22
Jul

How to remove Bubbles from the Scratch guard / Screen Protector

How to remove Bubbles from the Scratch guard / Screen Protector

You waited long enough to get a smart phone and sure you want to do everything possible to protect every sharp glaze on that apple of your eye. The first thing we load our phones with is a screen Guard/protector and we have every reason to do so right? With so many hands handling it […]

18
Jul

Google Wallet: The revolutionary Technology to Pay Money accomplished via NFC

Google Wallet: The revolutionary Technology to Pay Money accomplished via NFC

Google unveiled  Google Wallet, a payment system on mobile contact-less (using NFC = Near Field Communications). The search engine aims to migrate payment by credit card on smart-phones. This market opportunity is simply HUGE. Google Wallet is an Android app that makes your phone your wallet. It stores virtual versions of your existing plastic cards […]

1
Jun

Top 10 Secret Codes you aren’t suppose to Know

Top 10 Secret Codes you aren’t suppose to Know

Stores, hospitals, entertainment venues, and other places where the public are together in large numbers, use secret codes to pass information between store employees. These are meant to be a secret as they don’t want to alarm the non-staff members or alert someone (like a thief) to the fact that they have been noticed. Many […]

28
Apr

Share Internet Connection via WLAN in Windows XP, No Software required | How to

Share Internet Connection via WLAN in Windows XP, No Software required | How to

If you wish to share your internet connection via WLAN when on a Windows XP Machine, you would think you will need a third party software, but No, this is a built in feature to Microsoft Windows XP. Here is how to share your Internet Connection via WLAN (Wireless LAN) 1. Go to  Control Panel […]

10
Apr

What the heck is a Trojan Horse? Greek Myth? Computer Nemesis?

What the heck is a Trojan Horse? Greek Myth? Computer Nemesis?

We have all heard the term Trojan horse, but what exactly is a Trojan horse? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. One of the most dangerous examples of a Trojan is a program […]

29
Mar

How to know if the Credit Card is a Valid One, Detect Fake Credit Card, That too in your Head.

How to know if the Credit Card is a Valid One, Detect Fake Credit Card, That too in your Head.

This is most definitely the credit card generation, buying stuffs with the plastic money is not only in trend but much easier. Swiping your card for an ONLINE transaction is one of the most comment scenarios in today’s generation. With the tremendous usage of the credit card there are increase in the number of frauds […]

15
Mar

How to save yourself from Online Fraud, Online Scams and Phishing Attacks

How to save yourself from Online Fraud, Online Scams and Phishing Attacks

If you deal on the internet, you MAY be dealing with a Scammer, who might take your money and won’t send you the product or the website that you may be dealing with is a fraud website. How to know if you are dealing with the right company on the internet?   Check for the […]

25
Feb

Get Twitter Followers and Facebook Fans for FREE in Minutes

Get Twitter Followers and Facebook Fans for FREE in Minutes

A website called Twiends, gives you Twitter Followers, Facebook Fans and Website visitors in Minutes. Now once you go on the website, you will get an idea of how to go about getting followers, you need to connect it with your Facebook and Twitter account, additionally you can also add your website and Youtube accounts […]