Pages

Subscribe:

Friday 28 December 2012

Download Facebook Videos Without Any Software


Hello everyone!, I think you don't need any description about Facebook. Usually most of the people use Internet download manager to download data or files from Internet , but in sometimes IDM will not catch Facebook videos. So Here is simple trick to download Facebook videos through Google chrome extension.

First of all install this chrome extension on your browser:


https://chrome.google.com/webstore/detail/facebook-video-downloader/amjcoehkcacocffpmhnefgoeanepjfkf

After the installation of Chrome extension, Click on any Facebook video and open it in a new tab 
Example: https://www.facebook.com/photo.php?v=421168804621097

Then you will see Facebook icon your chrome tool bar Click on it. 
[Click on SD Download/ HD Download]

It will start downloading... 


Have fun!! :)

Thursday 27 December 2012

Nike Fuel Band!!


WHAT IT TRACKS
Through a sports-tested accelerometer, Nike+ FuelBand tracks your daily activity including running, walking, basketball, dancing and dozens of everyday activities. It tracks each step taken and calorie burned. It also tells the time of day.
SET A GOAL
Decide how active you want to be by setting a daily NikeFuel goal. The band's LED display lights up from red to green showing your progress throughout the day.
SEE YOUR PROGRESS
Visualize your daily activity to see when you're most active - and when you're not. Nike+ helps you understand your activity patterns to help you do more.
STAY MOTIVATED
Receive achievements and rewards as you do more. Get on a streak, exceed your goal, and hit milestones along the way.

Wednesday 26 December 2012

Difference Between Virus,Worms,Trojan and Spyware



We all have heard the terms Virus,Worms,trojans and spyware but only a few of us know the difference between them.We genreally consider everything that is detected by an antivirus as virus but this is not the case.The antivirus not only provides protection against viruses but it also protects us from trojans,worms and spywares.All these can be harmful to your computer hardware and software.Today I will differentiate all these terms from each other .

Brazilian phone maker offers new Android device called the iPhone!


December 21, 2012

Brazilian consumer electronics maker Gradiente has begun marketing a new device under the iPhone brand after being granted the exclusive right to use the trademark in Brazil through 2018.
But Gradiente can only use the name in Brazil and nowhere else.
The company in fact filed its application with the Brazilian trademark office a few years before Apple ever released its first smartphone in March 2007.
Gradiente said in a statement that it applied for the trademark back in 2000, after realizing "there would be a technological revolution in the world of cellphones with the convergence of voice and data transmission and the reception via mobile Internet."
Not that Gradiente's iphone is itself all that revolutionary. The device, which retails for around US $290 and bears the rather tongue-twisting designation "Smartphone linha G Gradiente iphone, modelo Neo One GC 500," appears to be the same thing as an earlier model that Gradiente marketed simply as the Neo One GC 500. The only thing that has changed is the branding.

Tuesday 25 December 2012

Introduction To Hacking


Hello guys!!
Today i'm going to tell about what does HACKING really means? or who are the HACKERS?
As far as my knowledge is concerned hacking is simply a technical skill set. So understanding how hacking works, understanding how hacking attacks happen or being able to plan hacking attacks etc. is simply a technical skill set. Now you have to understand, if you decide to hacking in the real world (?), you are liable for any legal ramifications for that!! So, if you steal somebody's data that you're not supposed to steal or look at or you slow down the systems or destroy systems etcetera, THAT IS ALL ON YOU!! DO NOT BLAME ME FOR THAT!! (:P) In the upcoming blogs i'm going to tell you how to do hacking based on how malicious hackers would attack. So i'm gonna talk about how you plan attacks, why you do hacking, what you could do with hacking once you're into it, but like i said this is all just for informational purposes, if you decide to hack anything, thats all on you. DO NOT BLAME ME!

Introduction To My Technology Blog




Welcome to my technology blog!  As I come across interesting stuff, I'll post my musings here.

What qualifies as "interesting" for Durgesh?  Well, that's a pretty broad range of topics!  First and foremost, I'm always interested in improving efficiency and expanding services through better utilization of technology.  This is a journey, not a destination.  As we implement new technologies, I'll share our successes (or failures) here.

Another topic might be if I run into a technical problem, and then find a nice solution for it.  I might learn about an application or piece of hardware that offers helpful features.  Maybe there's an upcoming tech-related event that's of interest.  I also might come across a good magazine article.  The only thing for sure is that no matter what I write about, it will be related to technology in one way or another. 

By the way, "IT" stands for "Information Technology".  The vast majority of the people reading this page will know that, or they wouldn't be here.  No, I'm not trying to be condescending.  I just wanted to clarify that acronym in case somebody accidentally landed here from a Google search or something.
Anyway, feel free to wander.  And I really like it when people post responses to my blog.  In order to post a response, you need to register, though.  Don't worry, registering is free, and your information is kept strictly confidential. 

Enjoy!
Durgesh.