Saturday, October 29, 2011

Generate, Backup & Encrypt Passwords With Advanced Password Recovery

There are a lot of applications available on the internet to manage and recover Windows Accounts, but today, we have an application that not only manages your Windows Accounts, but is a complete password manager and retriever. Advanced Password Recovery is a portable application to manage the operating system’s accounts and passwords. It lets you change and remove all user passwords, generate random alphanumeric passwords, encrypt and decrypt any string or text with a password and recover Messenger, Windows, Office, Browsers and Wireless connection passwords and keys. In case you don’t remember the password of a User Account, you can delete and enter a new password for that account using Advanced Password Recovery.
Menu lets you switch between the four modes of the application; Windows Account Management, Recovering Passwords, Password Generator and Password Encrypter.Advanced Password Recovery Menu
Windows Account Management can be used to remove a password from an account, set a new password for an account and enable, disable and delete an account. To set a new password of an account, choose the account name from Username drop-down menu, type a new password and click Patch.
Advanced Password Recovery - Windows Account Management
Password and Serial Recovering enables you to backup all your passwords into text files. From the left side, select the passwords that you want to save from Messenger and Related, Windows and Office, Browsers and Wireless. Enter the path where you want the text files with the passwords to be saved, and hit Recover.
Advanced Password Recovery - Password and Serial Recovering
Password Generator Manager allows you to generate Alpha, Numeric, Alpha Numeric and Alpha Numeric Special (also uses characters) passwords. Pick the length of required password, and choose Generate.Advanced Password Recovery Password Generator
Password Encrypter Manager can be used to encrypt and decrypt any string or text. To encrypt, type text in the left pane, enter a password and click Encrypt. The encrypted text will appear in the right pane. You can copy and save this text in a file for future use. To decrypt this text, paste it in the left pane, enter password and click Decrypt.
Advanced Password Recovery Password Encrypter
Advanced Password Recovery requires Microsoft .NET Framework 3.5, and works on all 32- and 64-bit versions of Windows.
Download Advanced Password Recovery

Monitor Multiple Computers From A Single PC Using Computer Monitor

When running processes on multiple computers at the same time, it is both time consuming and inefficient to check if it encountered any errors. Computer Monitor is a Java based application that can remotely monitor computers on a network from a single PC. The application lets you set a password for your server to prevent unauthorized access to its screen and you can refresh the screen to view the current status of running apps and processes. It has two components; a Server and Client. You have to run the Server on the PC (server PC) which needs to be monitored from Client PC (secondary PC).
The application may come useful where you have to monitor server processes from different remote locations. In server-member server-client network architecture, Computer Monitor will help you monitor main server’s activities from member servers and clients without having to manually access main server. Sadly it doesn’t allow forwarding connection port to monitor server activity from PCs outside the network, but you can manually forward a port for client console to check the current activity of server. It doesn’t offer a lot of settings and is pretty easy to configure. To start monitoring, run Server on main server, enter password and click Activate. In the infos field, you will receive an IP. You will need this IP address to monitor the server via client.
Computer Monitor - Server
On your secondary PC (which you will be using to monitor remote PC’s), run Client console, enter the Server IP, Password and click Connect. The main window will display a screenshot of server PC’s screen, which can be refreshed using Refresh button.
server monitor
Computer Monitor is an open source tool that works on both client and server editions of Windows.
Download Computer Monitor

Recover All Types Of Deleted Files With Pandora Recovery

Whenever you delete a file from a memory storage device, only the reference to the file data in File Allocation Table is marked as deleted. Until and unless more data is written over it, the content is not erased from the disk, and it can be recovered by making it visible for file system again. Pandora Recovery lets you find and recover all types of deleted files from memory storage devices. It provides you with an easy to follow wizard, which guides you through the recovery process. The application scans your memory drives and builds an index of existing and deleted files, which can then be recovered in a user-specified location. You can use search to find a deleted file if you remember full or partial file name, file size, file creation date or last accessed date. Pandora Recovery allows you to preview image and text files before performing recovery.
The recovery process is pretty simple, since the wizard takes you through the complete process. When you start the application, it asks you to check the Recycle Bin to make sure that the deleted files are really removed. If you can not find the files in Recycle Bin, select No, I did not find my files and click Next.
Pandora Recovery Wizard 1
In the next step, it gives you a list of all the memory drives connected to your computer. Select the drive that you want to scan for deleted data and click Next.
Pandora Recovery Wizard 2
Now, select a recovery method from Browse (if you want to browse the drive and review individual folders and files), Search (if you want to search the required data by full or partial file name, file size, file creation date or file last accessed date) and Deep Scan (to scan drive surface for files of certain types). Choose the preferred method and click Next. A dialogue box will show the overall progress and remaining time of the process.
Pandora Recovery Wizard 3
Once the scan is complete, you can browse though all the files found in your memory device. Names of files that can be recovered without any problems appear in black, while the files which are overwritten and cannot be retrieved appear in red color. Right-click the file name and select Recover-to to recover the files.
Pandora Recovery 5
Enter the folder path where you want to recover the files or click Browse to choose an existing folder. You can also choose if you want to recover file attributes (Archive, Hidden, System etc.) and alternative data streams with the file.
Recover
Pandora Recovery is similar to previously reviewed to Recuva, but this application offers previews for image and text files before initiating the recovery process. Pandora Recovery works with all version of Windows.
Download Pandora Recovery

Thursday, October 27, 2011

Photographing Steve Jobs

Hi ,

Just click on the following link for Photographing Steve Jobs :

http://money.cnn.com/galleries/2011/technology/1110/gallery.photographing_steve_jobs.fortune/2.html?iid=GM


How to Encrypt and Hide Your Personal Files Inside of a Photo



Have secret plans to take over the world that you don’t want anyone to be able to read? Encrypt those precious bytes with a custom password before disguising them as an ordinary picture that could fool anyone.
Head over to the developer’s website and grab yourself a copy of the portable app.
sshot-1
Once the download has completed, extract it.
sshot-2
A donation screen will appear, click on the skip donation button to launch the application.
sshot-4
The application asks for a the file that you wish to hide, a JPEG image in which to hide the file, as well as a path were the new image will be outputted.
sshot-5
On the right hand side check the box to allow you to use a custom password to encrypt the file with, and type in a password.
sshot-6
Hit the large camouflage button to start hiding your files.
sshot-7
Now when you look at the file in explorer, you will see that it has a much bigger file size but the new file will still open like an ordinary image. The size that the file increases by will obviously vary depending on what you are hiding.
sshot-8
To get your file back, switch to the de-camouflage tab, select your picture, remember to check the box and input the same password you used to encrypt the file. If you use the wrong password your file will not be able to be decrypted, and you will get an error message like so.
sshot-9
However if you supply the right password, your files will be extracted to the directory that you specified.
sshot-10
Besides the obvious increase on file size there is no way that anyone would be able to tell that there was any hidden contents in the image.

Free Clipboard Manager

clipboard item library. The application may come useful in situations where you have to copy text and take a lot of screenshots. Unlike previously covered Clippy, which keeps a log of your screenshots & copied text and requires you to save items manually, Free Clipboard Manager automatically saves the files to your hard drive without having to manually select and save the clipboard items and screenshots. It saves the selected text in a TXT file and images in PNG format, which can be accessed from system tray menu. It allows you to delete all clipboard items and apply restriction on saving text string that is less than 20 characters.
In order to send text to application, just select the text from app window and press Ctrl+C. The application will automatically save the text in a TXT file. It supports 2 screenshot taking methods; capture whole screen and capture active window. Use PrintScreen to capture whole screen and Alt+PrintScreen hotkey combination to take screenshot of active window. Both screenshots and text files will be saved in Clipboard directory within Free Clipboard Manager folder.
FCM list
You can change the settings of Free Clipboard Manager by right-clicking on its system tray icon. It lets you delete all clipboard items, browse clipboard directory, apply limit on saving text string less than 20 characters, enable auto start with windows, etc.
FCM Settings
It works on Windows XP, Windows Vista and Windows 7. Both 32-bit and 64-bit OS editions are supported.
Download Free Clipboard Manager

My Sync Center: Automatically Sync Data Between Android & PC Over WiFi

00-My-Sync-Center-Android-Featured
Almost a month ago, we covered Cheetah Sync - a free Android app that provided two-way data sync between your device and your PC over a commonly shared Wi-Fi connection. While the free variant of the said app allows users to manually sync just one folder at each sync instance, My Sync Center – a handy replacement for Cheetah Sync with dual-way data sync support – lets you specify multiple custom folders on your device, as well as on your PC, and syncs them automatically over the same network. In addition, My Sync Center supports syncing some of the most common content/folders from your device (music, pictures, videos, ringtones, alarms et al ) to your PC, and vice versa. Furthermore, My Sync Center extends its support to even sync your iTunes-music based on various categories (tracks, albums, artists). All you need to do is specify the desired folders on your device as well as on your PC, and let the app sync all the content automatically. The app supports manual syncing of data as well, and keeps you informed of the sync status via status bar notifications. Details after the jump.

01-My-Sync-Center-Android-Categories02-My-Sync-Center-Android-Sync
As with all other similar apps that support syncing content remotely, My Sync Center, too, requires a desktop client installed on your PC. The desktop client currently works only on Microsoft-based operating systems, while support for MacOSX and Linux will be added soon. You can download the client from the official website of the app’s developer.
Setting up the desktop client, as well as the app, is as simple as one-two-three. From the client perspective, all you need to do is drag & drop all the various folders and/or iTunes music library contents from your computer into the client under relevant tabs. Remember that all content can be synced only from the mobile client. and not from the PC.
03-My-Sync-Center-Android-BackUp04-My-Sync-Center-Android-Settings
Configuring the app is simple too. When run for the first time, the app prompts you to specify the category-based folders on your device that you wish to sync, and provides you with a secret numeric code that you must feed in to the desktop client in order to establish a secure connection between the device and the PC. From the app’s Settings screen, you can pair your device with a new PC, specify content categories that you want to sync and reset the default folders for music and video files on your device.
The Backup screen on the app lets you add custom folders on your device that you wish to remain in sync with your PC – an extremely useful feature if you’re looking to effectively backup/restore device data (including system folders as well) to/from your PC. Long press on a folder to remove it from this list.
Although the app supports automatic syncing of selected content to/from PC, it does not let you specify the sync time, thereby meaning that either you have to wait for automatic sync to take place, or press the big, green Sync button on the app’s home screen for manual operation. You’d also notice a toggle for Restore Mode just under said button, which, if enabled, can be availed to restore all data back to the device from the PC (provided you haven’t deleted it from your PC, too).
05-My-Sync-Center-Android-Client-Pair
Syncing mechanism of My Sync Center was successfully tested during our brief run, with the desktop client running quiet smoothly on Windows 7 (64-bit edition) and the app doing its job effectively on HTC Desire Z. On this note, you must remember that My Sync Center requires Android OS 2.2 or higher to run.
The only restriction with this otherwise-robust app is that its free version lets you sync a total of just 25 files at a time, after which you have to manually push the Sync button from within the app. However, you might be interested in the paid variant of the app that lifts any such restrictions, and allows you to seamlessly sync multiple files/folders between your device and PC. The paid version of My Sync Center is available in the Android Market for $2.02, and download links to both the paid as well as free version are provided below, along with their respective QR codes.
Here is a video that quickly demonstrates how easily you can set up the respective apps on your device/PC and sync data between them.
Download My Data Sync (Free)
Download My Data Sync (Paid)

Futuristic Exclamation Marky Flying Robot


Exclamation Marky Flying Robot was the first creative work of young office “Form & Drang” in Leipzig, Germany. It is actually a mascot to symbolize futuristic, quickness, youthful energy, enthusiasm, and action. The client demanded the mascot represents all that symbols in exclamation point!. That’s why the robot looks like flying exclamation mark. During the design process, the team was inspired by the actual design of computers, mp3 players, and many gadgets, because the intention was to reach young and technology interested people through this robot.
Designers : Ronny Sauer and FORM & DRANG
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang

The final design of Exclamation Marky Flying Robot is simple and clean in attractive white finish, without any sharp edges. It’s futuristic and cute at the same time, because the head is so much bigger than the rest of its body. Marky can work as terminal information to provide important facts or news to visitors in an exhibition. Aside for displaying the information, the LED screen will also inform you if Marky is in good or bad mood.
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang
Exclamation Marky Flying Robot by Ronny Sauer and Form & Drang

Wednesday, October 26, 2011

Paste Text in Command Prompt with Ctrl+V and More



Being the tech-savvy crowd you are, we figure you use most or all of the standard Windows hotkeys, such as Ctrl+C for copy. It's also probably safe to assume that you break out the command prompt once in a while. Despite being used almost exclusively by experienced users, the command line is frustratingly incompatible with the most basic key combinations. Plenty of our tips require you to enter text in the command line, some of which can be a real pain to enter manually. To paste text, you either have to right click in the window for a context menu option, or more annoyingly, hit Alt+Space > E > P. Instead of pasting text, the usual Ctrl+V keystroke gives you ^V.

Fortunately, the How-To Geek has found a simple solution. Here's the rundown:
1. Download, install and run AutoHotkey.
2. Download and open the Geek's script.
3. Paste text to your heart's content.


Note that the script doesn't break lines that well. Also, you can hide AutoHotkey in the system tray by adding #NoTrayIcon to the top of the script.


Another way to easily paste text in the Command Prompt
While looking into this topic we also recalled using a mouse right-click on the Command Prompt window to paste clipboard content. As it turns out, you have to enable QuickEdit mode in the CMD which is left disabled by default.
To enable QuickEdit mode:
1. Right-click the Command Prompt's title bar and go to Properties.
2. Under Edit Options, select QuickEdit Mode.
3. Paste text using the mouse right-click button.

This will also let you select text using the mouse and copy it to the clipboard from the Command Prompt by hitting Enter or right-clicking.

Windows 7 will save your QuickEdit mode preference, however if you are using an older OS version and want this to be the default behavior for the Command Prompt, use the Registry Editor (regedit.exe from Run), go to HKEY_CURRENT_USER \ Console and set the QuickEdit key's value data to 1. That should do the trick, permanently.
If you're unfamiliar with Windows' hotkeys, or more specifically Windows 7's new hotkeys, be sure to check out this list for useful shortcuts. A few examples: Win+Space shows the desktop, and Shift+Click on a taskbar icon will open a new program instance.

Check If Someone Is Using Your Wi-Fi



There are many reasons why you'd want to check if an unauthorized party is using your wireless network. It may be that you're experiencing a slower than normal Internet connection or you simply don't want anyone getting a free ride while you pay the bill. Of course, there are also security implications if this person can somehow access files on your network, and even legal implications if he uses your connection for piracy or other illicit activities.
Whatever the case it's better to stay on the safe side. Many of you may have already taken some basic precautions when setting up your wireless network and know your way around troubleshooting these issues. This brief guide is aimed mostly at novice users in need a hand to find out if, indeed, their Wi-Fi is being stolen.

Check the devices associated with your router The first thing you need to do is login to your router's administrative console by typing its IP address directly into the browser address bar -- typically 192.168.0.1 or 192.168.1.1 depending on which router you have. If you don't know your router's default address check out this guide or simply go to the command prompt (Start > Run/Search for cmd) and enter ipconfig. The address you need should be next to Default Gateway under your Local Area Connection.
Alternatively, if you are on a Mac, you can find the default address by going to Network under System Preferences. It should be listed right next to "Router:" if you are using Ethernet, or by clicking on "Advanced…" and heading to the "TCP/IP" tab if you are using Wi-Fi. Next, point your browser to that address and enter your login details -- if you haven't changed the default settings it should be a combination of "admin" and "password" or blank fields. Here's a default username and password list (PDF) you might find useful, but we recommend you change this afterwards.
Once inside your router's administrative console look for a section related to connected devices or wireless status. In my old DIR-655 from D-Link it's available under Status > Wireless but you'll find it as "Attached Devices" in Netgear routers, under DHCP Clients Table on Linksys routers, "Device List" if you are using the Tomato firmware, and so on.

DHCP client list examples on D-Link and Linksys routers.
This should provide a table with the IP, MAC address and other details of every device currently connected to the router. Check that list against your gear to find any intruders. You can find out the MAC/IP address of your computers by going to the Command Prompt again and entering 'ipconfig /all'. The MAC address will be shown as the physical address. I'll let you figure it out for mobile devices like smartphones and media players since I can't possibly list all options.

Taking action The best and simplest solution is to set up a strong password using WPA2 or WPA -- WEP is very easy to crack so avoid that if possible. There are some other methods you can use to beef up security, like switching off the SSID broadcast (which prevents it from advertising the name of your network to nearby Wi-Fi devices) or setup a filter for allowed or blocked devices by MAC address. It won't stop the most determined intruder but it will slow him down.
That should be more than enough for most users but if you need to actually track down who's been breaking into your network it's possible to pinpoint his physical location using a tool called MoocherHunter. You'll need to burn a Live CD to boot your laptop with and walk around to track down unauthorized wireless clients. According to the program's description, it detects traffic sent across the network and can find the source within 2 meters accuracy.
Needless to say, we're not suggesting you take matters into your own hands, but it might come in handy if someone is getting you in trouble with authorities using your network for illegal purposes -- or simply to have a cool story to tell.

Bonus: Profit by setting up a paid Wi-Fi hotspot If it doesn't bother you to have someone piggybacking on your connection you might as well get something in return, right? Chillifire is a good third-party firmware alternative if you want to run a public hotspot, as it allows you to offer for-pay or free Internet access points from your consumer router. Alternatively, you can get a Fonera router, which gives you free roaming at Fon Spots worldwide in return for sharing a little bit of your WiFi at home.
Remember to check our new Product Finder when shopping for your next wireless router!

Why Computer Voices Are Mostly Female



STORY HIGHLIGHTS
  • Studies have shown people generally find women's voices more pleasing than men's
  • Scholar: "It's much easier to find a female voice that everyone likes than a male voice"
  • In Germany, some BMW drivers refused to take GPS directions from a woman
  • Tech companies may avoid male computer voices because of HAL from the move "2001"
(CNN) -- To most owners of the new iPhone, the voice-activated feature called Siri is more than a virtual "assistant" who can help schedule appointments, find a good nearby pizza or tell you if it's going to rain.
She's also a she.
Siri answers questions in a part-human, part-robot voice that's deep, briskly efficient and distinctly female. (At least in the U.S. and four other countries. In France and the UK, Siri is male.)
People describe the app using female pronouns. Her gender has even prompted some users to flood blogs and online forums with sexually suggestive questions for Siri such as "What are you wearing?" (Siri's baffled response: "Why do people keep asking me this?")
The fuss over Siri's sex also raises a larger question: From voice-mail systems to GPS devices to Siri and beyond, why are so many computerized voices female?
One answer may lie in biology. Scientific studies have shown that people generally find women's voices more pleasing than men's.
"It's much easier to find a female voice that everyone likes than a male voice that everyone likes," said Stanford University Professor Clifford Nass, author of "The Man Who Lied to His Laptop: What Machines Teach Us About Human Relationships." "It's a well-established phenomenon that the human brain is developed to like female voices."
HAL, the homicidal artificial intelligence in \
HAL, the homicidal artificial intelligence in "2001: A space Odyssey," may have scared manufacturers away from male automated voices.
Research suggests this preference starts as early as the womb, Nass said. He cites a study in which fetuses were found to react to the sound of their mother's voice but not to other female voices. The fetuses showed no distinct reaction to their father's voice, however.
Another answer lies in history. According to some sources, the use of female voices in navigation devices dates back to World War II, when women's voices were employed in airplane cockpits because they stood out among the male pilots. And telephone operators have traditionally been female, making people accustomed to getting assistance from a disembodied woman's voice.
When automakers were first installing automated voice prompts in cars ("your door is ajar") decades ago, their consumer research found that people overwhelmingly preferred female voices to male ones, said Tim Bajarin, a Silicon Valley analyst and president of Creative Strategies Inc.
This may explain why in almost all GPS navigation systems on the market, the default voice is female. One notable exception has been Germany, where BMW was forced to recall a female-voiced navigation system on its 5 Series cars in the late 1990s after being flooded with calls from German men saying they refused to take directions from a woman.
"Cultural stereotypes run deep," said Nass, who details the BMW episode in his book.
Voice casting
Most companies that produce automated voices hold auditions for voice actors and collect recordings of them speaking. Then they invite focus groups to listen to the recordings and rate the voices on how well they convey certain attributes: warmth, friendliness, competence and so on.
"It's casting," Nass said. "It's something Hollywood has known for a long, long time."
Look no further than examples of automated or artificial-intelligence voices in sci-fi movies and TV shows. Voices of authority or menace tend to be male: the homicidal HAL 9000 computer in "2001: A Space Odyssey," the computer program in "WarGames," or Auto, the spaceship's autopilot function in "Wall-E." More subservient talking machines, such as the onboard computer from the "Star Trek" TV series, skew female.
Bajarin, the Silicon Valley analyst, believes that more computerized voices would be masculine if not for the associations with HAL, whose malicious intent in the 1968 Stanley Kubrick film was made even creepier by his soothing tone.
"A lot of tech companies stayed away from the male voice because of HAL," he said. "I've heard that theory tossed around multiple times." (One prominent exception: The chipper "You've got mail!" voice from AOL's dial-up days.)
What Apple did is absolutely brilliant. They took Siri and gave it more of a personality.
Norman Winarsky
When it comes to consumer applications of computerized voices, the sex of the voice is usually determined by what service or product is employing it. For example, transit systems such as the San Francisco Area's BART often use higher-pitched voices because they are easier to hear over the clatter of the train cars.
Nuance, a Massachusetts-based company that develops speech technologies for Ford vehicles' SYNC system, Amazon e-readers and other clients, creates both male and female voices. It's then up to the client to choose which voice, and gender, best fits their product, said chief creative officer Gary Clayton.
"As these products become part of our everyday lives, there's a huge opportunity for personalization," added Brant Ward, the company's director of advanced speech design. "I could have an approximation of my wife's voice read me a text message in my car."
Siri: Brilliant or sexist?
Siri, the iPhone 4S's voice, grew from a five-year research project that was funded by military agency DARPA and led by SRI International, a Bay Area research institute. The project spawned a company, also called Siri, that launched an iPhone app in February 2010 and was acquired by Apple two months later.
That original Siri voice-to-text app -- powered in part by Nuance's technology -- also worked by people speaking commands into their phones, although it didn't talk back. And it had no gender. In fact, the app was originally conceived to speak in a gender-neutral voice, said Norman Winarsky, vice president of SRI and a co-founder of Siri.
"What Apple did is absolutely brilliant," said Winarsky, who calls speech "the most natural of all human interfaces."
"They took Siri and gave it more of a personality," he said. "It's the first real artificial intelligence working in millions of people's hands."
An Apple spokeswoman declined to comment on why the company gave Siri a female voice in the U.S. Nor would she say why Siri speaks like a man in the UK, where iPhone 4S owners have swarmed online forums to request a female voice instead. "Eww!! Hope UK gets female voice soon," wrote one commenter. "I don't think anyone in the US cares about male voice option."
Many GPS devices and computer text-to-speech programs now offer multiple voice options. And someday soon, voice-technology experts say, Siri will probably speak in a variety of voices, too.
Until then, some bloggers have wondered: Are computerized female "assistants" sexist?
Not necessarily, said Rebecca Zorach, director of the Social Media Project at the University of Chicago's Center for the Study of Gender and Sexuality.
"I think they have to be understood in a broader context in which they're one small piece," she wrote in an e-mail to CNN. "Voices intended to convey authority (such as voice-over narration in films) tend to be male. So yes, probably these compliant female robot voices reinforce gender stereotypes, not just because they serve the user but because the technology itself is about communication and relationships (areas that women are presumed to be good at).
"I wouldn't automatically claim any sexism in individual companies' choices, though. Most such decisions are probably the result of market research, so they may be reflecting gender stereotypes that already exist in the general public."
Zorach listened to some sound clips of Siri online, then e-mailed back again.
"What's interesting to me is how they seem to intentionally make her speech sound artificial -- they could choose to make her speech more seamless and human-like, but they choose instead to highlight the technology," she said. "That makes you aware of how high-tech your gadget is."

Apple iPod: 10 Years of the Ubiquitous Media Player


A decade ago, Apple launched an MP3 player that can be partly attributed with shaping the landscape of today's mobile computing market. Along with being the best-selling portable media player and saving Apple from near irrelevance, the iPod influenced many of Cupertino's ambitious and revolutionary projects, forcing much of the industry into a perpetual state of catch-up. Apple's iPhone birthed the smartphone as we know it and stands as the top-selling device of its kind -- likewise with the iPad and the tablet segment, despite Microsoft's early dabblings. Software-wise, the iTunes Store paved the road for digital music sales and represents the world's largest music retailer, while the App Store's sales dwarf all the competition combined -- Android included.
In fact, the iPod and related products prompted Apple to change its name from "Apple Computer, Inc." to just "Apple Inc.” Without fawning over Apple's every endeavor, we'd like to pay homage to the company's game-changing gadget on its 10th birthday. Join us as we take a brief stroll down memory lane.

First iPod 5, 10GB -- Oct. 23, 2001
The first iPod was developed in less than a year and although it didn't flip the music industry upside down overnight – in fact received a lot of criticism – it laid the conceptual framework for grander things to come. Powered by a dual-core 90MHz ARM-based PortalPlayer processor and 5GB 4200RPM Toshiba HDD (a 10GB version came later), the rudimentary device only supported Mac computers as well as AAC, MP3 and WAV audio files. The first version of iTunes for Mac was released the same year in January. Also: Watch the first iPod being introduced by Steve Jobs.
iPod 2nd Gen 10, 20GB -- July 2002
Apple's second-generation music player arrived less than a year after the original device and brought several refinements including a cover for the FireWire port, an improved Hold switch and double the storage capacity. It also abandoned the first-gen's mechanical scroll wheel in favor of the touch-sensitive wheel used on many future iPods. This model introduced support for Windows via Musicmatch, prior to this tech-savvy users were forced to use workarounds for Windows compatibility.
iPod 3rd Gen 10, 15, 20, 30, 40GB -- April 2003
By April 2003, Apple prepared a full redesign of the iPod, adding an all-touch interface, a dock connector, a slimmer body and the maximum storage capacity was doubled to 40GB. The company also brought its own media platform (iTunes 4.1) to Windows, severing ties with Musicmatch. The iPod's increasing popularity prompted retailers Best Buy, Target and Dell to carry the device between 2002 and 2003. Microsoft and Creative prepared their rivals, the Media2Go and Nomad Zen.
First iPod Mini 4GB – Jan. 2004
After focusing on adding features to its original design, Apple went back to the drawing board and introduced a scaled-down minimalist iPod. The $249 iPod Mini was the first to have Apple's Click Wheel and only offered 4GB of storage. Despite its slimmer, trendier design, many criticized the device's value. Around the same time, Apple replaced its $299 10GB iPod with a 15GB model, forcing retailers to reduce the 10GB model to $249. This caused consumers to be even more skeptical of the Mini.
iPod 4th Gen & iPod Photo 20, 30, 40, 60GB -- July 2004
The first fourth-gen version came in July with a redesigned Hold switch and the iPod Mini's Click Wheel. In October, Apple introduced a premium version called the iPod Photo ($499-$599), which had improved battery life (15 hours versus 12), a color screen and support for common image formats, which was especially cool for album art. In February 2005, Apple replaced the 40GB iPod Photo with a thinner, cheaper 30GB model. By June, it decided to merge the iPod Photo and iPod “Classic” lines. (Picture shows first U2 special edition iPod).
iPod Shuffle: First and 2nd Gen Jan 2005 & Sep 2006
Shrinking its media player further, Apple introduced the first iPod Shuffle in early 2005. It served as an entry-level model with only 512MB or 1GB of storage and no display. Pricing was originally set at $99-$149. The second-gen Shuffle arrived well over a year later. It was roughly half the size of its predecessor with a belt clip and a more attractive aluminum case. Apple called it the "most wearable iPod ever." Despite its smaller size, it doubled storage capacities to 1GB and 2GB.
First iPod Nano 1, 2, 4GB -- Sep. 2005
The second-gen iPod Mini landed shortly after the first Shuffle and offered an incredible battery life of 18 hours (the first Mini lasted 8 hours). It also introduced a 6GB model along with minor cosmetic tweaks. The Mini line was discontinued later in 2005 when Apple shipped the first iPod Nano, which was essentially a smaller version of the Mini (half the thickness and roughly 11mm narrower). However, it had less maximum storage (4GB max versus 6GB) and a shorter 14-hour battery life.
iPod 5th Gen (Video) 30, 60, 80GB -- Oct. 2005
2005 was a monumental period for the iPod. Along with refining the fourth-gen iPod and releasing the Mini 2, Nano 1, Shuffle 1, Apple unveiled a completely redesigned fifth-gen iPod with a thinner case, a larger 2.5-inch 320 x 240 screen, and support for common video formats such as MP4 and H.264. The latter feature earned it the nickname "iPod Video." Additionally, sales skyrocketed 400% to 22.5 million units this year, dwarfing all previous years combined.
iPod Nano 2nd Gen 2, 4, 8GB – Sep. 2006
Compared to the year prior, 2006 was fairly mild for the iPod, though its sales remained strong and represented nearly half of Apple's total revenue. It brought a new version of the increasingly popular Nano, which offered a scratch-resistant anodized aluminum casing, more color choices, a brighter display, double the storage size and a huge boost in battery life from 14 to 24 hours. The second-gen Shuffle was also released, as was a 80GB version of the fifth-gen iPod.
First iPod Touch 8, 16, 32GB -- Sep. 2007
In an ironic twist, considering the iPod is arguably responsible for the iPhone's creation, Apple introduced the music player's greatest overhaul. Utilizing existing iPhone hardware and software, it was the first iPod to feature a multitouch display and Wi-Fi, the latter of which allowed users to browse the Web via Safari as well as access the iTunes Store and YouTube. It only lacked the iPhone's cellular connectivity and services along with its speakers and camera.
iPod Classic and iPod Nano 3rd Gen 80, 120, 160GB / 4, 8 GB -- Sep. 2007
The "Classic" branding for the traditional iPod didn't come until its sixth generation. Apple's latest addition shed the familiar white polycarbonate front plate for silver anodized aluminum and it abandoned the special edition models. It also had a thinner shell, a revamped user interface, and offered up to 36 hours of music and 6 hours of video playback.

Although the iPod Touch garnered much of the spotlight during Apple's launch in September 2007, the company also unveiled a promising Nano revision that scraped the rectangular shape in favor of a smaller, nearly square design. It was 19mm shorter and 11mm wider than its predecessor with the same storage capacities and battery life. It more than doubled the resolution from 176 x 132 to 320 x 240 and received a Cover Flow interface. Some folks criticized the third-gen Nano's lack of a touchscreen.
iPod Nano 4th Gen 4, 8, 16GB -- Sep. 2008
iPod Nano 5th Gen 8, 16GB -- Sep. 2009
The fourth-gen Nano reintroduced the elongated shell, though Apple managed to shave 0.5mm off the thickness and 12.5mm off the weight despite adding a larger display, more storage, as well as an accelerometer for horizontal viewing (videos, namely) and the ability to shuffle songs by shaking the device. This design was refined the following year as the fifth-gen iPod Nano gained a larger screen, a camera, an FM radio, a speaker, a pedometer, improved jack placement and a polished paint job.
iPod Touch 2nd Gen 8, 16, 32GB -- Sep. 2008
iPod Touch 3rd Gen 32, 64GB -- Sep. 2009
As with the iPhone, the iPod Touch remained largely unchanged through its first few revisions. The second-gen device received a tapered chrome back, volume buttons and a built-in speaker. More importantly, it was the first iPod to ship with Apple's recently launched App Store. Unsurprisingly, the third-gen iPod Touch mirrored the iPhone 3GS' changes, which included a quicker processor and graphics core, more RAM, Voice Control support, and a model with 64GB of flash storage.
iPod Shuffle 3rd Gen 2, 4GB -- Mar. 2009
Although Apple refreshed the second-gen Shuffle several times with new colors, the series went nearly three years without a serious overhaul. Its successor shipped in March 2009 with twice the storage (4GB), a smaller body that was reminiscent of Apple's first Shuffle design, and a completely new interface. Instead of hardware buttons on the device itself, Apple moved the volume and playback controls to the right earbud cable and introduced VoiceOver functionality for hands-free control.
iPod Nano 6th Gen 8, 16GB -- Sep. 2010
iPod Shuffle 4th Gen 2GB -- Sep. 2010
The sixth (and current) generation iPod Nano borrowed elements from 2007's iteration but it delivered what the third-gen couldn't: a touchscreen. The device features a 240 x 240 multitouch display and given its 1.47 x 1.61-inch dimensions, Apple cut its predecessor's camera and video playback, but retained functionality relevant to active users like the pedometer. Meanwhile, the fourth-gen iPod Shuffle essentially serves as an entry-level Nano without its touchscreen interface and accelerometer.
iPod Touch 4th Gen 8, 32, 64GB -- Sep. 9 2010
Some three years and four generations after the first touchscreen model, iPod sales began a noticeable decline -- a fate largely induced by the iPhone and competing Android handsets. The line between portable music players and smartphones (especially the iPod Touch and iPhone) has grown incredibly blurred. Nonetheless, the fourth-gen iPod Touch represents Apple's finest offering to date with a high-res "Retina" display, Apple's A4 SoC, as well as front and rear cameras for FaceTime and video recording.
 
So, which iPod models have you owned over the years? Share your thoughts in the comments.