Blogger Widgets }

මුණ බලන කන්නාඩිය හදන්නේ මෙහෙමයි

කට්ටිය හැමදාම කන්නාඩියෙන් මුණ බැලුවට කන්නාඩියක් හදන හැටි දැකල නැතුව ඇති නේ. එහෙනම් මේ Video එක බලන්නකෝ.  

Do you have Internet Security?


Today, the Internet is highly graded and considered as one of the most useful means of communication, a source to find useful information, purchasing products, availing services, storing information like in a cloud, and much more. Internet is many times the best tool for you to start your own website, business, online trading, service community etc. The speed of Internet in terms of providing information, loading speed and budget-oriented data transfer has remarkably demanding over time. So Internet has become a great opportunity for many that anything more, and thus, life has becoming easier, specially due to its time saving traits and improvements in technological developments.

Smart Watch by Sony (ソニーのスマートウォッチ)


Sony has released a new accessory for use with their smartphones – a Smartwatch, and the company will be launching the device in India by June this year. The release of smartwatch was confirmed by the company recently, and it will be priced at Rs. 6,299 here. Sony SmartWatch, also known as Android watch, is a small gadget with 36 x 36 mm dimensions, 8mm thickness and weighs 15.5 grams. It can easily clip onto a silicon wristband or strap provided with the watch.

Tumblr got hacked!!


Tumblr, a cool and trendy blogging website got hacked by a software worm two days ago. With sudden issue with the website online, it was clear and evident that it was a victim to hackers and all the blogs were a condemned piece in a jiffy. Tumblr gained great popularity after its set up and became a superb blogging and interactive platform.

Supposedly, Gay Nigger Association of America [GNAA] was the name of the hacker group that entirely dismissed that the interactive forum on the website was offensive, vitriolic and expletive laden in the form of comments and messages. The company running Tumblr communicated on Twitter that they were aware of the hack attack and are looking into resolving the problem as quick as possible.

Magicplan App Makes Amazing Automatic Floor Plans

 

Magic Plan is a room plotting app that works on your iPhone or iPad to create a complete floor plan using your device’s camera. The app measures the space to a high degree of accuracy: within about six inches (15 cm).

Aakash 2 in town for Rs 1,130


Aakash 2 – the new version of India’s low-cost tablet is now for sale at Rs. 1,130! But the question is will this tablet become a threat to its competitors like Micromax, spice Karbonn etc.

The HRD Ministry has launched Aakash 2, the new style of India’s low-cost tablet, when the previously released Akash was dumped by both users and reviewers for its poor presentation. The new Aakash 2 tablet is available at a price of Rs 1,130 for Indian students. Well, guys compared to the previous version of the Aakash tablet, the second version now has some upgraded  key features to enhance the user experience.

How are tablets ruling the world of technology?


When Steve Jobs ended years of speculation in 2010 by announcing the introduction and features of Apple’s iPad tablet, he assisted in beginning a new era in computer technology. While tablet PCs have been around for years, the iPad was the first device to use the form factor successfully in the consumer oriented market. And Apple’s success benefited other companies as well as tech enthusiasts who looked forward to advanced devices from the firm.


What is Cybercrime all about?


Cyber Crime is termed as any unlawful activity, which involves exploiting the computer as well as a network as key sources to carry out illegalities that are unfavourable and not considered right in the eye of cyber law. Cyber crime has been vastly prevalent over the last few years, especially due to the technology that has been on the scale of constant up gradation  Some of the most common cyber crimes include network intrusions, identity theft, terrorism, tracing the computer activity, stalking, online hacking, or purposely propagating computer viruses and so on. The computer can be used in the form of a target – attacking others’ computers, a weapon – exploiting the facilitated computer to commit crime, and as an accessory – to store illegal, secretive or stolen data.