Friday, 15 November 2019  
Dolvin Blog
Dolvin Blog » Our DB
Microsoft - Arc Mouse
by. Dolvin ≈ December 3, 2008
The revolutionary design of the Arc™ Mouse combines the comfort of a desktop mouse and the portability of a notebook mouse. Arc Mouse folds to 60% of its fully expanded size when you’re on the go. Two color options to match your personal style.

Arc Mouse2.4 GHz - 30 ft. Wireless Range
The 2.4 GHz wireless USB micro-transceiver connects wirelessly right out of the box with virtually no interference and has up to a 30 foot wireless range

Folds For Portability
Mouse folds to 60% of its fully expanded size using the strong metal hinge. Folding the mouse closed automatically turns it off.

Scroll Wheel
Save time and effort with the scroll wheel—navigate documents & Web pages without using the on-screen scroll bar.

Battery Status Indicator
You won't get caught with a dead battery—the Battery Status LED Indicator glows red when the battery is running low.

Snap-in Transceiver
Micro-Transceiver snaps into the bottom of the mouse.

One-touch access to Windows Flip 3D*
Allows you to flip through open windows in a stack and quickly switch between applications for added productivity.

Customizable Buttons
Get quick access to the media, programs, and files you use most often with customizable buttons.

Comfort for Either Hand
Use your mouse with your left or right hand—ambidextrous design makes it comfortable either way.

Ergonomic Design
Point and click in comfort—ergonomic design helps you work longer without discomfort.

Designed for Notebook PCs
Compact and comfortable, our handy notebook and laptop products are designed for convenience and mobility.

Snap-in Receiver
Plug in the snap-in receiver when you’re ready to work, then snap it into your mouse when you travel, preserving battery life.

Laser Technology
Microsoft Laser Mouse products are more precise, more responsive, and deliver smoother tracking.

6+ Months Battery Life
Work with less interruption with longer battery life.

3-Year Limited Hardware Warranty

Product Price


And, this is the mouse looks like if we collapse it...
Arc Mouse - Collapse
Source :
Category :  Technology    Comment : 0 Comment
Download From Youtube
by. Dolvin ≈ May 12, 2008
  1. Whenever you are watching video on YouTube, goto the address bar at the top of your browser.
    Notice the URL is something like this:

  2. Just in front of the domain name, insert the word ‘kiss‘.

NOTE: Remember to save your video with “.flv” extension

source: Sherlock Group - Download From Youtube
Category :  Technology    Comment : 0 Comment
Saving Energy with Black Google
by. Dolvin ≈ May 8, 2008
Did you know about Blackle?
Blackle is Black version of Google for saving energy, that have a Google search box on a black background with light text. The site is intended to allow environmentally conscious Internet users to save a little electricity while they surf. The concept is based on findings that suggest that some computer monitors use more energy to display a white or light coloured screen than they do to display a black or dark coloured screen.

it said Blackle saves energy because the screen is predominantly black. "Image displayed is primarily a function of the user's color settings and desktop graphics, as well as the color and size of open application windows; a given monitor requires more power to display a white (or light) screen than a black (or dark) screen".
- Roberson et al, 2002

On Mark Ontkush blog, entitled: “Black Google Would Save 750 Megawatt-hours a Year”. He said, Google, which has a white background and gets about “200 million queries a day” could reduce global energy use by 750 Megawatt-hours a year by simply changing the color of its homepage to black.

Btw, there is another black Google custom search portal called that designed to reduce eye strain and save energy (with CRT monitors) while conducting Google searches. All searches from this portal will take you directly to with a black background and light text.

In the end, with Black search portal, every time we load our web browser reminds us that we need to keep taking small steps to save energy.

Category :  Technology    Comment : 1 Comment
Rinspeed sQuba diving car
by. Dolvin ≈ March 5, 2008
I saw cool car tday in Metro TV... it's amphibian car... it's cool coz it can traverse land and water equal ease. and when I search about this at google.. I found sQuba diving car.. wow.. that's car can diving! 

sQuba diving car

sQuba diving car concept, Swiss automotive design company Rinspeed’s latest Concept, actually inspired by James Bond in the movie The Spy Who Loved Me.
as the ‘world’s first real diving car’, the new sQuba is designed to autonomously turn into an amphibious vehicle at the push of a button and can submerge up to 10m (33ft) under water.

Powering the concept is an electric motor mated to the rear wheels. The propulsion on the water is ensured by two propellers in the stern and two powerful jet drives in the bow to propel the vehicle under water. The body is constructed from light weight components made of Carbon Nano Tubes and contains an on-board air-filling system.

for Driver and passenger, they can obtain fresh breathing air via 1 x 15 liter and 1 x 18 liter ScubaPro air supplies in a self-contained on-board system and back on dry land the sQuba is designed to drive itself autonomously at the push of a button.

hmm.. interested?
Category :  Technology    Comment : 2 Comment
Hacking Toolbox
by. Dolvin ≈ February 23, 2008
The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it.

These are the Hacking Toolbox that hacker must have:
  • Backdoor: Intrude computer and control the computer with client program.

  • Crack Tool: crack passwords of systems or applications, crack the serial numbers.

  • Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it.

  • DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer.

  • Document: Documents about hacker, cracker, etc.

  • E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several tools about e-mail, for example, email bomber, tool to find someone's email address, etc.

  • Editor: Edit or modify your program with them.

  • Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.

  • Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one.

  • ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ's password, sharing your files, and encrypting your ICQ messages, and so on.

  • Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password.

  • MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.

  • Packet forging: Modify the data packet on network at will.

  • Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.

  • Scanner: Acquire the system information, for example, open ports, OS, and so on.

  • Sniffer: Intercept and capture the data on the network.

  • Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on.

  • Source code: Source code of many tools.

  • Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.

  • Virus: Source code of virus and executable virus.

Category :  Technology    Comment : 2 Comment
Page : 1 - 2 - 3 
:: November '19 ::

:: My Blog List ::

:: Blog Category ::
» Books
» Christian Soul
» Fashion
» Film
» Foods & Drinks
» Games
» General Info
» Health
» Jokes
» Love
» Music
» My Life
» Programming
» Technology

:: Site Links ::
» Angel Sulistyo
» Anton Ongsono
» Darwin
» Fellys
» Inge
» Kado Imut
» Koleksi Unik
» Lie Fung
» Lintaka
» Lobak
» Rosrita
:: Dolvin Website | Dolvin Blog | Our DB ::
Copyright © Lavinia - 2006 - 2019