Monday, 27 February 2017

Nokia 3310 is Back With New Look And Exciting Features.


In 2005 nokia 3310 disappeared in market.After long time Nokia 3310 is back with Advanced Features.

Features of new Nokia 3310

  • Color Display
  • 2.4' screen
  • Two micro sim slots
  • 2 Mega Pixels Camera
  • 22 Hours Talktime
  • 25 days Standby
  • Legendary Snake Game with Little update
  • Cost is upto 3500RS

Wednesday, 22 February 2017

Here are some Facebook hacking techniques?


In this post I will simply tell how a Facebook account is hacked in different ways.

1-Phishing attack


Phishing is the one of the most popular attack that is used for Facebook hacking.Here attackers simply create a page which looks exactly to Facebook.Once the victim log in through the fake page,the victims Login ID and password are sent to attackers house. So when ever you logging into any social media website please look the address carefully and then continue log-on.

2-Key logging


Key logging is the easiest and faster way to hack Facebook. Here intruders install a key logger in victims computer. It records every thing on his/her computer(key presses and mouse clicks). And these all are stored into log and this log is send back directly to the attacker house. Whenever logging into private systems once check background process like any keyloggers.

3-Session Hijacking


Session Hijacking is the one of the dangerous attack among all other attacks.Here the attacker stole the user-name and password by hijacking the session.Here the session is stealed by non secure connection(http).It is most widely used on LAN, and WiFi connections.

4-Stealer's


Almost 70% of people save their passwords in browser to access facebook. Attackers use some software's that specially designed to get the saved passwords from the victims browser.

5-DNS Spoofing


If both the hacker and victim are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victim's Faceboook account.

6-Man In the Middle Attacks


If the attacker and victim are in same network, a hacker can place himself between the client and server,otherwise he could act as default gateway and can capture all the traffic in between them.

7-USB Hacking


If an attacker has physical access to victim's computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Web Browser.

Source:mr-tricks.blogspot.in

Sunday, 19 February 2017

Apple processor manufacturer?


Do you know that? Apple Processor is manufactured by Samsung and TSMC. http://123technotricks.blogspot.in/2017/02/do-you-know-that.html

Tuesday, 14 February 2017

A search engine ‘more accurate than Google’


A 16-year old going by the name Anmol Tukrel, an Indian-origin Canadian citizen is now challenging the authority of Google. He has designed a personalised search engine that claims to be as high as 47 percent more accurate than Google, and about 21 percent more accurate on an average. Tukrel’s search engine was designed as a part of a project to submit to the Google Science Fair, which is a global online competition open to students aged 13 to 18 years.
Anmol Tukrel, who has just completed his tenth grade stated that he took a few months to design this project and approximately 60 hours to code the engine. In conversation with The Times of India, he said, “I thought I would do something in the personalized search space. It was the most genius thing ever. But when I realised Google already does it, I tried taking it to the next level.” His development kit included only a computer with at least 1GB of free storage space, a python-language development environment, a spreadsheet program and access to Google and New York Times. The report points out that to test the accuracy of his search engine, Tukrel limited the search query to this year’s articles from the New York Times.
He claims that his search engine is better than Google because not only does it take into account location or browsing history, but also tries to understand context and meaning.
Source:http://tech.firstpost.com

Saturday, 4 February 2017

What is a Banana Pi?


low-cost mini computer for education, multimedia applications, scratch, arduino, game emulator, home server, robot etc. Banana Pro has an excellent compatibility with multiply software supports. Generally speaking, all main operating systems based on Linux can run on Banana Pro, with the version of Lubuntu, Android,Debian, Bananian, Berryboot, OpenSuse, Scratch, Fedora, Gentoo, Open MediaVault, OpenWRT. Banana Pro also supports BSD system.

For more details visit:Banana Pi

What is Orange Pi?


It’s an open-source single-board computer. It can run Android 4.4 , Ubuntu, Debian, Rasberry Pi Image, it uses the AllWinner H3 SoC, and has 1GB DDR3 SDRAM

Uses of Orange Pi

Build… 
A computer
A wireless server
Games
Music and sounds
HD video
A speaker
Android
Scratch
Pretty much anything else, because Orange Pi Plus is open source

For more details visit www.orangepi.org

Andriod-7 and google play on raspberry PI-3