Wednesday, March 5, 2014

A phone that self-destructs if tampered with


Boeing’s Secure Mobile is meant for People Working in Defence and Homeland Security


Boeing Co unveiled a smartphone that appears to come straight from James Bond spy Movie. In addition to encrypting calls, any attempt to open the casing of the Boeing Black smartphone deletes all data and renders the phone inoperable.

Tuesday, March 4, 2014

Wi-Fi virus that spreads like common cold


Researchers have shown for the first time that Wi-Fi networks can be infected with an ‘air-borne’ virus that can move as efficiently as the common cold.
Researchers at the University of Liverpool in UK designed and simulated an attack by a virus, called “Chameleon” on Belfast and London in a lab setting. The found that not only could it spread quickly between Homes and businesses, but it was able to avoid detection.

Experts found that “Chameleon” behaved like an ‘airborne’ virus, travelling across the Wi-Fi network via access points (APs) that connects households and businesses to Wi-Fi network. When “Chameleon” attacked an AP it was able to collect and report the credentials of all other Wi-Fi users who connect to it. The virus then sought out other Wi-Fi APs that it could connect to and infect. 

Why Hyper Links are Blue?

Ever wondered why hyperlinks are blue? Sir Tim Berners-Lee, inventor of World Wide Web, chose the color because it was the darkest color available that would not blend in with black text.

How to control Mouse Pointer (Cursor) from keyboard in Windows

You can control your mouse with a keyboard in Windows 7, Windows 8 and Windows 8.1.
This is a tutorial on How to control Mouse Pointer (Cursor) from keyboard in Windows in 15 Easy steps. 

To do so you follow these easy steps:-

·         Boot your PC with Windows 7, Windows 8 or Windows 8.1
·         Press Windows Button + D or Click on Desktop App to switch to Desktop from Start (Omit this step if you are using Windows 7)
·         The Desktop will appear, now go to Run by pressing  Windows Button + R
·         Run Dialog Box will appear, Type ‘control’ and then press Enter (Or directly go to Control Panel via Start in Windows 7)
·         The Control Panel will appear,
·         Click on ‘Ease of Access’/ ‘Ease of Access Center’
·         Then Click on Ease of Access Center (Omit this step if done in the previous step need if done before)
·         Click on ‘Make the keyboard easier to use’
·         Check ‘Turn on Mouse Keys’
·         A new icon will appear on the Notification area of your screen which will look like a Mouse which means that Mouse Keys are active
·         To change settings click on ‘Set up Mouse Keys’
·         Change the settings according to your wish
·         Click on Apply
·         Click on OK
·         Close Control Panel and use your keyboard to access the Cursor.

No snapshots added to reduce data usage for people having Limited Data Connections

Monday, March 3, 2014

Where are the words added to Dictionary Stored?

Have you even wondered where the words are stored after being added to dictionary? Well I know exactly where those words (Those added to dictionary) are stored in Windows® 7, Windows® 8 and Windows 8.1.

The things you have to do are:-
·         Boot your Computer with an Administrator account
·         Go To Computer/ This PC (In Windows 8.1)
·         Click on View/ Organize
·         Click on Options/ Folder and search options
·         Folder Options will come, Click on View Tab
·         Check ‘Show hidden files, folders and drives’
·         Click on Apply
·         Click on OK
·         Press  + R, Run will appear.
·         Type ‘Appdata
·         Double Click ‘Roaming
·         Double Click ‘Microsoft
·         Double Click ‘UProof’. This folder contains the notepad which stores the Added words
·         Double Click ‘CUSTOM’. This the notepad file which contains all the added words

A notepad file will open which contains all the words which are added to dictionary!!!

Note:-
·         Do not delete or move (Cut) any file or folder from that Directory.
·         You must have any Microsoft Office 2007, Microsoft Office 2010 or Microsoft Office 2013.
·         ‘UProof’ folder will not be present if you have not yet added any work(s) to the Dictionary.

No snapshots added to reduce data usage for people having Limited Data Connections

Sunday, December 15, 2013


The Ten Commandments of Computer Ethics


Let us learn the famous Ten Commandments that are encouraged by most computer and professional societies. In the following lines we are giving Ten Commandments issued by Computer Ethics Institute.
1.      Thou shall not use a computer to harm other people.
2.      Thou shall not interfere with other people’s computer work.
3.      Thou shall not snoop around in other people’s computer files.
4.      Thou shall not use a computer to steal.
5.      Thou shall not use a computer to bear false witness.
6.      Thou shall not copy or use proprietary software for which you have not paid.
7.      Thou shall not use other people’s computer resources without authorization or proper compensation.
8.      Thou shall not appropriate other people’s intellectual output.
9.      Thou shall think about the social consequences of the program you are writing or the system you are designing.
10.  Thou shall always use a computer in ways that insure consideration and respect for your fellow humans.