#Post Title #Post Title #Post Title
Oct 31, 2011

Google Search Tricks

Well let me tell You what actually google tricks mean. Google tricks/google tips, does not mean hacking google, Using the below Google operators, we can get the desired google result very quickly. Well we can name this as hidden google secrets or Advanced google searching.  

Google Trick -1 :- GOOGLE OPERATOR
Type the following highlited words in google search box.
Google has several google operators that can help you find specific information, specific websites or inquire about the indexing of your own   site, below you will find the most important ones:
Click on the example google trick, and You will be redirected to google.
define: – This google operator will find definitions for a certain term or  word over the Internet. Very useful when you come across a strange word when writing a post. I use this as a google dictionary. example : (define computer)
info: – The google info operator will list the sets of information that Google has from a specific website (i.e. info:http://hack2007.50webs.com)
site: – This google operator can be used to see the number of indexed pages on your site (i.e.site:www.hack2007.50webs.com).  Alternative it can also be used to search for information inside a specific site or class of sites.
link: – This google link operator allows you to find backlinks pointing to your site. Unfortunately the count is not updated frequently and not all backlinks are shown
allinurl: – Using this Google operator will limit the search to results that contain the desired keywords on the URL structure. (i.e. allinurl:dailyblogtips)
fileformat: – Useful Google operator for finding specific file formats. Sometimes you know that the information you are looking for is likely to be contained in a PDF document or on a PowerPoint presentation, for instance. (i.e. “fileformat:.pdf market research” will search for PDF documents that contain the terms “market” and “research”)

Google trick -2 Top 10 Cool Google Search Tricks

well as we have gained enough knowledge regarding google operators, lets have a look at the following 10 cool google search tricks. Click on the example google trick, and You will be redirected to google.
  1. Google trick to  search different file formats (keyword filetype:doc)
  2. Google trick to search educational resources (keyword site:.edu) example (computer site:.edu)
  3. Finding the time of any location (time romania)
  4. Finding the weather of any location (boston weather)
  5. Tracking commentary of live events (Olympic games Beijing 2008)
  6. Using Google as a calculator (9 * 10)(143+234)(119-8)
  7. Converting currencies (1 USD in INR)(10 US Dollars in Indian Rupee)
  8. Find how many teaspoons are in a quarter cup (quarter cup in teaspoons)
  9. how many seconds there are in a year (seconds in a year)
  10. Tracking stocks (stocks:MSFT)
  11. Finding faces (add imgtype=face to the URL)

Google trick -3 Top Essential Google Search shortcuts

#1: Get Local Weather
Type: “weather [city name or zip/postal code]” Example: “weather 500054″ or “weather boston”
#2: Check Flight Status
Google automagically pulls flight data from FlightStats.com. All you have to do is enter the flight number. Type: [flight name and/or number] Example: “bc254″ or “newyork21″
#3: Convert Distances
Type: “[value] [first distance unit] to [second distance unit]” Example: “100 kilometers to miles”
#4: Find a Phone Number
Find a Person:
Type: “[person’s name], [city or zip/postal code]” Example: “Gaurav Pokar” + india
Find a Business/store:
Type: “[business name or type], [city or zip/postal code]” Example:WebDeveloper & Designer, Rajkot”

Google trick -4 :Google search trick for Rapidshare files search:
#1 site:rapidshare.com inurl:users “*”
#2 site:rapidshare.de inurl:users “*”
#3 site:rapidshare.com inurl:files “*”
#4 site:rapidshare.de inurl:files “*”
#5 site:rapidshare.com inurl:users (pass|password)
#6 site:rapidshare.de inurl:users (pass|password)
Suppose u need some info on ebooks. Then u can try following keyword to see all rapidshare folders having any hacking related thing in it
site:rapidshare.com inurl:users “ebooks”
[ Read More ]
Oct 25, 2011

China ‘not doing enough on software piracy’

The world’s leading software industry body warned on Monday of a jump in revenues lost to software piracy in China as the country’s government is failing to rein in rampant copyright infringement.

Robert Holleyman, president and chief executive of the Business Software Alliance, said pledges by the Chinese government to help foreign companies gain more revenues from software sales in China and high-profile anti-piracy campaigns had failed to deliver.

“All that activity led us to believe that we’d see some fairly rapid reduction of software piracy in China,” Mr Holleyman said. “But none of what I’ve picked up with our companies indicates that they’re seeing the kind of economic growth associated with the sales of software.”

The remarks indicate that software market opportunities for companies such as Microsoft are unlikely to keep up with the pace of China’s PC market growth, and that intellectual property rights infringement will remain an irritant in relations with the US and China’s other leading trading partners.

In late 2010, the Chinese government, responding to growing criticism of its intellectual property rights protection record, promised in talks with the US that it would help increase foreign companies’ software sales in the country.

Since last year, Beijing has also been running a high-profile crackdown on the production and sales of pirated goods. The duration and scale of the campaign initially gave rise to cautious optimism among foreign industry executives that real change could be on the cards.

The US government even expressed cautious optimism in its annual report on intellectual property rights protection, saying Beijing’s special campaign against piracy might lead to “lasting improvements”.

But Mr Holleyman said: “While [piracy as a] percentage of total software sales is coming down somewhat, the US$ losses are exploding.” He added that he expected multinational software companies to launch more legal action against Chinese counterfeiters as a result.

In China, 78 per cent of all software sold in 2010 was pirated, according to BSA’s 2011 Global Piracy Report, compared with a global average piracy rate of 42 per cent. While this is not among the world’s highest piracy rates, China created the second-highest economic damage through piracy as the industry lost $7.8bn in revenues to pirates last year. In the US, the damage was $9.5bn.

But China is expected to overtake the US in that ranking soon as it is set to surpass the US as the world’s largest PC market by unit shipments next year.

[ Read More ]

How to Find and Remove Unused CSS Code From Your Style Sheet

How to Find and Remove Unused CSS Code From Your Style Sheet. CSS (Cascading Style Sheet) is now becomes the most important area of the web design, and almost every page is having style sheet and class selector codes. If you are note the creator of your blog or website’s style sheet then you might not be aware from your css code, which css class selectors are being used and which are not in use. If you want to Find and Remove Unused CSS Code From Your Style Sheet then there is Mozilla Firefox plugin called Dust Me Selectors.

It has the capability to extract all the class selectors from all the stylesheets on the page you’re viewing, then analyzes that page to see which of those selectors are not used. The data is then stored so that when testing subsequent pages, selectors can be crossed off the list as they’re encountered.

- You can test pages individually, or spider an entire site, and you’ll end up with a profile of which selectors are not used anywhere.


Features of Dust-Me Selectors 2.2

  • Supports local and remote stylesheets included using elements, processing instructions, and @import statements. (Note: rules inside blocks that are not @import statements, and inline style attributes, are not included.)
  • Supports stylesheets inside IE Conditional Comments.
  • Check a single page, or an entire site.
  • Understands all CSS1 selectors, and most CSS2 and CSS3 selectors (courtesy of Dean Edwards’ wonderful base2).
  • Caters for common CSS hacks — for example, “* html #foo” will be treated as “html #foo”.

- Add this Plugin to your Firefox from : Remove Unused CSS Code From Your Style Sheet page.


- Use it and let me know if you like it or not
[ Read More ]
Oct 24, 2011

Advantage of Jailbreaking iPhone

Jailbreaking of iPhone is very popular since Apple has launched iPhone devices, a mass community of iPhone Dev Team is putting their effort in Jailbreaking of iPhone with every new iOS releases by apple. Do you know the advantages of Jailbreaking an iPhone? if not then you must have to read this post and know the advantage of jailbreaking iPhone.


iOS jailbreaking, or simply jailbreaking, is the process of removing the limitations imposed by Apple on devices running on the iOS operating system through use of custom kernels. Such devices include the iPhone, iPod Touch, iPad, and Apple TV 2G. Jailbreaking allows users to gain full access (or root access) to the operating system, allowing iOS users to download additional applications, extensions, and themes that are unavailable through the official Apple App Store, via installers such as Cydia. You can refer my post about Jailbreak iPhone 4 on iOS 4.3.3(8J2) using redsn0w_win_0.9.6rc17.
A jailbroken iPhone, iPod Touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls. Unlike rooting an Android device, jailbreaking is necessary if the user intends to run software not authorized by Apple.
At its core, jailbreaking an Apple iOS device gives access to its root filesystem, allowing modification and installing third-party software components. This gives the user more control over the device and may enable features that were previously unavailable. In many cases, jailbreaking also voids the device’s warranty.

Advantage of Jailbreaking iPhone

  1.  
    1. Under the DMCA of 2010, jailbreaking Apple iDevices is legal in the United States, although Apple has announced that the practice “can void the warranty.
    2. Cracked iPhone Games and Apps Installation – Jailbreaking is necessary if the user intends to run software not authorized by Apple.
    3. Gain deeper customization of device (e.g. theming, redesigned user interfaces and customize lock screens.)
    4. Jailbreaking also allows users to use paid apps from the App Store for free.
    5. It’s Fast and Easy – One of the best thing about jailbreaking an iPhone is you can easily jailbreak it within few minutes.
    6. Video chat over 3G Network – FaceTime video chat is a new feature of the iPhone 4, but it only works over a Wi-Fi network, which may be difficult to find in many situations. Jailbreaking the iPhone 4 allows for FaceTime video chat over a 3G connection.

[ Read More ]

Codec Error: Use Windows Media Player

WeI have tried to play downloaded 750MB torrent movie .avi file in VLC Media player, the screen was showing me message like “Codec Error: Use Windows Media Player“, then “Aborting Video, Redirecting to Microsoft Codec Download Page“. When I try to play the same video in Windows media player, screen displaying both the messages again.



So i thought that might be the problem because of unsupported codec, with the downloaded videos or with my media players? but I know that I am using the latest VLC Media player and K-lite Codec Pack.

Note: The message Codec Error: Use Windows Media Player and Aborting Video, Redirecting to Microsoft Codec Download Page can’t be resolved because you have downloaded a trojan video or movie. so I would suggest removing them and doing full system scan for virus and spyware to your computer.

If you want then you can try to rename the video file extensions from .avi to .exe, and your antivirus will automatically detect the virus in the video file, so click repair or clean button… then rename the file to avi again.
- Actually these videos are ‘hacked’ videos that contains scripts which can be executed using WMP only. The purpose of showing those messages to you is to force you to be redirected to another site and/or to download some stuff in the background. If you can’t play them in WMP then it’s a good sign that your Windows and WMP are correctly patched with the latest security updates.
When you try to open it in WMP they send you to wmvlicense.com/pluginerror/..don’t try to download it if u aren’t protected, it will try to download and open Trojan horse SHeur2.BDRX…After scaning wmvlicense.com/pluginerror/:” When I tested this site we found links to xxxlexelink.com, which I found to be a distributor of downloads some people consider adware, spyware or other potentially unwanted programs.”
You should delete these videos as soon as possible because they may compromise the security breaches of your computer if they are played in WMP.
If you want to save your self from getting into and download these kind of infected videos you should try Vuze downloads. It has a built-in player, so you can get idea about your going to be download movies and videos.
If you want then you can Download Media Player Codec Pack for playing back music and movie files and you will be able to play almost all audio and video files also this setup supports 32-bit and 64-bit both.
- Hope above information will help you in future and save your self from downloading unwanted craps from torrent sites and protect your against “Codec Error: Use Windows Media Player” messages.
[ Read More ]

Google Introduced a Google Wallet – Makes Your Phone Your Wallet

Using near field communication (NFC) technology Google has launched a new service called Google Wallet. Google Wallet is an Android app that makes your phone your wallet. It stores virtual versions of your existing plastic cards on your phone, along with your coupons, and eventually, loyalty and gift cards. Google Wallet will be an open mobile wallet holding all the cards and coupons you.

See Google Wallet into Action 

What is Google Wallet?

Google Wallet enables you to pay with your Citi MasterCard credit card and the Google Prepaid Card, which can be funded with any of your existing plastic credit cards. And, Currently Google is working on to extend this future to Visa, American Express and Discover cards also.
Google is adding a $10 free bonus to the Google Prepaid Card if you set it up in Google Wallet before the end of the year.

Can I use Google Wallet with my phone?

Google Wallet with tap and pay is compatible with Nexus S 4G by

Google, available on Sprint®.

If my phone is eligible, how do I get Google Wallet?
Google Wallet will be automatically pushed to Nexus S 4G phones on Sprint® as part of a software update.
What is near field communication (NFC) technology?
NFC is a wireless technology that enables data transmission between two objects when they are brought within a few inches of each other. Smartphones enabled with NFC technology can exchange data with other NFC enabled devices or read information from smart tags embedded in posters, stickers, and other products.
How much does it cost to use Google Wallet?
Nothing. Google Wallet is a free app. As an added bonus, for a limited time we’re giving new users $10 USD on the Google Prepaid Card upon activation of the card.

How does Google Wallet relate to Google Checkout?
Google Checkout is a service that enables merchants to accept and process online payments. Google Wallet, on the other hand, is a mobile app that enables users to tap and pay at physical, brick and mortar stores.
Google saying this “Google Wallet” as next big shit after coins, paper money and plastic credit cards.
You can read more FAQ about Google Wallet here.
Know more about Google Wallet and get help from official Google Wallet FAQ section. Lets hope that Google makes it a huge success. What do you think about Google Wallet? Share with us.
New Google Wallet - Makes Your Andorid Phone Your Wallet
[ Read More ]

11-yr-old Rajkot boy scores full marks in Microsoft exam

RAJKOT: A city boy has become the youngest student to equal the world record of obtaining full 1,000 marks in an online computer exam conducted by US-based multinational Microsoft Corp.

Akshit Jayesh Dhruv, a Class V student, appeared in the exam on March 16 and obtained full marks, said Chirag Kothari, Centre Head of Inside Tomorrow Computer Academy, where the 11-year-old studied.

Nearly 17,000 candidates, from as many as 119 countries and studying from Standard III to post graduates, appeared in the exam in which Akshit was ranked first, Kothari said.

Earlier, a 21-year-old electronic communication student, Shruti Doshi - also from Rajkot - had set the world record by getting 1,000 marks, he said.

Doshi, who was also a student of Inside Tomorrow Academy, had surpassed the record of 999 marks obtained by Peter Phill of New Zealand in 2004.
[ Read More ]
Oct 22, 2011

Apple stores close as employees celebrate life of Steve Jobs


CUPERTINO, Calif.

Apple leaders, employees and pop culture stars celebrated the life of Steve Jobs in a tribute Wednesday to a computer visionary who changed the world when he incorporated music, media and lifestyle into a sleek line of products




The service at company headquarters here drew hundreds of employees. They crowded into an outdoor amphitheater to reflect on the legacy of the company co-founder, who died Oct. 5 at age 56 after battling pancreatic cancer.
Across the U.S., Apple stores shut their doors for several hours so retail employees could watch a live webcast. The ceremony was closed to the public, and media handlers shooed reporters away from the famously private company.


Despite the best efforts at keeping the 90-minute ceremony private, music drifted across the campus when Norah Jones and British rock band Coldplay performed. And employees took to Twitter to relay some of the scene. Helicopter footage showed banners splayed on the building walls surrounding the amphitheater with pictures of Jobs. One banner showed Jobs sitting cross-legged cradling the first Macintosh computer. Employees crowded balconies overlooking the stage.
The mood at the service was festive, not somber, employees said. Speakers reportedly included CEO Tim Cook, Apple's chief designer Jony Ive and former U.S. vice president Al Gore.
Elsewhere, Apple customers found shuttered stores but rarely an explanation for the closure. Most who visited didn't mind the inconvenience.
"Jobs is a visionary. He is basically the core of Apple. So it makes a lot of sense," said Stephanie Desanges, 25, who works in finance and lives in New York. She had gone to the store to get her laptop fixed.
Carol Badger only had one complaint after she showed up at a store in San Francisco to find it closed. "I was just a little bit disappointed that it was not simulcast around the world so people could gather in cities and take part."
Analyst Stephen Baker, who tracks consumer electronics sales for research group NPD, said Apple doesn't stand to lose a lot of sales by closing its stores for a few hours.
Wednesday's service follows a memorial at Stanford University last Sunday for friends and family. That service at Memorial Church reportedly brought out Oracle chief Larry Ellison and Microsoft's Bill Gates, as well as politicians including Bill Clinton. U2 frontman Bono and Joan Baez reportedly performed.


[ Read More ]

'Revenge of the Electric Car' goes corporate


Nissan CEO Carlos Ghosn, here with his electric Leaf, is one fo the stars of

Nissan CEO Carlos Ghosn, here with his electric Leaf, is one fo the stars of
Five years ago, the documentary Who Killed the Electric Car took the auto industry by storm. Now comes the sequel, Revenge of the Electric Car, and it is being embraced by the industry. The new film follows four companies' executives and their the development of their electric cars. They include General Motors' Bob Lutz and the Chevrolet Volt; Nissan's Carlos Ghosn and the electric Leaf; Tesla's Elon Musk and the creation of the electric roadster; and a startup firm headed by Greg Abbott in Culver City, Calif.
Who Killed and Revenge, the original and sequel, are polar opposites, yet done by the same true believer, director Chris Paine. The contrast:
  • The first movie had a fresh, brash, anti-corporate theme, with protesters being dragged away and automakers who clammed up about what came across as a conspiracy to bury a promising technology. The new movie opening today is actually a salute to the efforts by automakers to create electric cars. Several of them sponsored screenings leading up to today's release. It takes viewers into the boardrooms and humanizes the executives who came across as greedy robber-barons in the first time.
  • The first movie seemed brazen and unpolished, guerrilla filmmaking at its best. This new effort is slick and beautifully photographed, the product of what seems like a much-larger budget.
  • The first film was a personal crusade, rich with rebels who are true believers in the electric-car cause. The second is dispassionate with an unemotional narration and style that will remind you of the journalism practiced on PBS' Frontline.

Still, Revenge is a must-see movie for anyone interested in cars. With automakers now quaking in fear now that they know how badly Paine could make them look, they grant him full access. Yet given the Occupy Wall Street protests and backlash against corporations, the new film seems out of touch with the anger of the times.

[ Read More ]
Oct 21, 2011

Facebook Launches Application For iPad



Facebook has launched its official iPad app. The tablet device was unveiled in January 2010, but development and negotiations with Apple stalled the release of Facebook’s app until now. Facebook for iPad is now available in App Store.
  




Here are some of the top Features of the new app:

Enjoy bigger, better photos
Your photos take on new life on the iPad. They're big, high-res and easy to flip through—like a real photo album.

Focus on what matters

With less on the screen, it's easier to zoom in on your friends' photos, updates and stories.

Navigate anywhere, fast

Just tap, slide or pinch to get from one screen to another and back again in no time.

Never lose your place

Use simplified navigation to send a message, see your notifications or browse your bookmarks without switching screens.

Play games on the go

Play your favorite Facebook games wherever you are, and on a bigger screen.

Tap to send messages

A simple dropdown menu makes it easy to scan and send messages without visiting your inbox.





[ Read More ]

BLOCK UNWANTED MAILS IN GMAIL

want to block some unwanted emails in gmail ?

JUST follow these steps
1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings, click on Filters
4. You’ll now see an option “Create a new filter“, click on it
5. Now in the Form field enter the email address from which you do not want to receive emails
For ex. you may enter abc@xyz.com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.
6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.
[ Read More ]

What is a Macro Virus?

Macros: Better Applications or Worse Viruses

At the base, macros are a series of commands, as in MS Excel or MS Word, grouped together for executing oft repeated tasks in an automated sequence.

They are small programs which record a series of commands in an application and when run, they automatically execute expediting the repetitive tasks. In the following paragraphs we will know as to what a macro virus is and what harm macro viruses can do to your computer and ways to deal with macro viruses.

What is a Macro Virus

A macro virus is a series of computer codes written in macro language and embedded in any document, usually of a Microsoft office package, which opens when you open a document. It performs preprogrammed tasks automatically. The predominant ones are word macro virus and excel macro virus. But what is so horrifying about macro viruses is that 75% of all viruses to day are macros and can embed into your computer system and infest all future files or documents you might create. Nevertheless, these are filtered out by popular antivirus programs, but you never know. The major distinctive part of macro viruses is that they infect documents and document templates and not programs.

How Is the Computer Infected With a Macro Virus?

Usually macro viruses are received as attachments in emails and when you download the attachments they unfurl and install on your computer. Irrespective of whether it is Melissa macro virus or for that matter any other office XP macro virus, it launches along with the appropriate Windows office application and propagates. Under specific conditions the virus generates attachments to all documents you mail and spread thus. If your recipient had macros turned on, he had it. The vulnerability to macros comes from the fact that most people don't have the practice of scanning their received documents before they can be downloaded!


Mail clients like Yahoo!, for example, scan all attachments for viruses and warn the recipient. Invariably all attachment are channeled thru scans to prevent trouble. But is it safe to use MS Outlook? Certain malicious attachments execute even when mails are read in preview panel. Just reading the address book can trigger viruses to propagate easily. Some viruses don't depend on Outlook's SMTP engine (mail transfer protocol), and one they own themselves! Most popular virus here is Romeo and Juliet (also called as BleBla.)

How Do I Know My Computer Is Infected With A Macro?

This is especially simple. All you have to do is follow the steps below.

  • Launch the program you want to check for macros
  • Go to tools menu and choose Macros sub menu
  • This opens a dialog box which lists the macros, if there are any
  • You can expect infection if you find following names in the list:
  • Check_files
  • Auto_Open
  • PERSONAL.XLS!check_files
  • PERSONAL.XLS!auto_open
  • In other cases where you have an infected work book (MS Excel) open in the background you may find the following:
  • !check_files
  • !auto_open
  • 6. Alternately you can go to C:\MSOFFICE\EXCEL directory to find if there is a hidden infected file called PERSONAL.XLS. Set all files to visible status to see the file if it exists. However, you will need to check for new types as they macro viruses are generated more frequently than we think.
[ Read More ]
Oct 20, 2011

Final Destination 5 (2011) Hindi Dubbed DVDScr Rip | Full Movie




Released  : 2011
Genre       : Horror | Thriller
Starcast   : Nicholas D'Agosto, Emma Bell and Arlen Escarpeta
Desc        :Survivors of a suspension-bridge collapse learn there's no way you can cheat Death.

[ Read More ]

Android 4.0 to be open source in 'coming weeks'

Google unveils plans to make its upcoming mobile operating system release open source and available when Samsung ships the Galaxy Nexus.
HONG KONG--Google has confirmed that its latest version of the Android mobile operating system (OS), also dubbed Ice Cream Sandwich, will be made open source once the Galaxy Nexus ships.

Speaking at the AsiaD conference held here Wednesday, Andy Rubin, the company's senior vice president of mobile, unveiled the newest iteration of the platform, Android 4.0, which will soon ship with other smartphones and tablets.

Rubin said Ice Cream Sandwich will be open source "in a couple of weeks" when Samsung's Galaxy Nexus ships and manufacturers will be free to push the update to their current range of devices. Going open source means manufacturers will be able to put Android 4.0 into their own devices and cut their own ROMs for existing products.

Google previously said the Nexus S would receive the Android 4.0 update, but had not provided a timeframe for this. Honeycomb, the current tablet-only Android OS, remains closed-source and codes available only to select partners and manufacturers.

Both Android 4.0 and the Galaxy Nexus smartphone are expected to ship this November.

In a statement issued Thursday, Ovum's analyst Nick Dillon said the new OS release brings together the phone and tablet strands of Android into a single version, which is the "more important aspect of the update". This is because Android tablets' sales have so far been limited and one of the reasons for this is the relatively small number of apps available for these devices, Dillon said.

"By creating a single version of Android, Google is making it easier for developers to modify their apps and take advantage of the larger screens of tablets, which should stimulate the creation of apps designed for Android tablets," Dillon explained.

[ Read More ]

Motorola launches world's 'thinnest' smartphone


Washington, Oct 19 (IANS) Motorola has launched what it called an 'impossibly thin' Droid RAZR phone with a stainless-steel core, a Gorilla Glass screen and a nanotechnology Splash-guard that protects even the electrical boards inside.
Motorola Mobility's Indian-American president Sanjay Jha declared the 7.1mm-thick mobile device the world's thinnest smartphone. Not only is it thinner than other 3G phones, it will run on Verizon Wireless's 4G LTE network in the US.
In other countries, the phone will be called the Motorola RAZR. The details on international carriers and network compatibility will come soon.
With a 4.3-inch screen with qHD resolution, it will have higher contrast and richer color than iPhone 4S, said Jha.
Not only will it have an incredibly high-res screen and a powerful 1.2GHz dual-core processor, but it will be the 'first device to download HD movies from Netflix'.
On the software front, it runs Android 2.3.5, aka Gingerbread. It will not launch with Ice Cream Sandwich, the next version of the Android OS.
The Droid RAZR supports the webtop interface, like the Droid Bionic, Atrix, Photon and others, so one can dock it to one of Motorola's lapdocks, in order to run full Firefox browser.
The RAZR also has MotoCast, a syncing system that Jha called the phone's most important feature.
'You can stream content from your computer straight to your pocket (or purse) so your personal content is always within reach,' according to a Motorola press release.
'And, because you don't have to upload to a third-party site, you're saving time while gaining peace of mind. That's right - your files stay safe because they stay with you.'

[ Read More ]

Beginner guide to body language


It's often said that actions speak louder than words — and this rings especially true when it comes to body language. As a non-verbal form of communication, body language can be a powerful tool, as you can use it to put people at ease, make friends, or even persuade people to do things for you.
Being able to read body language can also allow you to detect things such attraction, truth, confidence and shyness.
You can read body language by carefully watching the facial expressions, hand gestures, posture, and other movements made by another person. All of us — whether we realise it or not — use body language in our everyday lives. With this in mind, here the realbuzz.com team have selected a few common body language behaviours and gestures, and given the common interpretations of their possible meanings — which will help to make you fluent in the art of reading body language!
Eye contact-A failure to look someone in the eyes or rapidly shifting eye movements can often be interpreted as trying to hide something or lying. It can also be a sign of shyness or lack of confidence.
Smiling-Smiling can demonstrate confidence, friendliness, and a positive attitude, and also gives the impression that you’re someone that people would want to be around. On the other hand, a ‘nervous’ or ‘false’ smile can demonstrate the opposite.
Attention span-Often you can tell what a person is like by noticing their attention span. For example, if someone quickly loses focus and clearly is not listening then this makes them appear disinterested, bored, and possibly even uncaring — whereas a longer attention span is likely to indicate more interest.
Head shaking or nodding-Frequently, without realising they are doing it, people nod or shake their head to signal whether they are in agreement or not. You can give your approval to someone just with a nod of the head, and your disapproval either by not nodding or by shaking your head.
Touching-Touching another person during social interaction, if done appropriately, can convey a strong message to them. For example, it can be used in a flirtatious manner to show romantic interest, or can simply be a way of calming or reassuring someone.
Arms folded/legs crossed-This can be seen as a defensive posture or can signal that the conversation is at an end as far as that person is concerned. Sitting tightly folded up indicates that you are closed to communication, as your crossed limbs effectively form a physical barrier to keep other people away from you.
Standing with hands on hips-This demonstrates a readiness to act in a situation, or can even indicate aggression. It is not the most welcoming of gestures and you may often see it displayed by teenagers wishing to show their defiance.
Handshakes-You can tell a lot from a handshake. A firm handshake is usually given by a person who is confident of themselves, while a limp handshake is usually given by nervous, shy, or insecure people. Also, watch out for the ‘hand crusher’ given by someone trying to intimidate you!
Sitting with legs crossed/legs apart-People frequently sit with their legs crossed, often with one or both feet kicking slightly, and this can be seen as a sign of boredom or impatience. Sitting in a position with your legs apart shows that you’re more relaxed and open.
Touching the nose-Touching or rubbing your nose can often be seen as a sign of doubt or a signal that you’re lying. Pinching the bridge of your nose, which you’ll often do with your eyes closed, can often be seen as a negative response to something you have just done for another person.
Rubbing hands-We’re all familiar with the old ‘rubbing the hands in anticipation’ thing. It’s usually something that we tend to do when we’re awaiting the arrival of something that we are really looking forward to!
Open palm-An open palm gesture is often one of sincerity, openness, or innocence. For example, if you truthfully say ‘It wasn’t me’ or ‘I haven’t done anything’, you’ll probably also use an open palm gesture.
Tapping fingers-
Tapping or drumming fingers on a surface such as a table or desk is a sure-fire way of letting someone know you are bored. It displays a degree of impatience in a given situation, and is often our way of telling someone else to get a move on!
Playing with hair-
Patting or fondling hair often indicates insecurity or a lack of self-confidence. Certainly, people who are nervous will frequently do it. Try watching an interview with a young sportsperson who is new to being interviewed, and you’ll see what we mean.
Tilted head-When a person tilts their head to one side, it’s often because they’re interested in something. We probably most commonly notice it with dogs, which quite clearly tilt their head when something takes their interest — but we do it to a lesser degree too.
Leaning forward-When you lean forward — either when you’re sitting down or standing up — you are indicating that you’re interested in something. In other words, an interested listener leans toward the speaker. Conversely, leaning away is a clear sign of disinterest.

Biting nails-Biting your nails is invariably an indication of nervousness or insecurity. People often refer to ‘nail-biting moments’ when watching sports matches or films — in other words, moments that are very tense and cause viewers to be nervous.
Pacing the floor-Nervousness can also be displayed by someone’s inability to stay still. A person can be up and down and pacing about, and many of us will interpret this as them being nervous or tense. For example, if you see someone waiting for an impending birth, don’t be surprised to see them wearing out their shoe leather!
Interpreting body language …


Although some behaviour and gestures have clear-cut meanings, reading people’s body language is not always an exact science because some actions can have multiple meanings. For example, if you fold your arms it doesn’t necessarily mean you are being defensive — you could just be physically cold!
Our advice is not to get in to a habit of scrutinising your and everyone else’s movements and gestures for hidden meaning. However, if a person uses several behaviours or gestures at the same time (such as biting their nails and pacing) that have the same common interpretation (nervousness), then this is a good indicator of how they are feeling at a given time.
[ Read More ]

iPhone 4S vs. Samsung Galaxy S II Drop Test




In this video, we test the iPhone 4S vs. the Samsung Galaxy S II to see which of these devices survives a waist high and shoulder high drop.

[ Read More ]