Posts

Showing posts with the label socialmedia

Here Is How You Can Google Search From Linux Terminal

Image
Linux is gaining popularity day after day and it is not a completely geek stuff anymore(since we see normal people using Linux now). Every one of us uses google alot. We use Google to find answers to most simple ones to complex questions. If you are a Linux user and uses Google a lot, there is a more geeky way to search the web, since Linux users have a way to do things differently. You can actually perform a Google search from Linux terminal. To do so, we use a utility knows as Googler. Here is how to use it. How to Install Googler The very first step you, would start with is by installing Googler. To install Googler, we have two methods.We are now installing it from source code and installation package. Since Googler is written in Python, make sure you have least Python 3.3 installed on your computer. Installing from the source code: cd /tmp git clone https://github.com/jarun/googler.git cd googler sudo make install cd auto-completion/bash/ sudo cp googler-completion.ba...

What is VPN (Virtual Private Network)? How it Works?

Image
VPN is a technology used to setup a private network over the internet to share the resources of a corporate intranet with remote users and other office locations of the company.  People can also use VPN to access their home network.  VPN is a personal network created over the internet The devices connected to a VPN can have a continuous communication, regardless of any physical or digital barriers in the mid-way. A VPN is like your private lounge on the internet where you can hang out without interference from other people. It allows you access your home network or the corporate network of your company even if you’re in some other corner of the world. Two Types of VPNs Mainly, VPNs are of two kinds, namely, Remote Access VPN and Site-to-Site VPN. The second kind site-to-site virtual private networks have further sub-types. Remote Access VPN When we talk about Remote Access VPN, we are talking about giving someone access to an existing private network over the interne...

Facebook Will Soon Pay You For Your Video As Youtube Does

Image
Facebook is all set to ditch the cloak of a social media company and turn itself fully into a media company. Its investments in videos will be further pushed in near future. During Facebook’s Q4 earning announcement, Zuckerberg told that Facebook is planning to start sharing its ad revenue with content creators. This strategy will attract more content creators to Facebook. Facebook has defied the predictions made by economists and revealed that its growth isn’t going to stop anytime soon. On Wednesday, the company said that its revenue grew 51% in 2016’s fourth quarter. Zuckerberg’s company was also able to convert 52 cent of every dollar into operating profit. But, before Facebook’s growth stumbles, what’s next? Last year, Facebook made big bets on video by pushing live videos like crazy. This year things won’t slow down. Instead, the company is expected to invest more money to create its new moneymaking machine. Zuckerberg himself considers video a mega trend. “That’s why we’re g...

10 Facts About Wikipedia That You Didn’t Know

Image
What is the step you take when you come across a random USB stick? Very often, people stick it in their laptop without much thought. This could result in heavy losses in the form of virus infections, ransomware attack, or installation of some keylogger or adware.  The popular TV show Mr. Robot (2nd favorite TV show at Fossbytes after Westworld) has changed the way computers and hackers are portrayed in popular culture. In one episode, a character named Romero says, “I’ve been in this game 27 years. Not once have I come across an animated singing virus.” In another episode, one of the F-Society hacker drops few USB drives in a prison parking lot. One of the prison employees picks one USB and ends up infecting the computer network. In such a situation, what would you do? Will you pick up the USB drive and use it? Earlier this year in September, we told you a study that confirmed the human behavior of plugging the random USB drives in the laptops as soon as possible. In...

Researchers Unveil A Wireless Tech That’s ’10 Times’ Faster Than 5G

Image
A new transmitter tech demonstrated by a team of Japanese researchers enables a communication link of more than 100 Gbps over a single 25GHz channel using the 300Ghz frequency band, dubbed as ‘Terahertz’. They are uncovering more about their Terahertz wireless tech at the IEEE’s International Solid-State Circuits Conference 2017. 5G or the fifth generation mobile networks, is expected to roll out sometime around 2020. But a new wireless tech  demonstrated  by a group of researchers is around 10 times faster than 5G. It’s capable of boosting speeds up to 100 Gbps over a single channel using a 300Ghz band – known as the Terahertz. The team includes researchers from Hiroshima University, the National Institute of Information and Communications Technology, and Panasonic Corporation. During the demonstration, their IC-based transmitter used a 25 GHz channel, ranging from 275Ghz to 450Ghz. They were able to establish a communication link of 105 Gigabit per second. The...

Here is What Now Google Chrome gets its own barcode & QR code scanner

Image
Picture by Padsainformation Now you can free-up more space on your iPhone, wondering why? because you don’t need that  barcode and QR code scanner your mobile anymore. With the new update, the Google’s Chrome mobile browser can do the same job instead. Google Chrome now includes aa built-in scanning function, which you can use either by doing a search for “QR” in the spotlight or by using 3D Touch on the  app’s  icon. Even though the shortcuts only refer to the QR code scanning, Chrome can also scan a traditional barcode product for you. The barcode scan will take you to a Google Search results page of the item in question, a place where you can check read reviews, prices, and more. Despite the rumours to the contrary, QR codes have not entirely died out. If anything, they have started to make a comeback due to the adaptation of the apps like Kik, Messenger, and Snapchat, as well as in the food labelling. Even Amazon is now putting QR codes on some of its own...

How To Secure Your Facebook/Gmail Accounts From Hackers | Padsa Information

Image
How To  Secure Your All Social Media Accounts  From Hackers? Social Media is a tool in every single person’s hand to share his/her feeling and idea to the world. But if your  social media account will hacked?  Then  where to go?  How to recover that account? And mostly asked Question is How To secure social media accounts Like Facebook, Gmail, Twitter and Instagram from hackers .So in this post i’ll tell you how to secure social media accounts from hackers.So in this article i’ll show you which methods hackers use to hack your accounts. How Hackers Hack Your Facebook/Gmail/Twitter Accounts. #1. Phishing. Phishing is a Most common method used for hacking like  facebook hacking . mostly readers don’t have a single knowledge about that  What Is Phishing?  phishing is trick to make a fake login page of any social media site like facebook or gmail or any other. as the hacker send you the fake login page of social sites in your gmail or in anyother...