Free Essay

Aaaaaaaaaaaaaaaaaaaaaa

In:

Submitted By vanessamearayos
Words 255
Pages 2
Aurelio U. Umali III
BSBA-3101

XDModo Users can stick the 0.68-inch thick Window solar charger to the inside of a glass window with the photovoltaic panels facing out, and then feed off a charging cable to a portable device positioned in the cooling shade. The brainchild of a team of international designers under the umbrella of XD Design, the Window solar charger has an ABS plastic case with a PV panel surrounded by silicone pads capable of temporarily sticking to the glass of a window. On the base of the device are a full-size USB port and a mini-USB port for connecting portable devices in need of a clean energy battery boost. The charger itself contains a 1300 mAh Li-ion battery which is said to take around 13 hours of direct sunlight to reach full charge. The Window solar charger outputs 5V/500mA via the included mini-USB cable, and has over-charge and over-heating protection built in.

Camille G. Lacorte
BSBA-3101

BioLite Campstove The CampStove is designed to burn small, easily gathered biomass like twigs, pinecones and the like without creating much smoke and with a powerful enough flame that it can quickly boil water, grill burgers, roast marshmallows or handle any other stove tasks as well as traditional, propane, white gas or alcohol-fueled camping stoves. It's supposed to do that in a package small, light and convenient enough that you can easily take it with you. And it can charge your gadgets too.

Similar Documents

Free Essay

Ceh Test Questions

...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...

Words: 34575 - Pages: 139

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558