Transparent White Star

GooGle Is SPyIng US ?

That words across my mine during web-surfing, while my gmail and iGoogle account still logged in. Moreover I like Chrome to get any information through internet. Does Google really spy on me? If you open History in Chrome, you will be amazed by how well-organize Chrome doing it.

How Does Google+ Stack Up Against Facebook?

With Google+, the behemoth of Web search may have finally figured out social networking. Demand for Google+ invites is reportedly through the roof, and critics are generally pleased with how the service works..

Angry Birds Now in Windows Phone Marketplace

At last. Angry Birds is now available in the Windows Phone Marketplace—a few hours ahead of schedule and so fresh it hasn’t even been rated yet! Be the first—or just hunker down with your phone and get dem pigs. .

WindOwS 8 is Cool Enough ?

On Tuesday, Microsoft showed off the first tablets running Windows 8, and provided a bunch of new details about the operating system.

Secure Browseing Is The Way To scuess

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Angry.Birds.v1.6.2.iPhone.iPod.Touch.iPad


picture

                            
[Name]:Angry.Birds.v1.6.2.iPhone.iPod.Touch.iPad-ARBiTRAGEPDA
[Date]:2011-07-25
Copy extracted file to iTunes apps library and sync device. 
http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewSoftware?id=343200656

Screenshots:
 
http://image.bayimg.com/jajoaaade.jpg
 
http://image.bayimg.com/jajobaade.jpg
 
http://image.bayimg.com/jajocaade.jpg
 
http://image.bayimg.com/jajodaade.jpg
 
http://image.bayimg.com/jajoeaade.jpg  

                            
DOWNLOAD THIS TORRENT (MAGNET LINK)
Read More

SHIFT 2 Unleashed.v1.0.1.iPhone.iPod.Touch.iPad

picture

SHIFT 2 Unleashed v1.0.1
                        Electronic Arts Nederland B.V.

             Language....: MULiT7


             Protection..: FairPlay


             Date........: 03/08/2011


             OS..........: Apple iOS



                             ...:: Description ::...



          More Infos..:



          http://itunes.apple.com/nz/app/id444282358?mt=8#



                             ...::nstall Notes ::...



               How to install:

               1: JB Your device,install app sync patch
               2: Unzip and unrar
               3: Add  e .ipa file to iTunes
               4: Synchronize your device          


Screenshots:
 
http://image.bayimg.com/majcgaadi.jpg
 
http://image.bayimg.com/majchaadi.jpg
 
http://image.bayimg.com/majciaadi.jpg
 
http://image.bayimg.com/majcjaadi.jpg
 
http://image.bayimg.com/majckaadi.jpg  

DOWNLOAD THIS TORRENT (MAGNET LINK)
Read More

How to Tweak your Laptop for Faster Internet


How to Tweak Your Laptop for Faster Internet


internet accelerator for laptop
Install a Speed Booster and Download Accelerator
While this particular step is very important, and can make a great deal of impact on the internet speed you get, a lot of people still ignore it. One great way to get faster internet access on your computer is by installing a speed booster on your computer. The main function of a speed booster is to help you get better internet speeds, and it does this by connecting to an external server and by implementing a wide range of tactics to help improve your internet speed. If you’re someone who downloads a lot you can also install a download accelerator on your computer to ensure faster internet speeds. Most download accelerators connect to several servers to provide you better internet speed, and by using them you don’t have to worry about slow downloads again.

Realize that Your Computer Influences Your Internet Speed, and Work on Optimizing it Regularly
Another step you can take to help you enjoy your internet on your laptop is to work on optimizing your laptop regularly. Most people think that the problem is with their ISP whenever they experience a slow internet problem, whereas, in most cases, the problem is with their computer. It is important that you realize that your computer influences your internet speed to a great extent and you should work on optimizing it regularly. Make sure you clean up your laptop regularly, make sure you shut it down at the right time, and make sure you remove applications you don’t need.

free dns server for laptopConfigure Your Laptop to Work with a DNS Server
The final option you can employ to get better internet speeds is to configure your laptop to work with a DNS server. Whenever you try to access a web serveryour internet server has to connect to it first, and sometimes, this often takes longer depending on the website. You can easily ensure you get better internet speeds by configuring your laptop to work with a DNS server since most DNS servers already have the website you are visiting in their system. The best DNS server you can use online is the one at OpenDns.com.
Read More

BodyGuardz MyKase for iPhone 4/4S is Customizable


If you have an iPhone 4 or 4S smartphone and you want a cool case that you can customize to your tastes the MyKase might be perfect for you. The case comes with side rails and a back that can be interchanged to make a case with multiple colors that suits your style.
bodyGuardz
It appears the pieces slide together easily. The case is up for pre-order right now at $29.99 for black or white starter kits and kits with a screen protector sell for $34.95. It’s not clear exactly when they will ship, mid-November is the only date offered.
Each of the $29.95 kits comes with a single color case with two additional back panels. It appears that all the ports and controls are left uncovered and the case should provide some drop protection as well.
Read More

iPad was supposed to Get Intel Atom Originally


When Steve Jobs and co over at Apple were initially planning the iPad tablet, it had tied up with Intel to provide processors for the Mac line of computers. According to the Jobs biography, Steve originally wanted the iPad to use an Intel Atom processor.
iPad
I had always assumed the Atom to be to weak sauce so maybe that’s why the fruit-named company switched. According to the book, Jobs had concerns about Intel, namely the fact that the company was so slow to react. Jobs likened Intel to a “steamship” and said Apple was used to going fast.
Jobs also worried that Apple would teach Intel “everything” and then Intel would sell it to their competitors. I don’t think the iPad would have been the same animal had it used an Atom processor inside.
via PCMag
Read More

How to Hide Data in Image, Audio & Video Files: Steganography


How to Hide Data in ImagesEver wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have  managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.
Download Stego Magic
Download StegoMagic.zip
The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
I hope you enjoy this post :) . For queries and feedback, please pass your comments 
Read More

Less than 900 Days Until Windows XP End of Life



Time is running out for Windows XP. There are now less than 900 days until Microsoft discontinues support for the decade-old operating system. 

More precisely, there are 893 days until the Redmond company pulls the plug on Windows Vista’s predecessor. 
In a sense, XP is already living on borrowed time, since Mainstream Support for the operating system was retired on April 14, 2009.

But as it is the case with a number of its products, XP transitioned to the Extended Support phase, which is scheduled to end on April 9, 2014. 

Microsoft’s Alex Guy warned customers about the imminent deadline when XP support is “flicked to off, and no support means Windows XP becomes a significant risk for your business. After April 8th 2014 there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates,” he stated.

Microsoft made sure to mark the moment when XP support end date was 1,000 days away, and the company certainly urged customers to upgrade earlier this week. 

On October 25, 2011, XP turned 10 years old, but despite this it’s still a major presence on the operating system market. 

Like it or not, XP is all but obsolete, and users of Windows 7 for example can attest to this. it’s right about time for those still on Windows XP to plan to upgrade. 

“It’s hard to believe it, but ten years have passed since Windows XP was first launched, and the workplace has changed quite a bit,” Guy added. 

“Today’s businesses, big or small, face trends that were not mainstream a decade ago – highly mobile and distributed workforces, new compliance regulations, more consumer devices in the workplace, and an increased emphasis on operational efficiency. The modern workplace needs modern technology to support and embrace all these changes.”
soruce softpedia.com
Read More

Newer Posts Older Posts Home

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More