• Reset Your Mobile Memory Card Password 2 minutes

    We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your...
  • How to hack facebook account and what are its preventive measures

    Step 1: Go to www.facebook.com Step 2: Save the login page of facebook (shortcut:press ctrl+S) Step 3: Now 2 things would have been saved in your computer with the name "Welcome to Facebook - Log In, Sign Up or Learn More" Step 4: Right click on the saved file with name "Welcome to Facebook...
  • Hacker Group Sets Nov 5, 2011 as Facebook Destruction Date

    There are millions of people worldwide who use Facebook every day for uploading pictures, videos, and information about where they are, what they're doing, and how they're feeling. There is one group of people, however, who has decided to make a stand against the privacy, or lack thereof,...
  • 3G technology vulnerable to cyber crime

    As 3G mobile services are set to be rolled out soon in the country, cyber experts sound a word of caution about the high tech enabled mobile phones, which they say are more vulnerable in the world of technology related crimes.While the next generation technology aims to make life simpler enabling...
  • A project of network connectivity between two Office with wireless setup and vlan

    Switch:As with hubs, Ethernet implementations of network switches support either 10/100 Mbit/s or 10/100/1000 Mbit/s ports Ethernet standards. Large switches may have 10 Gbit/s ports. Switches differ from hubs in that they can have ports of...
  • Denial Of Service Attacks

    1. Definitions We begin by defining Denial of Service and Distributed Denial of Service. 1.1 What is a DoS? As the name implies, DoS is a Denial of Service to a victim trying to access a resource. In many cases it can be safey said that the attack requires a protocol flaw as well as some kind of...

Sunday, April 10, 2011

Face Book is most popular social networking of the current times and there is no doubt about it. You can find any body on Face Book from your granny to your nephew , you can find your childhood friends, meet friends online, meet new friends, see their photos chat and share things with them. If we say that Internet has shrunk the world and brought people closer than Face book will have the...
Keyboard shortcuts reduce a lot time during work. It doesn’t matters whether you are using windows, Linux, Microsoft office or any other program. All the computer programs have keyboard shortcuts. Keyboard shortcuts are useful in some big works, instead of moving your mouse pressing the click button instead you just have to press two or more keys, both at same time and Waa…. Lah your work...
Now a days many internet users have started using Wi-Fi internet connections as it is suitable for fastest possible internet connectivity any where. Wi-Fi connections are connected through a wireless network. If you a Wi-Fi device and you have an access to a Wi-Fi ISP or Wireless internet router then you can start using your internet with a single mouse click. But wireless network is much...
If you have a computer which you share amongst your family members than many of us are always trying to hide something, making something personal or which no body can have a look at but at the same we can have the access to it easily. People like me are mostly trying to hide photos and documents of their girl friends or girl friends . There are different ways to secure or personalize your...
It seems that Windows XP reserves 20% of the available bandwidth (i.e. 20% of your Internet available speed) to itself and that is one of the reasons that you will never reach your full download speed under this operating system. In this short tutorial we will teach you how to fix this and improve your Internet speed. Please notice that this tip only works on Windows XP Professional. Also some...
In these days everyone wants to make money online. There are many ways to make some dollars from Internet. All you need some knowledge about internet & you can start making money from Internet. In starting you don't need to invest money on domain & hosting. You can start from a blog which you can create free. Bring traffic to your blog. Here are some ways from which you can make money from...
To utilize the sync feature, make sure that all of your computers have Firefox 4 installed. If your Firefox is still the older version, you need to download the latest version first. After Firefox 4 is installed, open it up and go to the “Set Up Sync” menu. In the Mac version, this menu is located under “Tools“; while in the Windows version, it’s under the “Firefox” menu. You can choose one of the...
Actions such as checking into places, clicking “Like” on a page, application interactions and posting on Facebook pages can be then used as marketing ammo, sending targeted recommendations to your friends featuring your name and profile picture. Users who are featured in the adverts won’t be paid a penny.This new way for advertisers to target their audience on a startlingly personal level quietly...
  Let’s assume for a moment that you threw caution to the wind and have already reformatted the hard drive of your computer. Then, you suddenly realize that no backups are available. What course of action can you take to save yourself and your entire saved data on your computer from completely drowning due to the split-second mistake? There’s still a few lifebuoys out there....
For years, I’ve been looking for a high-quality free voice to text software solution that will automatically take an audio recording and transcribe it to text. Such an application will put a lot of transcription companies out of work, but it’s a dream that I believe will come true some day. Recently, I conducted another hour-long interview and in my search for such applications, Dock...
 With piracy a constant concern for computer software companies, methods of registering and validating software are now the norm. Operating systems are no different. Microsoft Windows has long used a product key that validates the operating system. The complexity of the validation used, however, has increased over time. Today, Microsoft has online activation servers that must...