Sunday, September 29, 2013

Turn your iPhone 5 into iPhone 5S

If you're currently sporting an iPhone 5 and you find yourself stuffing your hurty feelings waaaay down into your tum-tum every time you see someone with an iPhone 5s, there may be a solution for you.



Wednesday, September 11, 2013

The Apple Show: iPhone 5S and 5C Review



Cupertino, California- Apple unveiled the much awaited iPhone 5S along with a budget model iPhone 5C. The 5S model is very much like the iPhone 5 as far as appearance is concerned but there are many other changes in the Hardware as the 5S comes with a faster 64-bit A7 processor and a first on the earth FingerPrint scanner. There is a major improvement in this model for the photography lovers as iPhone 5S comes with a 13-MP camera and a dual led flash. This phone will be available in two new colours which are Gold and Grey.
What upsets the users is the same screen size as the last years iPhone 5. Thus, main features of this year's iPhone 5S are motion processor and Touch ID.

Thursday, August 29, 2013

Top 5 Most Common Web Application Vulnerabilities


A Web application vulnerability is a system bug that could be exploited for some kind of harmful purposes. It's main task is to compromise the security of an application. It plays a major role in the Computer security part. Once the attacker has discovered a flaw or a vulnerability, he tries to gain access by exploiting it and thus performs a cyber crime. These crimes are done for accessing the confidential data of companies, its users, creation, etc. The hackers use typical methods and specific tools to find the vulnerability and exploit it. The most common types of Vulnerabilities include:
 

Tuesday, August 27, 2013

Installing Siri on iPhone 4



The latest technology by apple named Siri has reportedly created a buzz in people’s mind to buy an Iphone 4s instead of Iphone  4. But we have figured out a method for existing Iphone 4 customers who do not wish to upgrade their Iphone. The method is of installing Siri on ios 5.1.


Monday, August 26, 2013

Samsung Galaxy Tab 3 8.0 Review

Finally the Galaxy Tab 3 is out by the largest Android OEM of the world "SAMSUNG". This Tab is definitely a tough competitor for all the Tablets in the current market especially Apple. It's biggest competitor is the Nexus 7 and the iPad Mini. Galaxy Tab 3 is quite well built but is not what the consumers would demand at the currently allocated price of around $300.


Sunday, August 25, 2013

5 Simple Tips to Increase Traffic to your Website or Blog

Do you ever wonder how to get more and more visitors on your website every day? There are a lot of website who receive millions of visits each day and so they can earn more. Today I will teach you how to increase traffic on your website in a legitimate way and not like other blogs who would ask you to buy their book to learn how to increase hits on your website. By doing the methods described below, you will easily attract thousands of page views.


Wednesday, August 14, 2013

7 different ways of gaining your partner's trust back after cheating

Cheating is too hard to deal with in a relationship, but if you're looking for ways to gain your partner's trust back after you've been the one cheating, I've got some tips. You've got to really take it back to the very foundation of your relationship. Remember, typically relationships are built on trust and once that trust is broken, especially at that level, it is very, very hard to rebuild. Take a look at my top ways to gain your partner's trust back – even if you have to start over again.


Monday, July 15, 2013

Monark Modi (Myself) on The Times Of India

Student detects vulnerability in Indian Certificate of Secondary Education website

TNN Jun 17,

AHMEDABAD: A class XI student from Rajkot has reported cross-site scripting (XSS) vulnerability to the Indian Certificate of Secondary Education (ICSE) website.Monark Modi, the young web security enthusiast, told TOI that he was checking the central board results for class X earlier this month. "At that time, I came across a glitch that I could exploit with a simple authentication bypass technique. Once I entered the dashboard, I could see pages containing the results of 13,000 students. I was shocked as with the proper knowledge, it could have been manipulated by someone," he said.

According to a report by an online security major, cross-site scripting was found to be a reason for security vulnerability in 84% of cases. Experts say that better coding and monitoring cookies and scripts active at the time of functioning can reduce the risk.Modi said that he has so far reported XSS related glitches to more than 12 sites of various industries. "More often than not, the company officials invest in designs and features and ignore the security aspect. In major websites where hundreds or thousands visit everyday, it can lead to instances ranging from identity theft to financial fraud," he said.

Monday, July 8, 2013

How to integrate Gmail with your Domain

Google continues to rule the internet world. The all new Google Business Domain apps increases its monopoly. Therefore, there is some good news for all Companies who own a personal domain. They can integrate their mail with Gmail and use all its features. The Google App comes with a free trial of 30 days and then you will need to pay to continue. To know the pricing, click here http://www.google.co.in/intl/en_in/enterprise/apps/business/pricing.html .


Sunday, June 9, 2013

The "CANVAS" Era

           Micromax did not take much time to become the Fastest selling mobile phone in the world after the launch of the CANVAS series. They are constantly coming out with high end smart phones in very low budget. As people always look for something challenging and at a lower cost then other competitors in the market, Micromax makes up the audience this time. They even made a record of highest number of pre-orders.

This was because all the Canvas phones provided the same features as in phones of 30k range. Its main competitors is Samsung. Even Samsung has grown up its market to a large extent after the release of Galaxy series like Note, S3, Note 2 and S4. But the prices of these phones is pretty higher than Canvas.

Saturday, June 8, 2013

Did FACEBOOK and GOOGLE really allow PRISM to access the data??

Reports of the National Security Agency (NSA) program PRISM, raised questions about whether the technology giants like GOOGLE, FACEBOOK and APPLE provide government agencies access to their database and servers.


Mark Zuckerberg of Facebook and Larry Page of Google both denied about the unrestricted access to user data to U.S. authorities, but now it comes to the notice that both companies have, in fact, collaborated with government requests.

The UNSECURE "BOARD" website

The Indian Certificate of Secondary Education is one of the very well known boards in India. Thus, there are nearly about one lakh students appearing for the I.C.S.E Board exam every year. Almost every child wishes to study in an ICSE board school.

Every year the ICSE results are declared online and students need to login with their seat numbers as usernames to see their results. This point makes it completely essential for this board to secure its website so that individual result is available only to the concerned student and their school. This is what I believe.

Friday, June 7, 2013

DNS Poisoning - A Pollutant to the WiFi networks


 What do you mean by DNS?
The DNS (Domain Name System) translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.
In today’s world with botnets, viruses and other nefarious applications that use the Domain Name System (DNS) to further their harmful activities.