Category: Computing

Use yor software right from usb flash drive 0

Use yor software right from usb flash drive

So,who wants a portable Mozilla Firefox or Skype that can run from the usb flash drive ??Well continue reading and you will know about it.This time I’ll be discussing about U3 smart drive that...

Setup custom Blogger domain with Namecheap 4

Setup custom Blogger domain with Namecheap

In my previous post I discussed about .You can see I’ve moved to new domain name.This means http://techno-plex.blogspot.com is now Techfuzon.com.In this post I’ll give the full tutorial for setting up custom domain for...

HTML rendering bug in Gtalk 0

HTML rendering bug in Gtalk

In this I’ll be telling about a bug in Gtalk which is a popular Windows and web-based free application for instant messaging and voice over internet protocol (VOIP), offered by Google Inc. If we...

360 degree Profiling to check evaders 0

360 degree Profiling to check evaders

What is 360° profiling ? It is a database of suspected money launderers,criminals and corrupt officials that track their actvities and transactions in minute detail through synergy with various agencies and service providers. How...

Google flags the whole internet as malware 0

Google flags the whole internet as malware

On saturday google caused terrible fear among internet users all over the world from 1430 GMT to 1525 GMT.During that period of time google flagged each and every web site as malicious which were generated...

How to Change Windows Service Pack 0

How to Change Windows Service Pack

Many times, new softwares, games require you to have the latest service packs to install. There’s a way to bypass that. For example, the latest GTA IV requires thatYou can change your service pack...

Browsing internet can damage environment! 1

Browsing internet can damage environment!

Environmental experts warned that browsing a website like Google could cause as much damage to the environment by generating more carbon dioxide as the aviation industry. If you do a Google search once, it...

Hide files behind files:the secret trick 0

Hide files behind files:the secret trick

In the NTFS file system When you create a new file , one unnamed default stream is created to store all data written to the file.Since NTFS file system in Windows 2000 or above...

Phishing the phisher : a counter attack tutorial 0

Phishing the phisher : a counter attack tutorial

This post will explain you about phishing which came across me when I used to learn hacking related stuffs.In this post I will be explaining you mode of operation of phishing starting from scratch.Though...

How to Bypass BIOS Passwords 0

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting...