Tags archives: tools


Connect up to Five Headphones to Share Music

What is the best way to share and mix your music with friends? Here comes the Belkin RockStar 5-Way 3.5-mm Headphone Splitter allows you to connect up to five headphones to one device for sharing music with friends. It has a unique hub with five jacks that connects a combination of MP3 players and headphones. [Buy]


Roll-Up Board Games by Sondergut

Germany-based backpack specialist at Sondergut have created a range of unique roll-up board games. Each of these portable pocket board is hand crafted from genuine suede and leather, and all the pieces neatly fit into the zippered pocket for safe and reliable storage. Weighs less than half a pound and the size is 10 x 12-2/3″. […]


Spring Smasher Nuts Cracker

Naomi nut cracker comes with a conical spring, which contains a firmly fixed pin. The nut is put in the stainless steel bowl provided and the spring placed above it. The spring is held to the side with two fingers, the ball at the end of the spring is pulled upwards thus putting the spring […]


Prescissors - Scissors With Ruler

Prescissors (Precision Scissors) combines the functionality of a ruler with classic scissors into one unit that gives you precise slices with every cut! Measurements start at zero where the first cut begins, so you can easily see and control how far you go. Designed by designer RAEES PK. via – yankodesign


Bicycle Cup Holder

Cycling is a healthy activity and a great hobby. Many cyclists might have experienced that there is no or not enough space to keep our stuff while cycling. The Bicycle Cup Holder is a simple holder that is great for iced coffee, water bottles, sunglasses, and anything else you need within easy reach while riding. […]


Top 10 Password Crackers

Here is the list of Top10 Hacking tools for crack the passwords used by Geeks:   01. Cain and Abel : The top password recovery tool for Windows It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached […]