Halloween Costume ideas 2015

Current and Future Trends In Technology.

2012

Geeky Note is Co hosting GIVEAWAY on behalf of  DailyStuff.org | Admix.in | Factsforfolks.in .

This time, the partner websites DailyStuff.org | Admix.in | Factsforfolks.in are coming together to offer this giveaway to all its readers. In this giveaway, we are offering 4GB Sandisk Pendrive FREE for the one who wins this giveaway. You will need to complete some steps mentioned below and once you do, you become eligible to win this Giveaway.

Are you a blog owner?

If you are a blog owner, you too can co-host this GIVEAWAY in your website. If the winner comes from your website, you too will win a small lovely gift from us! So, you can co-host this GIVEAWAY by entering the details in the GIVEAWAY Gadget below.
Enter the GIVEAWAY:
a Rafflecopter giveaway

Rules :
This Giveaway is open only for INDIA
All mandatory options have to be completed else the person will be disqualified from the Giveaway and a new winner will be declared
Free shipping!
We reserve the right to cancel any participant found not following giveaway rules.
Results are final and binding and 100% Random
 

Geeky Note is Co-Hosting this giveaway on behalf of Dragon Blogger



This is no April Fool’s Joke,  DragonBlogger.com have teamed up with Craving Tech, Trending Poetry and MetallMan to give one of our lucky readers a chance to win a 3rd Generation iPad for free!


DragonBlogger is giving away a brand new 3rd Generation iPad to 1 Lucky winner. and believe you could be that one of the lucky winner and can own a brand new iPad for your self and that to FREE.

Enter now for your chance to win a brand new 16GB White iPad (3rd Generation) and be sure to leave a comment and let me know how much you want one!

a Rafflecopter giveaway

This contest is hosted by Rafflecopter and kicks off on April 1st and will end on May 31th 2012.  This contest is open Internationally but International residents will be required to pay for shipping and handling.  If you live in the continental U.S. then DragonBlogger will pay for the shipping.

 Rules :

1) The contest winner will be chosen randomly by Rafflecopter which uses Random.org method to choose random winner, the more entries you get the better your odds of winning but it is a random draw for the winner.

2) This contest is open to anyone/anywhere, but if you are International you will must be willing to pay for the shipping costs of the iPad.

3) Do not enter contest if you aren't willing to pay for the shipping.

There is no shipping cost if you live in the U.S. and I will simply ship the iPad to you if you are the lucky winner.

4) Last date of participation is May 31, 2012.

5) Please Don’t SPAM.

6)  All mandatory options are to be followed. If we see that the winning entry has not passed through all mandatory options, he/she will be disqualified and will not get the prize.


7) The cost of Products and Shipping are covered by DragonBlogger and sponsor.

8)
Organizer reserves the rights to cancel any entry, restrict a person/persons from participating in this giveaway, and/or taking down this giveaway at any point of time, with/without showing any cause for the same.

9) GeekyNote is not Responsible 







Its not just another April Fool Jokes What you see in movie is now part of reality.

Google brings high Tech life for you. A high Tech Glass called Google’s Project Glass.

Google Inc is getting into the eye wear business with a pair of thin wraparound shades that puts the company’s web services in your Eyes.
Project Glass is Google’s dream to mass produce hybrid glasses that act as a miniaturized smartphone wired with hands-free access to a micro display, cameras, microphone, Web browser, and speech recognition. It’s the type of jaw dropping innovation the tech elite love.

Google, the world’s No. 1 search engine, is famous for letting its employees work on ambitious projects that don’t always have a direct relation to its business.

The glasses could provide a way for Google to more closely entwine its advertising-supported online services, including Web searches, maps and email, into people’s daily lives.
It’s all very futuristic, no doubt. There is no release date yet. But without having tried a prototype on ourselves, they seem as though they would be vaguely intrusive if not downright creepy.
Here is Google Project Glass Official Page

We believe technology should work for you — to be there when you need it and get out of your way when you don’t. – Google


Firefox New Web Developer Tools to View Site Structure in 3D.



Firefox 11 added two new web developer tools to Firefox’s already impressive arsenal. The Tilt feature visualizes website structures in 3D, while the Style Editor can edit CSS stylesheets on the fly.

To get started, open the Page Inspector by selecting “Inspect” from the Web Developer menu. You can also right-click in the current page and select “Inspect Element” to start the inspector at a specific element.


Click the “3D” button on the inspector toolbar. Here we go…


Rotate the model by left-clicking, move the image around by right-clicking, and zoom in and out using the mouse wheel.

This view is integrated with the other tools in the inspector.

If you have the HTML or Style panels open, you can click an element on the page to view that element’s HTML code or CSS properties.

The 3D visualization feature watches for changes on the current page and notices when changes occur. When you use the Style Editor with the 3D inspector open, your changes will be reflected immediately in the 3D view.

Source : howtogeek, Firefox

Your Private messages in BBM is no longer Private. Indian Government To Launch BlackBerry Messenger Snooping System Soon.
After a battle lasting almost two years, BlackBerry maker Research In Motion has knuckled under to the Indian government, giving security forces in that country access to private instant messages.
RIM decided to set up Blackberry servers that were stationed in Mumbai, India. Capture and crack BBM messages will be used strictly on snoop on devices whose users are suspected of engaging in criminal or terrorist activity.
Not only has the Indian government gotten their way with the Blackberry servers, but they will now be able to tap into BBM messages. This was confirmed by Indian security agencies who revealed that the process to decrypt the 256-bit encrypted data used by BBM is underway and would be up and running soon, claiming that the interception of BBM messages will be used in case where the government suspects that crimes or terror plots are being hatched.
It should also be noted that the tapping of BBM only affects those on BIS as BES encryption keys are specific to every installation, while BIS’ encryption key is shared. While India may be the first country granted official access to some of RIM’s data.
—“Once a company does it for one country, what’s stopping other countries from asking for it?”

Mark Zuckerberg -
I’m excited to share the news that we’ve agreed to acquire Instagram and that their talented team will be joining Facebook.
For years, we’ve focused on building the best experience for sharing photos with your friends and family. Now, we’ll be able to work even more closely with the Instagram team to also offer the best experiences for sharing beautiful mobile photos with people based on your interests.
We believe these are different experiences that complement each other. But in order to do this well, we need to be mindful about keeping and building on Instagram’s strengths and features rather than just trying to integrate everything into Facebook.

That’s why we’re committed to building and growing Instagram independently. Millions of people around the world love the Instagram app and the brand associated with it, and our goal is to help spread this app and brand to even more people.
We think the fact that Instagram is connected to other services beyond Facebook is an important part of the experience. We plan on keeping features like the ability to post to other social networks, the ability to not share your Instagrams on Facebook if you want, and the ability to have followers and follow people separately from your friends on Facebook.
These and many other features are important parts of the Instagram experience and we understand that. We will try to learn from Instagram’s experience to build similar features into our other products. At the same time, we will try to help Instagram continue to grow by using Facebook’s strong engineering team and infrastructure.
This is an important milestone for Facebook because it’s the first time we’ve ever acquired a product and company with so many users. We don’t plan on doing many more of these, if any at all. But providing the best photo sharing experience is one reason why so many people love Facebook and we knew it would be worth bringing these two companies together.
We’re looking forward to working with the Instagram team and to all of the great new experiences we’re going to be able to build together.



THE HACKTIVIST Antisec group has published Symantec Norton AntiVirus 2006 All Platforms Source Code on The Pirate Bay.

The leaked data is in the form of a torrent file and is a 1+ gig file

Anonymous, with which Antisec is related, has long boasted of its ownership of Symantec code, and this is its latest release in an ongoing campaign against the security firm.


Anonymous has released other code such as that from PCanywhere in the past.

What Anonymous Says :


The apparent Symantec code-dump, as well as the DDoS attack on the Vatican, were on the heels of an attack on Panda Security.

Source : #Anonymous




Sometimes you need hackers to help you avoid getting hacked.
Google offered to pay as much as $1 million to anyone who could show vulnerabilities in its Chrome browser

Less than two weeks after Google launched Pwnium, a competition for hackers to find security exploits in Chrome, the search giant has announced its first winner.

Google has paid out $60,000 to a security researcher for demonstrating a 'full Chrome exploit' in its Chrome web browser.

Sergey Glazunov, who has built up a reputation for demonstrating weaknesses in Chromium, is the first researcher to be awarded the $60,000 top prize. Glazunov showed off a remote code execution vulnerability in Chrome on an up-to-date Windows 7 system, which qualifies as a full Chrome exploit.

The exploit makes it possible for a malicious hacker to do just about anything they want on an infected machine.

$60,000 - “Full Chrome exploit”: Chrome / Win7 local OS user account persistence using only bugs in Chrome itself.

$40,000 - “Partial Chrome exploit”: Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows sandbox bug.

$20,000 - “Consolation reward, Flash / Windows / other”: Chrome / Win7 local OS user account persistence that does not use bugs in Chrome.
[youtube http://www.youtube.com/watch?v=YCp2GQpqqZQ]





Update 1 :[11-03-2012] Pinkie Pie Earns $60K At Pwn2Own With Three Chromium 0-Day Exploits

Google's Chrome browser on Friday fell to a zero-day attack that pierced its vaunted security sandbox, the third such attack in as many days at a contest designed to test its resistance to real-world threats.

A teenage hacker who identified himself only as PinkiePie said he spent the past week and half working on the attack. It combined three previously unknown vulnerabilities to gain full system access to a Dell Inspiron laptop that ran a fully patched version of Chrome on top of the most up-to-date version of Windows 7. He spent the past three days holed up in hotel rooms and conference areas refining the attack so it would break out of the sandbox, which was designed to prevent code-execution attacks like his, even when security bugs are identified.

The five vulnerabilities exposed during the third and final day of the contest are miniscule compared to the overall number of bugs Chrome's security team fixes each year. A member of the team said the value of Pwnium isn't in the number of bugs that come to light, but rather in the insights that come from watching how a reliable exploit is able to slip through carefully crafted defenses.

Source : CNET,PWNIUM,arstechnica,slatester

What if you attacked by Virus, Whoz Mother tongue is out of this World ? O_o

Researchers at Kaspersky have reached out for assistance after an investigation into the Duqu Trojan uncovered a section that is written in an unknown programming language.

Duqu is a sophisticated Trojan which seems to have been written by the same people who created the infamous Stuxnet worm. Its main purpose is to act as a backdoor into the system and facilitate the theft of private information.
Conclusions-Kaspersky Lab Expert

  • The Duqu Framework appears to have been written in an unknown programming language.

  • Unlike the rest of the Duqu body, it's not C++ and it's not compiled with Microsoft's Visual C++ 2008.

  • The highly event driven architecture points to code which was designed to be used in pretty much any kind of conditions, including asynchronous commutations.

  • Given the size of the Duqu project, it is possible that another team was responsible for the framework than the team which created the drivers and wrote the system infection and exploits.

  • The mysterious programming language is definitively NOT C++, Objective C, Java, Python, Ada, Lua and many other languages we have checked.

  • Compared to Stuxnet (entirely written in MSVC++), this is one of the defining particularities of the Duqu framework.


The Duqu Framework: What was that?-Kaspersky Lab Expert

After having performed countless hours of analysis, we are 100% confident that the Duqu Framework was not programmed with Visual C++. It is possible that its authors used an in-house framework to generate intermediary C code, or they used another completely different programming language.

We would like to make an appeal to the programming community and ask anyone who recognizes the framework, toolkit or the programming language that can generate similar code constructions, to contact us or drop us a comment in this blogpost. We are confident that with your help we can solve this deep mystery in the Duqu story.

Source : Kaspersky Lab Expert,https://www.securelist.com

For Detail Analysis Visit securelist.

Apple Inc. unveiled a new iPad tablet with a sharper display and the ability to connect to the Internet on 4G broadband networks, as the electronics giant strives to stay ahead of rivals in the tablet market.



The new iPad will have a high-resolution "retina" display and connect to 4G LTE services that are offered by carriers like AT&T Inc. and Verizon Wireless. The tablet will also have a five megapixel camera.

The new 9.7-inch iPad starts at $499 and has 2048×1536-pixel retina display, 5-megapixel camera (with the same optics sensor from the iPhone 4S) and 1080p video recording. It will be available March 16 in black and white, powered by A5X chip (with quad-core graphics) and support 4G LTE networks. It’s 9.4 millimeters thick and weighs in at 1.4 pounds.



It will hit stores on Friday, March 16 not only in the U.S., but also in Japan, UK, Canada, Switzerland, Germany, France, Hong Kong, Singapore and Austria. And for the rest one wait until March 23.

Pre-orders start today. For Wi-Fi only iPads, it will cost $499 for 16 GB, $599 32 GB and $699 for 64 GB. For 4G models, it will cost $629 for 16 GB, $729 32 GB and $829 for 64 GB. It will have 10 hours of battery life, and 9 hours on 4G.



The iPad will also feature a retina display with 2048 x 1536 pixels, and 264 pixels for each inch. It will include 44% greater saturation and A5x quad-core graphics.

Apple is working on two LTE versions of the iPad with AT&T, Verizon in the U.S., as well as Rogers, Telus and Bell in Canada. Both LTE U.S. models will be 3G ready, too.

Update : Apple's new iPad ship date slips to March 19th in the US

Source : Engadget,Mashable,TheVerge

Facebook Messenger for Your Windows Os.




 Chat while you do other stuff

 See and respond to chats right from your desktop. Whether you're browsing other websites or using  another app, you don't have to click away to stay connected.



 Get notified instantly

 Find out about new comments, photo tags and more as soon as they happen.


You can set up the app if you use Windows 7 or Windows Vista. Please note that FB Messenger do not currently support Windows XP.




When you download and open Messenger for the first time, you will be logged in automatically. From then on, you'll need to log in from the app and not from your browser.



Logging In

To log into Messenger


  • Click on the icon in your Windows system tray


  • Once the app opens, enter your email and password







 

Note that when you click on messages, notifications or ticker items, you will be directed to your browser. If you aren't logged in, you’ll need to log into www.facebook.com to view this content.



When you log out of the app, you'll still be able to view your content on www.facebook.com. Logging out of the app will not interrupt you from viewing an active Facebook session on your browser.



You Can Directly Install Windows base FB Messenger by clicking on Install Now







You can chat and message with individual friends, see what’s going on in ticker and get quick notifications about Facebook activity in Messenger. Chatting with multiple friends, video calling, limiting chat availability and editing settings are not currently available through the app. You can still do these by going to www.facebook.com in your web browser.

Soon when you logout of Facebook, you could be greeted with a full recreation of the Bing home page, complete with pretty photo and an active search box.When you type in a query and press Enter, you're taken out of Facebook to a separate Bing search results page.



At Marketing Conference , Facebook explained that over 37 million people log out every day, which offers huge potential for advertisers. The new log out ad unit is an option inside Premium On Facebook, a new paid campaign businesses can sign up for that also includes News Feed ads and Mobile app ads.

Microsoft made a hefty early investment (which is now worth more than $1 billion) in Facebook, and even powers web search results that can appear inside the site's internal search bar. Facebook's new ads likely won't bother users (since they've already @ logged out Page), and will provide a new opportunity for advertisers to turn the log out page into the coveted back page of a newsstand magazine.

Now that the Yahoo deal has seemingly fallen apart, Microsoft is even more eager to expand its search footprint against arch rival Google. Google reached a large search agreement with MySpace a few years ago, guaranteeing $900 million in payments over 3.75 years. Since that time, there have been rumors that Google has been dissatisfied with the monetization performance of MySpace’s search traffic.

Microsoft,Facebook Vs Google,MySpace

Source: TheVerge,TechCrunch,Facebook

Wait Is Over as Microsoft finally Unveils Windows 8 Consumer Preview Called Windows 8 Beta Available as a public download, the Consumer Preview build includes access to Microsoft's Metro style applications, and the over 100,000 changes Microsoft has made since the Windows 8 Developer Preview.

"The operating system is at Consumer Preview level. The apps are at preview level."- Dana Wollman



The Consumer Preview it is currently available in both 32-bit and 64-bit versions in English, Chinese, French, German, and Japanese.

It's Windows reimagined and reinvented from a solid core of Windows 7 speed and reliability. It's an all-new touch interface. It's a new Windows for new devices. And it's your chance to be one of the first to try it out.
System Requirements


Windows 8 Consumer Preview works great on the same hardware that powers Windows 7:

  • Processor: 1 gigahertz (GHz) or faster

  • RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)

  • Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)

  • Graphics card: Microsoft DirectX 9 graphics device or higher

  • To use touch, you need a tablet or monitor that supports multitouch

  • To access Windows Store and to download and run apps, you need an active Internet connection and a screen resolution of at least 1024 x 768

  • To snap apps, you need a screen resolution of at least 1366 x 768


Download ISO
An ISO image must be converted into installation media stored on a DVD or a USB flash drive. Instructions are provided on this page. Developer tools are available for download from Windows Dev Center.

English

64-bit (x64)                    Download (3.3 GB)

32-bit (x86)                    Download (2.5 GB)

Product Key:   DNJXJ-7XBW8-2378T-X22TX-BKG7J



Note before you download: Windows 8 Consumer Preview is prerelease software that may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. Some product features and functionality may require additional hardware or software. If you decide to go back to your previous operating system, you'll need to reinstall it from the recovery or installation media that came with your PC.

Source : Engadget,Mashable,TheVerge

Nokia just unveiled an incredible camera phone called the 808 PureView during Mobile World Congress in Barcelona. The device features a stunning 41-megapixel camera. Nokia says this is only the beginning and that it will introduce the sensor into many more products in the future. The phone is expected to begin rolling out in May for 450 Euros and it will be available in a variety of colors.



Symbian has always enjoyed a reputation for producing impressive camera phones, and the Nokia 808 Pure View, has certainly upped the game.

As with other Nokia phones it uses Karl Zeiss lenses, but what makes this phone radically different is it features a sensor with an incredible 41 Megapixel capacity, either 7728×5354 in 16:9 format, or 7152×5368 in 4:3.

The phone uses a technique that Nokia calls over-sampling, to produce crystal clear, noiseless images with an effective resolution of 5 megapixels. The camera uses a dedicated graphics processing unit to combine algorithmically groups of up to seven pixels to produce one “super” pixel. The GPU processes one billion pixels a second.

In addition the massive over-sampling allows the camera to digitally zoom up to 4x with no loss in quality. Shooting video in full 1080p video allows for 3x zoom, or up to 6x zoom if shot in 720p definition.



This is Nokia's first smartphone to feature our exclusive new PureView technology, which completely blows away any prior expectations about the quality of camera phone photography.The Nokia 808 PureView features a 41-megapixel sensor with our highest performance Carl Zeiss optics to date and Nokia’s brand-new pixel oversampling technology.


It’s also a smartphone


Outside the camera, it’s also a great smartphone, of course! Inside, it’s got the latest Nokia Belle operating system with Feature Pack 1 enhancements. These enhancements allow improved performance, personalisation and entertainment options, with a new browser, the latest Nokia Maps and an improved notifications bar. One other great new feature is that the phone can deliver content recorded in surround sound to any stereo headphones, using technology from Dolby.

The screen is a four-inch, ClearBlack AMOLED display underneath Gorilla Glass, allowing for a big clear view of what’s going on, under any lighting conditions. Inside, there’s a 1.3GHz processor to keep everything humming. There’s 16GB of internal user memory, with support for MicroSD cards up to 32GB to contain all the pictures and video you’ll be shooting.

The device is remarkably pocketable considering how much there is inside. It’s only slightly larger than the Nokia N8 while the total weight, including the battery, is 169g. Talk time (over a 3G network) is rated at 6.5 hours, with a standby time of up to 540 hours.

Source : technobuffalo.com , Nokia , http://live.theverge.com/Event/Nokia_MWC_2012_event , http://conversations.nokia.com

Flipkart is launching music service this month – DRM Free, Priced at Rs. 10/


Flipkart in recent months has started expanding the number of products it sells— from books it has moved to mobiles, motherboards, and other products. Just last month reports came of Flipkart buying out rival online retail firm LetsBuy.com.

Now an exclusive news report from Plugged.in reveals that the website is planning to launch a music service, much on the lines of Amazon, which allow users to download mp3 songs for as low as Rs 10.

Now in India at some point we’ve all downloaded music, television shows, movies, illegally. As Songs.pk banned in India Flipkart’s latest offer of mp3′s at Rs 10 might sound like a good deal, and a good attempt to prevent piracy online.

What do you think? Will you buy a song for Rs 10?
for More Info visit http://www.pluggd.in/flipkart-music-flyte-pricing-297/

Source : http://www.pluggd.in

It seems like two of the top two torrent websites are down right now. Pirate Bay and EZTV are not responding to user requests at the time of reporting.

The Pirate Bay website at http://www.piratebay.se/ and EZTV website http://eztv.it seem to be offline and cannot be accessed right now. [19/02/2012 11:20 GMT +5:30].

Ping report of http://www.piratebay.se


Ping report of http://eztv.it


Waiting for More Info...

Stay Tune :)

Update1: Jason Livingood, Executive Director Internet Systems Engineering at Comcast told TorrentFreak: “Please note that we do not block websites and we are NOT blocking The Pirate Bay.”

Final Update : Both Site http://thepiratebay.se/ and http://eztv.it/ are back in Action.

Update : 02-03-2012

Server Down Again [02/03/2012 05:34 GMT +5:30].

Symantec’s pcAnywhere Source Code released on the popular Bittorrent indexing site The Piratebay where it quickly climbed into the top 5 seeded files of the Misc category.

What Anonymous Says :
"Symantec has been lying to its customers. We exposed this point thus spreading the world that ppl need" - #AntiSec #Anonymous


What Symantec Says :
Symantec can confirm that a segment of its source code has been accessed. Upon investigation of the claims made by Anonymous regarding source code disclosure, Symantec believes that the disclosure was the result of a theft of source code that occurred in 2006. Since 2006, Symantec has instituted a number of policies and procedures to prevent a similar incident from occurring.

Furthermore, there are no indications that customer information has been impacted or exposed at this time.

What products were impacted?

Our investigation continues to indicate that the theft is limited to only the code for the 2006 versions of Norton Antivirus Corporate Edition; Norton Internet Security; Norton SystemWorks (Norton Utilities and Norton GoBack); and pcAnywhere.











The hackers have already announced that they will also release the Norton Antivirus source code.



Final Question :

Should Norton and Symantec customers be worried about the source code release?

Symantec stated that user’s who have upgraded the products to the latest version have nothing to worry about.

Source : Anonymous, Ghacks, thepiratebay

Pyka

  • Do you travel by train? And, would you like us to call you and wake you up just in time to get down?

  • Do you want to be on time to receive your guest instead of waiting when the train is delayed?


Then, PYKA is For You
[vimeo http://www.vimeo.com/26103353 w=400&h=225]


Sample Message


PYKA 12677 SBC 16-01-2012
This message sets a wake-up phone call for Bangalore City-Ernakulam Intercity Express reaching Bangalore City on 16-08-2011

Message Format


pyka train_number station_code [arrival_date] [mobile] [minutes]























train_numberNumber of the train in which the passenger travels
station_codeStation before which wakeup call is to be made
[arrival_date] (optional)Date of arrival at the destination for future journeys
[mobile] (optional)Mobile number, if different from the sender
[minutes] (optional)Minutes before reaching the station, when alarm needs
to be raised (default: 20 minutes)

Disclaimer: The service is in beta testing phase. SMS delivery and Voice calls  depend upon a number of factors including network connectivity, congestion, and the phone being powered on. Also, alarms can sometimes use the schedule information.

Source : Pyka

This method will require you to modify the Windows registry

Step 1: Open the Windows Start menu and enter regedit into the search bar.[Backup your Registry before start Cooking]

OR

Windows + R and Type "regedit" [Without Quote]

Step 2: Right click on HKEY_LOCAL_MACHINE and select Find.

Step 3: Search for OEMBackground, which should be in Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background. If the key does not exist, add a new DWORD value with the name OEMBackground.

Step 4: Double click on the entry OEMBackground, and change the value from 0 to 1.



Step 5: Open Windows Explorer and go to the following path: %windir%\system32\oobe.

Step 6: Create a new folder named info, and open it.

Step 7: Create a new folder within info named backgrounds.

Step 8: Rename your desired wallpaper as backgroundDefault.jpg and place it inside the folder backgrounds (images must be less than 245KB in size).

That should do the trick, now just lock your PC, log off or reboot and enjoy.

Have your Facebook friends invited you to switch your boring blue Facebook profile to an attractive shade of red, black or shocking pink?

[youtube http://www.youtube.com/watch?v=ejCjxSaxnEM]

So what happens if you click on one of these links?

Clicking on these links, which ask you to share them with your friends before even changing any colors, will only spread the scam, says security blog Sophos.

Source : Mashable & Sophos

When I bought a new notebook recently, I resolved to take better care of my laptop battery this time than I had with my previous ones. With my last laptops the battery was more or less dead after a year or so. If a battery is treated with care it can last up to four years. I thought that I knew how a notebook battery has to be handled, but after googling this topic , I realized that quite a few of my beliefs were outdated.



There are two important keywords when it comes to battery            preservation:

Charging and Temperature.

That is, how the batteries are charged, and the temperatures to which they are exposed, are key factors that determine their lifespan.

There is a lot of confusion surrounding this issue, mostly because lithium-ion batteries are different from older, Nickel-based batteries ,Charging them incorrectly can decrease their Lifespan.

Most lithium batteries should last you a few years, but improper care can decrease that lifespan, meaning that your battery will be unable to hold a charge or unable to hold as big a charge as it used to quicker.

So, to clear things up, here's how to actually extend your battery's health as much as possible.

  •  Don't leave it fully charged : 


Lithium-ion batteries don't need to be charged all the way to 100%. In fact, they'd prefer not to be so the     40% - 80%rule you heard is a good guideline. When possible, keep it in that range to prolong its life as long as you can. And, if you do charge it to 100%, don't leave it plugged in. This is something most of us do, but it's
another thing that will degrade your battery's health.

  • Perform shallow discharges :


Instead of discharging to 0% all the time, lithium-ion batteries do best when you discharge them for a little bit, then charge them for a little bit. The table  from Battery University, shows that discharges to 50% are better for your battery's long-term life than (since the 50% discharges provide the best number of cycles-to-usage ratio).


Depth of discharge (DoD) determine the cycle count. The smaller the depth of discharge, the longer the battery will last.

  • Keep it cool :


Most people overlook this one. Excess heat is not only bad for your processor (and your lap), but your battery as well.



Once again, see the table from Battery University at the right side a hot battery will degrade in health much quicker than a cool one. As such, I highly recommend using a laptop stand or Cooling Pad.




  • Fully discharge it once a month :


This may seem contradictory, but hear us out. While lithium-ion batteries shouldn't be discharged regularly, most modern batteries are what's known as "smart batteries", which means that they can tell you how long you have until your battery dies (e.g. "2 hours, 15 minutes remaining"). This feature can get miscalibrated
after a lot of shallow discharges. So, manufacturers recommend fully discharging your battery once a month to make sure this stays accurate.

Keep these things in mind and your battery will last longer.




Do you know you can not create folder named "CON" [without Quotes] anywhere in your Windows Pc.

 Try creating a folder named "CON"(without the quotes) anywhere on your hard disk and i am sure you wont be able to do so.



Huh ... Now What ? Error Message ?


Because Windows Reserved Some Name  like PRN , AUX , NUL , LPT1 , COM1 , CON etc ...


Here is the Solution:


Just copy from here "СON" (Without the Quotes) and now paste it in your Folder or File name .Yes the Magic Happen. But The Question is How ?? O_o


Reason: The reason is that i am using Unicode. Instead of 67 as the ASCII code of C. Unicode 6.0 Character Code is 1057.That is why i am able to make a folder by this name.


Analysis : 


There is nothing strange in this... one of your "CON" contains a Unicode character for"C" having 1057 as Character Code. Whereas the Other "C" has 67 as Character Code. Since windows works on ASCII Characters it allows the users to create CON Folder where "C" has 1057 as Character Code.


Mystery is now solved  '_'

You're probably aware that 64-bit and 32-bit versions of your operating system exist, but you may have no idea what separates the two.

32bit Os



In any 32-bit operating system, you are limited to 4096MB [4GB] of RAM simply because the size of a 32-bit value will not allow any more. On a 32-bit system, each process is given 4 GB of virtual memory to play with, which is separated into 2 GB of user space that the application can actually use at a time.

The 4 GB limit for Windows, at least, is also a factor of licensing—the home versions of 32-bit Windows, while technically being able to support PAE[Physical Address Extension], have a hard limit of 4 GB for licensing and driver compatibility reasons.

Not only does 32-bit have a hard limit for the amount of memory it can address, there's also another problem: your devices, like your video card and motherboard BIOS take up room in that same 4 GB space, which means the underlying operating system gets access to even less of your RAM.

64bit Os

While 32 bits of information can only access 4 GB of RAM, a 64-bit machine can access 17.2 BILLION gigabits of system memory, banishing any limits far into the future. This also means that your video cards and other devices will not be stealing usable memory space from the operating system.Windows 64-bit Home editions are still limited to 16 GB of RAM for licensing reasons, but the Professional and Ultimate versions can use up to 192 GB of RAM, so keep that in mind when building that killer system.

On Windows, the 64-bit versions also come with a technology to prevent hijacking the kernel, support for hardware-enabled data execution protection, and mandatory digitally signed 64-bit device drivers.

Do 32-bit Applications Work on 64-Bit?

The vast majority of your 32-bit applications will continue to work just fine on 64-bit Windows, which includes a compatibility layer called WoW64, which actually switches the processor back and forth between 32-bit and 64-bit modes depending on which thread needs to execute—making 32-bit software run smoothly even in the 64-bit environment.

There are some exceptions to that rule, however: 32-bit device drivers and low-level system applications like Antivirus, shell extensions that plug into Windows, and some media applications simply won't work without a 64-bit equivalent.

Which Should I Use?

If you are ordering a new PC with 4 GB or more of RAM, you should probably be running a 64-bit version of Windows so you can use all of the available memory, especially if you want a rig with a large video card

The maximum memory[RAM-Random Access Memory] our system support depend upon the Operation System[32bit or 64bit] and Your Motherboard.

When you install 4GB ram on 32bit  Windows system your system will utilize only 3GB or 3.5GB .

There isn't a problem with the memory. Windows allows for 4GB of memory to be addressed, but this isn't 100 percent the same as having 4GB of physical memory. What happens is that some of the addressable memory (regardless of how much you have physically installed) is reserved for use by page files or by some of the devices that you are using, such as a graphics card, PCI card, integrated network connections, etc...so it's unavailable for use as normal main memory.

The maximum memory limitation varies by operating system; for instance, the 4GB memory limitation doesn't exist in 64-bit
versions of Windows [Which is used by High-End Users].
Memory maximums for current MicrosoftŠ Windows OS :

Windows 7 32bit and 64bit 



 

 

 

 

Windows XP 32bit and 64bit



 

 

 

Windows Vista 32bit and 64bit

MKRdezign

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget