Posts

Showing posts from February, 2016

Here is a brief look at the next flagship to be unvelied by samsung - S7 and its counterpart s7 edge

Image
Samsung's new Galaxy S7 flagships are here. But which is the best? Samsung has now unveiled its 2016 Galaxy S flagship and, as expected, it's called the Galaxy S7. Also as expected, it was a dual-launch with the regular Galaxy S7 following the same format as the Galaxy S6, in being accompanied by a same-but-different variant called the Galaxy S7 edge; featuring a unique curved OLED display which wraps around the phone's sides for a very distinctive look. In terms of internal specs for hardware, including the processor, camera and storage, these two are mostly identical, but there are a few important differences. A key difference, however, is the price - the Galaxy S7 edge is a bit more expensive than its flat-screened counterpart. But is it worth the extra cash? A lot has already been said about Samsung’s 2016 flagships. General word on the street is positive; the phones have been updated in all the right places. But is th

Six Android apps you probably haven’t heard of but very useful one's

Image
The number of apps that are available to us is astounding. It’s easy to believe there are apps for everything. With so many options available, however, it can be hard to determine what apps to get. Below is a list of a few apps that aren’t your everyday app but can be pretty useful, depending on your situation. Tunity – Ever been to a noisy bar and can’t hear what the announcers are saying on the TV? This app allows you to play the sound of the TV from your device. It scans the TV and figures out what channel is on. Then, audio begins playing through your phone. Photomath – This app claims itself to be the world’s smartest calculator. Having trouble figuring out how to solve a math problem? Using your phone’s camera, the app captures math problems and walks you through the steps. RunPee – Having to use the restroom while watching a movie can be rough. This

Switcheroo Lets You Control Stuff With Your Smartphone!

Image
  IoT buzz is all around and people are building great stuff. Few weeks back, we talked about upcoming IoT development kits –  CHIP , Modulo and Cubit , which will help you in building IoT projects easily and effectively. Today, we found another great product called Switcheroo, which lets you control stuff with your smartphone. Switcheroo started trending on Kickstarter  last week and it has reached its funding goal so it will come to you soon. What is  Switcheroo? In layman’s language “Switcheroo is nothing but a wireless switch which you can control with your smartphone”.  With this you can control almost anything with your smartphone. The Switcheroo makes it a snap to upgrade everyday devices for smartphone control. The Switcheroo can do things like; control toys unlock doors start your car turn on lights open/close your garage door control your heat remote shutter release for cameras upgrade anything with a pushbutton How does it work? A

Running ‘rm -rf –no-preserve-root /’ Command In Linux Can Kill Some Laptops Permanently

Image
Image: Arch Linux Short Bytes: The mere thought of permanently damaging your laptop is daunting. But, what if you are trying to erase your current Linux installation and you end up hard bricking your device? One such incident happened with a user who ran the ‘rm -rf –no-preserve-root /’ command and ended up breaking his laptop. I n early January, a user posted on the Arch Linux forums telling how he bricked his own laptop after running a single ‘rm -rf –no-preserve-root /’  command. However, this command is known to erase the current Linux installation and nothing else. Well, this world isn’t a simple place and the Arch Linux forum user 9233 is a living example of the same.To get rid of the Arch Linux installation on his MSI Notebook by avoiding simple reinstallation, he decided to run this command. Afterwards, when he tried to boot into the BIOS, it didn’t work. On the Arch Linux forum, he writes: “So today me and a friend ran “rm -rf –no-preserve-root /” on a

Google Idea To Kill Flash Ads, Goes 100% HTML5 - a new web stratagy

Image
  Short Bytes: Google today told the world that its ad service is ditching the notorious Flash for HTML5 in upcoming months. The company will stop accepting ads based on this security nightmare, starting on June 30, 2016, and will complete drop them on January 2, 2017.   A nother day and another nail in the coffin for Flash! Google has just announced that it’s dropping the Flash display ads completely and going 100% HTML5. In its Google+ announcement , Google has set some deadlines for the advertisers. The ad-serving company will no longer accept new Flash ads from the advertisers after June 30, 2016. The older Flash ads in Google’s catalog will continue to run till January 2, 2017. This step by Google was long overdue. Recently, the tech company decided to automatically pause any Flash-based ad in Chrome. This latest change will bring along a great impact as Google Ad network reaches more than 95 percent of desktop internet users. Hence, a total ban on Flash ads wi

All Versions Of Windows Hit By ‘Severe’ Security Vulnerabilities -- Remote Code Execution

Short Bytes:  As a part the latest Patch Tuesday, Microsoft released 13 security patches for all version of Windows and other software like Microsoft Office, IE, Flash etc. Out of these, 6 vulnerabilities were rated critical and demanded immediate attention from your side. W indows is hit by major vulnerabilities that affect all supported version of Windows operating system. In its latest Patch Tuesday security bulletin, Microsoft said that the users of Windows Vista and later should immediately patch their systems to guard themselves against these serious security flaws. The company provides this information to help customers prioritize monthly security updates with any non-security updates.The monthly release lists 13 security threats, including 6 critical vulnerabilities for remote code execution. The other 7 flaws deal with the denial of service, security feature bypassing, and elevation of privileges. These vulnerabilities confirm the outcome of a recent rese