its free to xda members. just trying to support the dev.
its free to xda members. just trying to support the dev.
beat me to it. since i got this app it has essentially destroyed what space i had. good thing i can just leave it on amazon for later install (or so i hope).
Whatever happened to the same concept but as a credit card? [www.poweredcards.com]
Concise question: Best way to learn about and implement regular expressions to parse data between desired layouts/formats?
I thought for a second this was a call for Top 5, and then realized it should be "Ways to work with iTunes so it doesn't drive you nuts" with sub-topics: how to automatically update your library, managing ID3-tags outside of iTunes but still works with iTunes, and how to keep iTunes from not messing up your folder…
and while getting your new white balance filter, get a wallet too
Half-asleep interactions with strangers are a great opportunity to invest in a pyramid scheme, or just get out-right robbed.
I believe you can only be notified, but if you already joined attwifi and an imposter attwifi showed up, you would most likely automatically connect.
Thanks, I had totally forgot how much fun it was to use the AIM warnings. Oh the days....
Rope! If anything just to use it to hang clothes to dry, but also doubles as grip on a stick/pole or lashing items to your bag or your bag to a vehicle. Also, for meds I would totally make sure to bring some Immodium and the handy electrolyte packages to add to water (helps with hangovers or plain old dehydration).…
+1 for adding a solution to Gawker Media sites (rolling in at #11 on this list).
Sticking with [code.google.com] , DroidTracker, which is super lightweight and allows me to track the phone after an SMS trigger. Granted, there is no phone calling after the trigger, but at least mine is set up so that the crook isn't aware its going on (no notification, no action required). In your setup you would…
you should check out their beta chrome plugin. you can perform a ton with keyboard shortcuts now. [blog.agile.ws]
I guess what I meant was, what level is acceptable? Obviously I don't need 1 million years protection, but what about 1,000 years? Moreover, since the 1Password data stored on Dropbox (in my case) uses 128-bit keys for encryption (millions of years to crack), shouldn't it be fine storing it wherever I want?
The biggest benefit of 1Password for me is syncing (or just accessing it, like when I am at work and I don't have a registered Win copy of 1Password), which in my case uses Dropbox. Granted 1Password acknowledges you 'could' break the encryption [blog.agile.ws] but then my question is, what encryption couldn't you…
I always thought that the people that started Snopes were the same folks who started the initial chain mail. Didn't someone do a story about that once (I am being serious)?
I would also throw into the mix what OS you are using. I can't quantitate the difference, but on my Mac, Chromium seems faster than dev Chrome, while on my Win7 machine, I see no difference between the Chromium and Chrome, and so stick with Canary or Dev of Chrome.
I use chrome (dev and canary) at work on a Win7 machine, but on my MacBookPro I really think Chromium is much faster (and stable) than Chrome on the same machine.
Thanks for all of your post. You and Gina were the first online writers I ever started to take note of and associate your articles with you individually versus the LH aggregate. I don't know if my perception is more interesting than reality, but I can say you hold quite a bit of cred in my book, secondary to LH cred.…