Wednesday 3 July 2013

Why Facebook is Blue in Color?

Leave a Comment

Why Facebook is Blue in Color?

When you open Facebook, the first thing that you notice is the blue color it uses. Ever wondered why is Facebook so blue in color and not changing its color scheme?

Ever since they started as 'thefacebook', Facebook has stayed with the blue color. Although major changes have been made in the Facebook theme since then, the major unchanged thing has been the blue color.

facebook blue color
Facebook from its early days when it was known as  thefacebook

An exciting fact: In its earlier days, thefacebook.com required you to have an  .edu email id to join.

Everywhere from its login page to Facebook groups, you find only blue.

facebook is blue
Facebook Login Page. All Blue!

The reason for this is that  Mark Zuckerberg, the young founder of Facebook is red-green color-blind and blue is the richest colour for him which he confirmed in an online interview with Leo Laporte.

Another important commercial factor for using blue color is the fact that most colors tend to distract the viewers. Blue on the other hand acts as a transparent background to the main content as visible to the human brain due to which most popular websites tend to use the blue color. It can easily be called a webmaster's favorite color. Blue color is also sometimes referred to as 'Nirvana' for the brain.

All these factors make blue a prominent color on Facebook.

If you are bored with Facebook's blue theme and want a stylish theme, visit Change Facebook Theme.
Read More...

Change Processor Name Permanently

Leave a Comment




Processor name is a very common thing which everyone likes to check in the computer and laptop he/she see's. It shows you the quality of computer and even the pay of the guy whoz the computer is :p ....... Like if u have i7 proccesor you have a exclent pc that is of hig speed and graphics. 
Change Processor Name Permanently



 It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-


Steps :-
1.  Open Notepad.
2.  Copy and paste the exact code given below:-
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="Intel i7 Core 4.5 MGHz"
To change the processor name, edit the part of the code given in orange. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.
4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.
Processor Name

5.   Copy the created Shortcut file.
6.  Navigate to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup ( Also remember that AppData is a hidden folder.)  if C: is your System drive.
7.  Paste the copied file.

Done now every time some one checks the processor name they would be fascinated. This is a cool trick to play on your friends...
Read More...

Tips to Shop Safely Online

Leave a Comment


Shopping online is becoming increasingly popular with consumers of all ages. With fast shipping and websites selling virtually everything, online shopping is an attractive alternative to the hassle of visiting multiple stores.

However, eCommerce safety is a huge issue, and many shoppers are unaware of how to ensure that their online transactions are safe, secure and private. Fortunately, there are a number of simple signs to look out for and changes you can implement to make purchasing items on the Web considerably safer.Many of the people dont shop online because of the fear of their credit/Debit card information used by crook people.

The most common methods used by hackers to steal consumer information are phishing sites and emails. Hackers  set up websites that look similar to other branded sites and send emails to potential customers of those companies urging them to shop through special links. By gaining consumer trust through having a similar appearance to the original company’s website, hackers make consumers feel more comfortable about entering their details into such sites, including credit card information.Many times hackers also send phishing email saying that earn 1500$  and when you go to the link they ask for cerdit/debit cards details to send money and in return you card is hacked and the person now can use this number and details for transaction.

Avoiding phishing emails and websites is simple. Any time a shopper receives an email from a company asking them to shop or navigate to a website, they should carefully check the domain the email is being sent from or the URLs of the links they land on. All email addresses and URLs should contain the company’s official domain.

Having updated antivirus and firewall software is also necessary. Also, one must ensure that he or she is using the latest version of the web browser of their choice. Most modern web browsers have inbuilt mechanisms to detect spoofed websites.Some web browser that have inbuilt mechanism are Google Chrome.Using good and trusted email providers like gmail,hotmail are also very important to tackel this issue as they report suspicious emails as Spam and prevent you from opening them.

safely shop online

A common trick to watch out for is a minor misspelling in the domain name that may be hard to pick up without careful attention. Additionally, some hackers may place the company’s name before the @ symbol in the email address, rather than after, which is where it should be.

All pages, including login pages, asking for consumer details, such as billing/shipping addresses and payment information, should have URLs that begin with “https://” rather than the more commonly used “http://.” The “s” denotes a secured connection and provides encrypted communication between a shopper’s computer and the receiving company’s servers.

Preferably, the site will also have a verifiable certification showing that the site can be trusted and that the installed security suites are up to date. Many sites display a security certification image link or privacy seal, making it easy to verify their status.

People who decide to shop on websites they’ve never heard of should ensure that these sites are legitimate. This can be done by searching for online reviews and confirming that the site is listed as a secure site with a trusted online security company.

One must be extra cautious while shopping on shared computers and always remember to not save login information in the web browser. Logging out and clearing cookies once you are done is also recommended.

Shopping with certain methods of payment and opting for tracked shipments can also provide enhanced protection. Payment services, such as Paypal, allow buyers to dispute charges and other issues they may have with sellers. Many credit cards offer similar protection, and since they aren’t linked directly to a bank account, hackers can’t drain a shopper’s finances. Finally, trackable shipping allows shoppers to find out exactly where their packages are, providing added confidence in the legitimacy of any seller's services. All tracking information should originate from the shipping service and be trackable within 24 hours of receiving the tracking number.
Read More...

Cool Keyboard Tricks (Windows) : Make a Disco

Leave a Comment

Cool Keyboard Tricks (Windows) : Make a Disco

Keyboards usually have small LEDs which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows.

This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard.

Keyboard tricks

To make your own live disco, follow the steps given below:-

1. Open Notepad.
2. Copy paste the exact code given below:-

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
3. Save the file as Disco.vbs or "*.vbs".


Cool Keyboard Tricks

Double click on the Saved file to see the LED lights on your keyboard go crazy and make your own cool disco.

This trick has been tested on Windows XP, Windows Vista, Windows 7 and Windows 8 and found to be working perfectly.

You can disable the keyboard disco by starting Task Manager and ending the wscript.exe process
Read More...

Make your Computer Talk

Leave a Comment

Make your Computer Talk

Have you ever wondered how can you make your computer speak whatever you input to it like in the movies? Would it not be fun? If only it was possible! Rejoice, because now it is possible. Well, if you wish to know how to do this, then you have come to the right place. With this trick, you can create a script in Windows which will make your computer speak whatever you input to it.

To create one such talk script, follow the steps given below:-


Make your Computer Talk

Steps
  1. Open Notepad.
  2. Copy and paste the exact code given below.
         
      Dim Message, Speak
          Message=InputBox("Enter text","Speak")
          Set Speak=CreateObject("sapi.spvoice")
          Speak.Speak Message
        3. Click on File MenuSave As, select All Types in Save as Type option, and save the file as Speak.vbs or "*.vbs".
        4.  Double click on the saved file, a window will open like the one in the image. Enter some text in enter text column and click OK.

    Now your Computer will speak / talk what you typed in Step 4. Try it yourself.

    Windows Compatibility: This VBS file can be executed on all versions of Windows including Windows XPWindows VistaWindows 7 and Windows 8.

    Personal Experience: I personally showed this trick to many of my friends and they were literally left awestruck. You too can impress your friends by making your PC talk and be the Computer Wiz.
    Read More...

    Tuesday 2 July 2013

    Messi A Great Dad

    Leave a Comment

    Leo Messi Amazing DAD !!! 

     

                                                                                     
                        Leo Messi Amazing Trick 1080p!!!!          
                                                                                   
    Read More...

    Monday 1 July 2013

    5G

    Leave a Comment

    All About 5G

    5G (5th generation mobile networks or 5th generation wireless systems) is a term used in some research papers and projects to denote the next major phase of mobile telecommunications standards beyond the current 4G/IMT-Advanced standards. 5G does not describe any particular specification in any official document published by any telecommunication standardization body.
    Although updated standards that define capabilities beyond those defined in the current 4G standards are under consideration, those new capabilities are still being grouped under the current 4G standards.
    According to South Korea's Yonhap News Agency, Samsung has successfully tested its 5G network with 1 Gbps speed (potentially up to 10 Gbps), and aims to provide service by 2020.

    Can You imagine speed 10gbps!!!
    Means you can download 1 GB in 1 second ;
    Read More...

    Faster Than Light

    Leave a Comment

    Faster Than Light


     Faster than light (also superluminal or FTL) communications and travel refer to the propagation of information or matter faster than the speed of light. Under the special theory of relativity, a particle (that has rest mass) with subluminal velocity needs infinite energy to accelerate to the speed of light, although special relativity does not forbid the existence of particles that travel faster than light at all times (tachyons).
    On the other hand, what some physicists refer to as "apparent" or "effective" FTL depends on the hypothesis that unusually distorted regions of spacetime might permit matter to reach distant locations in less time than light could in normal or undistorted spacetime. Although according to current theories matter is still required to travel subluminally with respect to the locally distorted spacetime region, apparent FTL is not excluded by general relativity.
    Examples of FTL proposals are the Alcubierre drive, and the traversable wormhole, although the physical plausibility of some of these solutions is uncertain
    Read More...

    Technothlon

    Leave a Comment


    Technothlon

    Technothlon is an international school championship organized by the students of IIT Guwahati. Technothlon began its journey in 2004 with an aim to ‘Inspire Young Minds’. Starting of its journey with a participation of 200 students confined to the city of Guwahati, over the past 9 years Technothlon has expanded its reach to over 150 cities all over the nation and various centres abroad. Technothlon gives students an opportunity to explore IIT Guwahati and get an inside into the technological world. It is an enthralling competition of mental aptitude, logical skills and dexterity - in which students compete in teams of two. The contest is divided into two categories of students - Junior Squad (classes 9-10) and Hauts Squad (classes 11-12) and is organized over 2 rounds - a written prelims (which takes place in numerous schools all over India in July), and mains - which is conducted at IIT Guwahati, among the top 50 teams from each squad.
    For More Information Visit - 

    http://www.techniche.org



    Read More...