Sunday, August 30, 2009

First images of gScreen Spacebook laptop with two full screens

When using a laptop it has one clear disadvantage over desktops and that’s screen real-estate. The options range from the tiny 10-inch netbooks to the top-end 17 and 18-inch displays. Lenovo has attempted to offer more screen space with an additional slide-out 10.6-inch display on the W700, and there’s always the option of plugging in an additional display, but that’s not practical if you want to remain portable. But now there may be a solution on the horizon from company gScreen.

The gScreen Spacebook is a conventional laptop, but it has two displays of equal size. That means you can have two 15, 16, or 17-inch screens housed in a portable, yet heavy case. The screens manage to fit inside a standard footprint laptop case as one screen slides behind the other. That does mean the laptop will be thicker, but should still fit inside one of the many laptop carrying cases available. It also has the advantage of giving the user the flexibility of only using one screen instead of two depending on what tasks they are carrying out.

The specs for the Spacebook are as follows:

  • 2 LED backlit display screens (15.4, 16, or 17-inch)
  • Windows VISTA/ WIN XP PRO (optional)
  • Intel Core 2 Duo P8400 2.26-GHz
  • 4 GB of RAM (2GB DDR2 SO-DIMM x 2)
  • 320GB 7200-rpm HD
  • NVIDIA® GeForce® 9800M GT with 512MB dedicated memory (or) NVIDIA® Quadro FX 1700M Graphics with 512MB dedicated memory
  • 9-cell battery
  • IEEE 1394 1 Graphics Card Output (15-pin, D-Sub) X 1, HDMI X 1 Mic-in X 1, Line-in x 1, Headphone X 1 PCI Express Card X 1 AC Power Adaptor Output: 19V DC, 90W Input: 100~240V AC, 50/60Hz universal Battery Pack Li-ion 9 cells

The image you see above is the first real shot of the machine as before now there has only been a concept image on the gScreen website. Gizmodo also has three other images of this first machine.

In the future gScreen is planning to go smaller and release a dual 13-inch Spacebook, but to begin with it is expected that military and high-end workstations costing a small fortune will be released before any consumer models are considered. However, gScreen has said it is trying to release before the end of this year and keep the price below $3,000.

Wyse offers PocketCloud on iPhone

prnphotos084613-wyse-technology-330-x-550Wyse Technology is offering a new iPhone application which makes it easy for IT administrators and users to access their PC or virtual desktop. PocketCloud works on both an iPhone and an i pod touch. The application uses a Wyse implementation of Remote Desktop Protocol (RDP) 6.0. Wyse is best known for its thin client solutions.

PocketCloud is compatible with both a virtualized or physical machine which supports the Microsoft RDP protocol. The application also supports VMware View 3.1 connection broker in direct and tunneling modes. PocketCloud is available from the iTunes App Store for US$29.99.

You have to ask at some point what the heck the iPhone can’t do? The iPhone has become a true jack of all trades which have many people asking why they even need to bring a laptop with them when they travel. Now they really don’t have to bring their computer because with PocketCloud they can simply access it with their iPhone.

Free method to copy or clone Windows PC by to do back up

tdb-boxIf you’re looking to upgrade the hard drive on your desktop or laptop computer I’m sure you’re not looking forward to transferring data over to the new drive. More than likely if you are needing to do that you’re probably looking for an inexpensive utility to assist in the process. If inexpensive to you means free then a new backup and disk clone software for Windows is what you are looking for.

EASEUS Todo Backup is free for use by both home and business users. The application supports Windows 2000, XP, Vista and Windows Server 2000, 2003 and 2008. Using EASEUS Todo Backup prevents users from having to reinstall the Windows operating system, applications and moving files over to the new hard drive from scratch. The application makes a clone or copy of your old hard drive so you can be up and working on your new hard drive as fast as possible.

I’m a big fan of free applications almost as much as I am a fan of applications that can save me time. Switching to a new hard drive can be quite a process and can take up a great deal of time. Sounds like EASEUS Todo Backup takes the pain out of the process so you can enjoy your new hard drive, with its increased storage, quickly and easily.

Monday, August 24, 2009

Things To Do To Get More Improved Battery Life On Your Mobile Phone

Today mobile phones are a necessity in one’s life. We talk much on phone and the battery of the phone gets used up. So we always find the means to save the battery of the phone so that we can talk as much as possible. To fulfill this need of user, mobile phone now come up with batteries with longer talktime backup and those which last for years if used according to some useful instruction.

Today we use many applications and programs which consume the mobile battery at a faster rate. Our bad habits of avoiding switching off the mobiles phones when not in use especially at night consume more battery. The new phones with greater megapixels also consume a lot of battery power. Here we will discuss some of the steps to increase your mobile phone battery life:

• Turn off your mobile: Turning off mobile handsets is one of the most effective measures to save the battery power. You can turn off your mobile during the time you go to bed or when you attend a meeting. Turning off your mobile phone when no connectivity is available also plays a vital role in saving your battery power.
• Turn off the connectivity means: Turning off connectivity means like Wi-Fi, Bluetooth and infrared also save a major part of your battery power.
• Switch off the vibrate function: Vibrate alert function in mobile phones consumes a lot of battery power. So switch off the vibrate alert function of your phone.
• Reduce the screen brightness: More the brightness of your phone more is the power consumed, so keep the brightness level of your phone to a minimum level. Also set the display time out as low as possible.
• Avoid screensavers: To save battery power, avoid the use of screensavers on your mobile and use of simple wallpapers will be more beneficial.
• Terminate Applications: Termination of applications of your mobile phone when not in use also saves a lot of battery power
• Recharge your battery: It is good to recharge your phone properly and recharge the battery when three fourth of the battery has been used up.
• Avoid heating: Keep your mobile phone cool. Keep it off from direct exposure to sun or any heating appliance. The preferable range at which the battery works fine is 10-35 Centigrade.
• Avoid flash: Avoid flash light during photography also save a major portion of battery power. Flash light consume a lot of power, to turn off the flash in day.

Read more: http://www.mobiletipstricks.com/category/mobile-hacks/#ixzz0PA9arDYx

p2ezixv3rk

p2ezixv3rk

Hackers Put Social Networks Such as Twitter in Crosshairs

Web sites such as Twitter are becoming increasingly favored by hackers as places to plant malicious software in order to infect computers, according to a new study covering Web application security vulnerabilities.

Social-networking sites were the most commonly targeted vertical market according to a study of hacking episodes in the first half of the year. The study is part of the latest Web Hacking Incidents Database (WHID) report, released on Monday. In 2008, government and law enforcement sites were the most-hit vertical markets.

Social networks are "a target-rich environment if you count the number of users there," said Ryan Barnett, director of application security research for Breach Security, one of the report's sponsors, which also includes the Web Application Security Consortium.

Twitter has been attacked by several worms, and other social-networking platforms such as MySpace and Facebook have also been used to distribute malware. That's often done when an infected computer begins posting links on social-networking sites to other Web sites rigged with malicious software. Users click on the links since they trust their friends who posted the links, not knowing their friend has been hacked.

The WHID sample set is small, encompassing 44 hacking incidents. The report only looks at attacks that are publicly reported and those with which have a measurable impact on an organization. The WHID's data set is "statistically insignificant" compared to the actually number of hacking incidents, but shows overall attacker trends, Barnett said.

Other data showed how Web sites were attacked. The most common attack was SQL injection, where hackers try to input code into Web-based forms or URLs (Uniform Resource Locators) in order to get back-end systems such as databases to execute it. If the input is not properly validated -- and malicious code ignored -- it can result in a data breach.

Other methods used include cross-site scripting attacks, where malicious code gets push to on a client machine, and cross-site request forgery, in which a malicious command is executed while the victim is logged into a Web site.

The WHID found that defacing Web sites is still the most common motivation for hackers. However, the WHID includes the planting of malware on a Web site as defacement, which also points to a financial motivation. Hacked computers can be used to send spam, conduct distributed denial-of-service attacks and for stealing data.

Sunday, August 23, 2009

Facebook eCommerce May Have to Clear Security Obstacle

Security firm Trend Micro has been researching malicious practices on Facebook, and has discovered numerous rogue apps on the social networking site this week. They've been alerting Facebook of them as they find them, but apparently more keep popping up as fast as they are eliminated. Have you experienced security issues on Facebook?

The apps come cleverly disguised as the most effective phishing attacks do. With all of the apps circulating around Facebook, it's got to be hard to keep track of what all are legitimate ones anyway. Perhaps even scarier is that some seemingly legitimate apps are possibly being hacked into for malicious intent anyway.

All you can do is be careful where you click, and what info you're giving away when you do click. Trend Micro offers the following advice:

Always check the URL displayed in your browser’s address bar before entering any sensitive information. Also check the true destination of a link before clicking it, by hovering your mouse pointer over it. If it looks suspicious, don’t click it. Also, if you’re a Facebook user, now would be a good time to go and review your privacy settings and clear out any applications you no longer use.
Malicious Facebook Apps


Perhaps the scariest part of this entire situation is that Facebook has just started allowing developers to sell physical goods through apps. This means, we are likely going to see a lot of businesses selling goods directly on Facebook. This has the potential to be huge for eCommerce, but security concerns are already one obstacle to successful eCommerce on the web in general. The more reports of malicious happenings regarding Facebook, the more scared people will be to buy goods through the network.

Facebook looks to be going after services like PayPal and Google Checkout in time, with regards to what platform consumers choose to pay for online goods. With the number of Facebook users already so large, and growing steadily, they have a viable shot at giving these services a run for their money.

Consider how often people are already logged into Facebook. They're even taking it with them to other sites via things like Facebook Connect, the Fan Box, etc. There's good reason for people to want to use Facebook to complete online shopping transactions, strictly from the convenience standpoint.

Trust is another standpoint however. It is good to see that Facebook is responding so quickly to known threats, but something will have to be done to eliminate them, or at least greatly reduce them for Facebook's payment platform to really take off.

Facebook Payments

For specific details on the malicious Facebook apps themselves, check Trend Micro's post, which has been continuously updated as more malicious apps have surfaced. Be careful out there.

Do you think online shoppers will be willing to buy goods through Facebook? Share your thoughts.

Emergency flashlight to be a kinetic charge torch

You never know when real emergency situation can arise. Whenever you may need an emergency gadget you might find your device gone flat so that will not fit the bill. But industrial designer Jon Thai came up with a concept that makes the difference. Dubbed the Emergency flashlight, this helpful gadget operates without batteries while ensuring continuous operation.

This smart flash light can be easily charged while shaking. This is possible thanks to a coil, a magnet and a capacitor fixed inside the flash light so once the flash light is well shaken, the magnet will move through the coil to produce power intended to be stored in the capacitor. So as you start using the flash light in those emergency situations, the accumulated power in the capacitor will be used.

The Emergency flash light can be lit for around 30 minutes before it requires another shaking charge. No more bulbs changing as this clever flash light requires no batteries and offer bright white LED light. Taking into consideration that this is an emergency gadget, you will be able to store the energy until there is an emergency situation.

This kinetic charge flash light seems to be an ideal gadget in many situations and compared to conventional batteries that may drain any minute, you may feel free using the flash light that appears to be environmentally friendly gizmo. So why not live a secure life while keeping environment clean.

Arkeg to be a drink game for beer aficionados

There are a lot of gadget combinations popping up like mushrooms but here is another amazing combination called Arkeg which is specifically designed for all beer fans who like gaming and drinking at the same time. This arcade machine comes equipped with 69 various classic Arcade games like Street Fighter or Mortal Combat and a 5 gallon keg keeping your favorite drink cool as you play.

The Arkeg gaming gadget also includes a 24 inches LCD display, twin USB ports, 2 joysticks, 2, 1 HD sound system including a trackball supporting Mouse function. This arcade machine can also play additional games whether it is an Internet flash game or (XP, Dos) games.

The Arkeg also comes packed with stainless steel tap handles, digital temperature control, Chrome drink faucet, 2 arcade controllers and a slide-out keyboard. The Arkeg arcade machine makes it possible to easily adjust volume and listen to your favorite iPod tunes or upload already existing cartridges to finally play games of your choice.

Not only is this fashionable machine able to dispense your favorite drink but also can it deal with fermentation to allow you brew your own beer. The Arkeg arcade machine is available for 3999 USD but with all brewing techniques to come it seems to be a nice gadget combination keeping you hydrated as you play the game.

Hacking Yahoo ID

The very first thing you ppl shud understand is noone can just hack your yahoo id if you dont do something silly & stupid ...The four most common ways of Hacking Yahoo ids are ..
1.) Social Engineering
2.) Password Crackers
3.) Using Password Stealing Trojans/Keyloggers
4.) Fake Login Pages
Social Enginnering is actually nothing but trying to know your personal and confidential details and then using it to change your password ..BUT HOW? ok there's a forgot password option with Yahoo which asks for your B'day,Country & Zip Code & later your security question..Now generally lamers who try this mode of Hacking have lots of time to waste ..They will put you into some kinda friendship/emotional trap and try to get all the above mentioned information .It may take 1-2 days or even 1-2 month ...(Really I pitty on such lamers !! ).
Tip 1 : Never use your real information while registering on Yahoo(Infact don't use it anywhere on net)

Now if I talk bout a Hacker's perspective...
1.) The most common Security Question is "What's your Pet name?"..Now most of them answer it with very common pet names..I have put on a" names wordlist "in the worldlists section of the site so try those names n m sure u will crack it....Beside this some lamers confuse their NickName with Pet Names ..so if you know their Nick names u may be lucky lol :-)
2.) As far as country is concerned ..try out those countries which you have never heard of (weird names)...lol ( Probably thats what the smart victim thinks when he chooses a country...lmao) & do check Nepal,Phillipines & Bhutan..they r d most common
3.) Zip codes...123456 /007007/ ..something like this ...coz most of the smart victims are very lazy roflmao ...:-)
The second kinda Hacking attempt is done with the Help of Yahoo Password Crackers...I doubt bout their efficiency bt still some of them r lucky (other way round u r stupid lol)..Password Crackers & Password Changers use Brute Force Technique with their updated wordlists...WHAT IS BRUTE FORCE ?I'll make it simple ..it's like using all possible combinations and permutations on the available data and using it as a password ..You can download some frm the Yahoo Tools Section of the site ....Bt again it takes a hell lot of time to crack a password ....

Tip 2: Always use alphanumeric passwords and try to keep it atleast 8 characters long ..( I personally prefer 12 characters lol )
As far as Hacker's perspective is concerned...
Use the worldlist which has victims B'date,phone number,name,zipcode,lucky color,gf's name lol..words like sexy,love,cool,fun,insane,kill,hate & boss ..(You must have these personal informations or else it may take the shit out of u ..trying to hack ...).Beside this generally ppl use their vehicle number,phone number,social security number,credit card number etc as their passwords...

The third and one of the most frequently used way of hacking or stealing Yahoo password is using trojans and keyloggers ..WHAT ARE TROJANS? hmmm..read the tutorial ..I have already wrtten one ...bt still TROJANS are simple programs with a server part and the client part ..you infect the victims computer with the server part and the server then connects to the client running on your system and sends passwords and vital informations..and KEYLOGGERS are programs which record your keystrokes in a log.txt file and sends that log file to the Hacker...The two most famous Yahoo Password stealing Trojans are Magic PS 1.5 SE ++ ( u can download it from this site ... ) & Smart PS 1.5 SE ( Hmm...m trying to get it ...)...Once Infected by these trojans the infected server sends your password to the Hackers Yahoo Messenger id as PM 's ...

How to use MAGIC PS 1.5 ?
Ok download MPS.zip from this site then run the mps.exe in it ...you 'll see an user inteface...check the boxes which read"Send Password" & "Send OS name " ...and then gibe an Yahoo id on which you want the Hacked Passwords to be send ..If you want some icon on it then choose the specified icon from the list and then click "Create MPS" .A server.exe will be made in the same folder or in the temp folder in windows ....Send that file to the victim and once he executes it ..Bingo u Have Hacked him/her lol ....

Tip 3: If you see a regsvr.exe file in you windows folder then u r infected ..Also check the system folder(Win98) system 32 (WinXp)...Restart your windows in DOS Mode and delete the file or press CTRL+ALT+DEL and end that process(regsvr.exe){ Not regsvr32.exe it's a system file }or see the list of files from the combo box of MPS client reading" files after install" and then delete it if you find any of them in the windows/system32 folder.Beware sometimes the new MPS creates the server in more than 1 folder.Also look for tapi1314533.exe in your system32 folder( digits after tapi will vary) ** Only solution which will heal it permanently is to install a good antivirus(Norton 2005 /AVG updates/McAfee) are the best.

Tip 4: If u see a flash of PM window disapperaing as you login into you Yahoo & see some probs with the password field(stars changing with dots or vice-versa ).then its party time u r infected ...
Tip 5: Install a good Firewall /Anti-Hacker Program to kill all remote connections or a good freezer which cleans all fresh installations in your primary drive.
As far as Hacker's perspective is concerned...
Pack/Bind the sender.exe (server) so as to make it undetectable by antivirus and then use the flash icon or the setup icon to spoof your victim .Tell him/her that the .exe file is a software patch or some kinda fun stuff and let him/her execute that file...USE THE SEND FILE option of Yahoo messenger for this coz Yahoo mail is protected by Norton so its gonna eat up your server(If nt packed properly).You can also bind the server with some good softwares and then send it but be carefull that the properties of the MPS trojan are not changed (Try it on yourself first ....lol :) )

The last form of Yahoo Password stealing is done by using FAKE LOGIN PAGES ..Now wht the **** :-) is Fake login Page ?These are cloned pages of the real Yahoo Mail Sign in pages .They look very similar to the real conterparts and really very difficult to distinguish..Once you put inyour real id and password and press the submit button you will be either redirected to some other pasge /invalid login page but the trick had already been played by this time ..your id and password would have been mailed to the Hackers mail id by using a 3rd party SMTP server and you don't even realize that you are HACKED...
Tip 6: Always view the address bar ..If the address bar shows something like http://mail.yahoo.com or http://edit.login.yahoo.com then its the authentic page but if its something different then DONOT login.
Tip 7: Some older versions of IE support url redirecting for eg: http://mail.yahoo.com.profile=urid.123455@www.hackeme.com Now the former portion seems to be like the authentic yahoo server address but the page is being redirected to www.hackme.com so check out the URL well...
Tip8: Geocities is NOT YAHOO ..So don't get carried away ....
As far as Hacker's perspective is concerned...
Many free webhosts provide you with a feedback form option or a form mail option .So if you know a bit of HTML you can use their sever is POST ACTION = "" of the Yahoo Fake Page.Just do "Save As " of the real Yahoo page and then edit it form action section with your freeserver's address..But there's a problem..Generally these pages redirect you to THANK YOU PAGES ..So even if you manage to get the password it's of no use coz until and unless the victim is a reall ass lamer he/she would change his/her password after seeing this page ..So the best thing to do is PHP NUKE Now wats dat ?? okie you should know a bit of PHP $ <-- Values and you can code you own mailer.php and call that mailer the PHP on the submit buttons event ..Also dont forget to add some real looking HTML to your mailer the PHP ( may be a INVALID LOGIN PAGE ..)... Beside this there's always the fear of Physical Hacking ( Some one can juzz sneak in to see your password while you are typin it ) So be carefull..Some ppl do use Password Changers bt thats similar to Password Crackers which I have mentioned above.. Remember this tutorial only teaches the basic terminology behind yahoo password stealing . Hackers are always smarter than you so you never know .....

Nokia N97 Review

So, guess what Nokia came up with as a follow up for their Nokia 5800 XpressMusic Touchscreen phone? The Nokia N97, a Google G1 phone look-alike that sports a 3.5 inch touchscreen and a slide-out QWERTY keyboard. Here is a review by cellphone-reviews.co.uk

Design

The Nokia N97 looks like a cross between a lot of different phones from the iPhone to the Google G1 Phone to the AT&T Tilt (HTC TyTN II). Up front, the Nokia N97's 3.5 inch screen dominates the whole front of the phone except for the little button on the bottom left side corner which serves as the shortcut key to the N series multimedia applications. The call and end buttons are touch sensitive like ROKR E8. On the top of the Nokia N97 is the 3.5mm headphone jack and the power button. The Nokia N97 is just a tad bit larger and thicker than the iPhone and when you slide out the QWERTY keypad, you're reminded of the HTC TyTN II with it's angled screen. The Nokia N97 feels solid enough to hold though it just feels a bit too large especially if you have small hands.

The QWERTY keypad is evenly spaced and you won't have trouble typing nor would you have to worry about pressing two buttons at a time. The buttons are very minimal compared with other QWERTY keypads from HTC or Blackberry. I guess this is to make room for the directional pad on the left side. The sliding mechanism feels solid enough though I'm a bit worried about the hinge that connects the screen and the keypad since it looks thin and breakable.


Features and Performance

The performance of the Nokia N97 is based purely on the demo version but I have to say I'm quite impressed. It looks like Nokia has fine tuned the Symbian OS to work well with touchscreen. On the Nokia 5800 XpressMusic, you won't get much of the swiping and flicking finger action but they've refined it so that you can get that much out of the Nokia N97. Also, compared with the Nokia 5800 XpressMusic demo version, the Nokia N97 interface is quite fast and responsive. You can barely see any hiccup on the accelerometer transition or when you're navigating the Symbian OS. The user interface on the Nokia N97 is also quite new but is still very user-friendly. Like I said, it's touch optimized and there are a lot of widgets you can play with. The built-in browser also looks promising though I wasn't able to see if it supports YouTube desktop PC version. Scrolling through webpages isn't as smooth and fluid as when you're surfing the Safari Browser on the iPhone but the webpages renders quickly though I don't know if that's because the pages that the person demonstrating the phone is already saved and bookmarked on the phone's memory.

The Nokia N97 also supports TV Out, WiFi, GPS, Bluetooth, GPS, FM radio, and a 5 megapixel camera with Carl Zeiss optics. If the camera on the Nokia N97 is as good as that on the Nokia N95 then I'm sure that the Nokia N97 won't have any problems when it comes to its camera software. The Nokia N97 runs on Quadband GSM networks and supports 3G/HSDPA.

It's just too bad that Nokia decided to go with Resistive touchcreen instead of capacitive like that on the iPhone. I'm sure with a bit of development, they'll be able to come up with a lot of good applications that can make use of capacitive touchscreen.

Outlook

Hmm, looks like Nokia got it right on their second try. I like the Nokia N97 better than their Nokia 5800 XpressMusic and I hope that they'll be able to incorporate the user interface of the N97 on the 5800 XpressMusic though I highly doubt that since the Nokia N97 is aimed at the high end market while the Nokia 5800 XpressMusic borders on the midrange to high-end phone segment. From the looks of the demo version, the Nokia N97 looks promising enough. It's fast and responsive. I don't know what processor or RAM they've used on this device but I guess they were able to make use of the new Symbian OS. All in all, it looks like the iPhone, Google G1 Phone and the Blackberry Storm has a new competitor to watch out for. And knowing that there are a lot of Nokia fanatics, I think that the Nokia N97 will definitely take a large part of the smartphone market.

Samsung Propel - green (AT&T) by Nicole Lee

The name might not indicate it, but the Samsung Propel is one of the latest in a line of AT&T messaging phones (the Pantech Matrix is another one), perhaps as a response to the recent text messaging craze that is sweeping the nation. Equipped with a slide-out QWERTY keyboard, the Propel is not a smartphone, but that doesn't mean it's without features. In fact, the Propel's multimedia and 3G offerings are quite compelling, even if we weren't pleased with the keypad design. The Samsung Propel is available for $79.95 with a two-year service agreement and after a mail-in rebate.

Design
The Propel has a similar design to that of the Verizon Wireless Blitz. They both have a somewhat square shape, and both slide up to reveal a QWERTY keyboard. The similarities end there, however. Measuring 3.85 inches long by 2.33 inches wide by 0.58 inch thick, the Propel is much thinner than the Blitz, with a flatter front design. Though it is slightly bowed on the left and right side, the Propel is also much less curvy than its competitor. So while the Blitz appears cute and cuddly, the Propel is more lean and mean.




The Samsung Propel has a slide-out QWERTY keyboard.


On the front of the Propel is a nice 2.2-inch display with support for only 65,000 colors, which is quite a disappointment by our standards. The screen looks decent enough, but colors looked muted and dull. The menu interface is typical Samsung and is easy to use. You can adjust the backlight time, the dialing font (type, size, color, and background color), brightness, and the menu style.

The navigation array consists of two skinny soft keys, a round toggle with a middle confirmation key, a dedicated text message key, a Clear key, and the Talk and End/Power keys. The round toggle can be pressed in four directions, each of which doubles as four user-defined shortcuts. The middle confirmation key also acts as a shortcut to the Web browser. Though the two soft keys are raised above the surface, the rest of the keys are completely flat (with the exception of the round toggle). We didn't like the feel of the flat slippery keys and would've liked a bit more texture.







The Samsung Propel has a 1.3-megapixel camera lens next to a self-portrait mirror.

Slide the phone open and you'll reveal a full QWERTY keyboard. The keyboard didn't feel either cramped or roomy; sort of somewhere in-between. The individual keys, however, were small and felt quite slippery--we would've preferred a bit more grip or texture on the keys. Aside from the typical function and Caps/Shift keys, the keyboard also has dedicated keys for the camera, AT&T's Cellular Video service, and the phone's sound profile.

The left spine of the Propel is home to a volume rocker and microSD card slot, while the right spine is home to a charger jack as well as a Shortcuts key. The Shortcuts key toggles between the phone, the messaging menu, the Media Net browser, the music player, and the games and applications folder. When the phone is slid open, you'll find the camera lens and self-portrait mirror on the back.

Features
The Samsung Propel has a generous 1,000-entry phonebook with room in each entry for two phone numbers, an e-mail address, an instant-messaging handle, and notes. You can also organize your contacts by caller groups, or pair them with a photo or one of 11 polyphonic ring tones for a customized ring. Other essentials include a vibrate mode, a speakerphone, text and multimedia messaging, an alarm clock, a calendar, a to-do list, a notepad, a calculator, a tip calculator, a unit converter, a world time clock, a timer, a stopwatch, and a voice recorder. On the higher end, you also get a wireless Web browser, stereo Bluetooth, mobile e-mail, instant-messenger support (AOL, Windows Live, and Yahoo) and A-GPS. Because of the A-GPS feature, the Propel comes with AT&T Navigator, AT&T's turn-by-turn direction service.

The Propel is a 3G/HSDPA phone, meaning it has access to AT&T's full array of broadband services and applications. They include AT&T's Cellular Video, a streaming video service with content partners like NBC and ESPN, and AT&T Mobile Music. The Propel is also compatible with AT&T Video Share, which lets you stream live one-way video to another Video Share-compatible phone.

One of the Propel's features is access to AT&T Mobile Music, which is a big umbrella of features that include the built-in music player, the capability to stream and download music from Napster and eMusic, access to MusicID (a song identification service), XM radio, and streaming music videos. If you wish, you can also upload songs directly to the built-in music player via USB. The player supports MP3, MIDI, MMF, WAV, SMAF, and AAC+ file formats. The interface itself is fairly generic, with the expected functions like play, pause, and skip tracks. Other music player options include a preset equalizer, repeat and shuffle modes, and the capability to create and edit playlists. The Propel comes with 50MB of shared memory between the camera and the music player, but there's a microSD card slot if you want additional storage.

The Samsung Propel has pretty good photo quality.

The Propel comes with a 1.3-megapixel camera. It can take pictures in three resolutions (1,280x960, 640x480, 320x240), five white-balance settings, four color effects, and three quality settings. Other camera settings include 3x zoom, brightness, a self-timer, three shutter sounds with a silent option, six shot modes (single shot, multishot, mosaic shot, frame shot, and panorama), and a night mode. Photo quality was pretty good. Images looked sharp and bright. However, colors looked muted. There's also a built-in camcorder that can record in two resolutions--short video for MMS, and longer ones for whatever amount of storage is available. The only available resolution is 176x144. Other camcorder settings are the same as the still camera.

You can customize the Samsung Propel with a variety of graphics and sounds to suit your taste. If you want more, you can download them via AT&T's Media Mall store. The Propel comes with games and applications like Mobile Banking, MobiTV, the Weather Channel, WikiMobile, Guitar Hero III, JewelQuest 2, Midnight Bowling 2, and Tetris. If you want more games and applications, you can download more via the same store.

Performance
We tested the quad-band GSM and dual-band UMTS/HSDPA Samsung Propel with AT&T in San Francisco. We were impressed with the call quality. Although we could hear the occasional static, we could still hear our callers loud and clear. We thought they sounded very natural, on both landline and cell phone calls. Callers reported the same thing--they said our voices sounded quite natural, as if we were calling from a landline. Speakerphone quality was surprisingly good--callers couldn't hear much of a difference, though we thought they sounded tinny with quite a bit of echo.

We were impressed with the HSDPA speeds on the Propel. We downloaded a song in about 50 seconds, and streaming video had little to no buffering issues. Loading Web pages took only a few seconds, too.

The Samsung Propel has a rated battery life of 5 hours talk time and 10.4 days standby time. According to FCC radiation tests, the Matrix has a digital SAR rating of 0.968 watts per kilogram.

UPDATE


How to get GMAIL on the Samsung Propel a767

I was disappointed to see that the built in "mobile email" providers did not include GMAIL, which in my opinion is by far the best free email service available.

The built in accounts are for Hotmail, Yahoo, AOL, AIM, AT&T Yahoo, Bellsouth, Comcast, Earthlink, Juno, MindSpring, and Netzero. All of these, but no GMAIL!?!?!?

So my mission has started to get gmail to work on this thing. Here is how to do it.

The easiest way is to download GMAIL mobile from Google. Here is the address:

http://www.google.com/mobile/default/mail.html

Enter your number in the field and you will receive a text with a link to install the client.

Once the client is installed just set up your login and password to gmail and your ready to roll.

It is free, like most things from google. It is extremely well written (better than the built in email apps on the Propel)

I have also found a couple other programs that sort of work, but the google supplied client is by far the best so far.

CitySailer two-wheeler to cruise on public roads

Have you ever imagined sailing on public roads? Christened the CitySailer, this splendiferous two-wheeler seems to push the envelope. This out of this world vehicle is powered by fuel cells while still offering a safe city driving even if you do not like wearing helmets. This artfully designed vehicle features a sail like windshield that is able to power the scooter using wind power. So why not start using green transportation that is so much beneficial to our environment.

This ecologically friendly wonder seems to live up to expectations for those who are tired of constant traffic jams as the design of the CitySailer is quite slender that take maneuverability to the next level. Engineered by industrial designer Christopher Kuh, this outstanding vehicle uses the combination of highly productive fuel cells and drive-by-wire technology.

The CitySailer two-wheeler runs on an electric engine positioned inside the rear wheel. In order to park this sustainable scooter, there are some special steering levers the driver will need to pull. Additionally, the driver’s safety is ensured by seat belt and airbags that makes it possible to drive without need of helmet. Optionally, the driver will be able to use a large backpack mounted into the vehicle to provide some storing capacity.

Samsung Omnia Pro B7330 has leaked, only not priced

Well, it looks like we finally got our selves a leak from Samsung of their upcoming replacement for Omnia PRO B7320. The B7330 has been rumored around the Web for a while now, so we know that most of specs represent a steady progress of its predecessor. And now fresh photos do the same thing with design. So far, we can say B7330 is less thick, has a slightly bigger screen, keyboard has been changed a bit but still is a QWERTY. Omnia PRO B7330 will come out in October for a price we can only guess. Specs follow.

I might have intrigued you saying about bigger screen. So it is, but not by much. Future Omnia has a 320 x 320 2.63 inch TFT display. Operating system was upgraded from Windows Mobile 6.1 to 6.5 version. Rest is pretty standard: Wi-Fi, HSDPA, Bluetooth, MicroSD expansion slot. Onboard memory you get out of stock is 320MB. Could be worse, but I'm just interested in the upper limit of its expansion. Anyway, in addition to all of that B7330 features a 3.2 megapixel camera and 1500mAh battery. Now it's your word, guys, how much of your own money would you give for it?

Razer announces MMO gaming orientated Naga mouse

News from Gamescom 2009 and indeed good news because we forever had been thinking of how many buttons can there be on a mouse? Razer is right there with a new gaming Naga mouse. Do want to have a guess how many buttons they have stuffed on it? Wrong – its 17. The thing is Naga is not covered randomly with them, on left side it has a full 12 piece numeric keyboard which is there to help with gaming so you don’t have to roam all around the actual keyboard and keep the left hand exclusively on movement controls.

Behind the new design we find a familiar 5600dpi engine with 1ms response time. Enough for MMO games really, but in addition to Naga, Razer offers Add On software which allows Naga users to create unlimited number of profiles all with unique commands and key presets. And, finally, to sum up gaming enthusiasm, Razer also offers a Megasoma gaming mouse mat. This will suit optical and laser units for 49.99 USD. Razer Naga for size runs up to 79.99 USD. Well, who said MMO gaming is cheap?

T-Mobile Pulse is set for October with 257 EUR on the tag

Remember the Huawei U8220? Do you like the idea to bring it to Europe as a T-Mobile Pulse? If so, you then will be pleased to hear some recently appeared details on that. First, we have a new picture of it differs from the old, especially the bottom console keys, they are now placed vertically and the overall shape is smoothed out. In addition, the color scheme is also different. I liked the old one better I should say, but anyway, T-Mobile Pulse, as it was recently presented at a Dutch e-store preorder list, sports a cool black and white body. Price at the same place is 257 EUR. Specs after the jump.

So, here's what we have on T-Mobile Pulse:


* Touch sensitive 320 x 480 3.5 inch display

* 3.2 megapixel camera

* HSDPA 7.2 Mbps, HSUPA 5.76 Mbps

* Wi-Fi, GPS, Bluetooth 2.0
* MicroSD slot



T-Mobile Pulse will arrive in Europe in October with Android locked to T-Mobile network. There is a sense in the air that this is not the final information.

Thursday, August 20, 2009

Aegis Padlock hard drive secures your data with encryption and keypad

Last week we heard about the USB Flash Drive Lock which attached to any USB drive effectively locking your data away. Now we have the Aegis Padlock which adds encryption and a keypad to the mix.
padlock
The Padlock has a 12-digit keypad as standard on the front of the drive. Up to ten users can be setup with their own pass code and all data stored on it can use either 128 or 256-bit encryption. Better yet, no software is required to use the drive which comes in 250GB, 320GB, or 500GB capacities, has a built-in USB cable making that one less thing to carry, and has a 16-point omni-directional shock mounting system for protection.

The drive is compatible with Windows, Mac, and Linux, and easily fits in your pocket or bag measuring only 19mm X 84.5mm X 120mm and weighing just 5.5oz. The padlock is powered over USB and is supplied with a Y-auxillary power cable for this purpose. Pricing ranges for $99 to $159 depending on the storage size and encryption you choose.

Tuesday, August 18, 2009

Lock Windows softwares from unauthorized access

If you are the administrator of a network of computers , probably you would need a software to lock unauthorized access to your softwares. So here is a software that can disable access to specified .exe files in a Windows based PC.


This software ,Applocker can be used in Network and local computers . If it is used in networks , we need to have it installed only on the administrator's PC . Its executable file can be copied to a shared folder in the network ,to be used by other systems.

lock Windows softwares

Here there is some applications that are shown by default . If you want ,you can add more softwares to the list . Whenever any user clicks a locked software , it will give the following error message.



lock softwares



Download Applocker :Freeware ( 1MB) to lock Windows softwares from unauthorized access .

Monday, August 10, 2009

Squad Positioning System for Firefighters

I just saw an episode of Rescue Me last week where one of the firefighters was trapped, and the rest of the dysfunctional characters didn’t know where he was. Just watch the show on Hulu if you don’t know what I’m talking about.

Perhaps Dennis Leary and his comrades should use the Squad, a compact indoor position system that enables firefighters to know their location, as well as the location of their partners. This concept gadget, designed by a University of New South Wales student Roy Hareguina, uses a sonar sensor to provide a map of the surrounding area, instead of a GPS.

Sonar might not be the ideal tool for this type of work, but firefighters cannot depend on blueprints when ceilings have caved in or when weak floors give out. Sometimes all a fireman needs to know is the location of someone who needs rescuing, and let the axe do the rest.

The Squad units are set up to “take the heat”, having a melting point of 662° Fahrenheit (343°C). It is made of polyetheretheretone (PEEK) with a tough aluminum and zinc frame, and coated with fluorosilicone for impact protection and waterproofing. You may notice that buttons are large, but this is because it is meant to be used by firemen wearing thick gloves.

So far, the Squad is only a concept, but I could easily see firemen of the future wearing one on their arm.

Thursday, August 6, 2009

How To Speed Up PC

Are you sick and tired of slow PC performance? Do you wish your computer run like it did when you first bought it? Since your computer is like any other machine, it needs maintenance to stay in top health. To speed up your computer ,you should use Perfect Optimizer. It is an registry cleaner that offers users a chance to restore their PCs to optimal performance. The Perfect Optimizer constitutes the industry’s leading error scan and repair technology blended with easy-to-use interface that makes the process of cleaning your registry both elegant and efficient. It can detect the corrupt paths, redundant entries, invalid file shortcuts and more that make your computer run slowly or display error messages. With Perfect Optimizer you can restore your computer to like-new condition, all with a simple click of the mouse.

Download Perfect Optimizer


3)Security - safeguards against bad ActiveX, worms, ad-popup, spyware and viruses. Eliminate malicious threats on contact using the real time scanning capabilities. You can also encrypt file, folder and disk; and block programs and malicious websites to protect your personal information like bank accounts, passwords and credit card numbers.

4)Repair Tools- Optimize your system, clean and repair windows registry, fix PC crashes and error messages, restore IE default settings

5)Speedup - include memory speedup, startup speedup, system speedup and internet speedup. These tools allow you to make your Windows computer faster, more efficient and more secure; and optimize your internet speed up to 150% by changing the reservable bandwidth limit while boosting your RAM memory.

6)Restore - Perform a full backup of your system files, registry, favorite websites, driver at any time you wish. If you encounter a system problem, backup and restore tools in Perfect Optimizer make it easier for you to keep your data safe from user error, hardware failure, and other problems.

Unfortunately Perfect Optimizer isn’t free, here you can buy it: BUY PERFECT OPTIMIZER
I recommend the following PC Optimizer to improve the speed and performance, it can make your PC faster

Cannot delete file

You probably sometimes try delete file and suddenly appear message like this:cannot delete file, access is denied, the source or destination file may be in use and etc. Don´t worry, in this tutorial we will see few methods that can help.

For example , you have file problems.exe and you cannot delete that file. Lets say that directory path for problem.exe is c:\folder\problems.exe . Open Notepad and write del /F “c:\folder\problems.exe” and save file like killfile.bat on C:

delete file

Then go to Control Panel -> Sheduled Tasks -> Ad Sheduled task
When scheduled task wizard appear click Next
task wizard

Then click Browse and choose killfile.bat
task wizard

Choose When my computer starts and click Next

Enter username and password, Next

Click Finish and Restart Computer .After this file will be deleted.

Other solution for this problem is Unlocker It is simple and useful applications , that will help to get rid of error message like Error deleting file or folder, cannot delete folder…

Rename Recycle Bin

Have you ever wondered whether it is possible to rename Recycle Bin? Of course it´s possible and in just a few steps you can do it too.Here is step by step tutorial for renaming recycle bin .

1. Click Start button then Run , Start->Run

2. In run option type regedit

3. HKEY_CLASSES_ROOT->CLSID->{645FF040-5081-101B-9F08-00AA002F954E}->ShellFolder ,you must in ShellFolder change the data value from “40 01 00 20” to “70 01 00 20“, after restart your computer ,will have the possibility to rename Recycle Bin, follow the image below



When working in the Registry Editor, be very careful, because any error can cause problems in the functioning of the operating system!!!

Top 10 Windows Applications

There are so many Windows applications in the world. Wouldn’t you like to know a top ten list of some? Well, then you’ve come to the right place. I will give you an excellent list of applications, that are a must have!

1. CCleaner - crap cleaner

Top 10 Windows Applications

Download

2. Desktoptopia - wallpaper switcher

Top 10 Windows Applications

Download

3. Audacity-free audio editor

Top 10 Windows Applications

Download

4. Update Checker - updates your installed software

Top 10 Windows Applications

Download

5. Launchy - application launcher

Top 10 Windows Applications

Download

6. VLC - media player

Top 10 Windows Applications

Download

7. Picasa- photo viewer and editor

Top 10 Windows Applications

Download

8. Bubbles - site specific browser

Top 10 Windows Applications

Download

9. VirtualBox - free open source virtual machine

Top 10 Windows Applications

Download



10. YouTube Downloader - download YouTube videos for free

Top 10 Windows Applications

Download

I hope that you find these applications very useful. I know I do.

How To Recover Deleted Files

If you have lost important files from your harddrive and if you are sure that they have been deleted, don’t panic! Uneraser is simple software that can help. In this tutorial, we will see how Uneraser works. On this link you can download Uneraser.

For example, I delete move file on Local Disk (E:) , how to recover movie file?. It is simple

1. Run Uneraser , then select wizard , as shown below

2. When the wizard appears select “Do a lost files scan”, then click Next , as shown below

3. Select partition , where is deleted data, then click Next

4. Uneraser find my deleted movie

5. Now, just save your recover files, as shown below