Technical

HACKERSMIND advisory for Ransomwore & patch from Microsoft .

________ In view of prevailing cyber security situation worldwide, threats and severe risk to the important, sensitive and confidential information of the people and increasing Cyberattacks and Ransomeware, Jain Software foundation advises following steps to the common people to avoid such risks: • ‘Precaution is better than cure’, therefore be super secure and use genuine, good quality antivirus. • Avoid exposing your system to any unauthentic, insecure network. • On being attacked, remove the affected system from the network. •…

DUAL CAMERA TECHNOLOGY

In a world were use of smart phones are increasingly day by day, new features are a need. As some phones are struggling to excite us anymore. Phones need something to satisfy this need, and this technology easily satisfies that need. Our eyes come in a set of two, so why not digital camera on a smart-phone. There are several notable benefits in having two cameras.   Corephotonics : A technology that will change smart phone imaging is capable of…

Fitness Bands

fter smart phones there is a new trend catching on in India for fitness bands. Fitness bands is a wrist-worn device that can detect some combination of walking steps, running distance, heart rate, sleep patterns and swimming laps. Fitness bands interact via Bluetooth with an app in a mobile device that configures the device and receives the wearer’s activity data. Most smartwatches support some number of fitness activities via a health app. However, just as the smartphone combined phone, media…

3 Dimensional Printing – The Next Industrial Revolution

D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. Prepare a 3D model before it is ready to be 3D printed. This is what they call slicing. The technology was first invented in the 1980s, and since that time has been used for rapid prototyping (RP). However, in the last few years, 3D printing has additionally started to evolve into a next-generation manufacturing technology that has the potential to allow the…

IoT : The Things Is Far Bigger Than Anyone Expects

The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.     Basically with a internet connection you can control your car,home appliances eith built-in sensors from anywhere.Dutch Telecommunication company KPN have announced that by using LoRa(long range) network it has implemented IOT all over the country. Remotely monitor and manage your home and cut down on your…

The Increasing Reach of Virtual Reality (VR)

Whats is Virtual Reality? Virtual Reality (VR) is a technology that makes users feel in a Virtual Environment with the help of computing systems and specifically designed software. The term “Virtual Reality “ itself is comprised of two words i.e. Virtual and Reality .Virtual means “not real” but “like real” and reality. Thus Virtual Reality means anything that is near to reality. Technically Virtual Reality is described as “a computer generated three dimensional environment” in which a person can interact…

Bootstrap: A complete package for WEB

Bootstrap BOOTSTRAP is  a complete package for web who wants to become a web designer. Bootstrap is the most popular HTML, CSS, and JS framework for developing responsive, mobile first projects on the web sites. HTML: Defines data and structure of a page using elements under html. CSS: Defines how the data and elements actually looks and behave when interact with them. JS:  This is actually programming language of a web know as java script.   History of Bootstrap: Bootstrap is…

IP Spoofing

IP SPOOFING: “IP address spoofing” is a technique that involves replacing the IP address of an IP packet’s sender with another machine’s IP address. IP spoofing refers to connection hijacking through a fake Internet Protocol (IP) address. IP spoofing is the action of masking a computer IP address,so that it looks like it is authentic. IP Spoofing is a technique used to gain unauthorized access to computers. –IP: Internet Protocol –Spoofing: using somebody else’s information Exploits the trust relationships. Types…

Google Glass

What is Google Glass? Google Glass is a wearable, voice-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user’s field of vision. Google’s project program for developing a line of hands-free,intelligent devices that can be worn by users as “wearable computing” eyewear. The first product release from Project Glass, Google Glass, was available for beta testers (U.S. residents only) to purchase in 2013, for $1,500 plus tax. Google Glass is a headset, or optical…