technology loader
Featured Articles
technology

Sunday, 19 January 2014


Mobile processors have been taken to a different level altogether recently. Smartphone giants like Samsung are boasting the Exynos 5 octa core, while Apple came up with its A7 processor with a 64-bit architecture. Of course, Samsung isn’t far behind. The global leader of the smartphone market is expected to launch its own 64-bit processor with the Galaxy S5 flagship device. Add to all this the Qualcomm Snapdragon 800 quad core processor, which I’m sure you have all heard about.

There really is one big question. Does a better processor guarantee better performance? If yes, then why does HTC, Taiwanese smartphone maker repeatedly chose a processor that is below others in the segment. Or, why did Apple not have a quad core processor in the new iPhone 5S. Moreover, why did Anandtech’s analysis of the processors show the iPhone 5S to be stronger than the Samsung Galaxy S4 and others? It’s as that old song goes, the answer my friend, is blowing in the wind.

Whether it is Qualcomm, Nvidia or Cortex, a high performance dual core processor can often provide better performance than a low end quad core processor. This is the concept that is going behind Apple’s seemingly high performing A7 dual core processor. Further, the RAM also plays a part in the performance. As was pointed out by many after the release of the iPhone 5S, with low RAM, your device will not be able to multi task anyway. So, you may have a 2.3 GHz processor, but without adequate RAM, you’re not going to be able to use it anyway.

In smartphones, the biggest hindrance to the processor is the attached storage. Here we have three avenues, the internal storage, external micro-SD card and the RAM. You may have a high end processor in your smartphone, but if your hardware is not good enough to respond to such speeds, it again becomes useless. This is in fact what many relatively unknown mobile makers do. When you’re buying a micro-SD card, be sure to purchase a good quality card, belonging to the class 10 SD cards.

There is another aspect to the processor performance as well. Many people use apps like Facebook, Twitter etc. on their high end mobile phones and comment on how they don’t see a difference in the performance. The reason is simple- these apps aren’t developed to perform better on multi-core systems. You may have a Snapdragon 800 processor, but you will feel the difference when you’re using other apps. In most cases, gaming and multimedia apps are the ones that show the difference. Try playing The Dark Knight Rises on the Snapdragon 800 processor. You will see.

Another aspect of mobile processors that many don’t know about is how much battery they are draining. A high end processor often needs a high powered battery as well. Consider the Nvidia Tegra 3 processor for example. This one can shut down it cores depending on when they are being used, as a result, your battery is not drained quite as easily. Your battery is drained the most when all the cores of the processor are running simultaneously.

To the average smartphone customer, selling a phone based on the mobile processor is quite easy. Why? Because we look only at the clock speed (2.3 GHz, 1.6 GHz etc.) and the number of cores in the processor. In reality, mobile processors are very similar to a PC processor, which means that a good processor needs a lot more for it to perform at its best. Contrary to popular belief, it’s not very tough to understand either. Reading up on processors is always beneficial when you’re buying a smartphone, especially the good ones.

All about Mobile Processors


Mobile processors have been taken to a different level altogether recently. Smartphone giants like Samsung are boasting the Exynos 5 octa core, while Apple came up with its A7 processor with a 64-bit architecture. Of course, Samsung isn’t far behind. The global leader of the smartphone market is expected to launch its own 64-bit processor with the Galaxy S5 flagship device. Add to all this the Qualcomm Snapdragon 800 quad core processor, which I’m sure you have all heard about.

There really is one big question. Does a better processor guarantee better performance? If yes, then why does HTC, Taiwanese smartphone maker repeatedly chose a processor that is below others in the segment. Or, why did Apple not have a quad core processor in the new iPhone 5S. Moreover, why did Anandtech’s analysis of the processors show the iPhone 5S to be stronger than the Samsung Galaxy S4 and others? It’s as that old song goes, the answer my friend, is blowing in the wind.

Whether it is Qualcomm, Nvidia or Cortex, a high performance dual core processor can often provide better performance than a low end quad core processor. This is the concept that is going behind Apple’s seemingly high performing A7 dual core processor. Further, the RAM also plays a part in the performance. As was pointed out by many after the release of the iPhone 5S, with low RAM, your device will not be able to multi task anyway. So, you may have a 2.3 GHz processor, but without adequate RAM, you’re not going to be able to use it anyway.

In smartphones, the biggest hindrance to the processor is the attached storage. Here we have three avenues, the internal storage, external micro-SD card and the RAM. You may have a high end processor in your smartphone, but if your hardware is not good enough to respond to such speeds, it again becomes useless. This is in fact what many relatively unknown mobile makers do. When you’re buying a micro-SD card, be sure to purchase a good quality card, belonging to the class 10 SD cards.

There is another aspect to the processor performance as well. Many people use apps like Facebook, Twitter etc. on their high end mobile phones and comment on how they don’t see a difference in the performance. The reason is simple- these apps aren’t developed to perform better on multi-core systems. You may have a Snapdragon 800 processor, but you will feel the difference when you’re using other apps. In most cases, gaming and multimedia apps are the ones that show the difference. Try playing The Dark Knight Rises on the Snapdragon 800 processor. You will see.

Another aspect of mobile processors that many don’t know about is how much battery they are draining. A high end processor often needs a high powered battery as well. Consider the Nvidia Tegra 3 processor for example. This one can shut down it cores depending on when they are being used, as a result, your battery is not drained quite as easily. Your battery is drained the most when all the cores of the processor are running simultaneously.

To the average smartphone customer, selling a phone based on the mobile processor is quite easy. Why? Because we look only at the clock speed (2.3 GHz, 1.6 GHz etc.) and the number of cores in the processor. In reality, mobile processors are very similar to a PC processor, which means that a good processor needs a lot more for it to perform at its best. Contrary to popular belief, it’s not very tough to understand either. Reading up on processors is always beneficial when you’re buying a smartphone, especially the good ones.

Posted at Sunday, January 19, 2014 |  by Rajat Khandelwal

Wednesday, 8 January 2014



Rooting your Android device is the first step that you can take for making the most of your Android OS. After the device is rooted, you can customise the device to improve its performance, which is not possible on a non-rooted device. We take a look at some of the most essential Root apps out there in an effort to make your life with your Android device a lot easier. You can click on the application name and download it.

To know more about Rooting Check out this post: All That You Need To Know About Rooting


Juice defender Ultimate:This app is supercool in as much as it can turn your phone into a battery saving machine, squeezing valuable hours out of an otherwise lackluster battery performance. This it does by tweaking your connectivity options.

GooManager:This app is great for those who want to install anything up for grabs at goo.im. The app interface is easy to use and helps the user with a lot of files that they might’ve otherwise have to Google Search to find.

Tasker:Tasker allows you to make things happen in an automated manner, especially when you’ve put in place certain steps. However, in case as a user you want to enable or disable airplane mode, connect or disconnect VPNs, or do other advanced things that Android doesn’t allow apps to do, the user would have to give Tasker root access.

SuperUser:The app was developed by Koushik Dutta. The app is basic and something that is a bit of a must-have. With this app, the user can either give or deny root permission to other apps.

Greenify:If you are one of those mobile users that are perpetually on their phones and like to download and browse a variety of apps, then Greenify is just the app that is meant for your specific requirement. This battery-saving app automatically hibernates battery hogging apps that linger in the background once the user is done using them. Once the app has been installed on a given device, all the user needs to do is add applications that they want Greenify to hibernate, and the app will take care of the rest. Though apps hibernate, they don’t freeze and can be used as usual.

Titanium Backup: is an enormously useful app. Not only can it backup apps, but it can backup apps and all their data, and it can delete apps—even system apps or bloatware. Making regular backups of all your apps (and their data) can ensure that if you ever really screw up, say in trying to install a custom ROM, that you can still have everything the way you left it should you need to wipe the entire phone and start from scratch. For more detailed information, see our full guide on using Titanium Backup.

Root Explorer: Root Explorer uses root access to let you browse files on your entire device.For root users, this is an essential task. There are a plethora of activities that require you rummaging through the root of your device and Root Explorer helps you do it. It has a clean interface, plenty of features, and is one of those essential tools for all root users.

Some Great Android Root Apps!



Rooting your Android device is the first step that you can take for making the most of your Android OS. After the device is rooted, you can customise the device to improve its performance, which is not possible on a non-rooted device. We take a look at some of the most essential Root apps out there in an effort to make your life with your Android device a lot easier. You can click on the application name and download it.

To know more about Rooting Check out this post: All That You Need To Know About Rooting


Juice defender Ultimate:This app is supercool in as much as it can turn your phone into a battery saving machine, squeezing valuable hours out of an otherwise lackluster battery performance. This it does by tweaking your connectivity options.

GooManager:This app is great for those who want to install anything up for grabs at goo.im. The app interface is easy to use and helps the user with a lot of files that they might’ve otherwise have to Google Search to find.

Tasker:Tasker allows you to make things happen in an automated manner, especially when you’ve put in place certain steps. However, in case as a user you want to enable or disable airplane mode, connect or disconnect VPNs, or do other advanced things that Android doesn’t allow apps to do, the user would have to give Tasker root access.

SuperUser:The app was developed by Koushik Dutta. The app is basic and something that is a bit of a must-have. With this app, the user can either give or deny root permission to other apps.

Greenify:If you are one of those mobile users that are perpetually on their phones and like to download and browse a variety of apps, then Greenify is just the app that is meant for your specific requirement. This battery-saving app automatically hibernates battery hogging apps that linger in the background once the user is done using them. Once the app has been installed on a given device, all the user needs to do is add applications that they want Greenify to hibernate, and the app will take care of the rest. Though apps hibernate, they don’t freeze and can be used as usual.

Titanium Backup: is an enormously useful app. Not only can it backup apps, but it can backup apps and all their data, and it can delete apps—even system apps or bloatware. Making regular backups of all your apps (and their data) can ensure that if you ever really screw up, say in trying to install a custom ROM, that you can still have everything the way you left it should you need to wipe the entire phone and start from scratch. For more detailed information, see our full guide on using Titanium Backup.

Root Explorer: Root Explorer uses root access to let you browse files on your entire device.For root users, this is an essential task. There are a plethora of activities that require you rummaging through the root of your device and Root Explorer helps you do it. It has a clean interface, plenty of features, and is one of those essential tools for all root users.

Posted at Wednesday, January 08, 2014 |  by Rajat Khandelwal

Monday, 6 January 2014


Samsung Electronics has unveiled a 'Smart Home' service at the CES 2014 event in Las Vegas. The new service gives a single integrated platform to connect and manage your Smart TVs, home appliances and smartphones. The Smart Home service will be commercially rolled out for Samsung appliances and devices in the first half of 2014.

Samsung Smart Home service will enable users to manage and control their home devices through a single application.The application will connect Home and personal devices including Smart TVs, refrigerators, washing machines to digital cameras, smartphones and even its GALAXY Gear smartwatch.

Device Control will let you monitor and control home devices - for example, lights and air-conditioning - via Smart Home apps for mobile devices and TVs. You will be able to do this no matter where you are situated. This lets you define a profile for different occasions, for example leaving your house or going to bed, and have your appliances and lights switched on and off by speaking a related command, such as "Going out." or "Good night!".

Wonpyo Hong, President, Media Solutions Center, Samsung Electronics stated, “With Samsung Smart Home, we are bringing our capabilities as the world’s number-one manufacturer of smart devices to make the connected home a reality for consumers today. In the coming days, we will continue to roll out better home services to our consumers to enable them to keep enjoying a brand-new experience of ‘Smart Living and Beyond.”

We are curious, does Samsung's idea of a Smart Home make you feel excited, skeptic, or somewhere in between? Leave your thoughts in the comments below.

Samsung Smart Home concept introduced.


Samsung Electronics has unveiled a 'Smart Home' service at the CES 2014 event in Las Vegas. The new service gives a single integrated platform to connect and manage your Smart TVs, home appliances and smartphones. The Smart Home service will be commercially rolled out for Samsung appliances and devices in the first half of 2014.

Samsung Smart Home service will enable users to manage and control their home devices through a single application.The application will connect Home and personal devices including Smart TVs, refrigerators, washing machines to digital cameras, smartphones and even its GALAXY Gear smartwatch.

Device Control will let you monitor and control home devices - for example, lights and air-conditioning - via Smart Home apps for mobile devices and TVs. You will be able to do this no matter where you are situated. This lets you define a profile for different occasions, for example leaving your house or going to bed, and have your appliances and lights switched on and off by speaking a related command, such as "Going out." or "Good night!".

Wonpyo Hong, President, Media Solutions Center, Samsung Electronics stated, “With Samsung Smart Home, we are bringing our capabilities as the world’s number-one manufacturer of smart devices to make the connected home a reality for consumers today. In the coming days, we will continue to roll out better home services to our consumers to enable them to keep enjoying a brand-new experience of ‘Smart Living and Beyond.”

We are curious, does Samsung's idea of a Smart Home make you feel excited, skeptic, or somewhere in between? Leave your thoughts in the comments below.

Posted at Monday, January 06, 2014 |  by Rajat Khandelwal

Friday, 27 December 2013



The introduction of the thumb drive by IBM and Trek back in 2000 was revolutionary. It saw the beginning of the first viable replacement of the floppy disks that had been used for conventional data storage since the mid-70s. With the fallout of the floppies between 2002 and 2009, thumb drives (later pen drives, pocket drives, flash drives and USB drives) made their way into being the most convenient method of storing data that can be carried around in your pocket.

The physical size and capacity of current flash drives in the market open avenues to more creative programming, helping people get more portable. Here are some innovative uses of a pen drive:


Predator
Everyone likes their privacy, and the people at Predator know it. Predator is a software created to lock your PC using your pen drive as a key. Most people use direct login.

The installer program will automatically start Predator. 
  1. If not, you can launch it manually via the Start Menu>All Programs>Predator item or via the Predator icon on the Desktop.
  2.  A dialog box will ask you to enter a password and to prepare a USB flash drive.
  3.  Insert your USB drive and click OK to continue.
  4.  Keep in mind that the current contents of your flash drive will be unchanged by this operation. Then you see the Preferences window. 
  5. Type the password of your choice in the “New Password” field. You will use it to unlock your session if you lose your USB key. You must enter at least six characters, letters, figures or signs. The password is case-sensitive. Also, avoid typing characters that require the AltGr key because this key is disabled in the Password Dialog box later. 
  6. Check that the drive letter displayed under USB key drive actually matches your flash drive or choose the correct letter from the dropdown list.
  7.  Click the Create key button and finally, click Ok.

ClamWin Portable Antivirus



Eradicating Viruses in any system is usually quite a task. Taking your own data storage devices to alien PCs is always a possible viral hazard. ClamWin reduces chance of your storage devices and hardware contracting viruses from other systems. A free Antivirus for Windows it has a track record for having a high detection rate of viruses and spyware. The Clam Antivirus Team updates its database regularly to include a new virus or variants of old viruses almost regularly.
To install the Antivirus on a pen drive, download the setup from: http://portableapps.com/apps/security/clamwin_portable

Once downloaded, install it in the location of your pendrive. After installation, go to H:/ClamWinPortable/ and run ClamWinPortable.exe (Replace H:/ with the name of the pendrive you’ve installed clamwin on).
Clamwin would prompt you to update your databases. Once updated, you’re set.

VLC Portable



In a scenario when using a PC where the system is uncared for (other offices, cyber cafes and in college), that a program as commonly available as VLC hasn’t been installed on it. VLC Portable is a program used to fix this inconvenience. It is a mobile version of the VideoLAN Player which can be installed on your pen drive and carried around, complete with codecs and a multilingual language pack.
To Install: Download the portable package from the VLC Portable page at http://portableapps.com/apps/music_video/vlc_portable  and begin installation.
 
A PortableVLC directory will be created and all the necessary files installed.

Amazing Stuffs to do with your Pendrive



The introduction of the thumb drive by IBM and Trek back in 2000 was revolutionary. It saw the beginning of the first viable replacement of the floppy disks that had been used for conventional data storage since the mid-70s. With the fallout of the floppies between 2002 and 2009, thumb drives (later pen drives, pocket drives, flash drives and USB drives) made their way into being the most convenient method of storing data that can be carried around in your pocket.

The physical size and capacity of current flash drives in the market open avenues to more creative programming, helping people get more portable. Here are some innovative uses of a pen drive:


Predator
Everyone likes their privacy, and the people at Predator know it. Predator is a software created to lock your PC using your pen drive as a key. Most people use direct login.

The installer program will automatically start Predator. 
  1. If not, you can launch it manually via the Start Menu>All Programs>Predator item or via the Predator icon on the Desktop.
  2.  A dialog box will ask you to enter a password and to prepare a USB flash drive.
  3.  Insert your USB drive and click OK to continue.
  4.  Keep in mind that the current contents of your flash drive will be unchanged by this operation. Then you see the Preferences window. 
  5. Type the password of your choice in the “New Password” field. You will use it to unlock your session if you lose your USB key. You must enter at least six characters, letters, figures or signs. The password is case-sensitive. Also, avoid typing characters that require the AltGr key because this key is disabled in the Password Dialog box later. 
  6. Check that the drive letter displayed under USB key drive actually matches your flash drive or choose the correct letter from the dropdown list.
  7.  Click the Create key button and finally, click Ok.

ClamWin Portable Antivirus



Eradicating Viruses in any system is usually quite a task. Taking your own data storage devices to alien PCs is always a possible viral hazard. ClamWin reduces chance of your storage devices and hardware contracting viruses from other systems. A free Antivirus for Windows it has a track record for having a high detection rate of viruses and spyware. The Clam Antivirus Team updates its database regularly to include a new virus or variants of old viruses almost regularly.
To install the Antivirus on a pen drive, download the setup from: http://portableapps.com/apps/security/clamwin_portable

Once downloaded, install it in the location of your pendrive. After installation, go to H:/ClamWinPortable/ and run ClamWinPortable.exe (Replace H:/ with the name of the pendrive you’ve installed clamwin on).
Clamwin would prompt you to update your databases. Once updated, you’re set.

VLC Portable



In a scenario when using a PC where the system is uncared for (other offices, cyber cafes and in college), that a program as commonly available as VLC hasn’t been installed on it. VLC Portable is a program used to fix this inconvenience. It is a mobile version of the VideoLAN Player which can be installed on your pen drive and carried around, complete with codecs and a multilingual language pack.
To Install: Download the portable package from the VLC Portable page at http://portableapps.com/apps/music_video/vlc_portable  and begin installation.
 
A PortableVLC directory will be created and all the necessary files installed.

Posted at Friday, December 27, 2013 |  by Rajat Khandelwal

Friday, 29 November 2013



To be successful in developing PHP sites, it is essential to have a good development environment. When producing web sites it is generally essential to edit HTML, CSS and JavaScript files. A usable IDE should supply all those file types offering a complete set of tools for effective development.




  1. NetBeans IDE(Free)  permits editing many files at once by dividing screen into several parts. For doing it, you must open two files and drag a marker of any file to the bottom of the screen. After this, you will find a red framework in text box in the lower part of screen. It is supported by operating systems like Linux, Windows and Mac OS X.
  2. Zend Studio – This is among the most comprehensive PHP IDE available and has powerful PHP and Javascript debugging, team collaboration and remote server tools. It is among the highest priced PHP IDEs, although it has a free version, which does not offer great features.
  3. Aptana Studio PHP Editor(Free) –  It is a leading open-source HTML editor and most people do not know that it also comes with a PHP support. It is developed on Eclipse platform and supported by operating systems like Linux, Windows and Mac OS X. 
  4. PhpStorm – This offers qualitative and rich facilities for PHP code editing that include highlighting, conformation of code formatting, fast error checking, intensive code autocomplete. It is supported by Linux, Windows and Mac OS X.
  5. Eclipse PDT – It is designed to permit developers to select language, platform, and vendor environment. It has a wide range of plug-ins, tools, and examples. It is a program that makes it available for constructing, integrating, and using software tools. It is supported by operating systems: Linux, Windows and Mac OS X. The installation comes with all essential tools to elaborate on PHP. 

PHP IDE For Website Developers



To be successful in developing PHP sites, it is essential to have a good development environment. When producing web sites it is generally essential to edit HTML, CSS and JavaScript files. A usable IDE should supply all those file types offering a complete set of tools for effective development.




  1. NetBeans IDE(Free)  permits editing many files at once by dividing screen into several parts. For doing it, you must open two files and drag a marker of any file to the bottom of the screen. After this, you will find a red framework in text box in the lower part of screen. It is supported by operating systems like Linux, Windows and Mac OS X.
  2. Zend Studio – This is among the most comprehensive PHP IDE available and has powerful PHP and Javascript debugging, team collaboration and remote server tools. It is among the highest priced PHP IDEs, although it has a free version, which does not offer great features.
  3. Aptana Studio PHP Editor(Free) –  It is a leading open-source HTML editor and most people do not know that it also comes with a PHP support. It is developed on Eclipse platform and supported by operating systems like Linux, Windows and Mac OS X. 
  4. PhpStorm – This offers qualitative and rich facilities for PHP code editing that include highlighting, conformation of code formatting, fast error checking, intensive code autocomplete. It is supported by Linux, Windows and Mac OS X.
  5. Eclipse PDT – It is designed to permit developers to select language, platform, and vendor environment. It has a wide range of plug-ins, tools, and examples. It is a program that makes it available for constructing, integrating, and using software tools. It is supported by operating systems: Linux, Windows and Mac OS X. The installation comes with all essential tools to elaborate on PHP. 

Posted at Friday, November 29, 2013 |  by Rajat Khandelwal

Thursday, 28 November 2013

bat file


Today I am here to show you BAT file trick which can help you to show fake hacking trick to your friends. Mostly this trick is used in the Tom Cruz movies to show hacking. lol

Follow the steps below:
  1. Open Notepad
  2. Type the following in Notepad
  3. :techieCode
    color 02
    @echo off
    echo %random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%
    goto techieCode
    
  4. Save the file with the .bat extention.
  5. fake hacking
  6. And now open the bat file and here is the magic.
bat file hacking

You can also download the bat file form here its completely harmless 

Show Fake Hacking Skills To Your Friends

bat file


Today I am here to show you BAT file trick which can help you to show fake hacking trick to your friends. Mostly this trick is used in the Tom Cruz movies to show hacking. lol

Follow the steps below:
  1. Open Notepad
  2. Type the following in Notepad
  3. :techieCode
    color 02
    @echo off
    echo %random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%
    goto techieCode
    
  4. Save the file with the .bat extention.
  5. fake hacking
  6. And now open the bat file and here is the magic.
bat file hacking

You can also download the bat file form here its completely harmless 

Posted at Thursday, November 28, 2013 |  by Rajat Khandelwal

Sunday, 24 November 2013

hacking

Here is a great and annoying batch file trick with only three lines of coding. When the batch file is opened the batch file enters an infinite loop creating new folders at a very fast rate. It can create more than 1000 folders in just 7 seconds! Cleaning the newly made folders will be real difficult if the batch file is opened in a directory with a lot of important files and folders.

Follow the steps to create the folder bomb.

Step 1: Open notepad and type the following code in.


:techieCode
md %random%
goto techieCode


Step 2: Save as Flood.bat. Remember to include .bat extension.

That's it! Your folder bomb is ready for action!
WARNING: If you want to test this batch file, open the batch file in a new and empty folder. Do not open the batch file on your desktop or other important directories.
Remember to like and share the post.
 Subscribe to the blog to keep up to date!

Freeze the computer in seconds (Folder Bomb)

hacking

Here is a great and annoying batch file trick with only three lines of coding. When the batch file is opened the batch file enters an infinite loop creating new folders at a very fast rate. It can create more than 1000 folders in just 7 seconds! Cleaning the newly made folders will be real difficult if the batch file is opened in a directory with a lot of important files and folders.

Follow the steps to create the folder bomb.

Step 1: Open notepad and type the following code in.


:techieCode
md %random%
goto techieCode


Step 2: Save as Flood.bat. Remember to include .bat extension.

That's it! Your folder bomb is ready for action!
WARNING: If you want to test this batch file, open the batch file in a new and empty folder. Do not open the batch file on your desktop or other important directories.
Remember to like and share the post.
 Subscribe to the blog to keep up to date!

Posted at Sunday, November 24, 2013 |  by Rajat Khandelwal

Saturday, 16 November 2013



There would hardly be a day when we don't visit Google. Be it for a random search, or for a news or for checking our good old Gmail! So how about shifting seats from typical work searches to some fun tricks? Here we bring to you 8 must try tricks to have fun on Google.

1. Explore Mars!

Simply go to Just go to www.google.com/Mars and explore the awesome mars!

2. Add periods in login ID

Have fun by logging in by randomly adding periods in your log in ID. Google doesn't recognize periods as characters!

For example your email id is 123@gmail.com, try logging in with 1.2.3@gmail.com and you will still be able to login!

3. askew

Try Googling for the word "askew" and enjoy the result!

4. Google Sphere

First turn off your 'Google Instant predictions' Search in Google search settings. Then type 'Google Sphere' and click "I'm feeling lucky".

5. The loneliest number

Yes Google knows it all! Even the loneliest number! Just search "the loneliest number".

6. Using blocked websites!

So your school or office has blocked a certain website that you want to use? Simply Google for "cache:WEBSITENAME.com" and win!

7. Play games on Youtube!

Yes you can play games right inside YouTube while watching your video! Just type "1980" while watching a YouTube video and fight attackers from blowing up the video. There are many more games available with different key combinations, how to find them? Google!

8. Beatbox on Google!

This one is specially fun! Go to Google translate and enter the below text. Set the language from German and click on the speaker to listen.

pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk

8 Super Fun Things To Do On #Google !



There would hardly be a day when we don't visit Google. Be it for a random search, or for a news or for checking our good old Gmail! So how about shifting seats from typical work searches to some fun tricks? Here we bring to you 8 must try tricks to have fun on Google.

1. Explore Mars!

Simply go to Just go to www.google.com/Mars and explore the awesome mars!

2. Add periods in login ID

Have fun by logging in by randomly adding periods in your log in ID. Google doesn't recognize periods as characters!

For example your email id is 123@gmail.com, try logging in with 1.2.3@gmail.com and you will still be able to login!

3. askew

Try Googling for the word "askew" and enjoy the result!

4. Google Sphere

First turn off your 'Google Instant predictions' Search in Google search settings. Then type 'Google Sphere' and click "I'm feeling lucky".

5. The loneliest number

Yes Google knows it all! Even the loneliest number! Just search "the loneliest number".

6. Using blocked websites!

So your school or office has blocked a certain website that you want to use? Simply Google for "cache:WEBSITENAME.com" and win!

7. Play games on Youtube!

Yes you can play games right inside YouTube while watching your video! Just type "1980" while watching a YouTube video and fight attackers from blowing up the video. There are many more games available with different key combinations, how to find them? Google!

8. Beatbox on Google!

This one is specially fun! Go to Google translate and enter the below text. Set the language from German and click on the speaker to listen.

pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk pv zk bschk pv zk pv bschk zk pv zk bschk pv zk pv bschk zk bschk pv bschk bschk pv kkkkkkkkkk bschk bschk bschk

Posted at Saturday, November 16, 2013 |  by Rajat Khandelwal

Sunday, 27 October 2013


After Facebook rolled out its recent changes in Graph Search, it has given rise to new risks in terms of what can be controlled and what cannot be. But if you still want to keep your account safe, the best option is to limit how people see and share your posts, tags, images and location. We bring to you steps to take to reclaim some privacy on Facebook. 

1. Start from the Privacy Settings section

The primary way to control your information on Facebook starts by configuring the Privacy Settings area. Head to the Privacy Settings section by using the drop down menu on the upper righthand corner of your profile.

2. Who should see your posts?

Facebook's main privacy tools are broken down into three primary areas, which focus on who can see what you post, who can contact you, and how you can be looked up using the Web or personal details (phone numbers, or email). 

When it comes to who can see your stuff, the first option deals with "future" posts – as in posts from this point forward. The recommended setting is friends, as this limits the amount of people who can passively see what you've written. It will also limit the types of posts that appear in Graph Search results. 

3. Examine your Activity Log thoroughly

After that, you'll want to enable the Activity Log, which allows you to be selective about which posts appear on your timeline. Through the log, you'll see all the images and posts you're tagged in, with the option to remove the tag, as well as disallow it from appearing on your timeline. You can also see (and delete) old posts, images, check-ins, and comments you've made.

4. Limit past posts

The last thing to do in this section is to limit your past posts. Facebook will throw a warning when you attempt to do this, because all of the old post (going back to your very first one) that may be public will be removed. For a company that encourages sharing, this isn't something they'd like to see. Also, the process cannot be reversed. Keep in mind - individual posts can be left public if you wish, but the recommendation is to limit all of them, and then sort out what should be kept after the fact. 

5. How easily can your profile be found?

After altering those settings, you'll move on to manage the contact and lookup functions. When it comes to who can send friend requests on the site, the option is really a personal one. Most people (myself included) opt to leave this set to everyone. However, to lower the amount of network spam from random users, the strict filtering option is enabled for Inbox messages.

For lookups, friends only is the safest bet, otherwise anyone who already sees your email address or phone number, can use those to search for your profile. Also, if you allow search engines to link to your profile, then sites like Google and Bing can index and link to your profile and timeline.

6. Future posts can now be managed for privacy

After you've managed your Activity Log, which has clear markers as to the sorting and management of posts, you mat want to change the privacy settings of a single post on your timeline. When this happens, you can do this directly by clicking the arrow just under your name. Optionally, there is a pencil icon to the upper right of the post's box, which can be used to edit or delete the post.

Courtesy: CSO 

Six Steps To Secure Your Facebook Profile!


After Facebook rolled out its recent changes in Graph Search, it has given rise to new risks in terms of what can be controlled and what cannot be. But if you still want to keep your account safe, the best option is to limit how people see and share your posts, tags, images and location. We bring to you steps to take to reclaim some privacy on Facebook. 

1. Start from the Privacy Settings section

The primary way to control your information on Facebook starts by configuring the Privacy Settings area. Head to the Privacy Settings section by using the drop down menu on the upper righthand corner of your profile.

2. Who should see your posts?

Facebook's main privacy tools are broken down into three primary areas, which focus on who can see what you post, who can contact you, and how you can be looked up using the Web or personal details (phone numbers, or email). 

When it comes to who can see your stuff, the first option deals with "future" posts – as in posts from this point forward. The recommended setting is friends, as this limits the amount of people who can passively see what you've written. It will also limit the types of posts that appear in Graph Search results. 

3. Examine your Activity Log thoroughly

After that, you'll want to enable the Activity Log, which allows you to be selective about which posts appear on your timeline. Through the log, you'll see all the images and posts you're tagged in, with the option to remove the tag, as well as disallow it from appearing on your timeline. You can also see (and delete) old posts, images, check-ins, and comments you've made.

4. Limit past posts

The last thing to do in this section is to limit your past posts. Facebook will throw a warning when you attempt to do this, because all of the old post (going back to your very first one) that may be public will be removed. For a company that encourages sharing, this isn't something they'd like to see. Also, the process cannot be reversed. Keep in mind - individual posts can be left public if you wish, but the recommendation is to limit all of them, and then sort out what should be kept after the fact. 

5. How easily can your profile be found?

After altering those settings, you'll move on to manage the contact and lookup functions. When it comes to who can send friend requests on the site, the option is really a personal one. Most people (myself included) opt to leave this set to everyone. However, to lower the amount of network spam from random users, the strict filtering option is enabled for Inbox messages.

For lookups, friends only is the safest bet, otherwise anyone who already sees your email address or phone number, can use those to search for your profile. Also, if you allow search engines to link to your profile, then sites like Google and Bing can index and link to your profile and timeline.

6. Future posts can now be managed for privacy

After you've managed your Activity Log, which has clear markers as to the sorting and management of posts, you mat want to change the privacy settings of a single post on your timeline. When this happens, you can do this directly by clicking the arrow just under your name. Optionally, there is a pencil icon to the upper right of the post's box, which can be used to edit or delete the post.

Courtesy: CSO 

Posted at Sunday, October 27, 2013 |  by Rajat Khandelwal

Friday, 25 October 2013

Duplicate files are big burden to clean up,but inorder to keep your computer faster you must find a way to trash the duplicate files periodically.

One can not find each and every duplicate file manually,especially if you have huge data in your harddisk.To do this boring and repetitive task we need to go for a Softwares which can make things easier.

DeDupler is one of the best Windows cleaning tool which is you can download for Free.It will run on Windows XP, Windows Vista, Windows 7 and Windows 8 and on both OS versions (32 bit and 64 bit )

Removing duplicate files DeDupler involves very few steps and It provides many filters and features like Type of Scan ( MD5 and SHA512 ),Custom location,Custom file extension and maximum file size.

Step 1 :

Select the Directory to be scanned and click on Examinate any file to set filters

DeDupler

Step 2 :

Select the type of scan,Choose file extensions and filter the file size.

MD5 is a faster method but if you want to have high accuracy rate then go for SHA512.

DeDupler-settings

Step 3 :

Close the Settings and start the scan by clicking on option “Search for Duplicity

576x141xDeDupler-1.jpg.pagespeed.ic.Vxt6Hzv8WV

Step 4:

You will get a list of duplicate files and you can proceed with either deleting all the duplicate files or deleting the duplicate files and making links to original file or just leave the files wthout making any change

p7kXu

Thats it,You saved your PC from becoming slow .

Downloads :- DEDUPLER

[contact-form][contact-field label='Name' type='name' required='1'/][contact-field label='Comments' type='text'/][/contact-form]

How to remove Duplicate files in Windows 7 and 8

Duplicate files are big burden to clean up,but inorder to keep your computer faster you must find a way to trash the duplicate files periodically.

One can not find each and every duplicate file manually,especially if you have huge data in your harddisk.To do this boring and repetitive task we need to go for a Softwares which can make things easier.

DeDupler is one of the best Windows cleaning tool which is you can download for Free.It will run on Windows XP, Windows Vista, Windows 7 and Windows 8 and on both OS versions (32 bit and 64 bit )

Removing duplicate files DeDupler involves very few steps and It provides many filters and features like Type of Scan ( MD5 and SHA512 ),Custom location,Custom file extension and maximum file size.

Step 1 :

Select the Directory to be scanned and click on Examinate any file to set filters

DeDupler

Step 2 :

Select the type of scan,Choose file extensions and filter the file size.

MD5 is a faster method but if you want to have high accuracy rate then go for SHA512.

DeDupler-settings

Step 3 :

Close the Settings and start the scan by clicking on option “Search for Duplicity

576x141xDeDupler-1.jpg.pagespeed.ic.Vxt6Hzv8WV

Step 4:

You will get a list of duplicate files and you can proceed with either deleting all the duplicate files or deleting the duplicate files and making links to original file or just leave the files wthout making any change

p7kXu

Thats it,You saved your PC from becoming slow .

Downloads :- DEDUPLER

[contact-form][contact-field label='Name' type='name' required='1'/][contact-field label='Comments' type='text'/][/contact-form]

Posted at Friday, October 25, 2013 |  by Rajat Khandelwal
Blogger templates. Proudly Powered by Blogger.
back to top