Incredible iPhone Pranks

November 28th, 2011

WebApp iPhone Trick

Drink beer on your iPhone. And coffee, cola, water, milk…
“Best iPhone app” (CNN, TIME & NY Times). This hilarious visual gag behaves like a real pint of beer thanks to the iPhone sensors and our spare time.

“Best iPhone app” (CNN & NY Times)
“Must-have iPhone app” (FORTUNE & TIME)
“Top 10 iPod touch app” (Newsweek)
“iTunes Bestseller Awards” (Apple Charts)

Fake Calls.
Simulate calls with this great application! Have you ever been in the situation where you need the perfect excuse to get out of the room or step out of an annoying conversation? Easy: Open FakeCalls and within seconds or minutes the application will simulate a fake call. (No real calls are made; this is just simulation. Good news is: you are the only one who knows that!). Then answer the call, decline it or just let the phone ring to fake a missed call.

ATTN – IPhone Software Owners – You Are Mobile!

November 27th, 2009

Rich IPhone Software is key to freedom from wires!

The year 2007 ended with the release of a device that is in the process of changing the way we view our communication abilities. Recently I have been promoting some iPhone download services for the many new iPhone users out there. These services offer unlimited downloads for a one time fee. I have received some great feedback regarding the users of these services. However, as with any new technology there are those whom (myself included) need a little extra time to wrap they’re mind around what they are using.

I received an email from a customer who purchased one of these download services asking me if I could help him. It seems that he subscribed to the service but was unable to download any software or music to his new iPhone. After a brief email exchange I asked him if he was actually trying to download from his iPhone or from an external PC. As you might guess he was trying to transfer files from his PC to his iPhone using the download service. I explained that he doesn’t need to use a PC to get software on his iPhone instead, he can simply browse to the download service with his iPhone and start downloading away.Once this was understood everything was working perfectly!

So your asking what’s the point here? The point is with it being 2008 we still are living by a cabled mentality with regards to our communication abilities. Many of us still have landlines in our homes, and most of us grew up with at least one land-line in our home regardless if we had cellphones as well. This will not be the case for the current and upcoming generation. Devices like the iPhone make it possible for us to do whatever we need to do online without wires. Even with Cell phones having Internet capability for full functionality in the past we simply piggybacked our laptops on top of our cellphone Internet connection. With mobile devices like the IPhone we no longer need to do so. In fact, we don’t need any special cables or wires to do so either. By simply opening up the integrated browser on the IPhone we are granted the freedom to browse, download and exchange data without wires!

It stands to reason then that even though we have all these high tech wireless devices coming out on the market that will end the need for us to even have a computer hooked to a telephone line once and for all it will be some time until we can as a society shake from our brains that we actually need wires to communicate. That a mobile device no longer has to be connected to a PC for some of it’s functionality. Blue-tooth is an amazing protocol that has helped to revolutionize the way our gadgets interact. A very good example of what I’m talking about just happened recently:

I was in the process of making a video presentation on my laptop when my microphone headset went out. This is a legacy headset that has a 1/8th microphone jack that simply plugs into the audio input on my laptop. I was frantic as I had this video to make and no sound input. I tried for an hour to fix the microphone by rewiring with no luck. Then after about 2 hours it hit me that I could use my blue-tooth headset as a audio input on my laptop thanks to it’s integrated blue-tooth capability. Now some of you might be going “well duH!” but for me since I haven’t used my blue-tooth devices for my laptop before and only for my cellphone this was something new. But it’s a good example of how ingrained the “wired” concept is in our heads. I wasn’t thinking at the time how I could maybe go out and pick up the latest and greatest wireless microphone. Instead I was thinking about where I could go to get an old legacy microphone that was exactly like the one I had!

So the moral to this story is to start thinking outside the box and how we can further detach ourselves from the wired networks. The more detached we are, the more mobile we are and, the more mobile we are the more free we are! To you and your new year!

How to Backup Your Mac Data With Time Machine

October 2nd, 2009

Mac is a line of personal computers developed by Apple Inc. and the Time Machine is the state-of-the-art-automatic backup built into the Mac’s Operating System. It keeps a copy of any kind of file that has been saved on the Mac including photos, movies, music, documents and everything else. It enables one to ‘go back in time’ and recover anything that he/she has lost or needs, hence the name.

Installing the Time Machine to the Mac is pretty simple. On connecting an external drive, Mac asks the user whether the drive is meant to be for backup and on saying yes, everything else will be taken care of by the Time Machine. After installation, all the back up will be done automatically and the user won’t have to worry about this anymore.

During installation, the software copies the Mac’s entire contents to the backup drive. Without compressing anything, all files are copied as it is. After the initial backup, only periodic backups are done and that too only for files that have been modified since the previous backup. Time Machine also creates links to all the files that are unchanged so that you can see the entire contents of the Mac on any given day.

Like every other backup software, the Time Machine also copies every file on the Mac, but there is something that sets the Time Machine apart from all these other softwares. It not only keeps a spare copy of all the files but also remembers exactly how the Mac looked on a particular day.

By searching on the Time Machine browser for missing files, the user can find long-lost files which you might have lost ages ago, but still need. You can also find the most recent changes by specifying the precise date or you can even do a Spotlight search to locate exactly the file you are looking for. As per the user’s requirement, the Time Machine can restore the entire folder or just the required files. Even the entire computer can be restored using Time Machine, if need be.

By default, a backup of everything is saved by the software, but files can be excluded by going to preferences and changing the Options. Files that are to be skipped can be set here. The user can also delete files whose backup has already been made by selecting the files he/she wishes to delete and then by choosing ‘Delete from all backups’ from the action menu in the Folder toolbar, all unwanted backups are eliminated instantly.

Eventually the program is bound to run out of space, as no matter how large the backup drive is, it will one day be filled. Hence, the software will start deleting the files, oldest first, but before doing so it informs the user. Moreover, before deleting anything, the software copies files that might be required to completely restore the user’s disk for future backups.

For more hints, tips and articles visit Mac Tools.

Are Macs Really More Secure Than PCs?

September 16th, 2009

For years, Apple has claimed that Macs are unassailable to attack, while rebuking Windows as being filled with security holes. Now not only has a Trojan been able to infect Macs and create a botnet, but many famous researchers caution that the Mac’s Operating System is more vulnerable than both Windows or Linux.

There has been a lot of media hype recently about the detection of the world’s first Mac botnet. On downloading a pirated copy of iLife, Mac users found that their machines were corrupted by a Trojan which opens a port on the local connection hosts by acting as a back door.

While addressing the Trojan, Apple claimed that the chances of being infected by this virus is negligible. But the very fact of its existence, and a botnet run by it, proves that Apple’s declaration that Macs are impenetrable to attacks is simply false.

Hackers say that they find Macs less secure than their present Windows equivalent. They say the code quality, in terms of security, is superior in Windows. Apple has fallen behind as far as security is concerned in the last several years.  This is largely because the spotlight has been on Window’s OS but not as much on Mac’s.

The general perception that Macs are invulnerable to attacks is fast changing. On the contrary, more people these days assert that Macs are far easier to exploit than Windows. The steps taken by Windows to ensure that it is harder for an exploit to work are not followed by Mac. This makes hacking into Macs so much easier as one does not have to jump hoops and deal with all the anti-exploit measures that can be found in Windows.

The security aspect also has to do more with the operating system than with the target program. Firefox on Mac is very easy to hack into. The underlying OS does not have built-in anti-exploit patches. Firefox on Windows is another matter altogether, rated one of the most secure browsers across all platforms.

There is another simple explanation as to why Macs are easier to hack into than Windows.  Bugs that pop up on all platforms are mostly the same, but it is very difficult to write an application for Windows. Hence, it is equally difficult to write an exploit for Windows, making hacking Macs comparatively easier.

From the start, Mac has had a UNIX foundation. This is why several years ago Mac was more secure than Windows. But the latest kinds of Trojans can override all the UNIX protections and hence the edge that Mac has held over Windows has been nullified and Macs are now inherently less secure than the latest versions of Windows.

There is also the belief that Apple’s polished reputation has little to do with its hardware, but is all because of excellent marketing. It may be that the legend of the Mac’s superior security is more about marketing genius and less about actual facts.

So for those in the Mac community who are still under the impression that the Mac is invincible: Sorry to break it to you but that is a thing of the past.

You can find more great articles, resources and free downloads for the Mac at Macintosh Tools.

Macintosh Tools has the latest articles, resources, software and tools for your Mac.

IPOD, IPhone Hack & The Sony Walkman – A Case Of Isolation?

September 7th, 2009

Slow down with that IPhone Hack your wanting to try out for just a second and let’s look at some history!

With the invention of the Stereobelt in 1972 being the first portable music player it wasn’t until 1979 when Sony brought to the world market the well known “Walkman” line of portable audio products. The price for portable audio is well below the original Sony Walkman price of $1000 putting personal audio in the hands of just about everyone. You can find mp3 players from $10 up to a few hundred dollars. A 8GB Ipod Nano will run you around $180.00 and is a large capacity player including full motion video for most music listeners. This low pricing combined with the excellent mass marketing campaigns of the Ipod from Apple has resulted in a second portable audio revolution. Only now just about everyone has access to a portable audio player.

In the 1980′s I remember maybe 3 or 4 kids in our entire school with Walkmans. The Sony Walkman was considered a rich kids toys and due to the few people that had access to such luxury they were often looked on as inferior and out of place compared to the transistor radios and boom boxes that were popular among group listening. It wasn’t out of the ordinary to be walking down the street and seeing a couple people grooving to a band you loved for you to stop and listen and strike up a conversation around the music you were listening to. Many friendships were sparked up in just this way.

With so many Ipods, Zune’s and other mp3 players in the hands of so many it seems we have dug ourselves into an ear-bud hole so to speak. Every morning I’ll get aboard a bus for work and there will be many people with ear-buds jamming away. Only thing is, I don’t know what they are listening to, and with that lack of knowledge I am unable to enjoy the music with them or, even comment on what they are listening to. Of course some may see such a gesture as butting into someone Else’s business. I see it as self-imposed isolation by the mass public. Yes it’s a great and amazing thing to be able to carry your entire music library with you in your pocket however at what cost?

The rapid evolution of technology in the past 20 years has changed the core fundamentals of how we interact with each other in our daily lives. Once we gathered around street corners on a given Saturday night. Today we order pizza online for home delivery so we can be well nourished while taking our maximum allotted 15 minute break from Word Of Warcraft. Our dependence on high technology for our communication needs is increasing more rapidly than ever. There is an ever growing demand for products which allow us to do more in a given time period. Gone are the days where you just checked your mailbox and answering machines.

There however is a great light at the end of the tunnel! Rapidly evolving social networking technologies are changing the entire landscape of the global Internet. This is best represented by mainstream innovations such as Myspace and Facebook. Socialization is the hottest online trend going. By socializing online actions you can naturally let those that you know what you’ve been up to with no interaction on your part whatsoever. Post a article to your blog, update it to twitter, then facebook, then myspace, then on and on and on. Socialization is viral and we can expect great innovations that will focus on elevating our social isolation out of the darkness and into the world again.

You are free to resume your Iphone Hack in progress!

Understanding the Apple MacBook and Bluetooth Connectivity

August 30th, 2009

You should know whether your MacBook supports Bluetooth connections. However, latest Apple laptops have internal Bluetooth component. If you’re using an earlier Mac laptop without built in Bluetooth, though, you’re certainly out of the Bluetooth loop. Even so, you don’t have to pitch your faithful Mac if it doesn’t yet communicate to other Bluetooth-enabled devices! You can add Bluetooth feature to your Macbook with a widely available USB Bluetooth adapter. A regular Bluetooth adapter sells online for approximately $30.

Your external Bluetooth adapter should have automatic data encryption capability, which can protect your Macbook if there’s a Bluetooth cracker within about thirty to sixty feet of your Macbook. The adaptor may link with up to eight other Bluetooth devices as the same time. (Come to think of it, if there are a lot of people within 60 feet of your MacBook Pro during a LAN party bash, you’ll guess this feature really is important!) You’d expect any modern and high-tech operating systems like Mac OS X should come with basic Bluetooth supports. You’d be right; however Apple goes one step further.

Your Macbook comes with System Preferences and utility software to help you get your Macbook connected with nearby Bluetooth devices.

Choose the System Preferences icon located in the Dock. With the Bluetooth pane, you can

* Create new Bluetooth devices. Just click the ‘Set Up New Device’ to open the Bluetooth Setup Assistant utility, which sets up other Bluetooth devices for connection with Leopard. Read the onscreen instructions to configure a number of common Bluetooth gadgets (including mice, cellphones, keyboards, and printers), or you can also choose Other, Setup Assistant will looks for other Bluetooth devices and adjust the settings so that those devices are ready to party with your MacBook. Be sure that Bluetooth devices are discoverable and in range (available for connection with your Macbook) before you open the Bluetooth Setup Assistant utility. Read your user manual to understand how to set a Bluetooth device as “discoverable”, the device should be about twenty feet away (or less) from your laptop.
* Set up Bluetooth connections. Choose the Advanced button to establish, remove, enable, or disable a Bluetooth connection, using a Bluetooth connection as virtual serial port (for the simple file transfer) or as virtual modem (for bidirectional transfer, including using Internet connection through a Bluetooth cellphone).

You may also specify if a Bluetooth port should be encrypted.

It is recommended that you activate the Show Bluetooth Status located in the Menu Bar check box. Luckily, the Bluetooth menu allows you to conserve power by disabling your Bluetooth feature until you need it. It is quite convenient to toggle your Macbook’s discovery status and also configure a device or send a file. It’s also easy to know which devices are connected to your Macbook.

If you won’t be connected with Bluetooth devices while you are on the road, disactivating a Bluetooth service on a Macbook will help save battery power. There is another handy Bluetooth resource, the Bluetooth File Exchange. You have to launch Bluetooth File Exchange the old-fashioned way; just go to your Utilities folder, inside the Applications folder. It’s quite similar to a traditional file transfer protocol (FTP) application, choose the Bluetooth File Exchange icon to go to the file selection dialog; then browse the file you want to send to a connected Bluetooth device. You can also choose to browse the file in other networked Bluetooth device so that you know what the user of that device is offering.

You may also configure your default settings for file exchange in the Sharing pane, which is located in the System Preferences. Just click the Sharing icon and then choose the Bluetooth Sharing check-box to display the setting parameters. Here you can manage what Leopard does when you get files or PIM (Personal Information Manager) data with Bluetooth File Exchange. For example, with this setting, Leopard can

Ask you for permission to receive a file or Personal Information Manager item

* Accept any files and PIM items without any prompting or restriction
* Keep all incoming items and files to a specified folder
* Restrict file-sharing only for the items and files in the specified folder when other Bluetooth devices browse your MacBook.

It is recommended that you use these default setting in Leopard for file exchange:

* You know when someone’s sending you something.
* Anything you receive will be saved in your Downloads folder.
* If you turn on the File Transfer, you can allow others to see the content of your Public folder.

Even so, feel free to enable, disable, and adjust the setting to your heart’s content.

Buy Used Macbooks online from the Used Macbook Store.

Find Macbook Bluetooth Devices at the Used MacBook store.

How to Reinstall Mac OS

August 20th, 2009

The instructions in this article can be used to reinstall the operating systems of a wide range of MAC systems.

Insert MAC OS X Disc

The first step to reinstalling the operating system of your MAC PC begins with putting in the CD/ DVD with the OS X software into the disk drive. While pressing the [C] button key one has to restart the computer system. Once the computer has started up you will be given the option to “Continue” which you choose for the first two screen pages that appear. After this, the third page displays all the crucial information which is relevant to the installation process. After this information is presented, the subsequent two pages too have to be allowed to go further, which the user does by clicking on the Continue tab. Once this has been done, you will be presented with the Terms of License which you must read through carefully. Post this, if you agree with all the terms and conditions presented therein, you will click on the Agree tab to further the process.

Customize your installation

The next step involves choosing the details regarding the volume and the hard drive that one wishes to configure the OS X on. After deciding upon the volume you can choose to open up the Options tab and choose whether or not you wish to store the previous operating system in the archives. A folder known as Previous System can be used for storing the original operating system and one can also choose to save the old Users as well as the original network configurations.

Follow instructions and wait…

After this one has to let the installation process go on. This step can take a little long as the entire system needs to be configured. One only has to follow the automatic prompts that are provided by the computer system itself. You will be requested to begin a new account where you shall have to fill in a User Name and a Password to correspond with it. It is advisable to choose the “password hint” option to remind you of the same if you forget it at a later stage. The password is crucial to your system as it is required all through the process and even later, when you use the PC on a regular basis. Without this password you will not be able to modify or alter your system settings in any way and you will be unable to add new features or programs at a later stage.

Personalize your MAC

The next step involves choosing the personalization features such as those of selecting the date, the day, the time zone and such. Once such custom settings have been decided the installation process is finished. Now one needs to start the computer again to initiate the newly installed operating system. Upon the start up you might be asked to install a variety of different software. These updates are provided by the operating system to inform you of the different options available to you.

The re-installation process is now complete!

For more Macintosh tools, resources, articles and freebies visit: Macintosh Tools

How to Convert a DVD to an iPod Or PSP

July 4th, 2009

It’s rather complicated for one to become accustomed to all the options available on the web as we speak, regarding the process of converting a video DVD for a playback gadget like an iPod or a PSP. Depending on the model, firmware, format compatibility there are dozens of software programs for such converters that provide, more or less, suitable conversions for the iPod or PSP owner.

The software converter offered by those at 99bytes is an acknowledged piece of software by renowed specialists like Softpedia, in terms of download security and overall standard of ease of use. It does not require complicated steps to be made by the user, as the following described steps will show.

First of all, any user receives five free trial conversions beforehand, so a user gets to test the converter capabilities without needing to purchase the actual converter. After the installation, the video file to be converted has to be opened from the main menu. The 99bytes DVD converter for iPod and PSP offers double compatibility, meaning that a DVD can be converted both for an iPod and a PSP, which saves the user money and time because he or she doesn’t need to look for a different converter for their other gadget, the PSP. This particular software converts any video format into a compatible mp4 one for the iPod, so users don’t have to worry about previous conversions.

Furthermore, the software permits selected conversion, which are conversions of certain parts or chapters of the DVD, so users can save space on their iPod or PSP and watch only those parts of the movie they like best. These are the most basic steps a user has to do in order to convert a DVD for an iPod or a PSP using the 99bytes DVD software converter.

http://www.99bytes.com

Fix Mac Disk Errors

June 21st, 2009

In this article we teach you how to fix MAC disk errors for the Apple Macbook using the operating system OS X10.4.x. If your MAC computer is no longer working as quickly, efficiently or effectively as it used to when you had just purchased it, chances are that there is some malfunctioning of the disks of the computer systems. Such problems are known as disk errors and need to be fixed as soon as possible to prevent further damage and to restore the computer to its optimal condition.

Customers of Apple using the Apple Macbook are provided with a disk known as the Apple Software Restore disk which is to be used for such times where an emergency arises and the disk needs to be cleaned of unwanted applications and kinks need to be smoothened out.

Getting started!

The first step is to place the disk into the disk drive and then choose the ‘restart’ option to begin loading the computer up again. Once the start up process begins again you will be alerted to it by the startup sound. After you hear this sound press the C key down and hold it so until the screen displays the Apple logo. The logo display is in tones of gray.

Once the computer has started up the disk will automatically begin to initiate the OS installation process. Be careful not to begin to reinstall the operating system yourself manually.

You might be presented with the option of choosing another language. To work with English, which is the default language, click on the Next tab.

What next?

A window with the option Utilities will pop up. Click on the window and then choose the Disk Utility button. This will start up the Disk Utility function which will pop up as a new window. Towards the left hand side of the window will be a list of the disks out of which you need to select the one which you wish to heal. For the present time being, you will select the option listing Macintosh HD. There will be a bar running horizontal near the upper end of the window with the option First Aid. It is imperative to select this option as well. At the lower end of the Disk Utility window, towards the right hand side, you will be a tab with the label Repair Disk. To start the repairing process click on this tab.

And lastly…..

This action will initiate a scan in which the system will go through the drive that you have chosen to repair and will check to see if there are any problems in the drive. If the drive is safe and free of problems a message stating the same will be displayed. If there are errors in the drive a window detailing the same will pop up. After reading through the list of problems detected by the scan you only need to click on Repair Disk and the computer will start to fix the problems within the drive on its own.

Disk Software

Another highly recommended option for the Mac is to use some type of disk management and backup software such as Disk Tools. Read the full review of Disk Tools here.

For more Mac articles, tools, resources and downloads visit Macintosh Tools

Safari 4

June 9th, 2009

Apple has released the next version of its web browser – Safari 4 for Mac and Windows users.

The security fixes come as part of a larger update for Safari. Many of the major enhancements, such as faster Javascript execution and new ‘cover flow’ history browsing feature, were unveiled by the company yesterday at its World Wide Developer Conference in San Francisco.

Apple said Safari 4 is the first browser to pass the Web Standards Project’s Acid3 test, which examines how well a browser adheres to CSS, JavaScript, XML, and SVG standards that are specifically designed for dynamic Web applications.


css.php