Monday, May 2, 2011

Sony Bloggie 3D camcorder

Few weeks before, Sony unveiled its 3D portable camcorder  camera – Sony Bloggie 3D at CES and it was put up for pre-orders. Its now finally available for online purchase. This camera brings up 3D photography  at the user level, so that normal consumers will now not have to purchase expensive high end 3D cameras and still enjoy decent quality 3D imaging.

Sony Bloggie 3D is capable of recording 3D videos and 3D image capture. It can shoot 3D videos at full HD 1080p and take 3D still shots at 5 megapixels. It also takes images even in low light density with its Exmor- CMOS sensor and can capture photos while you’re shooting a video at the same time. It also has a 2.4-inch glasses-free 3D screen so you can preview your clicked shots or videos instantly. It has internal storage of 8GB, thus allowing  you to record up to 4 hours of video. Conveniently, a HDMI output allows you to share the captured videos and images on your big screen.The Sony Bloggie 3D is available now for $249.99

Monday, April 4, 2011

Brando USB 3.0 multi-card reader : super fast

Astechnology continues to advance we see new things pop up, everything improves and becomes better and faster. We have seen that with USB 2.0 to 3.0 (which many products making the switch over to), users generally get a substantial extra speed out of their devices. Brando has therefore made a new Multi card reader that utilizes USB 3.0 technology. The transfer rate goes up to 92.22 MB/S for read and for write it goes up to 62.17 MB/S. The reader offers plenty of slots. Two SD/SDHC slots and microSD/SDHC slots, as well as Memory Stick PRO DUO, Memory Stick,Micro/M2, CompactFlash and xD slots.

Sunday, April 3, 2011

Xilence M608 Pro Cooler

Xilence has introduced a new multi-platform cooler called M608 Pro, built using a top-flow design is a four heat pipes and a base of copper. The M608 Pro is recommended for the Intel 775, 1156, 1366 processors and AMD AM2, AM2+ and AM3 motherboards.
The air flow cooling is provided by a 120mm fan with speed control by PWM, speed range is between 500 and 1500 RPM. According to the manufacturer’s specifications, the Xilence Pro M608 cooler can easily cope with any Intel and AMD processors that have a maximum TDP of 130 watts.
The cooler also has a a top rubber structure that helps reducing the vibrations of the fan. The fan has only 120mm and can be placed on any case, doesn’t matter its size. M608 Pro is a top cooling solution for PC’s, this can bee seen by its price.


Tuesday, March 1, 2011

Google Bands Mobile No.

Google the mens best friend that bands your mobile number. Do u know how google bands mobile no? Perhaps you do not know about it.
When you register your account on google then you have to verify your account that google sends verification code in your mobile phone that you will be called and verification code is given to you by computerized system you will see the form displayed below.

If you register many google account using the same mobile no your mobile no will be banded and you will see the form displayed below.
 So be aware your mobile no may be banded so do not register  more accounts on google using same mobile no i.e. your mobile no. it will be banded




Thursday, February 24, 2011

Radio-frequency identification (RFID)

Radio-frequency identification (RFID) is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking.It is possible that by 2030, RFID technology will have inserted itself into our daily lives the way that bar code technology wrought unobtrusive but remarkable changes when it was new.
RFID technology makes it possible to give each product in a grocery store its own unique identifying number. Compare that to the situation today, with bar codes, where it is only possible to identify the brand and type of package. Furthermore, RFID tags can be read if passed within close enough proximity to an RFID tag reader. It is not necessary to "show" them to it, as with a bar code.Some tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags.Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels).
Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal.

7 Simple Steps to Keeping Your Account From Being Hacked

By far the most common reason accounts get hacked is that they had easy to remember and simple - sometimes even trivial - passwords.
In other words, the accounts have easy to hack passwords. Passwords like a pet’s name, a friend’s name spelled backwards, a favorite movie catch phrase, a significant other’s name (or “iheart” followed by that name), and so on.
Hackers are extremely resourceful at guessing and ferreting out those all-too-common password schemes. And sometimes it’s not even the hackers that end up with your passwords.
Here are seven key steps to keeping an account from being hacked due to simple and common password theft.
1 - Pick a good password. “iHeartSue” is bad. “qicITcl}” is great! The problem’s pretty obvious, though - if it’s easy to remember, then it’s probably a bad password. Instead, use a blended approach: never use full words or names; mix upper and lower case letters, use numbers. Use at least 8 characters. A password like “ILoveWindows” is bad, but a variation - “1luvwind00s” could be very good. “CorgiDog”, not so good, but “Igroc7Pup” might be ok. Get creative, using a technique you can remember that no one else could possibly guess.
2 - Keep your password safe. Tell no one. Even in a close and presumably trusting relationship - if anything ever happens consider the damage that the person could do knowing your password. Too many account theft scenarios begin with trusting someone just a little too much, and then having the relationship go bad. Your friends are your friends until one day they’re not. Especially if someone is pressuring you or if there’s the least little bit of doubt, don’t share your password.
3 - Use a “secret answer.” Most systems use the answer to a “secret question” as a way to recover or reset a password. Unfortunately many people choose answers that anyone can guess, or easily research on the internet. Answers like where you were born or your pet’s name are frequently easy to find out with a little searching. The good news is that your secret answer doesn’t actually have to make sense. Pick something unrelated or bizarre instead; choose answers like “Pickle” as your city of birth, “Confusion” as your mother’s maiden name, or perhaps “Flat Tire” as your favorite pet. As long as you can remember, it doesn’t matter.
4 - Maintain that alternate email address. An “alternate email address” is used by many mail accounts as a place to send you a password reminder or reset. Be sure to set up an account on a different email system for your alternate email address (any other free email system will do), and then use that address as your alternate everywhere else. Of course, keep the alternate account active so as not to lose it, since without it you may be out of luck.
5 - Remember. Remembering sounds easy, but like we said earlier: if it’s easy to remember, then it’s probably a bad password. And yet remembering and being difficult to guess are both critical. You must remember your password, failing that your secret answer, and failing that your alternate email account. Forget or lose them all, and you’re severely out of luck. If written down, be sure to keep it all in a secure place - not something like the almost cliche scenario of finding poorly hidden sticky notes containing passwords near your computer. It might be safe to keep something in your wallet, since you already treat that as secure. An encrypted file or password container on your computer might be another option.
6 - Don’t get taken. There are shady services that will claim to be able to retrieve your passwords and account access. Many are simply scams to take advantage of you when you are vulnerable and only take your money or login information for another account that they can then breech. The only place trustworthy enough for password and account recovery help is the service you’ve lost access to itself. If they can’t help, then neither can a reputable third party.
7 - Learn from your mistakes. Finally, if you now know that you have a weak password, if you’ve told it to someone you shouldn’t have, or if you’ve not set up that secret question or alternate account, fix it. Now. Change your password to something stronger, set up the alternate recovery methods, and keep your information private. If you’ve been hacked and you don’t have any of that set up, you’re very likely out of luck. Make sure to take more secure care of your account password and information with your next one.
Get more free tech help and advice from Leo Notenboom by visiting http://ask-leo.com With over 30 years of industry experience, including an 18 year career as a software engineer with Microsoft, Leo gives real answers to real questions from ordinary computer users at Ask Leo! Subscribe to Leo’s weekly newsletter now and receive a free ebook: “Internet Safety - Keeping Your Computer Safe on the Internet”, a collection of steps, tools and concepts you need to know to keep your computer and your information safe.
Article Source: http://EzineArticles.com/?expert=Leo_Notenboom

Page Rank

Check Page Rank of your Web site pages instantly:

This page rank checking tool is powered by Page Rank Checker service

Facebook

Followers