Skip to main content

COOL AND USEFUL USB FLASH MEMORY DRIVES – 36 AMAZING GADGETS


In the last years, the USB flash memory drives have evolved a lot, from the capacity of 256mb to 128gb and maybe even more. The interesting thing is that their capacity isn’t the only thing that evolved, the design also suffered some lovely changes. New and inventive designs are put on memory sticks almost every week, the products being either really cheap and accessible or expensive and luxurious. In this article, you will see the coolest of all USB flash drive collection, having bad ass looking drives, useful ones, crazy looking ones but more important, inventive and interesting pieces of work.

T-600 USB Drive

T-600 USB Memory Drive

Steampunk Scorpion USB Drive

Steampunk Scorpion USB Drive

Mario USB Drive

Mario USB Drive

Resident Evil 5 USB Chainsaw

Resident Evil 5 USB Chainsaw Drive

USB Flash Drive Lighter

USB Flash Drive Lighter

Star Wars USB Drives

Star Wars USB Drives

Transformer USB Drive

Transformer USB Drive

Steampunk-Inspired USB Stick

Steampunk-Inspired USB Stick

USB Wooden Clip Flash Drive

USB Wooden Clip Flash Drive

Hamburger Flash Drive

Hamburger Flash Drive

Rocky USB Drive

Rocky USB Drive

Uzi-Shaped Flash Drive

Uzi-Shaped Flash Drive

Clip-it

Clip-it Flash Drive

Lexar Media Echo SE and ZE

Lexar Media Echo SE and ZE Flash Drive

USB Chocolate Popsicle Flash Drive

USB Chocolate Popsicle Flash Drive

USB 8GB Flash Drive Lighter

USB 8GB Flash Drive Lighter

Tiny Canon 5D Mark II USB Flash Drive

Tiny Canon 5D Mark II USB Flash Drive

Hello Kitty USB flash drive

Hello Kitty USB flash drive

8GB USB Thumb Drive

8GB USB Thumb Drive

EagleTec USB Nano Flash Drive

EagleTec USB Nano Flash Drive

Steampunk Scorpion USB Drive

Steampunk Scorpion USB Drive

Novelty Mini Mobile Phone Shaped 2GB USB Memory Stick

Novelty Mini Mobile Phone Shaped 2GB USB Memory Stick

USB floppy thumb drive

USB floppy thumb drive

LaCie iamaKey flash drive

LaCie iamaKey flash drive

Light Bulb USB Memory

Light Bulb USB Memory 1
Light Bulb USB Memory 2

Butterfly Knife USB Drive

Butterfly Knife USB Drive

TrekStor USB stick

TrekStor USB stick

Apple-shaped USB drive

Apple-shaped USB drive

Wooden USB Stick

Wooden USB Stick

Lockface face recognition USB drive

Lockface face recognition USB drive

Penguin-powered bootable USB drive

Penguin-powered bootable USB drive

Corsair Flash Padlock 2 USB Drive

Corsair Flash Padlock 2 USB Drive

The Green Man USB Drive

The Green Man USB Drive

A USB flash drive sealed with wax

A USB flash drive sealed with wax

USB Hand Grenade

USB Hand Grenade

Comments

  1. Thanks for sharing this information. I really like your blog post very much. You have really shared a informative and interesting blog post with people.. photography packaging

    ReplyDelete

Post a Comment

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત