WhatsApp is a flawless informing application for keeping in contact with loved ones. It is super-quick, takes a shot at about all mobile phones (counting desktop PCs).
You have been utilizing WhatsApp essentially for chatting and calling yet there are a few other uses for WhatsApp that will you can make use of. Other than speaking with the outer world, you can likewise utilize WhatsApp to:
It was a normal day for me, I reached at my work place and started working, As part of our job we put all our project code backups on Git.
We use Gitlab and Source tree to push our codes on Git.
As soon i tried to push my code it encountered an Internal Server Error. This error never encountered to me. So just for curiosity i went on the Gitlab website to see whats wrong.
The website was down and it had a message saying
GitLab.com is currently offline due to issues with our production database.
We’re working hard to resolve the problem quickly. Follow GitLabStatus for the latest updates.
Facebook uses image recognition technology to accurately determine the content of your photographs. You can view these machine generated captions to know how Facebook sees your own photographs.
When you upload any photograph to your Facebook account, they look at the actual content of the photograph and try to determine what objects and scenes are inside the image. You may not have added any description, yet Facebook can determine what that picture is all about.
Follow these simple steps and you are good to go.
- Go to icloud.com/find
- If Prompted, sign in with your iCloud Apple ID
- Click ALL Devices at the top of your browser window.
- Select the device you want to erase.
- Click “Erase [device]” to erase your device and its passcode.
- Use the setup Assistant on your device to restore the most recent backup.
Look to hear from you in Comments..
Most of the applications in our Smartphone like Snapchat , Flipkart, Facebook are manually downloaded by us.
Prior to their installation such apps always demand certain kind of permissions.
- Access to Messages
- GPS Location
- Call details
- And many more
What a difference a decade makes. This week, the Firefox web browser turned 10. That anniversary, though, marked something more than the birth of a web browser. It marked a push by Mozilla to try to keep the web open. In this blog post, Mozilla’s CEO Chris Beard reflects on where Mozilla and Firefox have been, and where they’re going.
Elsewhere on the web, Mozilla’s Mitchell Baker writes at re/code about Mozilla and Firefox’s work to create an open internet. And Mashable has put together a timeline with fun facts and notable accomplishments.
Check Out The Developer Version It’s Kickass
Cyber-warrior experts have unearthed that to hack an ATM machine, all you need is a RM100 chip, technical expertise and a malware obtained over the Internet to hack Automated Teller Machines (ATMs)!
As a basis of the attack,the hacker knows with pre-assessment planning where the locks and connections are, the model of the machine, the level of security and the version of the operating system. Continue reading
Today no one having time to meet everyone personally…In such a world if something is there which connects people from one corner of the world to other than its Social Networking Sites. As Teens are always active on Social Networking Sites so they are majorily focused by the Attackers. Continue reading
The fact that your regular e-mail client doesn’t let you send/receive large files, files beyond a certain limit? Well, you’re not the only one. Don’t you always wish you had something, an online tool or a website for that matter that could help you send/receive large data with ease. After all breaking your data into little chunks when sending can be a daunting task. Here are websites that you should try it out. Continue reading
1. Cross site scripting (XSS)
The problem: The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks. Continue reading