Posts about geeky (old posts, page 1)

Microsoft Tablet Revealed

Courier is a real device, and we've heard that it's in the "late prototype" stage of development. It's not a tablet, it's a booklet. The dual 7-inch (or so) screens are multitouch, and designed for writing, flicking and drawing with a stylus, in addition to fingers. They're connected by a hinge that holds a single iPhone-esque home button. Statuses, like wireless signal and battery life, are displayed along the rim of one of the screens. On the back cover is a camera, and it might charge through an inductive pad, like the Palm Touchstone charging dock for Pre.


How a CPU is made

Ever wondered how a chip is made? These amazing high-res images from Intel show the process step-by-step.

How a CPU is made

Superhacker Max Butler Pleads Guilty

A skilled San Francisco-based computer hacker who once sought to unite the cyber underworld under his benign rule pleaded guilty to federal wire fraud charges here Monday, admitting he stole nearly 2 million credit card numbers from banks, businesses and other hackers, which were used to rack up $86 million in fraudulent charges.


Kopin Golden-i wearable computer

Kopin have come up with a head-mounted "virtual 15-inch display" to show off their new CyberDisplay micro-panel, a 0.6-inch screen capable of 800 x 600 resolution. The Kopin Golden-i concept - which they've given Motorola branding - integrates the CyberDisplay into a swing-down boom arm, linked to a hefty Bluetooth headset running Windows CE 6.0 R2 and supporting voice-recognition.


The Gear of War

Over at Boing Boing Gadgets, Joel put together a magnificent gallery of the "Gear of War.



VisualWget

VisualWget is a download manager that use Wget as a core retriever to retrieve files from the web. You can think of VisualWget as a GUI front-end for Wget that give you all of Wget functionalities (e.g. download resuming, recursive download) plus little management features such as download queue (prioritizing), speed limit and scheduler.


Twitter porn name game sets off alarms

Hysteria and paranoia ensued as security agencies began to suspect the trend was a massive phishing expedition, with hackers ready with rod and reels in tow to collect details that could be used in identity theft.So-called "secret" questions like "what was the name of your first pet?" and "what is your mother's maiden name?" are often used by websites to let users recover their passwords if they have forgotten them.


Researchers Hijack Botnet

The Torpig botnet was hijacked by the good guys for ten days earlier this year before its controllers issued an update and took the botnet back. During that time, however, researchers were able to gain a glimpse into the kind of information the botnet gathers as well as the behavior of Internet users who are prone to malware infections.


Needle in a haystack: storing billions of photos

The Photos application is one of Facebook's most popular features. Up to date, users have uploaded over 15 billion photos which makes Facebook the biggest photo sharing website. For each uploaded photo, Facebook generates and stores four images of different sizes, which translates to a total of 60 billion images and 1.5PB of storage.