Skip to main content

Posts

Tips:Prepare for future

              The Real Skynet                       In 1998, Kodak had 170,000 employees and sold 85% of all photo paper worldwide. Within just a few years, their business model disappeared and they got bankrupt. What happened to Kodak will happen in a lot of industries in the next 10 year - and most people don't see it coming. Did you think in 1998 that 3 years later you would never take pictures on paper film again? Yet digital cameras were invented in 1975. The first ones only had 10,000 pixels, but followed Moore's law.               So as with all exponential technologies, it was a disappointment for a long time, before it became way superior and got mainstream in only a few short years. It will now happen with Artificial Intelligence, health, autonomous and electric cars, education, 3D printing, agriculture and jobs. Welcome to the 4th Industrial Revolution....

Other use of mouthwash that you didn't know

1.)Take 1:1 ratio mouthwash and Vinegar, apply it to the affected area with a cotton pad, do it twice or thrice daily until fungus vanishes.  No need to buy antifungal creams. 2.)Take little mouthwash, apply it to the affected area with a cotton pad, do it twice or thrice daily, continue until the bruise fads away.   No need to buy painkillers. 3) Deodorant No deodorant at home, need to buy one.  As an emergency, you can pat some mouthwash to your underarms with a tissue, but avoid applying it to freshly shaven armpits, it irritates the skin. 4) Feet Mixing mouthwash to a bowl of water and soaking your foot in it gives a soothing and refreshing feeling. It not only energizes your tired legs but also kills bacteria which are harmful.  No need to buy massager machine. 5) Garlic You know that garlic odor is unpleasant and while in public, it affects your self-confidence.  Get rid of it, rinse your mouth with mouthwash and also rub some onto your hands, it remo...

Top parental content lock for smartphones

1. MMGuardian (Android phone or tablet, iPhone or iPad) Control Application Install and Use Encourage your child to take a break from their device by pre-setting times when all downloaded applications will be disabled. Or remotely send a command to temporarily disable them. Also, optionally disable the App Store to prevent new app installs, or set age-based restrictions on apps, videos and music downloadable from the iTunes store. Block Websites containing Porn, Adult or other inappropriate content Prevent your child from accessing web sites that are not appropriate for children, using the Web Filter function. Select which categories of web sites are allowed or should be blocked, or set up specific URLs and domains to allow or block. View complete web browsing history The complete MMGuardian Web Filter and Safe Browser solution includes detailed reports, accessible from the parent web portal, about all sites that have been viewed and attempts that were blocked. Restrict Device Function...

Cheat Sheet to convert social media sharing address

Here is how you can share social media sharing URL when we can't  use Non-alphanumeric characters.  So to include a colon (:), slash (/), ampersand (&), question mark (?), etc., we have to use (gulp) the HTML numeric code for that character. http://www.yoursite.com/yourbookpage/?detail&buy To use this inside of one of the social networking site’s URL’s, we’re going to need to change all of those non-letter characters to HTML codes. Here’s that cheat sheet I was talking about. Change the colon (:) to %3A Change all slashes (/) to %2F Change all question marks (?) to %3F Change all ampersands (&) to %26 Change all spaces ( ) to %20 When you make those substitutions, your URL will look like this: http%3A%2F% 2Fwww.yoursite.com%2Fyourbookpage%2F%3Fdetail&buy Ugly, but browsers will read them just fine. To create those social links just replace the bit that matches our dummy address above with your own. Facebook: For this link, we’re going to replace the web pag...

Create Profile Picture & Cover Photo Combo for your Facebook Timeline Page

Follow their instructions on how to crop and resize your profile picture and cover image using their template. But here are a few things to note: Make sure your profile image is clear when it’s shrunk to 32×32 pixels, since this is the size your profile image will appear at throughout your Facebook page (for example, next to any status updates you post). Your cover photo should be uploaded at a size of 851×315 pixels (which is the same size it will be displayed on your Facebook page). Your profile image should be uploaded at a size of 180×180 pixels (but it will be displayed as 160×160 pixels on your Facebook page).

How to Unlock Chess in FB Chat Box.

All you need to do is: type "@fbchess play" and hit Enter, during a conversation, and a small square box would appear in the chat box Here's how to play: The person who initiated the game would be assigned "White" side, to make the first movement. Although there is some standard algebraic notation like:- B for “Bishop” R for “Rook” Q for “Queen” K for “King” N for “Knight” P for “Pawn” Pawns could be moved by issuing the simple commands with numbers (along with the vertical axes). For, e.g. If your first play would take the second pawn from the left and move it up one block, you would write: ‘@fbchess Pb3,’ or simply ‘@fbchess b3.' You could refer to the help section by issuing the command "@fbchess help" for the possible commands to assist you throughout the game. It turns out that the commands are case sensitive. The board will update and notify you whether it is your turn to play. You can undo a move with "@fbchess undo" command or by ...

CVE-2015-7547 MegaBug wating to hit electronic devices

TechGlyphs Editor A highly critical vulnerability has been uncovered in the GNU C Library (glibc), a key component of most Linux distributions, that leaves nearly all Linux machines, thousands of apps and electronic devices vulnerable to hackers. GNU C Library (glibc) is a collection of open source code that powers thousands of standalone apps and most Linux distributions, including those distributed to routers and other types of hardware.The flaw can be exploited when an affected device or app make queries to a malicious DNS server that returns too much information to a lookup request and floods the program's memory with code. This code then compromises the vulnerable application or device and tries to take over the control over the whole system. It is possible to inject the domain name into server log files, which when resolved will trigger remote code execution. An SSH (Secure Shell) client connecting to a server could also be compromised. However, an attacker need to bypass sev...