GADGETS

Top Android phones for gaming

Here are the top Android smartphones especially for gamers When you consider what the first mobile phone looked like when it was released in 1973, it is amazing how much these devices have evolved since then. Phones today can basically do the same tasks once performed exclusively on computers. Gaming …

READ MORE →
SCIENCETECHNOLOGY

Now Bacteria Can Store Information like Electronic Hard Drives

Now we can use bacteria as living hard drives to store vast amounts of information. Instead of those bulky hard drives, soon we would be storing vast amounts of information on a bacteria. Yes, the humble bacteria can store information just like hard drives say scientists. Harvard scientists led by …

READ MORE →
SECURITY

Online Activities That Can Get You Arrested In Some Countries

Any of these 10 online activities could land you in jail in some part of the world Internet is an unrestricted realm for its users. It brings you latest information, allows you to share movies, images and music without any bounds, allows you to communicate in a split second and …

READ MORE →
INTERNET

Facebook vulnerability allows hackers delete any uploaded video

Facebook flaw allows any user to delete any video from anybody’s post A Facebook vulnerability allows you can delete any videos on Facebook in any users timeline by abusing a ‘logic flaw.’ The critical vulnerability was discovered by a Indian security researcher, Pranav Hivarekar, who found that the flaw allowed him …

READ MORE →
SECURITY

Try this to keep hackers out Instead of taping your laptops microphone

Covering your computer microphone with tape will do nothing, here’s what you should. Mark Zuckerberg had recently posted a picture on Instagram that had him and his Apple MacBook in the background. A closer look of the photograph revealed that not only Zuckerberg’s MacBook webcam but also the microphone of …

READ MORE →
TEARDROP ATTACK
INTERNETSECURITY

What is Teardrop DDOS Attack

Teardrop attack is a type of Denial of Service (DoS) attack which exploits the fragment offset field in the IP header to produce buggy fragments which are then delivered to the target machine. Unable to rearrange the fragments, the victim keeps on accumulating the fragments until it crashes. As the name …

READ MORE →
TECHNOLOGY

Available Types Of Networks: Trusted, Untrusted, And Unknown Networks

Firewall packet filtering rules are applied based on the integrity of the networks. There are three types of the networks defined by the rule of the security perimeter and the trust of the firewall against the origin of the packet.  When a network is created by the network manager or the …

READ MORE →
ixpand-memory-case-main
GADGETS

SanDisk’s ‘iXpand Memory Case’ Increases Your iPhone Storage by 128GB

 SanDisk’s ‘iXpand Memory Case’ Increases Your iPhone Storage by 128GB SanDisk, the storage solution company has launched a new sleek iXpand Memory Case that not only gives your iPhone as much as 128GB of extra storage, but also supports an additional battery pack on top. However, the SanDisk iXpand Memory …

READ MORE →
GADGETS

HP Spectre 13 ‘World’s Thinnest Laptop’ Launched in India: CrunchyUpdates

The world’s thinnest and sleekest HP Spectre laptop available in India for $1800. HP Inc. unveiled the world’s thinnest laptop HP Spectre 13 in India on Tuesday with a starting price of Rs. 1,19,990. HP Spectre is expected to take on rival, Apple’s Macbook pro and will be available for purchase to Indians …

READ MORE →
GEEK

How To Use Your Handwriting As System Font In Android phones

How To Use Your Own Handwriting As System Font In Android Smartphone We all are aware that Android smartphones are best known for the n degree of customizations and hundreds of themes. But did you know that you can use your own handwriting for all Android smartphone menus, app names …

READ MORE →