Monday, 30 November 2015
Friday, 27 November 2015
Artist Leif Podhajsky creates psychedelic limited editions for Ballantine's Whisky
Specialising in the abstract, London-based Leif Podhajsky “explores themes of connectedness, the relevance of nature and the psychedelic experience” across work for the likes of Nike, Tate, “Wired” and Google. His focus however lays in the world of music, designing bold, eye-popping covers for Kelis, Grimes, Santigold, Tame Impala, Foals and Lykke Li among others. For his latest project he applies his unique aesthetic to a rather different form, becoming the first participant in Ballantine’s whisky’s “Artist Series.” Following a trip to Scotland, inspired by its wild and beautiful landscape, Podhajsky creates 3 distinctive, organic prints that merge natural forms with a strong, graphic finish. Commenting on his research methods, he states, “immersing myself in this way is exactly how I work when I’m designing album cover artwork too; after a while something just clicks and the designs start to form organically.” The finished product references both the process of whisky making and the surrounding terrain, the artist producing a series of rich and contemporary patterns adorning 3 limited edition Ballantine’s gift pack tins available from next month.
Sunday, 22 November 2015
Mobile hacking+ Bluetooth Hacking + Hack through bluetooth
Bluetooth is a wireless protocol utilizing short-range communications technology facilitating both voice and data transmissions over short distances from fixed and/or mobile devices, creating wireless personal area networks (PANs). Well, for hackers, its just another way to get into your mobile device. So let us discuss some ways in which you could actually infiltrate into someone else's mobile gadget ..
--> BlueScanner : BlueScanner is a bash script that implements a scanner for Bluetooth devices. It's a tool designed to extract as much information as possible from Bluetooth devices without the requirement to pair.
Download it at : http://sourceforge.net/project/platformdownload.php?group_id=195755
--> BlueBugger -It simply exploits the BlueBug vulnerability of the bluetooth enabled devices. By exploiting these vulnerabilities and leaks, you can gain access to the phone-book, calls lists and other information of the bluetooth device.
--> BTBrowser -Bluetooth Browser is a J2ME app. which can browse and explore all the surrounding Bluetooth devices. Browse to different kind of device information.
Download it at : http://www.mobiles24.com/downloads/s/31753-111-bt_browser_20
--> BTCrawler -It is a Bluetooth scanner for Windows Mobile based devices. It can implement BlueJacking and BlueSnarfing attacks.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another bluetooth enabled device via the OBEX protocol.
Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking, but both exploit others’ Bluetooth connections without their knowledge. Any device with its Bluetooth connection turned on and set to “discoverable” (able to be found by other Bluetooth devices in range) can be attacked. By turning off this feature you can be protected from the possibility of being Bluesnarfed. Since it is an invasion of privacy, Bluesnarfing is illegal in many countries.
Saturday, 14 November 2015