background preloader

Open source electronic projects

Open source electronic projects

Multiwii.org | Howtos, build logs and FPV flights video Community 6 Core Principles to Tap the Power of Social Community Participation Gartner reports that many business and IT leaders fail at utilizing social media effectively because they do not understand mass collaboration. Many businesses use a “provide and pray” approach, expecting online community participation to just happen. It’s just one of the reasons why communities fail. What happens instead is that users have an initial interest and then lose that interest as they discover that the platform is too difficult to use collaboratively. Applying the six core design principles creates a better social media environment for meaningful collaboration and social community participation, Gartner says. 1. User and community participation is the driving force behind successful mass collaboration. The design becomes driven by this goal instead of making a social outlet where people can easily participate in the conversation and add meaningful content. 2. A purpose must be meaningful, identifiable and clearly defined for the target audience. 3. 4. 5. 6.

Top 10 Android Apps That Turn Your Phone into a Hacking Device 1.SpoofApp SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It's a decent mobile app to help protect your privacy on the phone. 2.Andosid The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. 3.Faceniff Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. 4.Nmap Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a "map" of the network. 5.Anti-Android Network Toolkit zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. 6.SSHDroid SSHDroid is a SSH server implementation for Android. 7.WiFi Analyser Turns your android phone into a Wi-Fi analyser. 8.Network Discovery

Open Design Engine Fork Robotics Kenbay conversion kits Dublin Ireland electric bikes bicycles Welcome to the website of Kenbay Electric Bikes based in Dublin, Ireland. Kenbay Electric Bikes was established in 2006 and our electric bicycles (also known as pedelecs) are available throughout Ireland through our bicycle shops dealers and can also be purchased directly if your part of Ireland isn’t covered yet. Our bikes offer all the benefits of a bicycle with none of the drawbacks. Powered by cheap electricity, hills are no longer an issue, long journeys are now achievable and showering after is a thing of the past. Using one of our bikes you can reduce your commuting costs and cut commuting times, have pollution free transport and power your way to work! Commuting isn’t the only use for our bikes either. Suitable for those who want to keep fit, short distance commuting and active older people, the new range of Kenbay electric bicycles use state of the art longer lasting lightweight batteries (LiFePO4) and light alloy frames. You can view our full range by clicking here

Latest Hacking News Dangerous Prototypes | A new open source hardware project every month bildr Kits - Categories sparkfun.com Shopping Cart 0 items log in register per page SparkFun Inventor's Kit - V3.2 Favorited Favorite 18 Wish List FLiR Dev Kit Favorited Favorite 28 SparkFun Inventor's Kit for MicroView Favorited Favorite 17 SparkFun Mini Inventor's Kit for Redboard Favorited Favorite 2 SparkFun Digital Sandbox Favorited Favorite 4 LilyPad Design Kit SparkFun Sensor Kit SparkFun XBee Wireless Kit mbed Starter Kit Favorited Favorite 0 SparkFun Nintendo DS Screen Kit Favorited Favorite 6 SparkFun RFID Starter Kit Favorited Favorite 5 ProtoSnap - LilyPad E-Sewing Kit SparkFun Simon Says - Through-Hole Soldering Kit Favorited Favorite 1 SparkFun ProtoShield Kit SparkFun WeevilEye - Beginner Soldering Kit SparkFun GPS Shield Kit SparkFun Essential Sensor Kit Chibitronics Circuit Stickers - Starter Kit SparkFun Inventor's Kit for IOIO Frequency Generator Kit - FG085 Favorited Favorite 3 SparkFun Beefcake Relay Control Kit Sylvia's Super Awesome Kit littleBits Base Kit SparkFun Decade Resistance Box Circuit Scribe Lite Kit Firefly Jar Kit

How to Anonymize Everything You Do Online | Threat Level One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It’s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane. But it’s also possible to go a step closer toward true privacy online. Mere encryption hides the content of messages, but not who’s communicating. Though it’s hardly the sole means of achieving online anonymity, the software known as Tor has become the most vouchsafed and developer-friendly method for using the Internet incognito. Some users are even experimenting with using Tor in almost all their communications. Here’s how you can use the growing array of anonymity tools to protect more of your life online. Web Browsing After about a week, he says, the switch was hardly noticeable. Email Encrypting messages with webmail can be tough, however.

The Unfinished Project Cours et Montages Électronique - Site Électrique

Related: