave new communication revolution

Google just opened up to a limited audience its very interesting communications experiment called Wave (news stories). Our hands-on evaluation: there's a lot to like. It really is a more contemporary take on communications. But it will knock many e-mail users off-balance.

Even Wave's own Software Engineering Manager Lars Rasmussen told me, "It takes a little getting to," and, "We're still learning how to use it." Imagine how everyone else will feel.

If you want to try Wave, you'll have to wait. Google is making access to the service available to some developers and press, but full availability will not be until "later this year," Google says. The version we tested was very raw, still in development. Many features were not implemented and the system threw us a few errors. But the framework and philosophy is clear to see, and that's what this evaluation is based on.

Getting started in Wave: It looks a lot like e-mail...
(Credit: Screenshot by Rafe Needleman/CNET)


What's Wave?

Wave is real-time e-mail. What that means is that when you're writing a reply to a message (or "wave") that you receive in the system, the recipient can see what you are typing as you type it. It will come as a relief to most that the real-time feature can be disabled if you click on the "draft" button (not working in my trial) while writing. But real-time visibility is the default.

You can put your replies anywhere in the message. You can also do this in regular e-mail, but in Wave, your comments are easy to pick out since the app bounds reply text in colored boxes with authors' pictures embedded in them. Those of us who prefer to reply to e-mail messages at the end (or the beginning) and not piecemeal can just reply as usual. But when you want to write a surgical point-by-point reply to a message, Wave makes it easy.

You can drop pictures straight into Wave messages (a neat trick in a browser-based app, made possible by Google Gears), and smart assistants will let you convert addresses to maps, automatically fix spelling errors, and expand contact names.

But Wave is not e-mail. In this image, I am watching co-developers Lars and Jens Rasmussen type replies to my query. The teal tag shows that Jen is typing right now; Lars, who just finished typing above Jens, had his own, separate color.
(Credit: Screenshot by Rafe Needleman/CNET)
But it's the reply-anywhere feature combined with the real-time function that's most interesting. It makes Wave the first useful blend of e-mail and instant messaging that I've seen. Unlike Google's previous attempt to meld the two communications modes into one app (Gmail has Google Talk in its sidebar), this one really works. An asynchronous e-mail conversation between two people can can stay that way, or it become real-time when both parties are online, and the dialog stays in place in the e-mail for later viewing. Switching between the e-mail and IM mode is seamless. In fact, the concept of the two different modes vanishes in Wave.

Wave's message handling really shines when a conversation is between more than two people. Using Wave and its specific, color-coded replies, a group of people can have an actual discussion in e-mail, in real-time if wanted, without getting bogged down in long multi-message discussions--or worse, in threads that end up forking so that different people are discussing different things.

The Wave in-box pane shows you when there are new messages in your threads by bolding the subject lines, and when somebody is actively typing in a wave, you can see the text come in live, in the two-line preview every message gets. That's really cool, although it can be overwhelming.

Speaking of being overwhelmed, the first time I had two people replying to me in an individual message at the same time, in different places in it, my head almost exploded. It's a lot of raw information coming it at once, and it's very different from the old e-mail or the instant message experience.





A new communications architecture

A lot of what Wave does is made possible by the fact that Wave messages don't live primarily in the desktop Wave client (which is actually a rich browser-based app), as the traditional design of e-mail dictates, but rather on the Wave server. Messages aren't just dropped off at your Wave client; persistent links to messages on the servers come with them. When you edit a wave with the Wave application on your computer, it's immediately reflected back to the Wave server, and from then out to other users who are viewing that Wave in their apps, immediately.

Wave servers synchronize with each other as needed. In fairness, this is not radically different from how Lotus Notes and Microsoft Exchange work, but Wave has no legacy support for old e-mail architectures whatsoever, and isn't bogged down by the old methods--like the practice of delivering messages to users and then severing the links to those messages.

Other benefits you get from this include the capability to add new recipients to a wave at any time, and for Wave to know, when that happens, what each user has read and what they haven't. Users' views into Wave will highlight what's new to them when they open a message.

And, taking a page from Twitter Search, Wave's search function will be real-time (it wasn't when I tried it). If you are searching for a word or phrase in your inbox of waves, and someone updates a message thread with your search target, that message will pop up in your results the moment they type in the change. (You can save searches in the navigation bar, a nice feature.)



All together? Not yet

At the moment, the only people Wave users can communicate with are other Wave users. Wave addresses look like e-mail addresses, but there's no gateway between Internet e-mail and Wave, so messages send from standard e-mail clients to Wave will bounce. This is a serious limitation, and one Google hopes developers will rectify by writing gateways between Wave and standard e-mail servers, not to mention IM services and other social and workflow systems like Facebook, Bugzilla, and so on. A Twitter interface is already being shown.

However, as Rasmussen told me, Wave is currently spam-free since it's not linked into the global e-mail system. He doesn't want to open up Wave to standard e-mail until he can ensure that this system won't be overrun, too.

In fact, the reason Wave is being released in the way it is right now--as an early developer-only experience--is to encourage programmers to write extensions to it. The e-mail gateway is particularly critical, and Google may develop it itself. Without it, Wave is yet another new communications medium that will have a hard time getting off the ground since it duplicates many capabilities people are already accustomed to. Wave is technically a radical departure from e-mail, but for the end users it will still be used for a lot of the same things e-mail is.

Google's Wave team hasn't yet done much integration with other Google developers' projects, although Wave was introduced to the company through a detailed video demo. As Rasmussen told me, "To say we're 'working with' other Google groups would be a stretch." Obvious integrations we're waiting for include Gmail, Google Docs, and Google Voice.







Check out the developer preview at Google I/O

Google Wave is a new tool for communication and collaboration on the web, coming later this year. Watch the demo video below, sign up for updates and learn more about how to develop with Google Wave.

Google Wave will be available later this year.

Learn

Google Wave can make you more productive even when you're having fun.

Take a sneak peek.

Develop

Learn how to put waves in your site and build wave extensions with the Google Wave APIs.

Visit code.google.com/apis/wave.

Build

Google Wave uses an open protocol, so anyone can build their own wave system.

Learn more at www.waveprotocol.org.

source:cnet.com

Don't Search For Free Goodies Online!

Searching for free music, games and screensavers can be hazardous to your computer



Internet security firm McAfee Inc. searched for more than 2,600 popular keywords on the most accepted search engines including Google and Yahoo! Buzz and found that certain keywords or search terms were riskier than others. McAfee said some search categories are used to lure unsuspecting consumers to their websites. Hackers and cybercriminals are often able to persuade searchers to download files carrying malicious software that can cause consumers to disclose their personal and financial data.
According to McAfee Inc., some of the riskiest searches on the Internet today are associated with either with finding items for free, such as music or screensavers, or looking for work that can be done from home.



Hackers are most successful when they can attract a large number of victims. One way to target big crowds online is to track current events-everything from celebrity meltdowns and natural disasters to holidays and popular music. One key tool cybercriminals use to snare victims is to get them to download a computer file or program that comes with a malicious payload.



Searching for free music downloads online is risky too. On an average, 20.7 percent of results were risky (compared to just 1.7 percent of all search terms) and on one results page out of the 25 search engine pages rated, McAfee found a whopping 42.9 percent of results risky. As consumers continue to convert their music libraries to digital formats like MP3 files, they also struggle with the cost of buying music they may already own in cassette, LP record, or other formats. 


Caught between those two needs, many consumers have heard that the web can be a source for free music. If the consumer is already looking for music, then they already have the mindset of being willing to download something-and that makes the malware authors' work easier.



Work from home searches can be as much as four times more risky than the average for all popular terms. And on an average, these searches are 50 percent more risky than other popular terms.



The Indian result of the study shows that searching for Katrina Kaif and Shahid Kapur can be dangerous to your computer! Searching for the famous actress can put you to a 26.6 percent risk of affecting your computer while Shahid Kapur makes you vulnerable to a 22.2 percent risk.







Other most dangerous search terms in India include Waptrick, Orkut, Yahoomail, Rediffmail, How to earn money, Namitha (Namitha Kapoor -- the Tamil/Telegu actress), Shimla and Bejing 2008 Olympic Games.



Surprisingly, searching for the term 'Viagra' is not as risky as searching for 'Screensavers' or 'Free Games'. According to the report, searching for Viagra is safer than searching for the term 'iPhone' and 'Barack Obama'!



The complete McAfee report can be accessed here.




Pentagon plans new cyberspace war command: report

WASHINGTON (Reuters) - The Pentagon plans to create a new military command for cyberspace, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare, the New York Times said on Friday.

The military command will complement a civilian effort President Barack Obama plans to announce on Friday that will overhaul the way the United States safeguards its computer networks, the newspaper said on its website.

Citing Obama administration sources, the Times said the president will detail on Friday the creation of a White House office that will coordinate a multi-billion-dollar effort to restrict access to government computers, protect systems that run U.S. stock exchanges, clear global banking transactions and manage the air traffic control system.

The Times said the civilian office would be responsible for coordinating private sector and government defenses against thousands of cyber-attacks mounted every day against the United States, largely by hackers but sometimes by foreign governments.

Administration sources said the president would not discuss the Pentagon plan on Friday. But Obama is expected to sign a classified order in the coming weeks that will create the military cyber-command.

The need for improved U.S. cyber-security was driven home in April when the Wall Street Journal reported that cyber-spies had penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system.

The Times said the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use as a deterrent or alongside conventional weapons in a wide variety of possible future conflicts.

Reuters has reported that companies in the cyber-security market range from security-software makers Symantec Corp and McAfee Inc, to traditional defense contractors such as Northrop Grumman Corp and Lockheed Martin Corp, to information technology companies such as CACI International.

The Pentagon had been working on a cyberspace strategy for several months. It was completed weeks ago, but was delayed because of ongoing arguments over the authority of the White House office and budgets for the entire effort, the report said.

iPhone and iPod Touch are vulnerable to hackers and new viruses

Are you using iPhone or iPod? Then its about time you udate the software used by these hardware platforms, iTunes and QuickTime.

Security breaches have been found in the software associated and distributed worldwide with the iPod and iPhone from Apple. There are several security leaks of which some are pretty extensive. The most known security holes have been blocked in new patches of these two software applications. There are ten different security holes that can be tightened up through automatic update on both the Windows and Mac OS operating systems.

The errors utilized in QuickTime lies in the media player that is associated with the media software iTunes. Most of the iPod and iPhone users utilize iTunes to update their media player with new music, videos and podcasts. The software iTunes is needed to use the iPhone at all, and to restore, update or handle media files.

The security errors can in worst case make it possible for malicious hackers to install software on your computer that should not be there.

They disguise this destructive and malicious software as movie cuts that will make the users to open them and give access to the hackers. The malicious code will make QuickTime to crash and if possible to install other malicious software to work in batch on your computer without you knowing it at all.

It is really bad news that malicious code is hidden in media files and let users believe that its only a movie they open up and not a malicious code hidden in it. The internet transfers more and more media files, so it is of great concern this trend.

A security hole in iTunes will also be fixed now together with an upgrade patch that will make the software ready for the next version of iPhone operating system 3.0 which is expected within short time.

So my advise to you is to update your applications iTunes and QuickTime now, and make sure you are updating it on a regular basis to implement the latest versions with fixes that at least takes the most common and known security holes in these applications.