Browsing category

How To

How to Block/Stop Candy Crush Notifications on Facebook?

Today, I was talking to some friends about the Candy Crush notifications and I found out that everyone is sick of the frequent notifications people send on Facebook. Candy Crush Saga is one of the top games available on Facebook, Android and iPhone. The users of the game are infamous for asking help from Facebook […]

Android 5.0 Lollipop Tips and Tricks for Your Phone

Now Android 5.0 Lollipop is out for some devices,  here are some handy tips and tricks for your updated phone. Check out these videos put together by the Motorola Team for their updated second generation Moto X. The value of these tips and tricks can be seen as Motorola itself launched its official videos. How […]

How To Get Google Inbox Without an Invite?

Last week Google launched  Google Inbox – a supplement (actually a good one) to the existing Gmail on your computer or your phone. It is a colorful, beautiful and more organized hub for your email which looks more clean and graphical. Also Read: Mozilla to Release New Developer Web Browser on November 10 Google earlier announced via its […]

How do open source tools stay secure?

Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,

Learn cyber security fundamentals (Free course) (online classes)

SANS Cyber Aces Online makes available, free and online, selected courses from the professional development curriculum offered by The SANS Institute, the global leader in cyber security training. SANS goal in making these courses available as open courseware is to help grow the talent pool and accelerate the rate at which skilled cyber professionals can […]

Find Out If Any One Opens Your Computer Without Your Permission

How to Know Who Logged into your computer and when? In Windows, there is one in-built too will records all events in your computer called “Event Viewer”. This application records all your computer activities from login to log off etc. The Event Viewer can be accessed in all Windows Operating system including Windows XP, Vista, […]

How To Shutdown A Computer With A Cell Phone.

Using this method, a user can shutdown, restart, hibernate, etc. his or her computer, just by sending an email from his or her phone. To do this, all you will need is Microsoft Outlook which should come with Microsoft Office, which most people have. This will need to be on the computer wish you wish […]

Variables In C | Cheat Engine tutorial

Variables is one of the most important part of programming, and millions of applications are using this technique.  Cheat engine provide to the user the access to the memory and modifying data. About cheat engine:

Cyber Security Awareness Month: It’s on!

October is National Cyber Security Awareness Month in America and each year this program brings more and more attention to issues that should be of concern to anyone who uses a computer, plus a low of how-to information, security resources, and awareness-raising events.

How to fix Shellshock Bash on Mac OS X: Mavericks edition

Apple Mac OS X users concerned about the Bash vulnerability dubbed Shellshock got some relief late yesterday as Apple published fixes for various versions of OS X. But if you use Mavericks you will need to install 10.9.5 before the Bash fix will work.

Write Your Message in the Sky and Name with the Galaxies

Each time we look at the sky we get amazed by its brilliance and vastness . Whenever I need to spend some time alone I go to some field , lie down and watch the skies , its beauty is mesmerizing . I don’t know about you , but I have a fantasy to see […]

How The Pirate Bay Remains Untouchable

The Pirate Bay still remains the world’s largest torrent site which handles requests from millions of users every single day and is in the top 100 most visited websites on the Internet. Generally, The Pirate Bay is famous for potentially hosting copyright material on its website. Despite years of harrassment from the law, it remains […]

How to protect yourself after the Home Depot breach

Home Depot has issued a statement today that provides more details about their recent breach, as well as indicating that the malware used by the attackers has now been removed from their systems. This breach appears to be even larger than Target’s, as it exposed payment information for 56 million customers in their US and Canada locations.

National Health IT Week – tips for starting Risk Assessment

This week is National Health IT Week, and you may be wondering – what is the best way to observe this occasion? While planning for catastrophe may not seem the most celebratory activity, this week is a great occasion to start or review your organization’s risk assessment.

How to Install Gnome Desktop Environment in Ubuntu 14.04 LTS?

Gnome  is one of the most popular and most used desktop environment for Linux systems . It is a desktop environment which is composed entirely of free and open-source software and targets to be cross-platform, i.e. run on multiple operating systems, its main focus being those based on the Linux kernel. If you don’t have […]

How to Install a Screensaver in Ubuntu ?

You know the time when LCD, LED screens were not common and CRT monitors were mostly used for video output? it was a time when screensavers were very popular and you must have tried it on your Windows PC. But these days you don’t see them much the reason being that 15 years back they […]