Wednesday, August 19, 2009

Cellular Review


Millions whine about inconsiderate cell phone use in public, yet millions use cell phones in public. We want everyone else to follow the rules of common calling courtesy, yet we'd like to get away with murder ourselves. Is it possible to have your social silence and break it too?

Yes.

This isn't going to be another one of those preachy "don't you dare let your phone ring in public" articles. Instead, you'll discover some creative ways to weave around society's niceties without landing yourself in the doghouse. Cell phone ringtone software can help you cheat the rules.

In public, cell phone violations happen because your phone causes those near you to endure two unwelcome events: extra interruption and extra noise. If you use your phone in ways that counter these two rude factors, you can get away with breaking a few cell phone etiquette norms.

Disguise Your Ringtone

Instead of using blaring midi tunes to announce your incoming calls, consider camouflage cell phone ringtones. If you can't find the perfect tone, many ringtone software packages can help you record your own socially-acceptable sounds. Such ringtones blend into the background and keep you from being the object of society's scorn. Here are a few favorites:

  • Cough or sneeze ringtone—you can even go through the motions for added effect
  • Whisper ringtone—no one will be able to tell that it's your pocket doing the whispering
  • "Shhhhhh!" ringtone—handy when a normal ringtone would cause others to shush you
  • "Ouch!" ringtone—people don't usually scold those who are in pain
  • Candy-wrapper-unwrapping ringtone—a sound not quite as socially acceptable, but still better than a typical ringtone and tough to pin on you if you aren't holding candy
  • Walking feet ringtone—to remind you to walk away from the crowd before you answer
  • Typing ringtone—the gentle rhythm of a keyboard doesn't sound a thing like a cell phone ring, but you'd better use this one only when surrounded by office space
  • Tweeting bird or buzzing bee ringtone—instant phone camouflage for outdoor events

You get the idea.

If you're worried that your ear won't catch these subtle ringtones before folks catch on, program the ring to start near-silent, and gradually up the volume. You'll be surprised at how quickly your brain connects the unusual ringtone to your cell phone.

Of course, you can use a silent, vibrating phone ringer whenever ringtones are unwelcome, but clever camouflage ringtones are a novel, fun way to approach social conformity. Just be sure to choose a ringtone disguise appropriate to the setting.

Keep in mind that camouflage ringtones make marvelous cell phone defaults that can save the day when you simply forget to turn your phone off.

Take Calls with Tact

In most settings, people within earshot won't consider most camouflage ringtones as interruptions, just background noise. But what if you're talking to someone one-on-one, and your phone sneezes?

If you want to take the call without offending the person, don't draw attention to the noise, and don't offer excuses or explanations. Quickly and politely—even apologetically—excuse yourself from view to answer the call. If it isn't urgent, offer to call back later.

Social norms say that the person you are conversing with takes precedence over a phone call, but without an explanation, others may assume that you had to visit the restroom—and that's more urgent than conversation.

On the Receiving End

When you're within earshot of blatant cell phone rudeness and just can't take it anymore, don't despair. There is an effective way to finagle back your golden silence and decorum.

I have a friend who used to phone me, begin a conversation, then put me on hold to converse with another caller. After politely waiting the first few times, I started hanging up. If you're left hanging on a call, don't criticize or complain when the caller returns, leave instead. Eventually, your caller will get the message loud and clear.

That same attitude will save your sanity in public too, but only if you have a knack for drama. If a noisy cell phone caller is in your face, leave. If you're trapped somewhere (like a train or a plane) and have patiently endured the loud, one-way conversation but can't escape because the bathroom is occupied, do the next best thing—have a coughing fit.

Make it a good one—wheeze, hack, double over until your face turns red. You're caller's ears will be just as inconvenienced as yours were, and the cell phone user will hang up. At that point, straighten up, clear your throat and remark, "Well! I'm glad that's over!"

Adapting these unconventional calling cures to suit your situation may save you—and others—a little anguish. Good luck and happy calling.

Cellular Review Of Cancer Risk


The cellular-telephone industry, which has been stung by charges that the use of cellular phones causes brain cancer, says an initial review of existing studies has found no such link.

"The studies we have analyzed so far do not suggest a linkage with cancer," George Carlo, a scientist who is directing the industry's research program, said on Friday.

The industry began the research program six months ago after a Florida man asserted that his wife's fatal brain tumor had been caused by her frequent use of a portable cellular telephone.

Thomas Wheeler, president of the Cellular Telecommunications Industry Association, a trade group, said the research effort was intended to try to discover if there were any links between phone use and cancer.

Mr. Wheeler said the initial research had shown "there is no relationship between exposure to cellular frequencies and cancer."

He said the entire research would be reviewed later by the Food and Drug Administration and other Federal agencies.

Viking Informatics Ltd Wifi Radar v1.00

Viking Informatics Ltd Wifi Radar v1.00

FEATURES
* displays nearby access points on a cool animated radar screen
* sounds an alarm when an available connection has been found, and displays it on the screen
* lists nearby WLAN access point.

Main screen
The main screen shows detected wifi networks.
Red dots: closed networks
Yellow dots: undetermined networks
Green dots: Opened networks, or networks with stored password.
At startup, all detected networks will be yellow, and after trying one after each other,
they will be either green or red.

Size: 5.19 MB

Download:


Mirror:
http://letitbit.net/download/1b45e7389711/...-v1.00.rar.html

MASPware GuardMobile 1.09.3308 | Mobile » Mobile Software

MASPware GuardMobile 1.09.3308

GuardMobile - your devays and information kept on him will protect, even if he will be stolen. Present, your devays was stolen. That can you do now?
- You can include an alarm and zablokirovat' devays;
- You can know his location, if you have a receiver of GPS;
- If on devayse secret information was kept, you can do hard-reset, to delete all information from memory! (Use with a carefulness!);
- You can remotely call from the devaysa, to eavesdrop a thief.
How does GuardMobile work? The proprietor of devaysa sets and adjusts GuardMobile. He sets a PIN-code and adds the numbers of mobile telephones which can manage this devays, fully to hinder some problems. After activating the program unnoticed works in a background, until she will not be asked to accomplish some actions.
Because all telephones support SMS today, management stolen devaysom is carried out through SMS, it means that you can manage them by any other mobile telephone (even not necessarily with POCKETPC - an ordinary telephone will walk up). Internet connection is not required also. Upon all requests, stolen devays answers SMS of returns.

Possibilities:
- Very little, rapid and unnoticeable program
- Integrated client appendix for control other devays
- Started convolute in a background. Survives even after soft-reset
- Can be fully remote only a proprietor
- Info card (PDF) for a seal (all commands for a management)
- Determining the location
- Activating / de activating of blocking of screen
- Activating / de activating of keyboard lockout
- Alarm (loud sound and vibration)
- Reverse call
- Soft-reset/hard-reset (Be careful!)
- Notification on sim-card change
- Fail log enabled
- Presets for clients (faster access)

List of commands:
Syntax of commands: #PIN# command
locate : To make an effort define the site of device
lock : to lock a screen
unlock : to lock a screen
keylock : to lock a keyboard
alarmon : To include a sound alarm and vibration
alarmoff : To turn off an alarm
callback : To compel a telephone to ring up you

Dangerous commands:
softreset : Soft-reset
hardreset : Hard-reset (Take into account, it will delete all information on a device)
You can use more than one command in one SMS. For this purpose divide commands a colon, for example: #1234#lock:alarmon:locate

Size: 5 MB
Language of Interface: multilingual
Platform: Pocket PC
License: KeyGen

Download:


Mirror:
http://letitbit.net/download/1530af54362/G...b.1.09.rar.html

The Best Racing Games Pack 3

The Best Racing Games Pack 3

The Best Racing Games Pack 3

For all Mobile devices|240x320|2.06MB|Rar


Include:
Offroad dirt motocross
Hummer jump and race
Need For Speed ProStreet
Need For Speed Carbon v4.5



Download Depositfiles
Click Here

Download Easyshare
Click Here

Download uploadbox {Free Premium Account}
Click Here

The Best Racing Games Pack 2

The Best Racing Games Pack 2

The Best Racing Games Pack 2

For all Mobile devices |240x320 |2.72MB|Rar


This package include:
SEGA Rally
Speed Racer
Race Driver Grid



Download Depositfiles
Click Here

Download Easyshare
Click Here

Download uploadbox {Free Premium Account}
Click Here

The Best Racing Games Pack1

The Best Racing Games Pack1

The Best Racing Games Pack1

For all Mobile devices | 240x320 |1.72MB|Rar

This package include:
Subaru Rally Challenge
Project Gotham Racing v1.0.2
London Racer Police Madness
The Fast And The Furious Fugitive



Download Depositfiles
Click Here

Download Easyshare
Click Here

Download uploadbox {Free Premium Account}
Click Here

150 Java Mobile Games

150 Java Mobile Games!!




Password: www.dl4all.com

Keywords: games, sophisticated, formats, binary, Download58, http58rapidsharecomfiles181460004wwwd4allcom150_Java_Mobile_Games__rar, wwwdl4allcom, Password58, native, various, mobile, platform, however, performance, adoption, limitations, common

Assembling of Mobile Antiviruses (NEW) | Mobile » Mobile Software

Assembling of Mobile Antiviruses (NEW)

There are a little ways of distribution of viruses, and knowing them, it is possible to secure the mobil'nik ot penetration of the vredonosnykh programs.
Bluetooth-connection. All vehicles, supporting this type, constantly scan space in search of devices for connection, forming networks and sending the infected files «on air». And here the basic feature of mobile troyan comes to an user help to inquire the consent of user to the program loading. It is possible only to advise more attentive to read questions on the screen mobile and not to load unknown files.
MMS-message. On mobile forums quite often lay out the broken up programs and games for mobile, quite often infected viruses. And here is nothing simpler, than to get these programs (and also any others) on a desktop computer and check their usual antivirus. And only then to unite on a favourite telephone.
What to do, if did a virus already get on mobile? How to ward off possible penetration of virus? For this purpose there are a few programs which are in an archive.

Additional information:
Symbian OS 6 - 7 - 8:
Anti Commawarrior
Anti Cabir
Avira Antivirus
Bitdefender Antivirus
BullGuard Antivirus
Commander Antivirus
Disinfector
F-Secure Antivirus
Kaspersky Antivirus
McAfee Antivirus
NetQin
Norton Antivirus
Panda Antivirus
Simworks Antivirus
Smobile VirusGuard
Symantec Antivirus
TrendMicro Mobile Security
Zeon Antivirus
Symbain OS 9.1 & 9.2:
exo Virus Stop
F-Secure
Jiangmin Antivirus
Kasperksy Antivirus
NetQin Antivirus
TrendMicro Mobile Security

Platform: Symbian OS 6-7-8, Symbain OS 9.1 - 9.2
Requirements of the systems: Support of sis
Language of interface: English + Russian
Size: 8.72 MB

Download:


Mirror:
aditmobilez.blogspot.com