November 2008

This flame you CAN hold, without burning your skin off. Learn to make fireballs you can hold in your hand. This amazing video tutorial shows you how to do it. All you'll need for this little science experiment or fiery weapon is 100% cotton cloth, scissors, lighter fuel, cotton string, and a needle. Be careful to follow the directions in this how-to video carefully otherwise you'll really be playing with fire.

Your rating: None Average: 3 (3 votes)

Learn how to make an automatic bug killing machine. This works great and is really simple to make in just a few minutes! Those bugs will never bother you again.

Your rating: None Average: 2 (1 vote)

Want to capture the surround sound experience in a pair of headphones?Here's how you can modify an ordinary pair of headphones to play back sound in 5.1 quality.

Your rating: None Average: 2 (3 votes)

Glass break sensors or Audi Discriminators have been around for a number of years. The technology has advanced in recent years and there are now a number of different versions available. The basic concept of a glass break sensor is to detect and sound an alarm if there is a sound of breaking glass. The original concept was based around a single technology which only picked up on the sound of breaking glass, however today there are now dual frequency devices which will not only pickup on the sound of breaking glass but also on the splintering of wood. Most of the glass break sensors today will use the dual frequency technology.

The technology works by listening at the frequency that glass breaks and if this sound is detected then the alarm is activated. There are some points that need to be made clear before you decide on this form of security, firstly the technology does not work through walls, ceilings or doors. With this in mind you would need to have a sensor in each of the rooms where you have glass windows or doors. This can be a costly exercise to have sensors in all of these places and you may not wish to have this many around the house in every room.
Read more..
Your rating: None Average: 1 (1 vote)

The Zone Trusted Information Channel (ZTIC) plugs into the USB port of any computer and creates a direct, secure channel to a bank's online transaction server, bypassing the PC which could be infected by malicious software (malware) or susceptible to hacker attacks.

The consumer can use the security stick to logon and validate all transactions via a display, while the USB device is securely connected to the server, safeguarding against today's ever more fiendish forms of attacks that can manipulate data in the background, hidden from the consumer and the bank. The USB device adds an extra level of security to the existing authentication solutions provided by smart card, PIN or one-time validation code, in order to counter the newest and most highly manipulative security threats.

Hackers are becoming increasingly inventive in their attempts to attack financial transactions on the Internet. Among the increasingly prominent threats are so called "Man-In-The-Middle" attacks, where a hacker inconspicuously intercepts and modifies the messages flowing
between a user and a financial institution. The modified messages appear to be official transactions from the financial institution, and the messages going to the financial institution appear to be from the consumer.
Read more..
Your rating: None Average: 2 (1 vote)



Sponsered links

Bookmark Us!


Page Rank


The power of imagination makes us infinite.

Explore Tags

Follow Us