Nokia is ready to set another benchmark this year for mobile application developers and IT industry by announcing its ‘Nokia Developer Conference 2009’ In Bangalore, India. The basic concept behind this conference is creating a forum where knowledge of developers across the nation will be shared. Presentation on various mobile
Steganography is method of hiding files in image files. This is used mostly on a network so that files can be stored secretly. This method is very harmful for those where source codes of viruses and and programs can be stored. Also some secret file can also be stored and
Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication. Every computer connected to Network have its unique IP address. When Person A sends an email to person B, The mail
We will learn the method used by most people when they want to get someone elses IP Address. Step 1 – Start MSN Messenger and login as yourself. Step 2 – Hit your “Start” button and click run. Type into the white box “cmd” (without the quotation marks) Step 3
You might have heard this term many times before but what it is actually? I am trying to explain it here in a small funny scenario. Person A has to send message to B. and some person wanted that message too we name it Mr. X. A wrote
Data is transmitted from source to destination by packet switching. So what exactly is packet switching. In simple words when you send message through an email the message is broken into chunks of small size and then they travel to destination and again get recombined there, and message
Debug is a program that comes with modern versions of DOS (I do not know when I started shipping out with DOS). Anyway, all Windows users should have it already. It’s a great tool for debuging programs, unassembling and cracking, and reading “hidden” memory areas like the boot sector, and
BIN/CUE image format is quite common on the Internet. It might seem that finding an appropriate software for burning these images is quite hard. Luckily, it’s not. In addition to Golden Hawk CDRWin, the original software for BIN/CUE format, you can also use Nero Burning Rom to burn the images.
If you receive an email from a friend titled “You’ve been catched on hidden cam, LOL: With the link (DO NOT CLICK) ttp://myvideo.d9.pl/?a=F0F 2EFE6E9ECE5AEE1EBAEE6E1E3E5E2EFEFEBAEE3EFEDAF.. F6B2B2B2AFB1B7B6B6AFB1B0B5AFF1B7B3B6B7B5B0B4B2B1DFB9B0B8B2AEEAF0E7&b=.. D4E5F2E5F3E1A0D2EFF4E9&v=07&s=fb.. It’s a virus Update your virus scanners to be protected. (AVG is Good) Happy Surfing.
Hey all, If some of you get the message saying “Guess who your admirer is… goto ‘yourcrushisreal.com’ (Don’t Click Just Read) Or “omg! you have a secret crush!! see who it is now goto your crushisreal.com Don’t go to it, Just delete ! (I got this message of alert from