Tech Concepts of 2012

  •  Net Neutrality

Net neutrality is such a subject that you hear time to time, especially if any new legislation is concerned or some tech company is in trouble for doing something really stupid. But you should definitely know about it in today’s world of omnipresent internet.

  • The Windows Registry

We all know about the Windows registry, but we all fear it because it is cryptic and powerful. But it can prove to be really useful for those who know how it works. You can take advantage of the registery tweaks now and then, if you want!

the windows registry

  • Android Task Killers

Android Task Killers were very popular and useful tools a few years back, but now they are actually harmful — but still many cellphone manufacturers recommend them to new users! So you should know what Android Task Killers actually are and why you should never use them on your phone. We might get shocked to know how harmful they can actually be!

Android Task Killers

  • SSL Encryption (Also Known as HTTPS)

Normally we use http:// but you must have heard of the term https://, yes with an extra ‘s’. But do you really know what it is? You might also know that it encrypts your data for meliorated security, but have you ever thought what is it protecting you from? Well you should definitely know about these things.

SSL Encryption (Also Known as HTTPS)

HTTPS is a significantly more secure version of HTTP. HTTPS is “a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encrypted communication and secure identification of a network web server.” [via]

  • What “4G” Really Means

Everyone of us has heard of 4G and almost everyone of us wants to get it. But have you ever thought why? Everyone around us is telling us how cool 4G is and how important it is to get it, but then again, no one gives us the valuable information like how fast is it or what is it or even the pros and cons of it.4

4G

4G refers to fourth generation, and the most recently released, WWAN (wireless wide area network).it offers peak data rates of 128Mbps downstream and 56Mbps upstream. LTE (Long Term Evolution) for GSM technology for cell phones and providing theoretical peak data rates of 100Mbps downstream and 50Mbps upstream.

  • The Difference Between Lossless and Lossy Music

Do you know what the “bitrate” of your music is? Well do you even know what ‘bitrate’ actually means? Go check out what it means and how lossless music compares to “lossy” music; and if it’s something you should care about.

  • 64-Bit vs. 32-Bit Operating Systems

Whenever you reinstalled Windows or Linux are are given the choice to select between 64-bit and 32-bit versions. Well you might have been told that if you have 4GB of RAM or more, you should go for 64-bit. But do you know why? And what are the 64-bit and the 32-bit operating systems anyway. Knowing about your operating system id really important, don’t you think?

64-Bit vs. 32-Bit Operating Systems

The terms 32-bit and 64-bit refer to the way a computer’s processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system. [via]

  • Proper Windows Maintenance

We have to keep our Windows maintained. We have to carry out proper Windows maintainance regularly. But what does proper Windows maintainance actually means? You are required to perform some maintenance tasks for your Pc to keep it running fast and fine, so find out what those tasks are. After reading, you would know enough and you would not have to reinstall Windows from scratch ever again. Use

Windows Maintenance

Update Windows, Run Microsoft Security Essentials, Back up Your Hard Disk, Clean Temporary Files, and Uninstall unwanted Programes, Clean Your Registry and Defragment Your Drives.

  • Viruses, Trojans, Worms, and Other Malware

Viruses, Trojans, Worms, and Other Malware, are all these things the same? If so, then why do they have different name? Well, in order to protect your computer from all these things, we recommend you learn about them. Unless and until you don’t know what you are up against, how can you expect to protect your PC from it?

Viruses, Trojans, Worms, and Other Malware

Malware: The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.

Virus:  A virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared.

Spyware: Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way.

Scareware: It is a comparatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses, and can only be cleaned if you pay for a full license

Trojan horses: it is such a application that allows your PC to be remotely controlled or in a network of computers affected as a part or botnet. It’s being called Torjan affected computer.

Worms: It’s a security hole in computer network that allows send copies of themselves to other PCs. It’s a speedy worm that affected Computers across a network in a path.

  • Wi-Fi and Networking

In today’s world of omnipresent internet, networking is a must part of any PC owner’s setup, but still when it comes to configuring the networks in our home, most of us don’t even know what to do. You should definitely know about routers, router configuration, Wi-Fi performance, and how to fix problems?

wifi and networking

-If you see a good number of Wi-Fi names available from your laptop, or you suspect you might have bad luck in your neighbors’ placement, it’s time to switch channels. You can analysis your Wi-Fi network as following tools : Meraki Wi-Fi StumblerinSSIDer (Windows) and iStumbler (MAC).

-Poor Placement is another factor for affecting your Wireless router.

Hello world!

Out beyond ideas of wrongdoing and rightdoing,
there is a field. I’ll meet you there.

There is a community of the spirit.
Join it, and feel the delight
of walking in the noisy street
and being the noise.
Drink all your passion,
and be a disgrace.
Close both eyes
to see with the other eye.

When the soul lies down in that grass,
the world is too full to talk about.
Ideas, language, even the phrase each other
doesn’t make any sense.