Mindblown: a blog about Technology.
-
Protecting Yourself Against Online Identity Thieves
Identity thieves, send out thousands of fake emails daily, claiming that they are representing certain official entities. So take care if you receive emails saying they are from some government agency or department, as it may be that these emails are part of phishing schemes. Phishing typically is when someone sends you emails with “bad” […]
-
15 Useful Google Tricks
Hai friends below are the very intresting and unknown tools provided by google. Please don’t forget to share if you really find them useful!!!And if you find any cool tricks which is not mentioned here, Just post it in the comment box below and that too will be added here! 🙂1.) To Search For A Particular […]
-
Why Is Blu Ray Better Than Standard DVD?
Blu ray quality is now being considered as the best quality of picture for home theaters and the like. High Definition or HD and DVD have been defeated by Blu Ray that has earned its spot in the home cinema and theater movie watching, so much so that it has completely changed the meaning of […]
-
What Is Buffering And It’s Facts
So what does buffering mean? There you are, happily watching the latest ‘Vampire Slayer’, or whatever the latest viral video is, when it screeches to a halt and the word ‘buffering’ appears. A buffer is supposed to reduce impact between two things, but ‘buffering’ is the most annoying aspect of streaming […]
-
Different Types of Malware
An alarming majority of internet users are either ignorant or careless about the prevalence of threats in the worldwide web. Whenever something goes wrong in their computer, they immediately dismiss it as an episodic malfunction that will not cause serious damage. Those who are aware of malware infiltration only wait for their entire system to […]
-
How To Move Your Blogspot Blog To Your Own Domain
If you own a blogger, someone is hosting your website for you. Unless you own your own server, all the pictures, videos, songs and other content on your blog are stored elsewhere on a machine constantly running so the files are always available. Some successful bloggers do get their own servers because the amount of […]
-
How Firewall Work’s
Firewalls are the first line of defense for computers connected to other computers or to the Internet. They help to protect against viruses, malicious software and hackers. At the same time, they can allow communication with other computers or Internet sites that are known to be safe. There are two types of firewalls: Hardware-based and […]
-
Free Software To Split And Merge Large Files [Freeware]
WinMend File Splitter is a free file splitter and merger. It can split a file into specified number of blocks or at specified unit size, so they can be easily attached to an email, or stored in a removable device such as USB drive, floppy disk, MP3, MP4, and mobile phone. It can also be […]
Got any book recommendations?