Categories
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Newest
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking Hacking Blackberry (ExtremeTech Series)
Posted on 2010-04-01
|
Here’s an even better way to get your BlackBerry fix
Admit it. You’re addicted to your BlackBerry. That’s okay. Most users are, and this book is just going to make it worse. Now you’ll discover how to use your BlackBerry to retrieve documents, weather forecasts, and Web information; use it as a word processor or drawing tool; even control your computer over a network with it. And we haven’t even gotten to the way-out stuff.
Pick a few of these hacks
* Play games with BlackBerry * Search the Web * Connect to your PC wirelessly * Use BlackBerry as a USB thumb drive * Install custom ringtones * Supersize security * Draw sketches on your screen * Play your BlackBerry like a piano * . . . and more!
Tweaks, tricks, and add-on apps to customize your BlackBerry–plus Java code for even cooler hacks
Table of contents:
Acknowledgments.
Introduction.
Part I: Customizing the BlackBerry with Tweaks, Secret Codes, Hidden Keys, and Add-On Applications
Chapter 1: Secret Codes and Hidden Keys. Chapter 2: Adding Software to Your BlackBerry. Chapter 3: Advanced E-mail, Voice, and Messaging. Chapter 4: Unleashing the Wireless Web. Chapter 5: Using Your BlackBerry as a Wireless Dialup Modem. Chapter 6: The Ultimate Remote Control: Controlling Your Desktop Computer from Your BlackBerry. Chapter 7: Storage on the Go: Your BlackBerry as a USB Thumb Drive. Chapter 8: Keeping Your BlackBerry Safe. Chapter 9: Getting Down to Business: Productivity Tools. Chapter 10: Beyond BrickBreaker: Fun, Games, and Entertainment.
Part II: Advanced BlackBerry Hacks: Put Your BlackBerry to Fun and Wacky Uses with Creative Software Projects.
Chapter 11: Developing Your Own BlackBerry Applications. Chapter 12: A Classic Sketcher Application. Chapter 13: Music to My Ears: A Toy Piano in the Palm of Your Hand. Chapter 14: Meet BlackBerry, Your Personal Masseuse. Chapter 15: Printing Your Notes Wirelessly.
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link 1 | Alive |
Buy This Book at Best Price >> |