No Picture

Nokia N8 Hacked To Support Bluetooth Keyboard And Mouse!!

August 21, 2010 0

One of the more useful features of Apple’s popular iPad is the ability to tether a Bluetooth keyboard to it, making text input a whole lot faster than using its virtual keyboard. Now, some clever hackers have managed to get the same feat on a Nokia N8, and they’ve thrown in support for a Bluetooth mouse as well. Check out a video showcasing this after the jump, and decide if you think whether the Nokia N8 might be a good phone to compose your lengthy emails in.

No Picture

Intel Buys McAfee for $7.68 Billion

August 19, 2010 0

Intel has just bought the cyber security company for $7.68 Billion or $48 per share. Buying McAfee Intel has moved into a whole new dimension. The Company which was well known for its hardwares especially microprocessors, has shown some valuable step forward in the software field by the acquisition of McAfee.

Facebook Vs Myspace

August 19, 2010 Axleration 0

In the competition between Facebook and Myspace it is very clear that Facebook won it. But Myspace was once the undisputed leader of Social Networking sites, but facebook started at a dorm grew fast to eat up Myspace to become the largest ever social networking site in the world.

No Picture

Report Fake Profiles in Facebook

August 9, 2010 0

Facebook is the largest Social networking website in the world. Facebook has been the favourite Social network for many people though it has many Privacy concerns. But one of the major problems faced recently is Fake accounts. Fake accounts of famous celebrities are created in facebook to get a lot of audience and to spam them. Fake accounts are really irritating and dangerous. If you find a Fake account in facebook, use the below procedure to inform facebook about it.

No Picture

New Version of Epic Browser

August 7, 2010 0

The first ever Indian browser – Epic Browser, was released a month ago, which created waves in the Indian teach field. The epic browser was a great success among the Indians as well as global users. The Epic team has released the next version of Epic version 1.1, which has solved many bugs that were found in the previous version.

No Picture

Google Ends Google Wave

August 6, 2010 0

Google Introduced Google Wave last year and it created a lot of waves in the tech world in the beginning but it faded into thin year soon. As Google didn’t get the expected response for Google Wave, It is planning to end the project by the end of this year.

No Picture

SweetSearch – A Search Engine for Students.

August 5, 2010 0

SweetSearch is a search engine which is specially designed for students, it uses Google’s search technology to provide us with the best results. But it’s results are very much accurate, since it indexes only 35,000 of the most relevant websites which had been handpicked by their staffs.

No Picture

Find Travel Routes Using Google Maps

August 4, 2010 0

Google Maps can help you in many ways. If you are planning to go for a picnic or just an outing, Google maps can help you to find the shortest route possible to reach your destination.

No Picture

HP Says No to Windows Phone 7

August 2, 2010 0

Hewlett Packard (HP) announced that they are not going to concentrate on mobile devices operating with windows phone 7 operating system. Rather they are going to concentrate on WebOS which is a property of Palm computers which they bought recently.

No Picture

100 Million Facebook Profile Data Leaked to Torrent Site

July 30, 2010 0

A 2.79 GB torrent file is out there in the internet containing data from 100 million facebook profile pages, but these data was actually available to everyone as no privacy restrictions were set. Hacker Ron Bowes from Skull Security created a crawler that pulled everything from Facebook’s open access directory, essentially giving him all data that people had set to allow anyone to see.

No Picture

How to Change Your Security Question in Gmail

July 28, 2010 0

A security question allows you to recover your account, when you have lost your password or when some one else hack your account. It is important that you setup a good security question, so that others cannot guess the answer for that question.