Search Box

Loading
Freelance Jobs

Friday, August 26, 2011

Location Sharing For Iphone Users....Amazing Iphone Application

 
 
Announcing that. Gani Software Pty Ltd., the developers of Koko, has released their latest product for iPhone users. Koko is a new launch, an application that makes it super easy for users to share their location, in an SMS or map, with any internet capable phone. The app is ready to use as is, without the hassle of sign ups, logins, feature unlocking, configuration or installation for recipients and lets users know who their incoming location messages are from. Currently, Gani Software is offering Koko free of charge.

Gani Software is proud to announce the launch of their latest application, called Koko. The word Koko means “Here” in Japanese, making it the perfect name for a location sharing app.Koko offers users a unique experience, where they are able to share locations via SMS or a map, with anyone who has an internet browser on their phone. Users are free to specify a location themselves or let the GPS automatically get a fix on their position. A map message can then be sent to others with merely a press of the ‘Send’ button.

All transmissions in Koko are selective, with nothing being shared until the user actually sends a location message and then, it is only revealed to the specified recipients. All incoming messages are identified on the screen, so a user can tell in a glance who has shared their location with them.

This is a completely hassle-free application. Once a user has installed Koko on their devices, the user does not have to sign up, log in, unlock features, or configure anything to start using Koko. It’s ready to go, once on the sender’s device. Users merely…use it.
 

Thursday, August 25, 2011

Camcorder Pen: Spy pen with style

 
Riding the crime wave, we have seen justice being served by our silver screens greatest spy knowingly identified as James bond with his latest gadgets and technology splashing all over the silver screen. Anybody gets tempted with the amazing gadgets that we see in the movies. It is proved that technology now embraces all parts of our lives and entwined with every work and influences every decision you make. Being a part of geekiegadgets.com, you will always receive not only the latest but the things that you expected not to be existed. You might be excited with another piece of spy gadgets for your hidden and secret venture. Take a close look around this Camcorder Pen that records anything you want without being noticed or getting caught.
 
Grooving with cool looking stylish pen that sits in your pocket like a normal pen does but the hidden function is unknown to everyone. It is small and can be used at anytime, anywhere when you want to catch someone doing something in front of you. Unlike other spy pen, this Camcorder pen comes with new and improved CMOS sensor for better function. This pen captures the video in MPEG4 –AVI format with sound at range of 10 meters by the built in microphone.


Okay, the space that this pen holds is 1 GB that is well enough to capture up to 3 hours of videos. More interestingly the focus range of this spy cam is from 150 mm to infinity, capturing at rate of 15 fps with 352×288 resolutions videos plus 128 kbps PCM audio. The buffering technology helps to record and encode the videos on the fly in mpeg4 format. The unit can be charged via USB output as it includes internal batteries. Doesn’t this sound so simple, when you have a pen that writes in style and captures everything around you secretly? Now, again you can venture your secret adventure of your own. Make sure it is fully charged and don’t lose it.
 

Saturday, August 6, 2011

Adds On Elevators and Escalators Wallpapers

 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
 Adds On Elevators and Escalators Wallpaper
Adds On Elevators and Escalators Wallpaper

Thursday, July 14, 2011

Google Earth For iphone

When you are dealing with the iPhone, I can tell you that the possibilities for this phone are endless.  No matter where you are or what you are doing, all you ever need is the iPhone.A good News for Iphone user that now it is possible to use Google Earth version 2.0  in your iphone.This version of Google Earth is actually completely different from the original version – there are a ton of things to do!

For example, with the Google Earth Version 2.0, you can customize maps that are created either by your or by someone else via the My Maps interface.  You can also touch an icon and a small glow will appear under your finger to let you know exactly what icon you have picked.
The Google Earth Version 2.0 is also available in 31 different languages.  Best of all – it’s free!

Wednesday, July 13, 2011

How to save your Laptop from being theft

A thief can snatch an unattended laptop from a desk and walk away in a matter of seconds. And a thief who has your laptop may have access to your files and personal information. A notebook lock won’t prevent someone from cutting the cable, but it can deter crimes of opportunity.
 Using a laptop lock is an uncomplicated way to avoid having your hardware stolen–and it can keep your data from falling into the wrong hands.Kensington is probably best-known for its notebook locks; it offers an array of locks for laptops and desktops. Targus is a second vendor that specializes in laptop security gear, including one lock that sounds an alarm when someone tries to pick up the attached laptop or cut the lock cable.

Prying eyes are a common security hazard. To prevent unauthorized viewing of your data when you step away from your desk, always lock your screen before leaving your PC unattended. To do this, simply hold down the Windows key and type the letter L. This will bring up the lock screen. To get back to work, press Ctrl-Alt-Delete, and enter your login password at the prompt.
 A simple laptop lock can suffice to discourage an opportunistic thief. But don’t leave the keys next to the machine.Another way to shield your screen is to install a privacy filter over the display. These filters fit directly on a monitor so other people can’t peer over your shoulder and see what’s on the screen. A privacy filter may be particularly useful if you work in an “open” office that lacks cubicle walls. Various companies sell these filters, including Targus, 3M, and Fellowes.

Sunday, June 19, 2011

Diamond iPad For 1.2 Million Dollars

If you have an extra $ 1.2 million, but no iPad yet, you can quickly get a trendy gadget by purchasing the most expensive models of the iPad.
 The price of this iPad due to the fact that it is literally made of gold – the device is decorated with 18 carat gold and 300 carats of diamonds, and the Apple logo on the rear panel and the «Home» button encrusted with black diamonds.

Saturday, May 28, 2011

Hackers breached US defense contractors

Unknown hackers have broken into the security networks of Lockheed Martin Corp (LMT.N) and several other U.S. military contractors, a source with direct knowledge of the attacks told Reuters.



They breached security systems designed to keep out intruders by creating duplicates to "SecurID" electronic keys from EMC Corp's (EMC.N) RSA security division, said the person who was not authorized to publicly discuss the matter.

It was not immediately clear what kind of data, if any, was stolen by the hackers. But the networks of Lockheed and other military contractors contain sensitive data on future weapons systems as well as military technology currently used in battles in Iraq and Afghanistan.

Weapons makers are the latest companies to be breached through sophisticated attacks that have pierced the defenses of huge corporations including Sony (SNE.N), Google Inc (GOOG.O) and EMC Corp (EMC.N). Security experts say that it is virtually impossible for any company or government agency to build a security network that hackers will be unable to penetrate.

The Pentagon, which has about 85,000 military personnel and civilians working on cybersecurity issues worldwide, said it also uses a limited number of the RSA electronic security keys, but declined to say how many for security reasons.

The hackers learned how to copy the security keys with data stolen from RSA during a sophisticated attack that EMC disclosed in March, according to the source.

EMC declined to comment on the matter, as did executives at major defense contractors.

Rick Moy, president of NSS Labs, an information security company, said the original attack on RSA was likely targeted at its customers, including military, financial, governmental and other organizations with critical intellectual property.

He said the initial RSA attack was followed by malware and phishing campaigns seeking specific data that would link tokens to end-users, which meant the current attacks may have been carried out by the same hackers.

"Given the military targets, and that millions of compromised keys are in circulation, this is not over," he said.

Lockheed, which employs 126,000 people worldwide and had $45.8 billion in revenue last year, said it does not discuss specific threats or responses as a matter of principle, but regularly took actions to counter threats and ensure security.

"We have policies and procedures in place to mitigate the cyber threats to our business, and we remain confident in the integrity of our robust, multi-layered information systems security," said Lockheed spokesman Jeffery Adams.

Executives at General Dynamics Corp (GD.N),, Boeing Co (BA.N), Northrop Grumman Corp (NOC.N), Raytheon Co (RTN.N) and other defense companies declined to comment on any security breaches linked to the RSA products.

"We do not comment on whether or not Northrop Grumman is or has been a target for cyber intrusions," said Northrop spokesman Randy Belote.

ACTIONS PREVENTED WIDESPREAD DISRUPTION

Raytheon spokesman Jonathan Kasle said his company took immediate companywide actions in March when incident information was initially provided to RSA customers.

"As a result of these actions, we prevented a widespread disruption of our network," he said.

Boeing spokesman Todd Kelley said his company had a "wide range" of systems in place to detect and prevent intrusions of its networks. "We have a robust computing security team that constantly monitors our network," he said.

Defense contractors' networks contain sensitive data on sophisticated weapons systems, but all classified information is kept on separate, closed networks managed by the U.S. government, said a former senior defense official, who was not authorized to speak on the record.

SecurIDs are widely used electronic keys to computer systems that work using a two-pronged approach to confirming the identity of the person trying to access a computer system. They are designed to thwart hackers who might use key-logging viruses to capture passwords by constantly generating new passwords to enter the system.

The SecurID generates new strings of digits on a minute-by-minute basis that the user must enter along with a secret PIN (personal identification number) before they can access the network. If the user fails to enter the string before it expires, then access is denied.

RSA and other companies have produced a total of about 250 million security tokens, although it is not clear how many are in use worldwide at present, said the former defense official.
The devices provided additional security at a lower cost than biometrics such as fingerprint readers or iris scanning machines, said the official, noting that the RSA incident could increase demand for greater use of biometric devices.
The RSA breach did raise concerns about any security tokens that had been compromised, and EMC now faced tough questions about whether "they can repair that product line or whether they need to ditch it and start over again," he said.

EMC disclosed in March that hackers had broken into its network and stolen some information related to its SecurIDs. It said the information could potentially be used to reduce the effectiveness of those devices in securing customer networks.

EMC said it worked with the Department of Homeland Security to publish a note on the March attack, providing Web addresses to help firms identify where the attack might have come from.