Posts about geeky (old posts, page 1)

Microsoft Tablet Revealed

Courier is a real device, and we've heard that it's in the "late prototype" stage of development. It's not a tablet, it's a booklet. The dual 7-inch (or so) screens are multitouch, and designed for writing, flicking and drawing with a stylus, in addition to fingers. They're connected by a hinge that holds a single iPhone-esque home button. Statuses, like wireless signal and battery life, are displayed along the rim of one of the screens. On the back cover is a camera, and it might charge through an inductive pad, like the Palm Touchstone charging dock for Pre.

Kopin Golden-i wearable computer

Kopin have come up with a head-mounted "virtual 15-inch display" to show off their new CyberDisplay micro-panel, a 0.6-inch screen capable of 800 x 600 resolution. The Kopin Golden-i concept - which they've given Motorola branding - integrates the CyberDisplay into a swing-down boom arm, linked to a hefty Bluetooth headset running Windows CE 6.0 R2 and supporting voice-recognition.

VisualWget

VisualWget is a download manager that use Wget as a core retriever to retrieve files from the web. You can think of VisualWget as a GUI front-end for Wget that give you all of Wget functionalities (e.g. download resuming, recursive download) plus little management features such as download queue (prioritizing), speed limit and scheduler.

Twitter porn name game sets off alarms

Hysteria and paranoia ensued as security agencies began to suspect the trend was a massive phishing expedition, with hackers ready with rod and reels in tow to collect details that could be used in identity theft.So-called "secret" questions like "what was the name of your first pet?" and "what is your mother's maiden name?" are often used by websites to let users recover their passwords if they have forgotten them.

Researchers Hijack Botnet

The Torpig botnet was hijacked by the good guys for ten days earlier this year before its controllers issued an update and took the botnet back. During that time, however, researchers were able to gain a glimpse into the kind of information the botnet gathers as well as the behavior of Internet users who are prone to malware infections.