RSS

Category Archives: Others

Samsung Corby Game Collection Pack 1 – 240×400 & 480×800 full touch

Publisher: Digital Chocolate
Category: Sports
Format: 240×400

alt alt alt

 

download here :

http://vinaytechs.blogspot.com/2010/11/samsung-corby-game-collection-pack-1_02.html

http://vinaytechs.blogspot.com/2010/11/samsung-corby-game-collection-pack-2.html
http://vinaytechs.blogspot.com/2010/11/samsung-corby-game-collection-pack-3.html
http://vinaytechs.blogspot.com/2010/11/samsung-corby-game-collection-pack-4.html
http://vinaytechs.blogspot.com/2010/11/samsung-corby-game-collection-pack-1.html

List of games

—————-

0-9
2012
365 Puzzle Club

A
Avatar
Assassins creed II
A-Team
Armadillo Gold Rush
Asterix & Obelix encounter Cleopatra

B
BlackShark 2 Siberia
Bug Quest
Battleships 2010
Bejeweled
Big Range Hunting 2
Block Breaker Deluxe 2
Bookworm
Brain Challenge Vol 2
Breeders cup
Brick Breaker Revolution 2
Bubble Bash 2
Bubble Popper
Bubble Bobble Evolution 2
Bubble Town
Bubble Town 2
Bugs Bunny
Build-a-lot

C
Clash Of The Titan
Cops
Chuck Norris Bring On The Pain
Civilization – 4
Command and Conquer
Commandos
Cooking Mama
Crazy Monkey Spin
Crazy Penguin Catapult 2
Crazy Taxi
CSI MIAMI
CSI NY
Cube Smashers
Celebrity S.E.X
Call of Duty Modern Warefare 2
Carnival land
Checkers
Chessmaster

D
Derek Jeter Pro Baseball 2009
Diner dash 2
Diner Dash Flo on the Go
Disney Board Games
Disneyland Kart Racer
DJ Mix Tour
Dodge This
Doggie Dash
DOOM RPG II
Dictator defense

E
Extreme Air Snow Boarding
EA SPORTS FIFA 2010
Earth worm Jim
EDGE
Eagle eye

F
Farm Frenzy – Nông tr?i vui v?
Fishing Off The Hook
Frogmixer
Fastand Furious
Family Guy Uncensored
Fight Night Round 4
Far Cry 2
Fling
Fort Boyard

G
Gold Rush
Gangstar II
Gi-Joe
GoGo Rescue Squad
Greys Ana tomy
GTRacing M0T0R Academy
Girls S E X

H
How To Train Your Dragon
Hero Of Sparta
HipHop All Star

I
Iron Man 2
I Simpson Arcade
Ice Age Dawn of the Dinosaurs
Indiana Jones Lost Puzzles
iSHOOT
J
Jungle Twister

L
Lemmings Tribes
Loco Roco Hi
Lux-drops of beauty
Lovi M y s h o n k a

M
Moorhuhn Deluxe
Mini Golf Park
Monopoly World
Monsters vs Alien
M0T0 GP 09
Ms Pacman
Marble Madness
Metal Slug 4
Miami Nights
M.U.M.U

N
No limit Casino
Nitro Street Racing II
NBA Pro Basket ball 2010
Need for Speed Shift
NFL 2010
Night at the Musem
Night Club Fever

P
Party Island Solitaire
Platinum Mahjong
Platinum Solitaire
Prison Tycoon
Pro Evolution Soccer 2010
Pro Golf 2010
Pyramid Bloxx

R
Resident Evil
Red Bull Soapbox Race
Risk
Roland Garros
Roller Coaster Revolution
Real Football Manager

S
Super Space Hero
Sonic Racing
Sonic unleasged
Sherlock Holmes: The Official
Sim City Deluxe
Spider Man Toxic City
Street Fighter Alpha Warriors Dreams
Superman Batman
Smackdown Vs Raw
Scarface Last Stand
S e x y Poker
S e x Bet
S e x toys
Slots
Snake Deluxe 2

T
Tekken Mobile
Townsmen
Tank Ace 1944 – 3D
The Saboteur
Transformers G1
Transformers Revenge of the Fallen
Tricky T.r.a.c.k.s
Tetris
Tetris POP
Tetris Revolution
Texas Hold’ Em Poker
The Mummy 3
The Oregon Trail
The Sim 3
The Simpsons
Tiger Woods
T0NY Hawk
Tour de France
Tower Bloxx New York
Toy story 3

U
Uno

V
Voodomino
Vegas Casino

W
War – Chi?n tranh
Wheres Wally
World Carmen Sandiego
World Championship Pool 2010
WSOP Pro Challenge Poker
Worms

Y
Yetisports Summer

Z
Zombie Infection
Zuma

 
2 Comments

Posted by on November 5, 2010 in Others

 

Tags: , , ,

Firefox Add-ons – Very useful for testing

Firefox Add-ons – Very useful for testing

This article highlights the usage of Firefox add-ons which are useful for testing various Web applications. Firefox is one of the most important browsers for testers working in Web application domain. Specially, with all the add-ons around it, Firefox is certainly essential for testing Web applications. There are add-ons useful for security testing, analyzing page source, accessibility, debugging and pretty much everything you need for Web application testing…………

 
Leave a comment

Posted by on April 23, 2010 in Others

 

Tags:

Password Best Practices

Password – Usage and Awareness

  • One of the main Security Breaches is because of using non – complex passwords.
  • Extreme care should be taken in choosing your password. If your password is not hard to guess, then someone may be able to access or steal your data. To protect your data and yourself to some extent, you must select good passwords and secure them carefully…………..

Password Best Practices

 
Leave a comment

Posted by on April 23, 2010 in Others

 

Tags:

Cluster Analysis

Cluster analysis is an exploratory data analysis tool for solving classification problems.  Its object is to sort cases (people, things, events, etc) into groups, or clusters, so that the degree of association is strong between members of the same cluster and weak between members of different clusters.  Each cluster thus describes, in terms of the data collected, the class to which its members belong; and this description may be abstracted through use from the particular to the general class or type.

More info : http://vinaytechs.blogspot.com/2010/01/cluster-analysis.html

 
Leave a comment

Posted by on February 3, 2010 in Others

 

Tags:

Semaphores

Inter Process Communication

Inter-process communication (IPC) is a set of techniques for the exchange of data among multiple threads in one or more processes. Processes may be running on one or more computers connected by a network. IPC techniques are divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC).

More Info : http://vinaytechs.blogspot.com/2010/01/semaphores.html

 
Leave a comment

Posted by on February 3, 2010 in Others

 

Tags:

Spanning tree protocol

  • Most of the industries depend on the performance of the Ethernet networks.
  • What would happen if the network failures?
  • Reasons of the failure?
  • Cable redundancy is tried by configuring the network in either ring or parallel branches.
  • Redundancy networks.

More Info : http://vinaytechs.blogspot.com/2010/01/spanning-tree-protocol.html

 
Leave a comment

Posted by on February 3, 2010 in Others

 

Tags:

A simple approach for Sun Message Queue Clustering

Introduction on Clustering

Today’s enterprise depends on the availability of mail and web services. Failure is never far away, whether it be a hardware failure or a human error. We have to try to make an infrastructure as highly available as possible. No company would afford to lose a customer when the services they offer to be unreachable, especially since that downtime will almost undoubtedly cost them money. Clustering is the approach towards maintaining highly available Customer service.

More info : http://vinaytechs.blogspot.com/2010/01/simple-approach-for-sun-message-queue.html

 
Leave a comment

Posted by on February 3, 2010 in Others

 

Tags:

Version Control with Subversion

Introduction

Version control is the art of managing changes to information. It has long been a critical tool for programmers, who typically spend their time making small changes to software and then undoing those changes the next day. But the usefulness of version control software extends far beyond the bounds of the software development world. Anywhere you can find people using computers to manage information that changes often; there is room for version control.

And that’s where Subversion comes into play.

Read More : http://vinaytechs.blogspot.com/2009/12/version-control-with-subversion.html

 
Leave a comment

Posted by on December 27, 2009 in Others

 

Tags: ,

Optical Character Recognition (OCR)

This article aims to look at implementation of OCR solutions in transaction handling processes to further optimize accuracy and productivity.

What is OCR?

Optical character recognition, usually abbreviated to OCR, is the mechanical or electronic translation of images of handwritten, typewritten or printed text (usually captured by a scanner) into machine-editable and searchable text/content. In today’s world, where information is critical, the ability to create live content where before there was only static images must be worth 10 times than the source.

clip_image002Why do we need it?

Read More : http://vinaytechs.blogspot.com/2009/12/optical-character-recognition-ocr.html

 
Leave a comment

Posted by on December 27, 2009 in Others

 

Tags: ,

Hidden Blackberry Features

Advanced Enterprise Activation Settings

ALT-CNFG In Options -> Advanced Options -> Enterprise Activation Settings for Enterprise Activation

Address Book

ALT-VALD In address book list Validate the data structure and look for inconsistencies

ALT-RBLD In address book list Force a data structure rebuild

Read More : http://vinaytechs.blogspot.com/2009/12/hidden-blackberry-features.html

 
Leave a comment

Posted by on December 27, 2009 in Others

 

Tags:

Open Source Alternatives

Click here

 
Leave a comment

Posted by on October 9, 2009 in Others

 

Tags:

A Simple Approach to Memory Analysis

Introduction

Memory Leaks are a common error in programming, especially when the language used to write the Code has no in-built automatic garbage collection mechanism. A memory leak can greatly reduce the performance of the system by reducing the amount of available memory especially when the amount of memory available in a system is very limited (in the case of portable systems and embedded applications) and when the program runs for long periods of time (such as background tasks on servers). Due to the prevalence of the memory leak bugs, a number of debugging tools such as IBM Rational Purify, Bounds Checker, memwatch etc. have been developed. Another such tool is User Mode Heap Dump (UMDH). The advantage of using UMDH is that it is very light-weight and fairly all the memory leaks in an application can be traced along with the line number in the source code where the memory has been leaked in a simple and easier way.

More Details – Click Here

 
Leave a comment

Posted by on October 9, 2009 in Others

 

Tags: ,

 
Follow

Get every new post delivered to your Inbox.

%d bloggers like this: