Like it!

Recommend on Google

plz Share

Powered by Blogger.

Secure your Android phone or tablet.

Here are the five steps to secure your android phone or tablet.

Geek stuffs to buy online

Looking for something geeky, cool and unusual to buy online? ThisIsWhyImBroke is the site for you. The site brings to you everything that fits the bill of being cool and sometimes, even bizarre!! The site is categorized into what's new, gears+gadgets, geeky toys, wearables, home+office, food+drink and kid stuff.

Increase of mobile threats in 2013

ESEI has identified a number of trends in its malware predictions for 2013 report. Chief among them being a huge increase in mobile malware. The number and complexity of android threats will grow even further, targeting users personal and corporate information, recruiting devices into botnets, downloading paid apps from fraudulent apps stores without user content and abusing premium rate sms and call services.

Your facebook likes could give away the most intimate details of your life

Proving that most people reveal far more information online than they are aware of, a team of university Cambridge and Microsoft researchers has identified that user's facebook likes can be used to construct highly accurate profiles,including sensitive personal attribution such as their ethnicity, religious and political opinions, sexual orientation, intelligence and history of drug use, in addition to age and gender.

How to simulate firefox os on pc

Firefox OS is still under development. Obviously we are all curious about the new OS that will say 'hello world' soon. But how about sneaking what it is all about? Here is the tutorial for simulating the Firefox OS on your PC.

Sunday, 2 June 2013

Increase Blog traffic by genuine Titles.

One of the most important part of your blog is the Title. Many bloggers spare a lot of time in creating high quality contents and lose everything by Titles!
It may look unnecessary but trust me readers won't crawl through every words in your blog, they want solutions which is kept straight and easy. So a relevant non tricky titles plays a huge role in the quality and traffic of your blog.



Try to put an unique title for each of your blog post. Titles that is most relevant and catchy to your posts. Try to put 'How to' if you are posting any tutorials, and only if it is necessary. Most bloggers believe placing How to's in every blog posts drive traffic to their blog! Thats absolutely not true.

If you are confused in the right title for your blog posts here is the little trick to follow,

Go to Google search and type any keyword that you want for your blog post title.
You'll come across several titles take the top 10 ranking titles and you'll surely come with your own good title for your post.
Make your Title, reader friendly and unique than the other 10 titles.

If you have a well established site, you may have written many of your page
titles and meta descriptions years ago when you knew less about marketing
than you do now. If so, it's time for another look at them.
If you have any old blogs try with it and you will be embarrassed with your titles at how bad they really are!

How to Get Traffic through high quality contents.

Many people own a number of blogs and their only complain is about TRAFFIC! It doesn't matter how many blogs you own, unless it has no genuine content in it. Contents are the most important thing in any blog, but sadly many website/blog owners ignore it.
Many bloggers concentrate on quantity of the posts rather than quality of the posts. I have seen many blogs which has more than 10,000 posts and still very few people visit it!




Owning a large, well established, high quality site is a very solid investment
in your future.These days, even Google's webmaster guidelines advise affiliates to publish "unique and relevant" content.

If you spend time thinking of ways to provide truly useful content that
people will talk about, you'll automatically end up with lots of free, one-way
links to your site as people recommend it without even being asked to do
so.

Also when it comes to the articles, only research based blogs overtake other blogs due to its original and unique contents. If your articles seems to be somewhere heard or already known to the reader you can't expect the reader to revisit your blog.

It is very important to write your own insights and informations rather than contents taken from other blogs, except some tech and tutorial based articles based on your niche. But who likes Copycats! Right?

And most importantly, successful blogs are intended on solving people's problems. Am sure they'll love it!

Thursday, 9 May 2013

How to simulate firefox OS on the PC.


Firefox OS is still under development. Obviously we are all curious about the new OS that will say 'hello world' soon. But how about sneaking what it is all about? Here is the tutorial for simulating the Firefox OS on your PC.







1.Download and install Mozilla Firefox. If you don't have it on your PC, the present version is 20.0. To download click here

2. Next you will need the simulator extension. Download the addon  Firefox OS simulator. The file is around 67 MB in size.

3. And thats it!! your system is now ready to simulate Firefox OS within Firefox. Click "tools" then on "web developer" and finally on "Firefox OS simulator". A new tab will open, there will be a simulator button on the left column and you'll see a highlight that is currently stopped. Click on the icon to start it and a new window will pop up with the Smartphone operating system run inside the simulator.

Have fun checking out the new OS and see whats new. Keep in mind that the OS is still under development and it won't run perfectly.

Geek stuffs to buy online: ThisIsWhyImBroke.


Looking for something geeky, cool and unusual to buy online? ThisIsWhyImBroke is the site for you. The site brings to you everything that fits the bill of being cool and sometimes, even bizarre!!

The site is categorized into what's new, gears+gadgets, geeky toys, wearables, home+office, food+drink and kid stuff.

The home page features all the products in a pinterest  like format. Clicking on products will take to another page where you will find additional information about them. Even if you are not looking to buy, you will surely be amused by the products.

For the geeks there is stuffs like a computer circuit board tie, floppy disk table, washable keyboard and moving gear chain locks. Star war fans will be amazed as there is a wide range of merchandise dedicated to the series. You will find a carbon fiber stormtroopers helmet, legend of Zelda wedding rings, star wars wedding rings, star war iphone cases, stormtroopers cuff links and much more.

For comic fan boys they have glasses, Batman contact lenses, superhero socks and lot more fascinating stuffs. There is also products for gamers like Nintendo themed furniture, mini video game controller rings, zombie head cookie jars, lawn zombie decorations and a lot of stuffs that will leave you broke!

How to secure android phone and tablets in 5 steps.

Here is the genuine five steps to follow to secure your Android phone or tablet.

1. Pin or unlock pattern:




















Go to settings/security and tap 'screen lock'. Choose the best pattern and draw a line between the points with your finger on the screen.
IMPORTANT: Also activate the automatic lock so your phone is protected when you leave it idle.

2. Encryption:




















In security settings, there is also an 'Encryption' option, which you set up the same way, using a PIM password or patterns. The device is decrypted when powering up.
NOTE: If you forgot your pin or pattern, only a factory reset will make the device usable and your data will be lost.

3. The top backup App:












Ultimate Backup tool is available for free at forum.xda.developers.com It is a windows tool that can backup your apps and data without requiring root access.

4. Wireless connection only when needed:




















It might be a little inconvenient but one way to stay safe is to only turn on the Wi-Fi and Bluetooth connection when absolutely required. That way malware can't communicate with the outside world.

5. Check permissions of each App:





















Some apps don't really require access to your address book and photo library, some malicious apps can potentially be very harmful to your private data.

Tuesday, 7 May 2013

Gamers enraged by bugs, DRM in new Simcity

EA's big Simcity franchise resurrection was preceded by month of hype and mounting expectation, which peaked when early reviews rated it 9.5/10 and above. However gamers who bought it were in for a rude surprise at launch time. EA's servers couldn't handle the load, leading to hour long waits and repeated crashes.
Even worse, EA responded by reducing functionality and killing online features. Gamers who never wanted the game to require a constant Internet connection, also quickly discovered that traffic routing is completely illogical and usable land area is laughably limited. EA still claiming that calculations are offloaded to the cloud, but this has been proven to be untrue. EA hasn't yet responded to the latest set of revelations.

Increase of mobile threats in 2013, windows still a target


ESEI has identified a number of trends in its malware predictions for 2013
report. Chief among them being a huge increase in mobile malware. The number and complexity of android threats will grow even further, targeting users personal and corporate information, recruiting devices into botnets, downloading paid apps from fraudulent apps stores without user content and abusing premium rate sms and call services.

On the windows side of things autorun malware is still popular. Websites and third party modules deliberately modified to include malware are fast gaining popularity. Botnets will continue to actively recruit zombie PCs using a combination of social engineering tricks.