Now, There is a Technique to Get SMS Alerts to your Mobile
Share This Post
Jan 29, 2011
Dec 28, 2010
steganography - How to Hide a data with in an Image ?

You don't have to be a trained spy plotting international espionage to put steganography to good use. With some free tools for both the Mac and PC, you can embed secret information in image, PDF, HTML and MP3 files for fun or profit.
Dec 22, 2010
How Twitter acquires people ?
When is an acquisition not an acquisition? When Twitter’s involved, apparently.
The microblogging company announced today that it had “acquired the team at Fluther, Inc.” Fluther makes a question-and-answer site, a popular category of Web startup as of late. (See Hunch or Quora for examples of better-funded competitors.)
When I asked Twitter spokeswoman Carolyn Penner what kind of deal it had actually struck, she characterized the event as a “talent acquisition.” I pointed out that there’s no such thing, really, as a talent acquisition: Either a company acquires or merges another company and takes on its employment obligations, or it hires employees as individuals. I also pointed out that under the U.S. Constitution, acquiring people was technically illegal.
Dec 15, 2010
Wikileaks have Now Competition with Open Leaks on Net
Wikileaks have Now Competition with Open Leaks on Net, It seems that the organization WikiLeaks will have a competitor going forward. According to the Swedish newspaper Dagens Nyheter, several people who resigned from the project due to conflicts with the founder Julian Assange are planning to open a new site next Monday (13), the Openleaks.
Dec 11, 2010
Arrest of Wikileaks founder Julian Assange

The founder of whistle-blowing website Wikileaks, Julian Assange, has been refused bail by a court in London but vowed to fight extradition to Sweden - but what are the issues involved?
Why has Julian Assange been arrested?
Mr Assange has been arrested under a European Arrest Warrant (EAW) because he has been accused of committing serious crimes in Sweden.Dec 6, 2010
Locate Lost i phone from Find my i phone, But thieves can easily Disable

Dec 2, 2010
What is QR Code and what is its Use ? Know about QR Code

Common in Japan, where it was created by Toyota subsidiary Denso-Wave in 1994, the QR code is one of the most popular types of two-dimensional barcodes. QR is the abbreviation for Quick Response, as the creator intended the code to allow its contents to be decoded at high speed.
Nov 29, 2010
A practical cell phone that is specially designed for senior citizens
Just what the doctor ordered! A practical cell phone that is specially designed for senior citizens! Lots of what you need, and nothing you don't! . Tired of those small phones with dial buttons so small that unless you have pencil fingers you can't make a call? Not exactly user friendly for people with arthritis, rheumatism, or poor eyesight right? In contrast, the old age pensioners phone has jumbo sized keys which make calling a breeze!
Nov 27, 2010
Mobile telecom profits may dip due to stringent norms: COAI
Cellular Operators Association of India (COAI) Wednesday indicated that profits of mobile telecom industry may shrink further on account of strict subscriber verification norms and levy of charges on erection of cell towers by the state governments. Lack of infrastructure facilities in rural areas coupled with stringent norms of customer verification before providing services is a deterrent for mobile penetration in most parts of the country, COIA Director-General Rajan S. Mathews said.
Nov 26, 2010
How to Make a Virus to Test your Antivirus ?
If you are active in the anti-virus research field, then you will regularly receive requests for virus samples. Some requests are easy to deal with: they come from fellow-researchers whom you know well, and whom you trust. Using strong encryption, you can send them what they have asked for by almost any medium (including across the Internet) without any real risk.
Subscribe to:
Comments (Atom)