This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, June 22, 2013

MAD CATZ S.T.R.I.K.E 7 Keyboard

Create Your Perfect Gaming Interface

When a fraction of a second is all that divides victory from defeat, you must be in absolute harmony with your gaming setup. Every command and key location must be committed to muscle memory as there's no time to look away from the screen. Enter the S.T.R.I.K.E. 7 from Mad Catz, the perfect keyboard with which to construct your ideal gaming environment. Whether your game of choice is an RPG, FPS, MMO, RTS, MOBA or any other genre, you can now customize your keyboard's physical arrangement to meet your needs.
Boasting a robust, full metal chassis which is much stronger than most gaming keyboards, the modular design gives you the freedom to interlock only the components which matter most to you and your gaming style. Replete with a specially engineered membrane which mimics the tactile feel generated by the mechanical keys often preferred by gamers - - without the resultant excessive noise - - the S.T.R.I.K.E. 7 Gaming Keyboard provides a distinct competitive edge.



Fully Modular for Unparalleled Customization

Borrowing modifiable technology from the world's most adjustable mouse - - the award-winning R.A.T. - - the S.T.R.I.K.E. 7 Gaming Keyboard's unique design provides unprecedented customization options to enhance overall comfort. Armed with total control of your keyboard's fit, size, color, sound, and programming, you can finally play your favorite games exactly as intended: How you like to play them!

5 Separate Hardware Modules


Strike71. Control Module with V.E.N.O.M. TFT-LCD Touchscreen
Easily navigate the keyboard's many functions with the Control Module's intuitive V.E.N.O.M. touchscreen. Program advanced macros, adjust backlighting, and take in-game control of external functions - - balance game and chat volumes, launch apps and websites, even initiate and control TeamSpeak - - all with a few simple finger taps.
Strike72. Main Keyboard
Thanks to a much smaller footprint than run-of-the-mill keyboards, the main keyboard gives your mouse plenty of extra space for large, sweeping movements. Replacement, interchangeable WASD and cursor keys adapt to your gaming style by giving you the choice of standard, contoured or rubber-edged versions. Full RGB backlighting - - with 16 million color variants - - matches the keyboard to your gaming rig and the keys' laser-etched, lacquered light guides are ideal for gaming in dim environments.
Strike73. Function Strip
Adding four programmable macro buttons to the mix, the removable Function Strip brings the total to 24. Including the V.E.N.O.M. touchscreen, the S.T.R.I.K.E. 7 Gaming Keyboard incorporates 24 programmable macro buttons over three modes to create 72 user-definable commands.
4. NumPad
Just like the Control Module, the NumPad is capable of loose or fix-mounted positioning. The custom connection scheme makes it all possible, and the included set of longer wires bolsters your arrangement options.
5. 3-Part Active Palm Rest and Two Wrist Rests
A height-adjustable, active palm-rest houses both a thumb wheel and an action button for even more controls at your fingertips. Both wrist rests utilize a rugged 5-pin connector to attach to the main keyboard module and NumPad, effectively enhancing your comfort during stints of extended gaming.




Strike7

Uncomplicated Macro Programming

An intuitive graphical interface vastly simplifies the formerly tedious task of macro programming. Assign single or multiple keystrokes, complete with custom timings, to macro keys or interface icons and then easily fine-tune your settings. This ability is essential for fast-paced games which require clear but complex multi-key actions.
Each of the keyboard's three different modes can store your programmed macros; you need only switch to a different mode mid-game to triple your available commands. Once programmed, custom profiles can be published to share with your community and saved for later recall, allowing for a seamless transition to another gaming PC.

Visit:http://www.madcatz.com/strike7/

Monday, June 17, 2013

Windows Hidden Godmode Folder

Windows hidden "god mode" folder Windows offers a centralized Control Panel for all of the OS settings, which makes it easy for users to tweak everything from desktop background to setting up a VPN.

To enter this mode, create a new folder with this exact name

 (copy and paste it):
 God Mode.{ED7BA470-8E54-465E-825C-99712043E01C}

The folder icon will change to a Control Panel-style icon, and you will be able to jump in and change all kinds of settings.  

Note: Don't try this on Windows Vista 64-bit as it's known to cause a reboot loop.




Works with new Windows 10







-blogmytuts


In the wake of PRISM, should we give up on online privacy?

Snowden came forward  and identified himself as the leaker of the NSA's massive surveillance operation
 


Depending who you ask, the scandal over PRISM, the NSA's secret data mining program, is either mere confirmation of what we already knew, or a shocking revelation that should drive people onto the streets in protest. It's certainly true that many people suspected internet services, such as Google and Facebook, were open houses to government agents, but there's a difference between suspicions and hard evidence.
Now we know the US government doesn't need to enact legislation such as CISPA in order to ride roughshod over civil liberties, it really does beg the question: Is online privacy a lost cause and is online anonymity impossible to achieve? Well, if you ask me, there's good reason to be cynical over the concept of online privacy, but with a few key tools tools and best practices, we can still reclaim a private space on the internet and surf – almost – anonymously.



Email and social

If you want to take privacy seriously then you'll have to make sacrifices -there's no way around it. This means many of the most convenient online services, such as web-based email and social networks, need to be purged from your online life. While this distrust of major providers such as Gmail, Yahoo and Microsoft could extend to all email providers, you could argue that smaller companies, which are not behemoths heavily reliant on government lobbying and co-operation, could offer better privacy protection.
Following this reasoning, privacy-orientated email services such as RiseUp, could be good alternatives if you really want to use web-based email. But ideally you should avoid using web-based services and only store your mail locally (or even rent your own Virtual Private Server). You can use encryption tools such as GPG/PGP to protect your data (though whoever your emailing will need to use the same encryption), web-based tools like Sendinc (though you're trusting a third party again) and encrypted versions of POP or IMAP. Just remember, if you email someone with a Gmail or Yahoo account you're back to square one.
You could also ditch Google and Bing, and start using a more privacy-oriented search engine like DuckDuckGo. But as long as your IP is obscured (which we'll get onto later), you can still use Google privately if you employ a cookie blocker like Ghostery and don't log into your account.
When it comes to social networks it's interesting that Twitter was not on the PRISM's list of compromised companies – especially since Twitter has a track record of defending users.

VPNs and TOR

If you want to browse the web anonymously then the most common, secure, and easy-to-use tools, are The Onion Router (TOR) and commercial VPN services (I2P is also worth looking into for peer-to-peer sharing). But VPN services and TOR both bring different problems to the table.
TOR is generally a very effective tool to keep your IP address private and hidden from surveillance. It's also free and used successfully by journalists, dissidents and privacy-conscious citizens. But it does have vulnerabilities. The most obvious being the ability to passively monitor the connection of both a sender and receiver of data over the TOR network and therefore correlate traffic. This is doable because anyone can run a TOR exit node.
The other vulnerability is the so-called 'bad apple' attack, which involves injecting traffic to trigger an insecure UDP connection, which in turn can reveal an IP address.
Commercial VPN services don't suffer from these vulnerabilities, but they do suffer from potentially much worse flaws. The problem with VPN services – providing they use a secure standard like OpenVPN – is that you have to trust the company providing your service. A cursory look at many VPN privacy policies will reveal that such trust is easily misplaced - policies often either explicitly state they log data in the same way as an ISP, or they’re so vague that you don't know either way.
There are some good resources to get around this problem such as TorrentFreak's round-up of VPNs that don't log data and my own company's ongoing guide on understanding VPN privacy policies. Of course, a good way of mitigating the vulnerabilities of TOR and VPN services is to combine both services to achieve security in depth.


Source:http://www.techspot.com/news/52900-in-the-wake-of-prism-should-we-give-up-on-online-privacy.html