Skip to main content

Posts

Showing posts with the label Talking

Security Robot Takes Its Own Life in DC Fountain Tragedy

I think this is the answer for , can a Robot replace a human security guards ! 

$1,500 Google Glass Costs Just $80 to Make?

Get this. You know Google Glass, the futuristic headset that sells for $1,500? According to a new report from TechInsight's Teardown.com, the high-tech headpiece only costs around $80 to produce. The site secured a pair of the pricey specs and then ripped them apart, piece by piece, to determine the estimated price of each component. The surprising finding? Their preliminary analysis revealed that the bill of materials for all the parts and pieces used to make Google Glass adds up to a measly $79.78. The most expensive component used in Glass is the Texas Instruments OMAP 4430 applications processor, which comes in at around $13.96. The display, touch screen, and glass cost just $3, while the battery comes in at $1.14, and the camera is worth $5.66. Non-electrical material used in the device costs $13.63, while the 16GB of NAND flash memory from Toshiba totals $8.18, and assembly and testing comes in at $2.15. Google, meanwhile, says Teardown.com's assessment is n...

Want An RFID Chip Implanted Into Your Hand? Here's What The DIY Surgery Looks Like (Video)

Amal Graafstra snaps on a pair of black rubber gloves. “Do you want to talk about pain management techniques?” he asks. The bearded systems administrator across the table, who requested I call him “Andrew,” has paid Grafstra $30 to have a radio-frequency identification (RFID) chip injected into the space between his thumb and pointer finger, and as Graafstra describes Lamaze-type breathing methods, Andrew looks remarkably untroubled, in spite of the intimidatingly high-gauge syringe sitting on the table between them. Graafstra finishes his pain talk, fishes a tiny cylindrical two-millimeter diameter EM4012 RFID chip out of a tin of isopropyl alcohol, and drops it into the syringe’s end, replacing the RFID tag intended for pets that came with the injection kit. He swabs Andrew’s hand with iodine, carefully pinches and pulls up a fold of skin on the top of his hand to create a tent of flesh, and with the other hand slides the syringe into the subcutaneous layer known as the fascia...

How To Increase Adsense Clicks

There is an entire science devoted to how humans interact when looking at a page.  Large advertisers have spent millions learning the exact wording for the ad, where to place it, how large it should be, and even what color. As a blogger, you don’t really care that much; nor do you have the time to become a psychology expert.  However you do need to experiment and test to learn how to increase Adsense clicks. After all, an ad spot on your blog is valuable real estate. If it’s not getting enough clicks, you need to rethink your strategy. Some people smother their blog in ads. I have seen blogs with sidebars on either side and ads from top to bottom, most of them flashing messages.  I have even seen blogs still putting ads into their content stream. Not The Best Adsense Strategy Imagine if you go into a room to talk to someone and 15 people surround you; talking to you all at once.  After a few seconds, you would become so frustrated you would probably sc...

NSA reportedly using radio waves to tap offline computers

The National Security Agency is using secret wireless technology that allows it to access and alter data on computers, even when they are not connected to the Internet, according to a New York Times report. Since 2008, the agency has been increasingly using "a covert channel of radio waves" that can transmit from hardware installed in the computers, according to NSA documents and experts interviewed by the Times. Signals can then be sent to briefcase-size relay stations miles away, according to the report. The NSA has also installed surveillance software on nearly 100,000 computers around the world, according to the Times. The newspaper said the Chinese Army was a frequent target of such technology but said there was no evidence that the agency used either technology inside the US. Repeating earlier denials that its data collection activities are arbitrary or unconstrained, the NSA rejected any comparison to Chinese attackers who have been accused to planting simil...

What is a VPN Connection ?

A virtual private network (VPN) is a method of computer  networking--typically using the public internet--that allows users to  privately share information between remote locations, or between a remote  location and a business' home network. A VPN can provide secure information  transport by authenticating users, and encrypting data to prevent unauthorized  persons from reading the information transmitted. The VPN can be used to send any kind of network traffic securely. VPNs are frequently used by remote workers or companies with remote offices  to share private data and network resources. VPNs may also allow users to  bypass regional internet restrictions such as firewalls, and web filtering,  by "tunneling" the network connection to a different region. Technically, the VPN protocol encapsulates network data transfers using a  secure cryptographic method between two or more networked devices which  are not on the s...

Delete all the posts in Facebook

so , i search how to delete all my posts in Facebook . and i read about a tool called iMacros but ! Facebook change the way the pages works so the script that the People know not working any more so i figure it out and write a new script that can do the job using the mobile version of Facebook the script : VERSION BUILD=7300701 RECORDER=FX TAB T=1 URL GOTO= http://m.facebook.com/profile.php?v=feed&refi d=0&_rdr TAG POS=1 TYPE=A ATTR=TXT:Remove TAG POS=1 TYPE=INPUT:SUBMIT FORM=ACTION:/a/delete.php? ATTR=VALUE:Remove have fun ;) * the cleanmywall.com site cant do the work that my script do :)

How to Hide Secret Messages and Codes in Audio Files

To encode, you're going to need Coagula (Windows-only), and to decode you'll need Sonic Visualizer (Windows/Mac OS X/Linux). You can watch the video above for a visual walkthrough, but here are the steps you need to follow: Create an image you want to encode. White text on a black background works well, and it helps to have a small image without too much empty space. Save it out as a JPEG or BMP. Open the image in Coagula and click the setting for "Render Image as Audio Without Blue/Noise." Be sure to choose this option as the other rendering option will not work. When you're done a new audio file entitled "Coagula.wav" will be in the same folder as the Coagula application. You can either go grab that file or you can save it out to a location of your choice by choosing "Save Audio File" as from the file menu. That's it. Message encoded! To decode the message, open it in Sonic Visu...

How to get old gnome Ubuntu look back

Some of us dont like the new look of ubuntu , all the MAC look , so if you just like to get back to normal : 1) Log-off your computer. 2) Click on your username. 3) Then select “Gnome” at the bottom of your PC. "or ubuntu classic" 4) Then type your password and login. 5) And you get your beautiful gnome look back.
The thing about the iPod Touch and the iPhone is that they are great portable hacking devices. To the naked eye the iPod Touch/iPhone looks like nothing more than an ordinary mp3 player/cellphone however that is just an understatement to its full potential. Once your Ipod Touch/iPhone is jailbroken you have access to your whole file system meaning that applications generally associated with laptop/desktop hacking can be ported and used on the iPod Touch/iPhone. This opens up a whole lot of possibilities for network sniffing, port scanning and much much more! In this tutorial we are going to take a look at one of these programs called Pirni. What is Pirni? Pirni is an application that was ported to The Ipod Touch/iPhone to be used as a native network sniffer. Pirni is so useful because it gets past the iPod Touch’s/iPhone’s wifi hardware limitation of not being able to be set into promiscious mode (a mode that allows a network device to intercept and read each network packet that arrive...