Skip to main content

Posts

Showing posts from June, 2015

How to Add a Recycle Bin in Your Android Phone or Tablet?

Ever deleted any files mistakenly and wondered, wish you had a recycle bin in your android phone ? Well, let’s make your wish come true. Recycle bin is one of the most exciting features of windows PC. In case you don’t know what a recycle bin is, let me tell you. It’s a kind of dust-bin of your computer. Whenever you delete a file, say a video song, it doesn’t permanently vanish from your computer. It still remains in the dust-bin, i.e. in the recycle bin. And later if you change your mind, you can restore (undelete) it easily. Now that’s a cool feature of computers. But what happens when you delete a file in your favorite android device? There is no recycle bin like computers in android phone or tablet. So when you delete some files, they get erased, forever .  Worst thing is when you delete some of your rare, favorite file(s) accidently!  That crappy – ‘What-did-I-do ’ feeling is very common amongst smartphone users. So what to do? Well, relax, chill down your jaw. We h

The 7 Deadliest Computer Viruses of All Time!

Without a doubt, the digital realm controls the physical realm of our world today. GPS satellites and systems control many technologies we take for granted, the planet’s finances are governed, monitored, and managed by computer systems, and communications technologies allow governments, corporations, organizations, and individuals to acquire and transfer information infinitely faster than could ever have been imagined only a few hundred years ago. Over time our physical security has improved immensely, security systems such as Pro-Vigil and other video surveillance or bodyguard companies through technology.  However, with these incredible technological gains we’ve realized to exponentially raise our standards of living, and alongside developed enormous risks to these systems over the years. In the world we live in today, digital security takes on a role just as prominent, if not even more so, than physical security. Past digital vulnerabilities have had the opportu