Aviation giant Boeing has just announced that soon it will launch on the market a 3D Aerial Camera to be used to capture 3D aerial images, which has been specifically designed to be deployed on UAV (Unmanned Aerial Vehicle) type aircraft and helicopters, and which can have applications in several
Month: March 2010
A bug inside your ordinary mouse
Mouse spy bug inside your ordinary mouse? When it comes to long distance surveillance, one of the main factors is keeping the operation as secret as it gets, and when you have to use a remote monitoring system, you should try to make them as invisible as possible. How can
A micro helicopter for post-nuclear attack reconnaissance
An Advanced micro helicopter At Virginia Tech University, a group of researchers is at work on designing an unmanned helicopter which, due to its characteristics, is one that its creators hope that they will never have the chance to use. In fact, it is designed to be used for reconnaissance
Digital video recorders to expose cases of bribery
Digital Video Recorders? When it comes to having the possibility of using one’s position and power in the political arena, no matter how small or big, for a personal gain, the world is all the same, no matter which side of the fence one sits in. So, at any latitude,
Flying man really exists
Flying man? Human flight device is nowadays really possible. Or at least, it is for those who can afford to spend at least 70000 dollars for this toy, which can turn anyone into a real jet man into a flying man. Manufactured by Martin Aircraft Company, a firm based in
A high security USB drive
One of the main reasons for headaches, when using USB sticks to transfer data files from one computer to the other, especially if the transported files contain sensitive or private data, is that the key may, one way or the other, end up in the wrong hands, along with the
Stealth Phone, the untraceable phone
Untraceable Phone? Those who, either professionally or as simple users, are involved with telecommunication security, know that encryption of telephone calls makes them more difficult to be bugged, but not impossible, especially if only one of the two users engaged in a conversation is using an encrypted mobile phone, while