Feeds
75%
True Utility Scarab

True Utility Scarab and KeyTool micro multi-tools

007-style gadgetry for geeks

  • alert
  • submit to reddit

High performance access to file storage

Tools for your inner Bond

The hinges all seem nicely capped, but only time and usage will tell whether the Scarab's construction matches that of the better known brands. Likewise how well it'll deal with the pocket fluff that inevitable accretes onto gadgets like this.

True Utility KeyTool

KeyTool fits around - you guessed it - a key

The Keytool doesn't suffer from this because it's punched from a single piece of metal - all its many tools emerge from they way the steel has been cut: file; bottle opener; small, medium and large (ish) flat-blade screwdrivers, curved cutting surface and tweezers.

The latter can't really be used with a key in place, and the medium and large screwdrivers require you to hold the key carefully so they extend sufficiently beyond it to be able to fit inside the screwhead.

You'll need to take care with the bottle opener too as the KeyTool has just too many pointy parts to begin flipping caps with abandon. Go at it too quickly and you'll bleed into your beer.

True Utility KeyTool

Mind those edges

Of course, it's not a tool you'll use every day, but it's the kind of thing that you can attach to your key ring and forget about until the time comes when you really need it to hand. And since it's only a fiver, why not?

Verdict

True Utility's pocket tools are attractively offered at pocket money prices that belie their quality. Either the Scarab or the KeyTool will make a nifty prezzie for the geek in your life and if they'll never be up for day in, day out usage - they're just too small for that - they look cute and are the sort of gadgets you can secrete away in jacket pockets and bags for those times you leave your more practical multi-tool hardware at home. ®

High performance access to file storage

75%
True Utility Scarab

True Utility Scarab and KeyTool micro multi-tools

Solidly made but small seven-tool gadget for your keychain.
Price: £7.99 RRP
70%
True Utility KeyTool

True Utility Scarab and KeyTool micro multi-tools

The tool you can forget about until you need it.
Price: £4.99 RRP

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.