Search results

  1. Have u watch spider man? Which part u like the most,is it 1,2,or 3!

    Yeah sumthng is related with 2nd,but still it can b watch...
  2. How to recover a gmail account when a family member dies

    Woow.,..its really too lengthly..
  3. Some facts about Nokia....

    Nokia an brand which having an unbelievable customers a brand which is known as Heart of Mobile...do u know some facts about it...have a look...to it!! 1.The nokia tune was made from 19 th century guitar by an spanish musician fransissco. 2.The name Nokia was derived 4rm river nokiavinra...
  4. How to manage startup applications/programs in Windows 7

    Cool....thanx 4 sharing this....
  5. Samsung w200

    If u r looking 4 an cam corder which should have hd clearity,shock proff,waterproff then u should have a look to samsung w200. It has 5 mega pixels camera with f2.2 lense which is specially made 4 shooting underwater.It is water proff upto 3 metres and shock proff up to 2 metre. It shoots video...
  6. How to be safe from smart phishing trick?

    U might be knowing about phishing page,this is the same but its advance. It sends the html page via email to the victim rather than posting its html page to other site. It has already created a page of html which they send to victim via an look a like official email id eg <!-- e --><a...
  7. Bot malware...

    Thanx to whom???
  8. Types of cables

    This cables r related with internet...normally co axial wires r used in internet connection.
  9. Cookie stealing technique....

    Its illegal i cant post it here....!!
  10. Bot malware...

    Botnet is an application which uses several computer having malicious code and it is controlled by an attacker. Symptoms....of botnets.... 1.pc works very slow,strange programs run... 2.task manager shows strange programs with strange names. 3.Many ads just pop ups without clicking. 4.u may...
  11. Types of cables

    There r three main types of cables..! 1.Twisted pair cable,normally found in telephone line has less electromagnetic interference. 2.Co axial cable,found in t.v 4 transmission of analog signal. 3.Fibre Optics,it is use 4 high level data transmission.it user light 4 transmission of data.
  12. Cookie stealing technique....

    This is an technique which is used to get sensitive information of user like log in id,password etc. You might be knowing about cookies it stores all the information of ur sensitive data. Clear all cookies at a specific time intervals. Once ur enemy gets ur cookie it can b easily decrypted.
  13. How to get known that email a/c u r using is being used by u only or not?

    If u r using gmail then at bottom there is an option 'view recent activity' click there and c whether any other i.p address is there or not. If u using ymail,hotmail c that there no new email which is nt read by u. If u receive any suspicious mail with attachment b careful with it,it may b a...
  14. Rate my maps

    Cool maps....its awesome superb
  15. Dell Laptop

    I think u should go with studio...cool performance plus almost all features..
  16. 3gpmobilemovies

    Yeah...may b of net probs but now i stoped dwnlding 4rm ths site...
  17. Encryption and Decryption

    Right plus wrong....half from i.t book and half from my brain...lolzz i havent open my i.t book..
  18. Encryption and Decryption

    You might have buy any product 4rm online shop,encryption and decryption plays a vital role in it. If u buy any product 4rm online market,it has three stages. 1st.presales. 2nd.execution. 3rd.settlement. Encryption and Decryption takes place at execution and settlement phase. It just...
Back
Top