-
Cyber-criminals Use P2P Tools for Identity Theft, Security Analyst Warns
Security experts warned that cyber-criminals use P2P or Peer-to-Peer tools for Identity Theft. Tools like Kazaa, Grokster, Gnutella, LimeWire, WinMX, BearShare, and a lot more other P2P Networks out there.Schmidt, a co-architect of the nat…
-
Hexagon.cc Combines BitTorrent and Social-Networking
BitTorrent is dominantly known as a medium for piracy or illegal downloads, but the technology itself is perfectly legal. For example, Blizzard Entertainment the developers of the massive hit online game World of Warcraft use BT as their official downlo…
-
Multi-Touch Screen
The first Multi-Touch Screen in the world. Watch it.. and believe it.Something familiar? Do I read someone thinking Minority Report? All we need now are people with Premonition and Deja Vu.(Source: Multi-Touch Screen Demo at TED 2007)
-
ProfileLinker – Your Solution to Multiple Social-Network Profiles
Many of us have countless of Social-Network memberships, it all started when Friendster, MySpace, EveryonesConnected, all started to pop out-of-nowhere, with all our friends, relatives and even bosses started inviting us – it’s a race to whoever gets the…