Welcome to Project Jacquard



Introducing Project Jacquard

Project Jacquard makes it possible to weave touch and gesture interactivity into any textile using standard, industrial looms.
Everyday objects such as clothes and furniture can be transformed into interactive surfaces.

Spinning conductive yarns

This is possible thanks to new conductive yarns, created in collaboration with our industrial partners.
Jacquard yarn structures combine thin, metallic alloys with natural and synthetic yarns like cotton, polyester, or silk, making the yarn strong enough to be woven on any industrial loom.
Jacquard yarns are indistinguishable from the traditional yarns that are used to produce fabrics today.
Spinning the yarn image 2

Weaving interactive textiles

Weaving interactive textiles image 2
Weaving interactive textiles image
Using conductive yarns, bespoke touch and gesture-sensitive areas can be woven at precise locations, anywhere on the textile.
Alternatively, sensor grids can be woven throughout the textile, creating large, interactive surfaces.

Embedding electronics

The complementary components are engineered to be as discreet as possible. We developed innovative techniques to attach the conductive yarns to connectors and tiny circuits, no larger than the button on a jacket. These miniaturized electronics capture touch interactions, and various gestures can be inferred using machine-learning algorithms.
Captured touch and gesture data is wirelessly transmitted to mobile phones or other devices to control a wide range of functions, connecting the user to online services, apps, or phone features.
LEDs, haptics, and other embedded outputs provide feedback to the user, seamlessly connecting them to the digital world.
Embedding electronics image 1
Embedding electronics image 2

Producing at scale

Producing at scale image 1
Producing at scale image 2
Jacquard components are cost-efficient to produce, and the yarns and fabrics can be manufactured with standard equipment used in mills around the world.
One loom can generate as many different textile designs as there are people on the planet. Now that same loom can also weave in interactivity.

Making connected clothing

Connected clothes offer new possibilities for interacting with services, devices, and environments. These interactions can be reconfigured at any time.
Jacquard is a blank canvas for the fashion industry. Designers can use it as they would any fabric, adding new layers of functionality to their designs, without having to learn about electronics.
Developers will be able to connect existing apps and services to Jacquard-enabled clothes and create new features specifically for the platform.
We are also developing custom connectors, electronic components, communication protocols, and an ecosystem of simple applications and cloud services.
Making clothes intelligent image 1
Making clothes intelligent image 2

Partnering with Levi's®

Partnering with Levi's
The Levi’s® Brand is the first partner we joined forces with to create and bring interactive Jacquard garments to consumers.
Since arriving in the Bay Area during the Gold Rush, Levi's has become a cultural icon known for it's design of fashionable and functional garments. It has built this reputation over the last 150 years by continually designing and creating products that meet a consumer need – from the 1800s when they first crafted jeans for miners to the 2000s when they introduced the Commuter line built for today’s urban cyclist. Now this tradition of innovation is continued with Jacquard.

Weaving interactive denim

The heart and soul of Levi's® apparel is denim, a sturdy iconic fabric that has been the foundation of the Levi's® brand since it was first introduced in blue jeans in 1873.
The Levi's® innovation team and Google teams joined forces to create a modern version of denim that is interactive and yet authentic, remaining true to the century-old tradition of denim manufacturing.

Making a Levi's® garment with Jacquard

Weaving interactive denim
Jacquard allows the Levi's® innovation team to design and produce connected, interactive denim garments that are indistinguishable from the brand's traditional clothing.
They remain the iconic garments that we know and love, but they are enhanced with digital functionality. The digital connectivity is provided through a smart tag that houses all the necessary electronics, and apart from this detachable tag, the whole interactive garment is washable and durable like regular denim.

Levi's® Commuter™ Trucker Jacket meets Jacquard

We integrated Jacquard technology into The Levi's® Commuter™ Trucker Jacket designed specifically for urban bike commuters.
Jacquard allows wearers to control their mobile experience and connect to a variety of services, such as music or maps, directly from the jacket. This is especially useful when it might be difficult to use the smart phone, like when you are riding on your bike.
Learn more about Levi’s® Commuter™ and the 2017 release of the Commuter™ Trucker Jacket with Jacquard technology woven in at www.levi.com
Levi’s Commuter jacket meets Jacquard
Project Jacquard will allow designers and developers to build connected, touch-sensitive textiles into their own products.

0 comments :

Please Enter best of your Comments

TRY IT C# PROGRAMMING



0 comments :

Please Enter best of your Comments

TOP 5 SMALL ANTIVIRUS FOR USB FLASH DRIVES


USB Flash Drives play the biggest role in transferring viruses from one computer to another. This is really annoying and we all face this when we move data through flash drives. The famous autorun.inf  virus is the one that is usually found in flash drives which is executed as soon as it’s attached and opened. This type of virus is not harmful but annoying as it copies itself to all permanent drives of a system.

Even after tight security through Antivirus Software this nifty little virus manages to enter most of the time without being detected. But there’s a solution for this – dedicated application to monitor and stop these flash drive viruses in real time.
The list below is of 5 best of those small antivirus applications which are specially developed to stop any type of USB worms. All of these are light weight, automatic and can be run in parallel with standard and full antivirus and do not slow down your computer at all.

Naevius USB Antivirus 2.1

A very popular and small antivirus. Naevius USB Antivirus is a tool which protects all your your pen drive from autorun-viruses. Takes a very little space in memory and scans the drives in real time.
Download

TrustPort U3 Antivirus 2010 5.0

TrustPort U3 Antivirus is designed specifically for the protection of U3 smart drives. When installed on the U3 smart drive, it continuously monitors files being copied to the drive, so that no malicious codes can be stored on it. On-access protection is further supplemented with on-demand scanning.
The user can scan files, folders or drives on the host computer. If an infected file is found, it will be handled according to user settings. It can be renamed, moved to quarantine or deleted. To ensure the highest level of security, the software udergoes regular updates from the internet.
Download

USB Flashdrive Autorun Antivirus 1.0

USB Flash Drive Autorun Antivirus automatically detects, closes and deletes the virus from your drive. The software provides future protection by immunizing the system; by installing special autorun file which virus can’t delete. 
Comes with multiple inbuilt tools like Task Manager to manage running programs, Autorun Suppressor to temporarily disable autorun while inserting the drive and System repair feature to repair system functions broken by a virus. It doesn’t require any signature updates so it is perfect for offline computers.
Download

USB Drive Antivirus 3.0


USB Drive Antivirus provides 100% protection which scans automatically, block and delete USB virus, trojans, and malicious code. It also works for Memory cards.
Download

USB Drive Antivirus

Another very popular but not so user friendly of all. But detects malicious files at good speed. Scanning options are not limited to USB drives – you can scan hard drives too.
Download

0 comments :

Please Enter best of your Comments

BLIND SQL INJECTION - WEB APPLICATION VULNERABILITY TUTORIAL



Blind SQL injection technique is used when the web application is vulnerable but the output doesn’t display to the attacker. When hacker tries SQL injection, they will redirect to some other pages instead of error message. Blind SQL Injection is harder to implement when compared with the above Traditional SQL Injection Technique, it will take more time . There are some tools for Blind SQL Injection.
Blind SQL injection can be done by querying the database with sequence of true/false questions.

How to detect the Blind SQL Injection Vulnerability?
Web application gets the clients input and supplied in where clause to retrieve data from Database. For instance, let us say the web application gets id and supplied to the sql query as follows
Statement=”select * from userinfo where id=` “+id+” ` “;
Hope you know about where clause and compound conditions (OR, AND). OR and AND are used to combine two conditions. The attacker can find the vulnerability by entering the compound conditions as input.
For instance, the attacker can enter id value as
1 AND 1=1 
The above query will become
Select * from userinfo WHERE id=1 AND 1=1
If the page remains on the same page, then the application may be vulnerable. This type of vulnerability occurs when the developer fails to validate the data type of ID. Here we give true condition (1=1). So if use false condition (1=2), it will raise an error message. We can conclude that if the condition is true, it remains in page. If false, showing error message.

Some Functions to be known
The following function will be useful for Blind SQL Injection.
substring(str, pos, length) is the function that returns the part of the String. sub string of the string is depending on the argument given to the function.

For instance substring(“hello”,2,1) will returns ‘e’. 
Here string is “hello”, character position is 2 (that is ‘e’), and length is 1.
  • lower(str) is the function that converts the character to lower case
  • ascii(c) is the function that converts the character to ASCII value.
  • length(str) returns the length of the string .
  • user() returns the current user(admin)
  • database() returns the database name.
  • version() retruns the version of database

0 comments :

Please Enter best of your Comments

HACK ANY WINDOWS ADMINISTRATOR PASSWORD





 I will show you on how to change Windows User Password (Administrator, Guest, User, many more) from a bootable USB drive or a CD.

The software which I will use is Active@ Password Changer.
You can download it from here(Download). 
 (Serial Number is Already Included in the package so that you can use this utility for free)

What is Active@ Password Changer?

Active@ Password Changer lets you reset local user passwords and change Windows login security restrictions on Windows NT / 2000 / XP / 2003 / Vista/ 7 systems: this is useful when the Administrator’s password is forgotten or lost, or when the Administrator’s user account has been disabled or locked out.

How to Create a bootable USB Drive to hack Windows Admin Password?


You must first install this software on your own system and make a bootable disk from it. I will show you how to make a bootable disk:

After the installation finishes, click on Start->All Programs->Active@ Password Changer->Bootable DOS disk creator.
Insert any USB drive and click on Start!

This will start the writing process after it finishes, then boot your system from that USB disk (You may have to press F12 or someother key for boot options when computer/laptop is just started as it depends on the computer and bios version you are using, You can look for it in computer bios setup, If there isn't any option of USB booting then rather make bootable CD from the program).

Changing/Hacking Password Using Active@ Password Changer:

Once you boot from that USB drive you must see a screen like this:
Active@ Password Changer

Choose any desired option. It is recommended to choose 2
After choosing you will see a list of logical drives
Active@ Password Changer

Choose any particular drive and press Enter
After it you will see the MS-SAM Database files
Active@ Password Changer

Press Enter
Then you will see the list of Users and Description
Active@ Password Changer

Select the user of which you want to change or clear the password. After you will select you will see something like this:
Active@ Password Changer

If you want to clear the password then press Y and hit Enter. You may also choose to change the option, you can do this by using Space key to enable or disable it.

You can also create a bootable CD/DVD ROM if you don't have other option as i told you above!

I hope you enjoyed my guest post at Hackers Thirst! 


0 comments :

Please Enter best of your Comments

TRACE ANY EMAIL ID WITH SPYPIG - EMAIL HACK

http://s3.amazonaws.com/readers/webupon/2008/04/27/150390_6.jpg

At first go to the website http://www.spypig.com/
Here you will find a form.Now fill up the form.

Step 1: Fill Your mail address, where you want the traced information of recipient.
Step 2: Write your message title.
Step 3: Select an image, by which SpyPig will trace your Sent Mail. I will Recommend to select 1st image that is blank, so that recipient could not get any idea that you r tracing him or her.


Step 4: Choose how many times you want to receive the notifications. You will receive a notification every time your email is opened up to the number you select above.
Step 5: Click the button above to create and activate your SpyPig tracking image in the box below.

Step 6: Copy the SpyPig image above and paste it into your email message.
Step 7: Now write your message, you want to send, and send it as usual.

Now when the recipient will read your message, you will be inform by email that your mail has been read with the IP Address and location of recipient


0 comments :

Please Enter best of your Comments

UNLOCK MODEM– HUAWEI UMG 1831 UNLOCK SOFTWARE

huawei umg 1831 unlock software



Unlock your Huawei UMG1831 21Mbps mobile broadband modem to use with any GSM service provider in India and abroad. Huawei UMG1831 Unlock will allow you to use your modem with any GSM providers in india likeBSNL/MTNL/AIRTEL and AIRCEL. All UMG 1831 modems are capable to support any 3G network once unlocked. In this post you will get free Huawei UMG 1831 Unlock Software and the step by step guide to do it.


How to Unlock Huawei UMG 1831:-

1. First Plug-in your modem in any one USB port in your laptop/desktop and make sure that it is detected and showing in my computer as an extra disk.
2. Download and Install DC Unlocker + DC Crap
  1. Select Manufacturer as “Huawei modems”
  2. Select Model as “Huawei UMG1831″
  3. Now in Unlocking button (given to the right) tab your Do job button will be enabled.
  4. Press Do job button and enjoy the unlocked modem and internet.

0 comments :

Please Enter best of your Comments

VERY FAMOUS HACKING TOOLS COLLECTION - FREE DOWNLOAD


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWD2K1aJsj8Vos_z8vYYHjFjmv-CpLotqM3EvmeqmUwZ2eyxPg0IVc5nwtDrVpD2OPO3k9kDbSYIKjcUuNvtYD5wKa9cbx5V8NhLI6bn6SSpvmA2WY1Tf3ohsAOpcWy5BE_Jg97TVMwj4/s1600/hacker.jpg

Here List Of Hacking Tools Are Listed. These are all rapidshare accounts. to Download rapidshare files with Premium Account Install this pluggin in Firebox...

Girlfriend 1.35

  • To download  Girlfriend 1.35  for free click the link below

newhacker

  • To download  newhacker  for free click the link below

HACKBACK

  • To download  HACKBACK  for free click the link below

Showdown_v8

  • To download  Showdown_v8  for free click the link below

showdown v8

  • To download showdown v8   for free click the link below

ICQ Machine Gun

  • To download ICQ Machine Gun   for free click the link below

Winsight

  • To download Winsight   for free click the link below

HACKTOUR

  • To download HACKTOUR   for free click the link below

Theef v1.22

  • To download Theef v1.22   for free click the link below

0 comments :

Please Enter best of your Comments

CREATE YOUR OWN VIRUSES BEST TOOL




Batch virus maker tool is the one which can create batch viruses.The properties and behaviour of the virus can be set by yourself.Batch programs are essentially sequences of DOS commands that 'type themselves' when the batch file is run.Batch files consist of control elements, internal DOS commands and external commands or programs. With a little ingenuity one can duplicate most of the functions of a general purpose language, but doing any kind of math is tricky, there are no arithmetic commands at all. But most of us use Batch codes for creating viruses.One of the important feature of batch viruses are it cant be detected easily by Antivirus systems.

DOWNLOAD LINK


HOW TO CREATE BATCH VIRUSES

1. Download and extract all the files and open virus maker, you can see a window as shown below.



2 .Now give any name and press enter to see the window as shown below.Now select any property by entering its number and hit enter.




3. Continue entering your properties for the virus and when its enough just close the virus maker, you can see a Batch file in the same directory with the name you specified.

4. This is the virus and just run this on your victims computer to see the effects...


0 comments :

Please Enter best of your Comments